Wed Dec 19 18:52:01 2018: Request 127918 was acted upon.
Transaction: Correspondence added by j...@hemmerling.net
       Queue: PAR-Packer
     Subject: Re: [rt.cpan.org #127918] PAR::Packer produces executable with 
virus
   Broken in: (no value)
    Severity: (no value)
       Owner: Nobody
  Requestors: j...@hemmerling.net
      Status: open
 Ticket <URL: https://rt.cpan.org/Ticket/Display.html?id=127918 >


On 12/05/2018 02:13, Martin McGrath via RT wrote:
> <URL: https://rt.cpan.org/Ticket/Display.html?id=127918 >
> 
> In the past I'd experienced problems installing pp on windows in a corporate 
> environment, caused by over sensitive AV/Security software. Once resolved the 
> exes generated didn't exhibit the problem you're experiencing, but it's not 
> unheard of:
> 
> https://perlmonks.org/?node_id=1222404
> 
> I trust you've ensured that the machine itself has no underlying infection? 
> Also, which version of perl do you have installed (AS/Strawberry, x86/x86_64?)

Thanks for your reply.  I know it's Packer code causing the problem
because the virus detector goes off as soon as "boot.exe" is
produced during installation.

I just rewrote the code in C++ to avoid all this.

Using 32-bit Strawberry perl:

   % /apps/devtools/Strawberry/perl/bin/perl.exe --version
   This is perl 5, version 28, subversion 0 (v5.28.0) built for 
MSWin32-x86-multi-thread-64int
   Copyright 1987-2018, Larry Wall

-- 
-- Jeff Hemmerling

Reply via email to