Jump to content

All Activity

This stream auto-updates     

  1. Past hour
  2. OK, so I bought the software through the website. When I go to add my username and password, all I'm given is a username and license key. Even though the shopping page where the buyer gets to choose their software option shows that ALL THREE (NOD32, Internet Security and Smart Security Premium) offer Linux support, and I did add NOD32, did adding password protection push me up to Internet Security, and therefore out of NOD32 and Linux software? It certainly looks that way. When I clicked the link to download my new software, it took me to the Windows software. This is ridiculous. Thank you both.
  3. Today
  4. As far as I know, activation from the command line is not supported. What is the use case for such scenario?
  5. Just a quick note. Opening a ticket is probably the best solution as it can be tracked better but if you ever need to post an attachment on the forums and are worried about privacy, only the moderators can see those attachments on here. Hope they can get to the bottom of this for you
  6. hi I need to install internet security v13 at the same time enter the file information and file xml config the license on the command line syntax --accepteula --msi-property PRODUCTTYPE=eis PRODUCT_LANG=1033 PRODUCT_LANG_CODE=en-US ADMINCFG ACTIVATION_DATA=key:AAAA-BBBB-CCCC-DDDD-EEEE
  7. Unfortunately it's not clear what you mean by managing devices. You can manage your licenses via the License manager at my.eset.com. There is also a link to the Anti-Theft portal where you can manage Anti-Theft on mobile phones and notebooks.
  8. If you are currently in Canada , you should buy from Canadian store Same as your credit card, you should buy from same country or you will get errors when you are trying to buy from ESET authorized stores.
  9. Wo finde ich die Seite, auf der ich meine Gerate (Multidevice) finde und verwalte? Im Menü (Windows 10) finde ich nur die Verwaltung des verwendeten PC, nicht die Verwaltung der Tablets und Smarthphones. Machine translation: Where can I find the page on which I can find and manage my devices (ESET Multidevice)? In the menu (Windows 10) I only find the management of the PC I actually used, not the management of tablets and smartphones.
  10. We have recently discovered a problem sending customer care requests from the built-in form in ESET NOD32 for Linux desktop. I would recommend contacting ESET LLL via the web form or phone. We are working on a resolution to make the internal form work. We apologize for the inconvenience.
  11. I'm afraid you can't do much about it. You can contact the person and ask for a refund but since the person is from Middle East I'm afraid he or she won't respond to it. We strongly recommend purchasing a license only from authorized sellers and e-shops.
  12. Marcos, thanks for your reply. Its about internet security (Wich is and was stated in the topictitle*wink) Thanks for your product and productfeatures information, but reasons to upgrade are not our issue. I selected the "No marketing switch" that is the point of this topic, as i don't want (any) software to overrule my settings concerning advertising and certainly not my security software and ..on my desktop. How intrusive can one get it? Given time i would need an adblocker for my internal processes 😃 Had to edit my message alas. Our IT advisor just replyed me telling me im not allowed to provide information on this forum and we should contact Eset customer support directly. Have a good Sunday and thanks again! This topic may be deleted, its solved.
  13. Hi, I purchased a licence from an ESET representative in Iran and I got an ACT 24 error. I am in Canada. How can I solve this?
  14. Reviewing the Joe Sandbox analysis again, the attack starts by opening a disguised .jpeg file executable, script, whatever. So assume that was delivered possibly via an e-mail attachment or embedded in the document and either opened by the using via phishing method, link, or macro. Opening the .jpeg file causes the default browser to open if not so already and connect to the the malicious URL , https://shipmenttracker.co/ via redirection from https://hshipmenttracker.co/ embedded in the .jpeg file . Another possibility is that this Shipment Tracker software shown in the Joe Sandbox analysis screen shots might even be a Google store app or the like. In any case, something like this would have lead the user to believe he was responding to a legit app installation.
  15. Yesterday
  16. Actually if this is the case, the malware installed a malicious service. It will then use this service to install other malware like a backdoor. It will then use that backdoor to establish a remote connection to the device. In other words, svchost.exe is not being used for outbound communication from the device. Additionally most of today's malware are using other "living off the land" Windows trusted processes such as infrequently used utility processes and script processes for their outbound communication these days.
  17. Buy through your browser , not the software , you may or may not receive a username among the cd-key , if you only received a cd-key , you will need to convert it to username and password , an ESET staff can help you with this
  18. some applications are using svchost.exe to connect to the internet. A benign example is Adobe X pro, which will check for updates, even though you block the updater of Adobe. Similarly, a malware can use svchost.exe to communicate outside. The purpose of a firewall is to monitor everything; why use a firewall if you ignore the alerts or blindly select "allow" ????
