Wed Dec 19 18:52:01 2018: Request 127918 was acted upon. Transaction: Correspondence added by j...@hemmerling.net Queue: PAR-Packer Subject: Re: [rt.cpan.org #127918] PAR::Packer produces executable with virus Broken in: (no value) Severity: (no value) Owner: Nobody Requestors: j...@hemmerling.net Status: open Ticket <URL: https://rt.cpan.org/Ticket/Display.html?id=127918 >
On 12/05/2018 02:13, Martin McGrath via RT wrote: > <URL: https://rt.cpan.org/Ticket/Display.html?id=127918 > > > In the past I'd experienced problems installing pp on windows in a corporate > environment, caused by over sensitive AV/Security software. Once resolved the > exes generated didn't exhibit the problem you're experiencing, but it's not > unheard of: > > https://perlmonks.org/?node_id=1222404 > > I trust you've ensured that the machine itself has no underlying infection? > Also, which version of perl do you have installed (AS/Strawberry, x86/x86_64?) Thanks for your reply. I know it's Packer code causing the problem because the virus detector goes off as soon as "boot.exe" is produced during installation. I just rewrote the code in C++ to avoid all this. Using 32-bit Strawberry perl: % /apps/devtools/Strawberry/perl/bin/perl.exe --version This is perl 5, version 28, subversion 0 (v5.28.0) built for MSWin32-x86-multi-thread-64int Copyright 1987-2018, Larry Wall -- -- Jeff Hemmerling