Install Steam
login
|
language
简体中文 (Simplified Chinese)
繁體中文 (Traditional Chinese)
日本語 (Japanese)
한국어 (Korean)
ไทย (Thai)
Български (Bulgarian)
Čeština (Czech)
Dansk (Danish)
Deutsch (German)
Español - España (Spanish - Spain)
Español - Latinoamérica (Spanish - Latin America)
Ελληνικά (Greek)
Français (French)
Italiano (Italian)
Bahasa Indonesia (Indonesian)
Magyar (Hungarian)
Nederlands (Dutch)
Norsk (Norwegian)
Polski (Polish)
Português (Portuguese - Portugal)
Português - Brasil (Portuguese - Brazil)
Română (Romanian)
Русский (Russian)
Suomi (Finnish)
Svenska (Swedish)
Türkçe (Turkish)
Tiếng Việt (Vietnamese)
Українська (Ukrainian)
Report a translation problem
And you didn't read my posts. I've replied in the wider context of the many posts we've had on this subject, hence mentioning PUPS.
Your argument is inconsistent. DRM by it's very nature is an unwanted or malicious program as it prevents an application running and acting as it would otherwise be expected to. Thus you can't complain when a completely separate third party's software that is designed to detect such things flags an application that is not running and acting as it would otherwise be expected to...
They can't tell magically tell the difference between a newly released encrypted (or encrypting) file that acts in the same way a virus doing, say, a ransomware attack does. An initial detection is based on known hashes of code within previously seen malicious applications and/or the behaviour of the binary. Oddly enough malicious software contains the same sort of code (e.g. encryption libraries) and acts in similar ways (interacting with files via that encryption) as DRM does.
AV vendors need to wait until the file is released, flagged, reported, analysed and at that point then they MIGHT make a guess as to whether the file is safe or not based on the source, and finally update their definition list to ignore it. But as I said, it costs them nothing to flag a file that's acting in a way you have asked them to identify by installing their software, since, as you are proving, users blame the application not the AV!.
You cannot blame ED for another vendor breaking their software by deleting files anymore than you can complain they didn't stop you deleting files manually yourself! That does not mean the DRM is not working as designed, it is.
And you do realise that ED do not own the aircraft modules that are being flagged? These are all Razbam modules. And what "changed a month ago" was Razbam and ED getting into a legal spat leading to RB ceasing support and development of their modules. Due to changes in the core game, and I suspect a certain level of F.U. from RB with dead mans switches embedded in their code, core game change patches are leading to bugs that ED may be trying to patch themselves. That will almost certainly lead to incompatibilities and clashes with RB owned DRM checks.
So your comment about being left with a non-functional module due to ED changing something is completely erroneous. ED do not own the module (Razbam do), and if you purchased through Steam then ED did not sell you the module, Steam did.
So you are about to find out the hard way what an End User Licence Agreement is. Razbam have ceased support, any come back from that is covered under their EULA, and likely amounts to "tough luck sucker". Steams EULA has already been confirmed to be "no refunds for DLC".
So as I said your choices are basically:
1) Trust the DCS software is being falsely flagged (or uninstall it if you trust your AV vendor more).
2) Don't buy or use DRMed products.
3) Don't buy further products from Razban and show other vendors that following their actions will result in long term financial loss .
4) Don't buy products via Steam without understanding the many implications of that choice (up to and including that you could lose all access to that software if Steam go bust or even just decide to pull support for it).
i have many games that dont throw AV issues that i can play, i dont need DCS so bad as to run a risk like this. i mean this is basic PC security to question such things, no one (or dev/publisher) is above scrutiny.
ED: sort it out and respond to your customers
Originally headquartered in Moscow, Russia, it is now headquartered in Villars-sur-Glâne, Switzerland.
Like being located in switzerland makes a difference as to the safety of their product since russian spies were inside the US for decades. Some of them being US citizens. Hanson for example, aldritch.
Deadmeat above says this:
AV vendors need to wait until the file is released, flagged, reported, analysed and at that point then they MIGHT make a guess as to whether the file is safe or not based on the source, and finally update their definition list to ignore it.
As if ED are going to give some AV company the source to their product which they guard so closely here. Forget it. Wont happen. So this file will forever more throw up flags and not one soul here on the forums can guarantee that the file is safe. So no change from before then.
E:\SteamLibrary\steamapps\common\DCSWorld\Mods\aircraft\F-4E\bin\HeatblurJester.dll
PUA:Win32/Packunwan
And
E:\SteamLibrary\steamapps\common\DCSWorld\Mods\aircraft\M-2000C\bin\M2KC_CPT.dll
PUA:Win32/GameHack
Have searched the forums and seems to be something quite a few people are reporting currently. Not really knowledgeable enough on the subject to know whether it's advisable just to add to an ignore list and carry on as if nothing happened or what here.
AKA your AV vendor doesn't like the file likely due to the way it is packaged, i.e. it could be using DRM that also has the potential to be used maliciously. Note that this warning does not mean that this is the case, just that it might be.
PUA:Win32/GameHack is a heuristic detection designed to generically detect a Potentially Unwanted Program.
Same deal, it doesn't know what it is but it might be "something bad".
In both cases these are required game files. If you do a file check of DCS and that comes back ok then you have what the module developer delivered via Steam (i.e. it isn't infected or replaced by something else).
If you don't trust Steam or the module vendor then your only option is to remove the module.
27-07-2024:
it installed and updated without triggering an AV alarm for me today.
dcs patch/update successful installed