  19. I don't know why you're monitoring oubound svchost.exe traffic in the first place. Paranoia, I guess. Instead of worrying about IP addresses, just create outbound firewall rules for svchost.exe for these two services assuming you are running Win 10 : wuauserv WaasMedicSvc
  20. But, when I review the firewall rules, 1month from now, how I am suppose to remember that I allowed this svchost.exe because was related to Windows update , if in the rule is just an IP ????
  21. To what @Marcos just posted, I will add this. What happens when DNS "hiccup's" on the resolution process? Refer to the screen shot in my posting here: https://forum.eset.com/topic/22586-fortinet-dnsweb-filter-blocking-eset-forum/?do=findComment&comment=109560 . I am using DNS over HTTPS with Clouldfare DNS servers. The fallback when there is a problem is to DNS over TLS using my ISP servers. It also happens that when the resolution is done by my ISP DNS servers, it is borked in some fashion with results not being what is expected as shown in the screen shot. Again firewalls do not contain advanced resolution capability. The more ambiguous the objects that they are basing their decisions on are, the more likely that the decision made will be in error. Additionally, use of any IP addresses in firewall rules should only be done on an exception and interim basis for all the reasons stated. The primary reason for allowing the IP address specification in firewall rules is for local subnet use.
  22. It shouldn't be a problem at runtime since the web access protection can provide the firewall with the hostname that has resolved to the IP address, however, if the hostname was used in a rule at a later time it wouldn't work as expected I assume. Example: You receive an interactive firewall dialog about communication with, web access protection would tell the firewall there has been a communication with maps.google.com that resolved to this address recently. A firewall rule would be created for maps.google.com which would, however, internally translate to a firewall rule for the above IP address. Such rule wouldn't work the next time since maps.google.com could resolve to a different IP address from subnet Moreover, it could be that you would like to block access to youtube.com that would resolve to an already allowed IP address: Name: youtube.com Addresses: 2a00:1450:4014:800::200e Name: maps.google.com Addresses: 2a00:1450:4014:800::200e As a result, there would be 2 conflicting rules. A permissive rule for and a blocking rule for the same IP address.
  23. I would recommend collecting logs as per the instructions at https://support.eset.com/en/kb3404-use-eset-logcollector-on-macos-and-send-the-logs-to-eset-technical-support and opening a support ticket with your local ESET distributor.
  24. Hey, I'm experiencing the very same issue as the OP. When can we expect this to be fixed? For troubleshooting and workaround for the time being see below: I'm not able to access any web service (node, nginx, docker etc...) that I fire up locally on any port. The browser just hangs and having the spinner rotating forever. None of the following works: hxxp://localhost:3000 hxxp:// hxxp://[::1]:3000 Most of these servers bind to the unspecified ipv6 address (::) - if it's enabled, this is the expected and default behaviour. By default, I should be able to access my local web service using the ipv4 address (localhost and and especially with ipv6 address ([::1]). It is platform specific and seems like most of the OS-s are the same. macOS definitely has dual stack mode enabled by default AND ipv4 is auto-listened if anything binds to the unspecified ipv6 address (::). (see attached and link to an issue) If I define ipv4 explicitly for the service (localhost, or then it works fine and it is accessible via the browser. This is what my ESET firewall log looks like. It is clearly blocking my access. 22/02/2020, 11:36:49 No usable rule found [::]:62323 [::1c1e:f373:0:0]:3000 TCP root 22/02/2020, 11:36:44 No usable rule found [::]:62322 [::1c1e:f372:0:0]:3000 TCP root I was able to get around it by adding the following rule to the firewall (also see attached). Please note: in order to add the :: address you'll have to type ::0 in the IP Address field in ESET for the button to become active. All Application - Inbound - TCP - All Remote Ports - All Local Ports - ::0 (the unspecified ipv6 address) and this is in my logs after adding the rule: 22/02/2020, 18:06:57 Communication allowed by rule [::]:64541 [::1c1e:fc1d:0:0]:3000 TCP Allow communication for System root 22/02/2020, 18:06:57 Communication allowed by rule [::]:64541 [::1c1e:fc1d:0:0]:3000 TCP Allow communication for System root I used freshly installed ESET Cyber Security Pro (6.8.300.0) - default settings - on macOS Mojave (10.14.6) to test and troubleshoot this issue. However, this came to my attention when I was trying to use my work laptop that has ESET Endpoint Security (6.8.400.0) installed on macOS Catalina (10.15.3).
  25. So, you are saying that the alert may not be accurate?
  26. All that Eset is doing for the alert is using one of the many IP address-to-domain URL and vice-a-versus web sites, or equivalent, to display the URL. There is no way on those sites to extract all IP addresses shown.
  27. Hi Nightowl, I uninstalled/reinstalled to try just that, but the purchase option isn't working. The second time I tried to purchase, it seems like nothing happened. I could try it *again*, I guess. Thank you.
  28. Hi Marcos, I sent a message to Peter Randziak here on the forums, but it appears he hasn't been logged on since then. I have no idea where the messages I sent from the app itself went, however. I have not received a confirmation e-mail from either time I sent my request. Thank you for your time.
  1. Load more activity
  • Newsletter

    Want to keep up to date with all our latest news and information?
    Sign Up
  • Create New...