Author Topic: MAL URL - blocking is an issue  (Read 5597 times)

0 Members and 1 Guest are viewing this topic.

nanogate

  • Guest
MAL URL - blocking is an issue
« on: January 29, 2014, 11:44:11 AM »
  8)
« Last Edit: April 19, 2014, 09:53:17 PM by nanogate »

Offline Eddy

  • Avast Evangelist
  • Maybe Bot
  • ***
  • Posts: 31216
  • Watching (over?) you
    • Malware removal, Biljart and other things.
Re: MAL URL - blocking is an issue
« Reply #1 on: January 29, 2014, 12:17:12 PM »
I strongly suggest you remove the text from the website since it is completely false.
The real problem is that you are using shared hosting.
On the same IP are malicious websites hosted and therefor the IP is blacklisted.

If you believe your website (url) should not be blocked, you can make a request by using the form on the avast website.
http://www.avast.com/contact-form.php

http://zulu.zscaler.com/submission/show/dbe4b0abd906d5614477e5fb58a3c07d-1390993446
http://urlquery.net/report.php?id=9105736

Offline Milos

  • Avast team
  • Super Poster
  • *
  • Posts: 2264
Re: MAL URL - blocking is an issue
« Reply #2 on: February 06, 2014, 07:48:34 AM »
Hello,
nothing detected. Post screenshot of avast!'s alert window and IP address of resolved domain.

Milos

Offline Eddy

  • Avast Evangelist
  • Maybe Bot
  • ***
  • Posts: 31216
  • Watching (over?) you
    • Malware removal, Biljart and other things.
Re: MAL URL - blocking is an issue
« Reply #3 on: February 06, 2014, 12:37:02 PM »
There is a problem with the website.
If I try to click with the left mouse button I get a JavaScript pop-up saying clicking with the right mouse button is disabled.

But other than that, the site opens and no warning from avast.

Here is a code that you can use to disable right/middle/left mouse button clicks.
Ofcourse you need to change it to your needs.
Code: [Select]
<script language="JavaScript" type="text/javascript">
<!--
var showContextMenu=false;
var sTestEventType='mousedown';

function handleMouseEvent(e) {
 var evt = (e==null ? event:e);
 var clickType = 'LEFT';

 if (evt.type!=sTestEventType) return true;
 if (evt.which) {
  if (evt.which==3) clickType='RIGHT';
  if (evt.which==2) clickType='MIDDLE';
 }
 else if (evt.button) {
  if (evt.button==2) clickType='RIGHT';
  if (evt.button==4) clickType='MIDDLE';
 }

 // Make sure hyperlinks (A tags) still work!
 if (evt.target     && evt.target.tagName     && evt.target.tagName.toLowerCase()=="a")     return true;
 if (evt.srcElement && evt.srcElement.tagName && evt.srcElement.tagName.toLowerCase()=="a") return true;

 alert(evt.type+': '+clickType+' button!');
 return true;
}

document.onmousedown = handleMouseEvent;
document.onmouseup   = handleMouseEvent;
document.onclick     = handleMouseEvent;

// NOTE: document.captureEvents is obsolete (NS4.x)
if (document.layers) document.captureEvents(Event.MOUSEDOWN);

//-->
</script>
« Last Edit: February 06, 2014, 12:49:51 PM by Eddy »

nanogate

  • Guest
Re: MAL URL - blocking is an issue
« Reply #4 on: April 13, 2014, 05:16:06 PM »
"I strongly suggest you remove the text from the website since it is completely false."
 
Which website do you mean Eddy ? my web or from this forum ?

Offline polonus

  • Avast √úberevangelist
  • Probably Bot
  • *****
  • Posts: 33628
  • malware fighter
Re: MAL URL - blocking is an issue
« Reply #5 on: April 13, 2014, 11:59:49 PM »
The site is vulnerable, because your Joomla version is outdated.
You should update your CMS!

See: http://sitecheck.sucuri.net/scanner/?scan=http%3A%2F%2Fnanogate.co.uk%2F
Joomla Version 1.5.18 to 1.5.26 for: htxp://nanogate.co.uk//language/en-GB/en-GB.ini
Joomla version outdated: Upgrade required.
Joomla Version
1.5
Found in META Generator Tag

The following modules were detected from the HTML source of the Joomla front page.
No modules were found passively in HTML source
The following components were detected from the HTML source of the Joomla front page.
No components were found passively in HTML source
The following plugins were detected from the HTML source of the Joomla front page.
No plugins were found passively in HTML source

Google safe browse check
PASSED
Google finds the site to be free of malware

Server: Apache/2.4.9 (Unix)
X-Powered-By: PHP/5.2.17
IP Address: 79.170.44.141
Provider: HEART INTERNET LTD
Country: GB

The IP had a history of PHISHing!

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!