script blocking

I assumed that when the script blocker flashes up…it it blocking a script… :slight_smile:

Your assumption is correct… I’ve just asked if the script was infected or not.
The user complains that avast! does not block the script. I just say that avast! will only block IF it it infected, otherwise, the scripts will run without any warning. Did I make myself clear this time? :-[

ah sorry Tech my mistake…didn’t read it properly… :-[

Hi Tech, yes this script is supposed to be malicous. analog x blocks file extensions .vbs,.vbe,.js,.jse,.hta,.wsf,.wsh,.shs,.shb. I assume these are bad script only.I believe avast pro should have done this.Avast pro calls this feature "script blocking" not scanner.tim

Hi Susz and timcan,

If you have FF you could do script blocking with NoScript, I have this add-on there now for quite some time, and I am quite satisfied with it… With one click you can block, block temporarily, unblock, unblock temporarily script. See this thread:
http://forum.avast.com/index.php?topic=15637.0.
Together with the Dr Web in-browser link checker I feel well protected. The real trouble starts when malicious script has been inserted into a site. This can be the route to so-called on-the-fly infection, be it irritant ad- or spyware or evenscumware and even worse nastiness. MS script hosting can be a means of running dangerous script unto your comp too. Here Bitdefenders’ free checker can be helpful.

greets,

polonus

Wrong. Not all the scripts are bad or infected. A lot of them are normal, legit, perfect.

It blocks after being scanned. It blocks the infected ones. Ok, could have another name but, after all, the user should know the behavior of the software that he/she is using.

I installed the Plugin (10Kb) into FF and you just right click a link and there’s a report popup. Amazing :o
Very informative thread everyone , plus good question to ask Susz !
Learn something new everyday ;D

I have my question. Does Avast! script-blocking do its job in human language or computer language of script? For I understand that script can be written in computer language, which is more various than human language with 01 combinations and is much tougher to be identified as malicious. Analogue X and Script Sentry block every script but how does Avast! recognize malicious script?

What will be the difference between scanning a script or a common program, an executable or zip file?
All files are ‘translated’ into binary combinations, aren’t they? avast! should be able to interpretate the binary code in any situation.
If this was not possible, an antivirus won’t be possible to run, it will have to block every program, script, etc.
avast! can analyse some ‘souspicious’ behaviors (for email and for the Behavior Blocker) but the most way it works is scanning not blocking.

Thanx for the reply, Tech.

Your ecplanation is reasonable and natural.

However, even in that case, it would be a good idea using both script blocker even if somebody is using the pro edition since script based virus varies and can be often unknown. Setting script-blockers to deny every single script and makes exclusions according to the needs may not be innovative but rational. A good and informative thread, any way. :slight_smile:

I fully agree. I use AnalogX myself besides the Pro version 8)