Jump to content

GreyGhost

Members
  • Posts

    61
  • Joined

  • Last visited

  • Days Won

    3

Posts posted by GreyGhost

  1.  

    The pre-release updates fixes the problem(s) I was having. 

    Internet navigating is much faster.  Chrome initializes much faster.

    The only problem remaining is updating virus definitions when I turn my computer on.

    This problem has existed since version 8 came out.

     

    Nice to hear that the pre-release update fixes most of your problem. However, may I know what is the updating virus definitions issue are you encountering? 

     

    When I turn my computer on, Eset loads and attempts a virus definition update.  However, I get an error and the update is unsuccessful. I have to update by manually clicking the update button.

  2. The pre-release updates fixes the problem(s) I was having. 

    Internet navigating is much faster.  Chrome initializes much faster.

    The only problem remaining is updating virus definitions when I turn my computer on.

    This problem has existed since version 8 came out.

  3.  

    Running with pre-release updates now.  Updated to virus definitions  11366P.

    So far so good? :)

     

    Still not updating virus signature database first thing in the morning. 

    I will report other results later today.

  4.  

    Malwarebytes Anti-Exploit is a nice program which fills in the holes in Eset's exploit detection.

     

    Well lets just see what kind of holes it fills ? :)

     

    Please provide said holes, and i am almost sure ESET will patch and protect these missing "holes" if possible and plausible.

    It's okay to post in this thread regarding the weaknesses you find in ESET Security. Moderators read and respond on these exact kind of issues. :wub:

    We may be able to add protection to an already proven and trusted security software ! :D

     

    You're right. Eset catches 100% of malware.  Eset makes having a layered approach meaningless. You should also tell users of Eset not to run Malwarebytes Anti-Malware concurrently since Eset catches everything.

  5.  

     

    Hello, i would like to expand into this link when we had a discussion a while back regarding Kaspersky's Safe Money Environment:

    https://forum.eset.com/topic/51-future-changes-to-eset-smart-security/page-6#entry10746

     

    In addition this thread discusses Keyloggers:

    https://forum.eset.com/topic/965-eset-and-keyloggers/?hl=%2Bwin32+%2Bkeylogger#entry8728

    Aryeh mentions " ESET's software detects keyloggers using both conventional signatures (which detect many as part of the Win32\Keylogger family) and technologies like heuristics and HIPS. "

     

    Having a virtual environment changes nothing. You will still be sending and receiving traffic on the same http port 80 or secure traffic port 443 inside your virtual environment.

     

    Also as an added bonus, ESET detects exploits already. Check out this link for all the features of ESET :

    hxxp://www.eset.com/int/about/technology/

     

    Adding Quote :

     

     

    Exploit Blocker is designed to fortify often exploited application types on users’ systems, such as web browsers, PDF readers, email client or MS office components. It adds another layer of protection by using a completely different technology, compared to techniques focusing on detection of malicious files themselves...

    Instead, it monitors behavior of processes and watches for suspicious activities that are typical for exploits. When triggered, the suspicious behavior is analyzed and the threat might be blocked immediately on the machine. Certain suspicious activities are processed further in our cloud systems, which gives Exploit Blocker the potential to protect users against targeted attacks and previously unknown exploits, so called zero-day attacks.

     

    Therefore, having Malwarebytes exploit application is redundant and may also cause application errors !!!

     

    Regarding browser plug ins, those fall under the category of "potentially unwanted programs" ESET detects and removes bloatware like that. The only purpose they serve is to bloat.

     

    Thanks for reading, good discussion LabVIEW707 !!!!

    Eset's exploit protection is not that great.  See:  www.av-test.org/fileadmin/pdf/reports/AV-TEST_XP_Exploit_Test_April_2014.pdf

     

     

    Sorry Greyghost, but thank you for your reply.

     

    Commissioned by Qihhoo 360 ?? They are dunganees.

     

    Don't get me started on Testing companies, where money is being thrown in the background to make other companies higher on the list.

    I'm not digging around for the last testing company who accepted money to bring companies to the top of their testing. Just know it has happened.

     

    Also, a test performed only on Windows XP ? A retired OS that everyone needs to quit using and will no longer receive any credibility?

     

    If your concerned about only exploits.

    Download and install EMET, not some third party exploit protection.

     

    Note: I like Malwarebytes and use their standard product.

     

    Don't like the result? Discredit the test and the testing orgainztion.  Standard practice. Other AVs did well.  Why not Eset?

    Nothing wrong with XP.  Using XP is a good way to test exploit protection.

  6. Hello, i would like to expand into this link when we had a discussion a while back regarding Kaspersky's Safe Money Environment:

    https://forum.eset.com/topic/51-future-changes-to-eset-smart-security/page-6#entry10746

     

    In addition this thread discusses Keyloggers:

    https://forum.eset.com/topic/965-eset-and-keyloggers/?hl=%2Bwin32+%2Bkeylogger#entry8728

    Aryeh mentions " ESET's software detects keyloggers using both conventional signatures (which detect many as part of the Win32\Keylogger family) and technologies like heuristics and HIPS. "

     

    Having a virtual environment changes nothing. You will still be sending and receiving traffic on the same http port 80 or secure traffic port 443 inside your virtual environment.

     

    Also as an added bonus, ESET detects exploits already. Check out this link for all the features of ESET :

    hxxp://www.eset.com/int/about/technology/

     

    Adding Quote :

     

     

    Exploit Blocker is designed to fortify often exploited application types on users’ systems, such as web browsers, PDF readers, email client or MS office components. It adds another layer of protection by using a completely different technology, compared to techniques focusing on detection of malicious files themselves...

    Instead, it monitors behavior of processes and watches for suspicious activities that are typical for exploits. When triggered, the suspicious behavior is analyzed and the threat might be blocked immediately on the machine. Certain suspicious activities are processed further in our cloud systems, which gives Exploit Blocker the potential to protect users against targeted attacks and previously unknown exploits, so called zero-day attacks.

     

    Therefore, having Malwarebytes exploit application is redundant and may also cause application errors !!!

     

    Regarding browser plug ins, those fall under the category of "potentially unwanted programs" ESET detects and removes bloatware like that. The only purpose they serve is to bloat.

     

    Thanks for reading, good discussion LabVIEW707 !!!!

    Eset's exploit protection is not that great.  See:  www.av-test.org/fileadmin/pdf/reports/AV-TEST_XP_Exploit_Test_April_2014.pdf

×
×
  • Create New...