flat assembler
Message board for the users of flat assembler.
![]() Goto page Previous 1, 2, 3, 4 Next |
Author |
|
Ivan2k2 22 Oct 2010, 12:37
maybe Rustock was written with fasm and fasmlib?
![]() c\c++ + (f)asm |
|||
![]() |
|
vid 22 Oct 2010, 13:08
Rustock is just one of many things that AVs report on these files: http://www.virustotal.com/file-scan/report.html?id=5a06b06eb7530a640298c732f77b1a1305b1362846088add21c63b256dc23f43-1256003064
Come on, it's just another false alarm of which we have seen dozens. |
|||
![]() |
|
DarkAlchemist 22 Oct 2010, 15:19
Well said ManOfSteel.
Bravo, but, alas, it will fall on deaf ears. |
|||
![]() |
|
f0dder 22 Oct 2010, 17:09
Hungry trolls need feeding, too.
|
|||
![]() |
|
mindcooler 22 Oct 2010, 18:05
Even my PE from scratch Hello World gets positives from three AV:s.
Quote: AntiVir 8.2.4.52 2010.09.16 TR/Crypt.XPACK.Gen _________________ This is a block of text that can be added to posts you make. |
|||
![]() |
|
baldr 22 Oct 2010, 19:10
mindcooler,
Is your PE small enough? Mine (0.3k IIRC) alerts almost all of them. ![]() |
|||
![]() |
|
mindcooler 22 Oct 2010, 19:36
Well, mine is almost a k, 1021b.
I don't see why size alone should be suspicious. |
|||
![]() |
|
baldr 22 Oct 2010, 20:07
mindcooler,
Then you have to RE AVs more. ![]() Heuristics are the scourge of AV country. They feel confident in their algorithms, yet those algorithms are so fuzzy that single-section PE is suspicious. Signature analysers can't beat morphing engines, so they stuff more (and more) detected signatures until the whole thing goes awry. All in all it's just a brick in the wall. ![]() |
|||
![]() |
|
iic2 23 Oct 2010, 09:09
Thanks janequorzar for the heads up. I say they don't like FASM because they can't detect every detail, beside it's not a MS thing... MS be paying us ... so who cares about FASM anyway.
Quote: That makes a lot of sense.. After this thread I am starting to think this way. I started thinking like this last week, actually for a few years now. I'm like you janequorzar, I hear you loud and clear. You're not claiming to be an expert. All you are saying is: "Don't drop it, just pass it on! ... with a few notes we can get it back on track" Reading this thread kind of made me feel this was all your fault. hee hee .......................... .......................... PS: People dd if=/dev/zero of=/dev/win_par bs=1M and please add conv=notrunc,noerror dd to backup your finest working Windows than dd to clean your programming disk and Windows partition sometimes... I will not go into details but sh*t happens, bigtime, and you never know until the end. Save your project 3 times (in steps) (as app_111 is main with latest changes... get it) and off-site even for ANY kind of change no matter how small. Reboot and make sure it still W O R K . . .. than test it on another machine. |
|||
![]() |
|
bitRAKE 24 Oct 2010, 04:14
AVs are like strapping on thousands of condoms to avoid STDs (because there are several types). Not only do the condoms break, but the experience is less than pleasurable.
![]() It's a flawed approach - look at how hard it is for our own bodies to fight cancer. A virus could be created to reconfigure whatever software is present on the machine to act in a malicious manner. Meaning the virus is stored at an operational abstraction layer - not existing in a single searchable place. How could this be detected? The AV industry stopped at a rough approximation of Natural antibodies. Luckily the human body does a great deal more - otherwise we'd all be dead. The OS/browser can restrict software, but people want control and that makes the system vulnerable. I prefer to trust myself rather than defer to someone else, but it's nice to be informed about what is happening behind the scenes. So, when I make a mistake I know better where the mistake was made. [I've been thinking a lot about how to protect transparency in many settings.] |
|||
![]() |
|
drobole 04 Nov 2010, 03:21
I'm using a commercial version of Norman at work and I get trojan alerts on a lot of fasm executables, including the examples and fasmlib.
I have tried to compile the source of the offending example (flibcdll.asm) and I don't get any alerts on the resulting executable. Even though I have no reason to suspect the developers of these executables, I don't know who has access to the server where theses executables reside. Either way it might be an idea to remove the executables from the example download. |
|||
![]() |
|
Tyler 04 Nov 2010, 05:31
Has anyone verified the executables are untampered with? Wasn't this site hacked once? ... or was it just the forum that was messed with?
|
|||
![]() |
|
mindcooler 04 Nov 2010, 08:56
TrendMicro HouseCall thought my whole fasm folder was viruses.
|
|||
![]() |
|
JohnFound 04 Nov 2010, 09:45
This thread is looking too paranoid for me...
![]() There was false positives for Fresh and Fresh compiled binaries at the past, but after sending several examples to Avira support desk, and when I downloaded the next update, the alarms stopped. Also, on my work computer, there is a Symantec corporate edition installed. When our IT support team installed it for first time, there was also false positives for all Fresh and Fresh compiled files. It was fixed by our IT support and now I am working with Fresh on every corporate computer without problems. Before, it was easy for AV makers - if it is bloated and huge - then it is not virus. If it is compact and efficient - then virus. Now, when there is a growing list of assembly written applications, to detect real viruses is really harder. ![]() Regards. |
|||
![]() |
|
vid 04 Nov 2010, 09:48
Quote: Now, when there is a growing list of assembly written applications, ... Is there? |
|||
![]() |
|
revolution 04 Nov 2010, 09:51
vid wrote:
|
|||
![]() |
|
JohnFound 04 Nov 2010, 10:21
vid wrote:
Ah, yes, there is. Of course, not every programmer comes to the forum to post: "I made great program with FASM." |
|||
![]() |
|
iic2 06 Nov 2010, 18:40
inverses
Quote: This thread is looking too paranoid for me... I'll never cash-in. It been a while, and now I understand the C++ that many FASM is crazy about. I plan to do a lot of FASM modules as HOST for C++ code. I hope this is not cheating toooo much? I just want to put a little time in it. All I need is the link to vid "OPP's article for FASM". I did clean-up week back in July and I have not found them yet. It's buried so deep in my backup. Google turns-up everything other!!! Google-Please: (ASM, FASM, vid OPP's for FASM) but no vid? http://www.google.com/search?hl=en&source=hp&ie=ISO-8859-1&q=ASM%2C+FASM%2C+vid+OPP%27s+for+FASM&btnG=Google+Search&aq=f&aqi=&aql=&oq=&gs_rfai= What's up with that? I might as well ask here. Mostly, I just don't like the curly braces. It can't be impossible to replace them for personal use with the help of codeblocks or something. C++ and FASM. I always have wondered about them. Now it's like they on the same team with my FASM as QUARTERBACK, so jumping-ship is out the question. ![]() http://www.codeblocks.org/ |
|||
![]() |
|
f0dder 06 Nov 2010, 20:48
iic2 wrote: Mostly, I just don't like the curly braces. Code: #include <stdio.h> #define BEGIN { #define END } void main() BEGIN printf("42\n"); END _________________ carpe noctem |
|||
![]() |
|
Goto page Previous 1, 2, 3, 4 Next < Last Thread | Next Thread > |
Forum Rules:
|
Copyright © 1999-2025, Tomasz Grysztar. Also on GitHub, YouTube.
Website powered by rwasa.