Clicked on the link to ensure the download link works and now my whole site is blocked (since my program tested positive as a Drep (whatever that means)). What the hell? Only way to access it is by disabling Avast IS 2015.
I have had Avast 2014 up until yesterday with no problems. Just updated my program today and when testing the download link, this c*** occurs. Any way to get this whitelisted locally and possibly globally so that this false positive does not block this OPEN SOURCE program?
Did you read the info at the first link? It appears the threat comes from elsewhere, outside the site.
Did you consider that possibly malware is being delivered through ads on that web site? Quite likely inconsistently, as not everyone sees the same ads all the time.
It’s a sad state of affairs, but some ad delivery services DO deliver malware laden ads. The webmaster who has chosen to partner with such a service should be informed and should stop his/her association with such service.
Maybe instead of criticizing the anti-malware software that blocks legitimate threats, as confirmed by others, you should take action that will actually help. Let the owner of alltechtalk.net know about the problem.
This is really starting to annoy me. How can I at least disable this shit locally? Can’t believe that I paid $ for something that is a pain in the ass when it comes to whitelisting.
If the software makes it into the Virus Chest - which this may not have - you can open the Virus Chest and explore the right-click context menu options there.
For what it’s worth, Avast doesn’t block your whole site for me here. And good for you not having any ads. That’s an underhanded way to try to make money online.
It pays to take some time and work through all the many settings panels in Avast. There are a lot of things you may want to reconfigure. It really can be made to be non-intrusive, and it does respect exclusion lists - assuming you manage to get your exclusions in the proper list.
But if your program is legitimate, and somehow Avast is detecting it as a false positive, then it makes sense to report it to Avast, because your prospective users may see the file blocked as well. Avast does act on such reports and enhance their database.
Site redirects: htxp://www.alltechtalk.net/forum/index.php
Sucuri comes up with: ISSUE DETECTED DEFINITION INFECTED URL
Internal Server Error 500-error?v1 htxp://www.alltechtalk.net/forum/member.php?action=register
Site error detected. Details: http://labs.sucuri.net/db/malware/500-error?v1
HTTP/1.1 500 Internal Server Error = It might be a temporary error, but it can also be related to a malicious injection gone wrong and breaking the site. Code hick-up:
ajax.googleapis dot com/ajax/libs/jquery/1.7.1/jquery.min.js benign
[nothing detected] (script) ajax.googleapis dot com/ajax/libs/jquery/1.7.1/jquery.min.js
status: (referer=wXw.alltechtalk.net/forum/member.php?action=register)saved 93868 bytes 9eb9ac595e9b5544e2dc79fff7cd2d0b4b5ef71f
info: ActiveXDataObjectsMDAC detected Microsoft.XMLHTTP
info: [decodingLevel=0] found JavaScript
suspicious: → http://jsunpack.jeek.org/?report=42ad21c2f991379d1d3449791376c3e67c0782ec
Has value name saved legacy settings that could give heuristic detection as Trojan/Win32/FakeAV.
Low risk analysis, Value Name: [ MigrateProxy ], also found up as trojan attack code, Volatile Environment - general cheat code.
LOL, some days online security starts to resemble a self-eating snake. See the attached image after trying to browse to the site you listed above, Eddy.
As a zip, Avast allows the file to be downloaded and allows it to be runned after it is extracted. As an EXE (http://www.alltechtalk.net/Yoga/Yoga_Patch.exe), it still blocks the download.