Conrad Sallian's community posts
HELP!!!!!!!! AVG and other Antivirus issues
Conrad Sallian,
Support (Posts: 3074)
Sep 13, 2022 5:32:02 pm EDT
Hi Rob,
It was today that we informed Avast (and by extension AVG) about that the last time :) Frankly, why it is so hard to whitelist at least the digital signature is beyond me.
It was today that we informed Avast (and by extension AVG) about that the last time :) Frankly, why it is so hard to whitelist at least the digital signature is beyond me.
HELP!!!!!!!! AVG and other Antivirus issues
Conrad Sallian,
Support (Posts: 3074)
Sep 13, 2022 3:55:16 pm EDT
Hi Rob,
I saw the link and the false positive detections. However, the certificate information is wrong - well, outdated. Even if you use the version 6.10 to build a custom installer there must be another certificate, a valid one issued by DigiCert. Here is a screenshot:
Have you tried to reconfigure your build? That should help.
I saw the link and the false positive detections. However, the certificate information is wrong - well, outdated. Even if you use the version 6.10 to build a custom installer there must be another certificate, a valid one issued by DigiCert. Here is a screenshot:
Have you tried to reconfigure your build? That should help.
HELP!!!!!!!! AVG and other Antivirus issues
Conrad Sallian,
Support (Posts: 3074)
Sep 13, 2022 12:47:32 pm EDT
Hi Rob,
Is it a freshly built installer?
Is it a freshly built installer?
Windows Defender flags 7.1.7.0 as VIRUS
Conrad Sallian,
Support (Posts: 3074)
Sep 05, 2022 10:19:31 am EDT
Hello,
One of those rare moments when it's not us who are getting blamed for the false positives, but the antivirus engine that generated them :)
One of those rare moments when it's not us who are getting blamed for the false positives, but the antivirus engine that generated them :)
Remote install without my knowledge
Conrad Sallian,
Support (Posts: 3074)
Aug 31, 2022 6:50:28 am EDT
Hello,
This registry entry contains the Host settings.This registry location has data >> HKEY_LOCAL_MACHINE\SOFTWARE\Usoris\Remote Utilities Host\.
Neither of the this data can help with tracking the attacker. Only the logs can tell what was the originating IP address that was connecting to the machine. However, even that may not be necessary since it may be an address of a proxy server somewhere in India or Pakistan and knowing it won't help much.Well they do contain a different port number than your documents show, and also include a <server_private_key> and a <server_public_key>. Can these be used to track the attacker?
I'm sorry, but the software such as Remote Utilities cannot miraculously appear on your computer out of thin air. If it has been found on your computer, it only means that someone had gained unauthorized access to you computer (or network) previously and Remote Utilities being installed on your machine is your least problem. This is fighting with the effect, not the cause.I have blocked known ports on my firewall, but it would seem that an attacker can set their own ports. This is just a game of Whacka-Mole.
Remote install without my knowledge
Conrad Sallian,
Support (Posts: 3074)
Aug 30, 2022 10:39:47 am EDT
Hello,
Thank you for your message.
As per using Remote Utilities, we disclose what information is collected and how it is used in our privacy policy.
Remote Utilities is software for legitimate remote access and remote support. We bear no responsibility for unauthorized use of this software.
Hope that helps.
Thank you for your message.
I'm sorry, but we have no idea how it could be installed. Perhaps, someone got unauthorized access to your computer and installed it (this is the most viable hypothesis). This can be applied to just about any software, not only Remote Utilities.So my question is, how was your product installed on a Windows 10 Professional Desktop, without my knowledge or approval.
Unfortunately, we cannot answer this question either simply because if someone gains unauthorized access to your computer they can copy any information from it anywhere. How could we possibly know what information they may steal from that PC?My next question is, how do I know what information / data has been downloaded from my Windows Desktop, and wh ere it was sent.
As per using Remote Utilities, we disclose what information is collected and how it is used in our privacy policy.
Remote Utilities is software for legitimate remote access and remote support. We bear no responsibility for unauthorized use of this software.
Hope that helps.
Free license: Notification near the system tray and other changes
Conrad Sallian,
Support (Posts: 3074)
Aug 26, 2022 8:22:42 am EDT
Hello Alessandro,
Thank you for your feedback.
Please, note that the purpose of this warning message/banner is to generally notify the user about the fact of someone being connected to their computer, not to give any specific details of the connection (i.e. the user is supposed to act immediately and terminate the connection if it's not authorized).
Also, this window is only shown in the free version because it's the one which was abused most. The commercial version doesn't show this banner.
Thanks.
Thank you for your feedback.
Please, note that the purpose of this warning message/banner is to generally notify the user about the fact of someone being connected to their computer, not to give any specific details of the connection (i.e. the user is supposed to act immediately and terminate the connection if it's not authorized).
Also, this window is only shown in the free version because it's the one which was abused most. The commercial version doesn't show this banner.
Thanks.
Server - Bind to specific IP address
Conrad Sallian,
Support (Posts: 3074)
Aug 05, 2022 9:14:56 am EDT
Hello Jeff,
Neither RU Server nor Host provides IP address binding. There used to be one on the Host long time ago, but we removed that feature because it was no longer necessary.
Thanks.
Neither RU Server nor Host provides IP address binding. There used to be one on the Host long time ago, but we removed that feature because it was no longer necessary.
Thanks.
216.158.232.18 detections
Conrad Sallian,
Support (Posts: 3074)
Aug 05, 2022 8:25:03 am EDT
Hi Daniel ,
Thank you for your message.
Yes, this is one of our servers. The reason why your security software says that it might be malicious is that someone may use our legitimate software for malicious purpose and that use was detected. However, this doesn't make the server itself or the software malicious (which is pretty hard to explain to security experts given their level of paranoia:) ).
In other words, the fact that hackers use Windows or Linux to build viruses doesn't make these OSes malicious per se. Unfortunately, modern security software is mostly "reputation-based" and immediately flags benign software as a virus or "suspicious" if it was used at least once in some illegal activity (see technical support scam).
Hope that helps.
Thank you for your message.
Yes, this is one of our servers. The reason why your security software says that it might be malicious is that someone may use our legitimate software for malicious purpose and that use was detected. However, this doesn't make the server itself or the software malicious (which is pretty hard to explain to security experts given their level of paranoia:) ).
In other words, the fact that hackers use Windows or Linux to build viruses doesn't make these OSes malicious per se. Unfortunately, modern security software is mostly "reputation-based" and immediately flags benign software as a virus or "suspicious" if it was used at least once in some illegal activity (see technical support scam).
Hope that helps.