Jump to content

cutting_edgetech

ESET Insiders
  • Posts

    336
  • Joined

  • Last visited

  • Days Won

    3

Posts posted by cutting_edgetech

  1. You can report phishing sites via the built-in form after selecting "Suspicious site" from the drop-down menu.

    Thanks for the info Macros! I overlooked that option in the drop down box. I guess I must have been specifically looking for the word phishing. The average user probably would not know what a phishing site is though.

  2. I reinstalled Eset Smart Security 7 beta last night, and was unable to activate it using my email address. The prompt informed me that there was already an account with that email address. I know there is already an account with that email address because it is mine. I had to use another email address of mine to activate it in order to be able to even use the beta version again.  Today it is giving me an option to activate it again. I am choosing activate beta version so I do not know why it does not want to allow me to install it more than once with the same account.  I use a baseline image without ESS installed for testing. I use that baseline image to beta test several other security applications so I often have to roll back my machine in order to test other security applications. This requires me to reinstall ESS beta again.  At the present time the tray icon is indicating that there is one item that needs my attention. It wants me to activate ESS again now.

  3. Stats: Windows 7 X64 SP1. I uninstalled the latest stable version of NOD 32 then installed the beta of Eset Smart Security. I tried downloading NOD 32 beta, but both links downloaded Smart Security instead.  The only issue i've noticed is while it was conducting a complete system scan it took almost 3 times as long for my Web Browser, and Ccleaner to open. I didn't try any other applications during the scan. ESS began scanning on it's own without asking the user. Everything else seems to be running really smooth.

  4. Btw.. In the past I have never been able to use Webroot Secure Anywhere with NOD 32 on this Laptop. It will not boot with both installed. I'm thinking now that maybe NOD 32's HIPS, or Self Defense was conflicting with WSA. Maybe even both. Do you have any recommended settings for NOD 32 to make it more compatible with security products like WSA?

  5. I don't have Logmein installed. If I disable HIPS do you think that may be enough? I don't want to disable the Self Defense mechanism though since it would make it easier for Malware to disable NOD 32. I will try disabling HIPS, and see if that helps. If not I will rename ehdrv.sys as you have suggested. Sometimes I forgot NOD 32 has HIPS since it never ask me to allow or deny anything.

     

    Thank You for your help!

    Mike

  6. I've had a lot of boot failures lately with my Sony Laptop. It freezes right after I enter my Windows Login Credentials, and does not proceed to the desktop. The little round mouse pointer just sits there, and turns for ever. Even when I do have a successful boot it almost always freezes for a while right before the desktop appears. It adds an additional 20-30 seconds to my boot time on average.  Sometimes I have to boot once in safe mode to get it to boot again in normal mode.I believe it's NOD 32 causing this because when I uninstall NOD 32 I don't have that long pause that occurs before the desktop loads. I just had another boot failure, and i'm going to open a support ticket. I already have a Sysinspector log to send them. What other information will Eset need to trouble shoot this?

     

    Thank You for your help,

    Mike

  7. Please submit a customer care request.

     

    I gave him that link already. He said it would not work for him.  I did not think anyone was going to respond to the thread so I responded.  You must have responded while I was typing the post. I normally would not touch this topic, but he was stuck without anyone else to help.  Try contacting customer support again. Report back if you are unable to get though.

  8. I must tell you before I offer this advice that I have no certifications, and if you decide to try this to remove these infections then you assume the risk of possible damage to your computer. This is a method I have used many times, and have found successful most of the time.  You can also get help for virus removal at the Links below.  Bleeping Computer, and Malwarbytes offer profession help for virus removal.  I normally would leave this up to support, but they do not look like they are going to answer.

     

    hxxp://www.bleepingcomputer.com/forums/f/55/spyware-and-malware-removal-guides-and-reading-room/

    hxxp://forums.malwarebytes.org/index.php?showforum=7

     

    Sometimes the infection will make your computer unusable or not allow you to install security software to remove the infection. Many times you will get BSOD (Blue Screen Of Death), or the computer will reboot before you can install anything to remove the infection. In this case you may have to use a Rescue Disk to remove the infection or remove enough of the infection so that the computer functions good enough to install software like Malwarebytes, Hitman Pro, etc to remove any remaining infection.  If you are unable to install Malwarbytes, and Hitman Pro to remove the infection then follow the direction below to see if that will remove the infection.

     

    You will need an internet connection to update the software listed below!

    If you have access to another computer then download Kaspersky Rescue disk from this link hxxp://support.kaspersky.com/us/viruses/rescuedisk?level=2

    It is an ISO file. You need image burning software to burn this to a disk. If you have Windows 7 then it comes with Windows Image burner. 

     

    If you don't have image burning software then you can get Imgburn for free from this link hxxp://www.imgburn.com/

    During the installation of imgburn it will probably ask if you want to install a toolbar or some other optional software. This is optional, and make sure to choose not to install this. Usually you have to untick the or choose I do not agree to the optional software.  Software like this is usually bloatware.

     

    Ok, put a CD or DVD in your CDR, or DVD burner depending on which you have. Then Double click the ISO file. Choose Burn image to disk. That is the option for most image burning software. If not it should be very similar to that.  After the Disk has completed burning place it in the infected computer's CD, or DVD drive depending on which type of disk you burnt.  You will need to do this while the computer is booting. You will use this disk to boot the computer from.

