Language Selection

English French German Italian Portuguese Spanish

Malware Warning (resolved)

Filed under
Site News

I have been informed that my site was producing malware warnings from Google. Google web tools reported that some malicious ads were possibly being served through my OpenX ad server. OpenX has been removed and the database deleted. You would have only encountered the infected sites if you had followed one of malicious ads and landed on a site delivering the malware. But since openX is gone for now, tuxmachines.org is completely safe as are the google ads that remain.

I just hope google will remove the warning with their next crawl. I have requested a review. Until then you can safely add tuxmachines.org to list of safe sites to avoid the warning.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

more warnings

Seems like Firefox (windows version) is warning as well.

I can reach TM via IE8 (using GoogleDNS) but FF (using GoogleDNS) spawns a malware warning.

Here's the link it offers to get "de-listed"

http://www.stopbadware.org/firefox?hl=en-US&url=http%3A%2F%2Fwww.tuxmachines.org%2F

You can also disable the autoblock in Firefox by:

"Can I disable the attack site warnings in Firefox? Yes, but doing so will leave your computer more vulnerable to being infected with badware. If you are willing to accept this risk, you may disable the warnings in the Firefox options/preferences by clicking the Security tab, unchecking “Block reported attack sites,” and clicking OK. "

re: warnings

I already put in for a review there too. They said a couple days there. Google said weeks. Sad

indeed

Yep, Indeed I noticed it as well and couldn't believe my eyes Smile
Today the warning is gone, though.

http://img.nux.ro/Screenshot-tuxmachines.png

More in Tux Machines

Android Leftovers

FreeBSD 12 & DragonFlyBSD 5.6 Running Well On The AMD Ryzen 7 3700X + MSI X570 GODLIKE

For those wondering how well FreeBSD and DragonFlyBSD are handling AMD's new Ryzen 3000 series desktop processors, here are some benchmarks on a Ryzen 7 3700X with MSI MEG X570 GODLIKE where both of these popular BSD operating systems were working out-of-the-box. For some fun mid-week benchmarking, here are those results of FreeBSD 12.0 and DragonFlyBSD 5.6.2 up against openSUSE Tumbleweed and Ubuntu 19.04. Back in July I looked at FreeBSD 12 on the Ryzen 9 3900X but at that time at least DragonFlyBSD had troubles booting on that system. When trying out the Ryzen 7 3700X + MSI GODLIKE X570 motherboard on the latest BIOS, everything "just worked" without any compatibility issues for either of these BSDs. Read more

How to break out of a hypervisor: Abuse Qemu-KVM on-Linux pre-5.3 – or VMware with an AMD driver

A pair of newly disclosed security flaws could allow malicious virtual machine guests to break out of their hypervisor's walled gardens and execute malicious code on the host box. Both CVE-2019-14835 and CVE-2019-5049 are not particularly easy to exploit as they require specific types of hardware or events to occur. However, if successful, either could allow a miscreant to run malware on the host from a VM instance. CVE-2019-14835 was discovered and reported by Peter Pi, a member of the Tencent Blade Team. It is found in the Linux kernel versions 2.6.34 up to version 5.3, where it is patched. Read more

Sandwich-style RK3399 SBC has optional NVMe and 4G

Boardcon’s “Idea3399” SBC integrates a CM3399 module with 4GB LPDDR4 that runs Android 7.1.2 on a Rockchip RK3399. The SBC offers optional M.2-based NVMe and mini-PCIe-based 4G. Boardcon also recently unveiled a MediaTek-based CM-MT6737 module. Boardcon announced a compute module and an SBC based on it equipped with a hexa-core Rockchip RK3399 SoC. As noted by the CNXSoft story that picked up the announcement from Embedded Computing Design, the Idea3399 is the company’s second sandwich-style implementation of the RK3399, following its EM3399 from 2017. Read more