Jump to content

FleischmannTV

Members
  • Content Count

    18
  • Joined

  • Last visited

  • Days Won

    3

FleischmannTV last won the day on July 13 2015

FleischmannTV had the most liked content!

Profile Information

  • Location
    Germany
  1. Be advised, even when "Detect shellcode injections" is unticked or the HIPS is switched off entirely, you have to set exclusions for "Detect shellcode injections", or otherwise the cguard32/cguard64.dll will be injected.
  2. Dear ESET team, since Advanced Memory Scanner technology is a post-execution mechanism, I would like to know if its detections still count as detected / protected in lab tests, such as AV-C and AV-Test. Thank you.
  3. Just remember that ESET is going to detect malware better with protocol scanning enabled. It's not just about blocking malicious websites, but malware that passes through the protocol scanner is investigated more thoroughly with additional assistance from LiveGrid. This is an important part in ESET's zero-day detection.
  4. I can confirm this on my computer as well. Downloads drop from 15 MB/s to 0,8 , while ekrn.exe uses around 30% cpu on my Core i5-3450. If I disable protection, download speed increases to 15 MB/s again. Windows 10 x64 Pro Nod32 9.0.318.20
  5. Interesting picture of ESET's CEO. Didn't know that was actually Guy Pierce.
  6. The tool from Malwarebytes doesn't exploit vulnerable applications which ESET's exploit blocker is watching. Hence there are no alerts. I suggest you try the Exploit Test Tool from Surfright. This tool allows you to choose the application which is exploited. From there you can select your browser or pdf reader. Then you should get alerts from ESET. hxxp://www.surfright.nl/en/downloads/
  7. I am sorry to rain on your parade, but this site is as far from real world as it gets. Real world means two things in my books. For one thing, it has to be about threats that users are actually facing (prevalence), and not some exotic stuff nobody ever encounters. And for another a product needs to be able to use all of its components in order to protect the user. As for prevalence, I cannot say if CRDF is taking that into account. As for utilizing all of a product's components, they definitely don't. They just use VirusTotal for scanning the samples. This means it's nothing more than
  8. @TJP It simply means that Kaspersky Lab and others have recognized the immense ramifications of these test results and therefore they are dedicating time, money and man power in order to detect even those "threats", which have little to no real-world value. People are regularly panicking and changing AVs over detection differences of 0,5 %. This is why companies are wasting resources in order to detect even the most insignificant supposed malware. It is not cheating.
  9. If you had bothered to read the topic of this thread or the survey, you would have realized that this isn't a comparative review .
  10. @Maximus Could you try to open the AMTSO phishing test page, located here: hxxp://www.amtso.org/feature-settings-check-phishing-page-intro.html This is just to check if protocol filtering is working at all with Cyberfox. If you are able to open the link located at that page, then protocol filtering isn't working correctly with Cyberfox and that could be the reason why you are no longer experiencing any problems, now that you've switched from Firefox to Cyberfox.
  11. It probably has something to do with caching. When I delete the cache in Chrome, detection upon left-click is working as well.
  12. Greetings. I know I have already asked this in a somebody else's topic, but since this topic has already been marked as answered I think it would be best to talk about this in a separate topic. The reason I am writing this is because I have witnessed weird behavior of ESET in regards to AMTSO's cloudcar.exe file when I try to download it with Google Chrome. If I download it with right-click \ save-as, it is detected, no problem. If I initiate the download with left-click, it is not detected. Once on the disk, I guess it won't be detected anymore because LiveGrid only works during d
  13. Hey there, I just wanted to report that with the latest Version left clicking to download the cloudcar testfile is now blocked in Chrome as well.
  14. I have just done further tests. I can download the cloudcar.exe with Chrome (32 and 64-bit), but it is blocked in Firefox and IE. Chrome protocol filtering is working though because the phishing page, EICAR and PUA downloads are blocked. Edit: When I try to save the cloudcar.exe in Chrome with right-click and "save as", ESET blocks the download in Chrome as well. When I try to save it by left-clicking the download link, it doesn't.
  15. I just want to report that I've witnessed this several times in Nod32 7 and recently in 8 as well. For some reason LiveGrid does not function properly even though participation has been checked during the installation dialogue. Deactivating and reactivating in the configuration didn't help, only uninstallation followed by reinstallation.
×
×
  • Create New...