     

    First it will say press  any key to enter menu.. Press any key so you will be taken to menu at this time.

     

    Next Choose which language you prefer.

     

    Then read the agreement, and press 1 if you agree in order to use the Kaspersky Rescue disk.

     

    Then select Kaspersky Rescue Disk Graphic Mode.

     

    Then wait until the desktop loads. (Note that this may take a few minutes).

     

    It will say database out of date. Select update now.

     

    After the update completes make sure that the following boxes are selected: Disk boot sectors, Hidden Startup Objects, C:/ . Note that if your operating system is installed on a partition other than C then select that partition.

     

    Then select Start Objects Scan

     

    This may take a long time so find something to do for a while :)

     

    Then Select remove for anything found unless you recognize something you know to be safe. 

     

    It may have to reboot again to remove the infections so allow it to reboot.

     

    Now remove the disk, and boot as you normally would. You can also leave the disk in. Just don't press any keys when it says press any key to enter menu. It will boot as it normally would as long as you do not press any keys.

     

    Now see if it will allow you to install Malwarbytes which you can download here

     

    After the installation is complete select update to make sure Malwarebytes signatures are up to date. Now select perform full scan.  The scan will take a while to complete so find something to do for a while :)

     

    After the scan has completed select remove for any threats found.

     

    Ok, now hopefully we are close to having all threats removed. With a little luck they have all been removed.

    Now download Hitman Pro from here

    Select 32 bit or 64 bit depending on which version of Windows you have. If you are not sure then hold down the Windows key, and the pause break key at the same time. It will bring up a Window with information about you computer. Look at System type to see if it says 32bit, or 64 bit. If this does not work then right click on computer, and then select properties. The same Window will appear with information about your computer.

     

    I do not remember each step for installing Hitman Pro. I believe it gives you an option to use a portable version or to install it to your machine. You can use either one you like. Just follow the prompts. Now conduct a scan. It does not take long to complete so don't go anywhere. After the scan has completed select remove for anything it finds unless you know it to be safe. Hopefully you are virus free now. If not then you will need to try to contact support again. Bleeping computer, and Malwarebytes forum offer professional advise for removing hard to remove threats. There are other tools that can be used to remove these threats, but I can not coach you on how to use them because if used improperly they can make your system unusable. I suggest you make a backup of your computer using imaging software once you get your computer infection free.

     

    I hope I have helped!

    Mike

     

    Edited: due to many portions of my post not appearing.

  9. Is Eset detecting it on your system now or is it being detected by another Security Software? I was going to link you to a stand alone cleaning tool from Eset, but I do not see one listed for this on the forum. You may need to contact support. If you purchased Eset in the United States then this is the link https://www.eset.com/us/support/contact/

     

    If you don't get an answer from Eset soon I will inform you of some other safe tools that should remove this infection. Try the Eset support link above first.

  10. So according to the instructions you have to install Window's ADK (Assessment and Deployment Kit).  Then you need to download the latest 32 bit  build of Eset Smart Security or NOD 32 depending on what you have installed. I was not aware that you had to download a 32 bit build of Eset when using a 64 bit OS and then browse to it as shown in step 8 to create a rescue disk. I've never had to use Eset's Rescue disk, but that's a good thing :) I think I will go ahead, and create an Eset rescue disk to put with the other Rescue disk I have.

     

    I think it would be a good ideal to create a section on the forum called Eset Tutorials to make knowledge like this easy to find on the forum. One could also post information on how to submit phishing sites, infected links, to submit malware, etc., etc.. There's so much that could be listed under a section called Eset Tutorials or a similar name.

  11. It seems that Eset customers in Germany are receiving fake emails from unknown individuals claiming they are from Eset. These individuals ask for your credit Card info or other method of payment. They say they will have no other choice than temporarily  suspend your account if you do no give them your payment info. I thought to myself most Eset customers are too intelligent to fall for something like that lol  There has been a thread started at Wilder's Security Forum on this by one individual that received this message by email. Hopefully no Credit Card info was compromised, but it does appear that some user's contact info was compromised. At least in Germany anyways, but nothing has been confirmed. Hopefully it was only a reseller, and no customers payment info was compromised. If they had the info they would not be asking for it so if anyone's payment info was compromised then it was obviously not everyone's. At any rate it's still bad news. I'm sure Eset will be addressing this soon.

     

    hxxp://www.wilderssecurity.com/showthread.php?p=2246020#post2246020

  12. Hi Larry,

    Have you tried excluding your web browsers from protocol filtering in Endpoint Security?

     

    To exclude browsers from protocol filtering, open Endpoint Security and press F5 to access Advanced setup. Expand Web and email > Protocol filtering > Excluded applications. You will see a list of applications on the right. Select the check boxes next to each of your web browsers in the list and then click OK to save your changes.

    If you do not see your web browsers listed, you may need to add them. To do so, click Add (below the list of applications) and then navigate to the browser you want to add and click Open. Once you have added a program to the list, you can select the corresponding check box to exclude it from Protocol filtering.

    Give this a try and let me know how it goes for you.

     

    --CB

     

    gajah88 said he or she already done this in his / her post above, but it is not a good solution.

×
×
  • Create New...