mkdir /home/qscand
pw groupadd qscand
pw useradd qscand -g qscand -d /home/qscand -s /usr/bin/false

mkdir -p /var/spool/qmailscan
mkdir -p /var/spool/qmailscan/quarantine/tmp /var/spool/qmailscan/quarantine/cur /var/spool/qmailscan/quarantine/new
mkdir -p /var/spool/qmailscan/working/tmp /var/spool/qmailscan/working/cur /var/spool/qmailscan/working/new
mkdir -p /var/spool/qmailscan/archive/tmp /var/spool/qmailscan/archive/cur /var/spool/qmailscan/archive/new

./configure \
--qs-user qscand \
--qmaildir /var/qmail \
--spooldir /var/spool/qmailscan \
--admin accountbounce \
--domain domainelo.com \
--scanners auto \
--notify none \
--archive no \
--redundant yes \
--log-details syslog \
--fix-mime yes \
--add-dscr-hdrs yes \
--unzip yes \
--bindir /var/qmail/bin

cp quarantine-attachments.txt /var/spool/qmailscan/
chown -R qscand:qscand /var/spool/qmailscan/
cp qmail-scanner-queue.pl /var/qmail/bin/qmail-scanner-queue.pl
chown qscand:qscand /var/qmail/bin/qmail-scanner-queue.pl
chmod 4755  /var/qmail/bin/qmail-scanner-queue.pl
/var/qmail/bin/qmail-scanner-queue.pl -z
/var/qmail/bin/qmail-scanner-queue.pl -g

    Source: geocities.com/hackermuda/exploits

               ( geocities.com/hackermuda)