- Jan 29, 2019
- 2,833
- 3,946
Thanks for the clarification!Godot 4 uses GLES3, since there are issues with developing support for GLES2(the version godot 3 uses). the full explanation can be found here:You must be registered to see the links
so for the sake of clarity, FS uses GLES3.
uh that is the one you can download here, also its not "not much here" its literally just buttons that do nothing lol. Not even sure why that is on the links bit for this lolAbout Godot version:
That's from their blog, if somebody didn't noticed this line. So, I think, it better to use .gblorb version.
- New Godot Version(Very much a work in progress, not much here yet!):
You must be registered to see the links,You must be registered to see the links,You must be registered to see the links,You must be registered to see the links, orYou must be registered to see the links
that may be a false positive since I have seen it popup ALOT but I would rather somone who knows more then me confirm it.Win: Mega
Windows default virus scan: Trojan:Script/Wacatac.B!ml
Definitely a false positive. Names like that (i.e. "Trojan:Script/Wacatac.B!ml") are pretty generic, and it's basically the AV software's way of saying "this might be a virus. Maybe. I think? Possibly." This is called a heuristic match, and it essentially searches for "suspicious behavior" (note that sometimes even something as benign as a decompression algorithm can trigger this) rather than a confirmed positive match.that may be a false positive since I have seen it popup ALOT but I would rather somone who knows more then me confirm it.
from my own expirence I had the same issue but it during development of a 32bit inno installer that had a seporate embeded c# temporary program that would handle the more complex requirements.Definitely a false positive. Names like that (i.e. "Trojan:Script/Wacatac.B!ml") are pretty generic, and it's basically the AV software's way of saying "this might be a virus. Maybe. I think? Possibly." This is called a heuristic match, and it essentially searches for "suspicious behavior" (note that sometimes even something as benign as a decompression algorithm can trigger this) rather than a confirmed positive match.
The best way to know for sure is to upload it to an aggregate site like VirusTotal. If a majority of the scanners agree that it's badware then, yeah, it should likely be avoided. FSGodot.exe, however, comes up with this:
View attachment 2093891
If 1 out of 69 scanners detect it, it's safe to say that it's a false positive.
I can speak on this from experience as well. I used to contribute to an open-source project, and we constantly had issues with Windows Defender flagging the 32-bit Windows version (not the 64-bit version, mind you) of our application as a trojan. Every single time we were ready to do a release we'd have to send a file to the Microsoft anti-virus team to explicitly whitelist the application. It was beyond annoying.
if you mean the mallrat who gets infected by the demon seed I thought she looses the cock when you cure hur.Does anybody else have trouble making Cole/coura stay female? or is it just me
Cole/ coura is the mall rat you get to transform with nermine
I mean the mallrat you can gender bend with a voodoo dollif you mean the mallrat who gets infected by the demon seed I thought she looses the cock when you cure hur.
Yep, that sounds like something that would cause it to freak out. Even though a lot of benign applications do similar things, that's still similar in behavior to a malware dropper.from my own expirence I had the same issue but it during development of a 32bit inno installer that had a seporate embeded c# temporary program that would handle the more complex requirements.
If I remember correctly I think I was working on Obsidian conflict at the time and was helping make an installer that would link up all the other games that were installed so that thier content could be used in said game.
yep plus I think I have seen regular powershell scripts have have the Wacatac markerYep, that sounds like something that would cause it to freak out. Even though a lot of benign applications do similar things, that's still similar in behavior to a malware dropper.
The application I contributed to started running into false positives after they added an auto-update feature, so I can't say I'm surprised.
If I had to hazard a guess, I'd say the reason the Godot port of FS is being picked up is because of its GDScript bytecode interpreter. It's a pretty weak flag seeing as hardly anything detects it, but stuff like that could be considered to be a weak obfuscation measure.
There is a coding error. It shall be fixed. I apologize for the inconvenience.This is my issue