To update to the 18.1.2326 version, Avast created a new folder and started a new executable to do the update.
Do Avast Software s.r.o. programmers have any clue how computer works?
Most people run firewalls. Hardware or software, these firewalls don’t just block unknown incomings, they also block all unauthorized outgoings.
So when Avast creates new folders with new executables in them, do you think the firewalls are going to let it go through like there was nothing?
NO!
So what is the result? Avast does not get updated. Avast users are not well protected.
Avast is coded like its employees do not care if its users are updated or not. The method used for updates is bound to get blocked.
So users, when they figure that an update is available but it’s just stays available, never gets installed, users must go out of their way to look at the file structure to inspect for new executables, go through their event viewers and figure that there’s some new process wants internet access. That process is a one off. The firewall rule that was just added is instantly obsolete and should be remove as the next update will use a different executable in a different location.
You guys need to fix that. Continuing to use a method that is will always be blocked is not good practice… any which way you want to look at it, it’s flawed.
A connection was blocked by the outbound rule:
PID: 4856 \device\harddiskvolume2\XYZ\avast\setup\new_12010916\instup.exe
Direction: Outbound
Source Address: 10…
Source Port: 57408
Destination Address: 10…
Destination Port: 53
Protocol: UDP
A connection was blocked by the outbound rule:
PID: 3848 \device\harddiskvolume2\program files\common files\avast software\overseer\overseer.exe
Direction: Outbound
Source Address: 10…
Source Port: 58081
Destination Address: 192…
Destination Port: 53
Protocol: UDP
Do you guys think that instup.exe or overseer.exe got their return?