|Running a Maven Webdriver Testng test on Jenkins, unidentifiable error|
Looking at the exception trace, you are missing some classes as you are
getting ClassNotFoundException and hence InvocationTargetException. There
are a couple of things you can try if you haven't already.
Upgrade your maven
Configure Jenkins to use the correct Maven install
You can probably find answer here. Hope that helps
|my app android is detected as malware in Avast|
Your app may be detected for several reasons:
you collect and send remotely private data such as IMEI, IMSI, phone number
your app uploads images online but does not include any EULA and Avast
thought you were doing that for malicious purposes
you are using an aggressive advertisement kit such as StartApp, AirPush etc
and that adkit is detected by Avast
Your solutions are:
contact AVAST and ask them to remove your app's detection. They'll study
your app more in depth and decide if it's malicious or not.
select less aggressive advertisement kits in your app if you want to
monetize it. Also consider not monetizing it all if you are just an
individual developing for fun. Advertisements pollute devices and in then
you won't be getting much money in return, apart if your application i
If your server has been compromised you need to rebuild it:
Export your existing content
Rebuild the box with an up to date wordpress version
Import your content
Regularly apply security updates
got a compromised Wordpress installation and it's a matter of time before
some other script-kiddy adds their own personal touches, or something worse
|Which file names are often associated with a malware or a virus?|
Check your .htmaccess file
.htmaccess file is vulnerable to malware attacks and commonly encountered.
Hackers use it to redirect your Joomla web page to their own site. Check
for any line or a string function ‘gzuncompress’ that should not have
been here. It won’t be a difficult process for you to detect the function
that wasn’t written by you to create the website. Set the .htmaccess file
permission to 444.
All the information get from
Hope will help.
|Windows phone "Scan the app for malware"|
I can't speak on behalf of MS but I imagine that the malware tools used
internally aren't available outside. Having said that, you could still run
scans using programs like MalwareBytes or Microsoft Security Essentials on
your XAP file itself and/or rename XAP to ZIP and unzip it to scan the
files individually. Viruses stored within the XAP file could be read in by
an app and then spread onto other platforms (even if it doesn't affect the
phone itself. The requirements may be discussing that.
If your app isn't doing anything suspicious and doesn't use unsupported
APIs, I personally wouldn't worry too much. Whilst there may be some false
positives sometimes, I'm not aware of any particular tool that this section
of the requirements specifically refers to.
Edit - I was reminded that there
|Get malware infected sites via Google Webmaster Tools api|
You would want to use the safebrowsing api rather than the webmaster one
(even though you can receive message notifications through webmasters).
There is a fair usage limit of 10,000 urls per day but you can get it upped
for free by contacting them (or create your script to limit to 10,000 and
continue in 24hrs time).
|malware code insert script to my .js .php and include file. help me to decode script|
If you crawl through the code and methodically replace the junk identifier
names, it makes a lot more sense. Most of the code and identifiers are
just there to obscure, and a lot of the rest of it just looks like
boilerplate code for browser-compatible ways to do things like attach
It also makes a pretty big deal of checking that you're on Windows, for
some reason, but that doesn't change the payload that's eventually
The piece that deploys the payload to the page is here:
var newElement = window[_document][_createElement](_div);
newElement[_innerHTML] = decodeString(key, payload);
newElement[_style][_display] = _none;
The payload decrypts as: