In reviewing a personal project I have seen this code (attached header functions) in the head (head), to inspect fire bug or the equivalent of chrome. First I thought of the libraries I use in the project but then I realized that appears on every page I visit.
....css rules....
Disabling browser protection of AVAST (I use the free version and is updated) seems to disappear.
Since the function names are a minimum alarming, I am looking for documentation on the subject.
In the css seems to create a hidden frame.
You have information?, AVAST is really who enter this code?
If so be not you think it would be a help to sign, at least one comment …
In order for the WebRep plugin to work it needs to inject CSS and JavaScript code into the webpages. WRC is the original internal codename that later became WebRep.
We need to know how to disable this, turning phishing off didn’t change a thing for me and I’d prefer to keep that feature active…it just needs to be built smarter.
It’s injecting code into my sites while I develop them which makes it difficult to determine what is my css and what is not. i.e. all external urls have extra nbsp spaces and spans injected right inside my blocks of code thus pushing elements, forcing wraps, adding extra margin/padding and line heights, etc. (different for each browser) Learn how to use overlays with position absolute instead please. Do it the proper way.