Feeds

Freegate is not Trojan horse, says Symantec

Relabels China censor-busting utility

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

Symantec is to stop classifying a software utility that enables Chinese surfers to view blocked websites as a Trojan horse.

The reassessment follows stories earlier this week questioning the designation of the widely-used Freegate programas malicious code. Freegate has 200,000 users, Dynamic Internet Technology (DIT), its developer, estimates. The software lets users view sites banned by the Chinese government by taking advantage of a range of proxy servers assigned to changeable internet addresses. Symantec mislabelled this behaviour as that of malicious code and wrongly-labelled Freegate as malign.

In a statement today, Symantec said: "A number of our customers drew our attention to what they deemed the suspicious nature of the Freegate software. Upon investigation by our researchers, similarities were noted between how the software operated and how various Trojan horses operated, based on the use of open proxies to penetrate firewalls used to block web sites. As a result, it was deemed a cyber threat and blocked by our software. Since that time, further investigation indicates that Freegate is in fact not a Trojan horse and detection for this program has therefore been removed from Symantec’s virus definitions."

The change in policy means Freegate users will once again be able to use the software on systems protected by Symantec's Norton AV security software. Which is nice. ®

Related stories

Symantec labels China censor-busting software as Trojan
McAfee to eradicate app assassin bug
McAfee AV ate my application
Pornsters face life in China smut crackdown
Free Chinese Net users Amnesty
China closes 17,488 Net cafes
Nortel helping China to overhaul state surveillance architecture
IT companies urged to help human rights in China

Beginner's guide to SSL certificates

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.