Jump to content

Twersky

Members
  • Posts

    11
  • Joined

  • Last visited

Everything posted by Twersky

  1. Oh, thanks a lot! Nice solution, but I hope it's temporary. Some antiviruses already have QUIC support. Still, this protocol is sometimes useful for the speed of the Internet.
  2. Hi Eset devs! QUIC has already received the status of a proposed standard by IETF (Internet Engineering Task Force) - https://www.rfc-editor.org/pipermail/rfc-dist/2021-May/005843.html I believe that gradually some sites (and possibly malware) will begin to switch to this protocol. On this background, it is interesting to know if Eset web protection supports QUIC decryption, how does it work for HTTPS?
  3. I tested the detection on a sample provided to me by other user, similar to the one used in the test on the links above, the principle of operation is very similar, but it is unlikely that they are the same. All detection settings were set to maximum. There was no detection. Fortunately, apparently your laboratory received samples either from the interface or by email, and the detection was added today https://www.virustotal.com/gui/file/32a095cbad3232c38e2f6dd1d01db655c7c817b8bd858a916a368741902743a6/detection I hope that in the future Eset will be able to detect any similar uninstallers that try to remove everything on the PC that is not blocked by access.
  4. Any good antivirus has at least two tasks - to protect information from theft, to protect the system and files from destruction. The fact that in the test there is only a broken uninstaller does not mean that you can close your eyes to it, because tomorrow such a file may be sent to a some person with some message, I don't know, for example, look at what a cool game or something like that, with intent for a person to run the file and lose the working system and part of the working files. So, this is an attack vector, yes, this is not a terrible hacker technique and not a zero-day vulnerability, but this can damage a person. I was provided with a similar installer (mb from DKech?) that removes everything, and I sent it for analysis to Eset by mail and from the program interface. I am absolutely sure that HIPS, at least in smart mode, must block the batch deletion of files and programs.
  5. Do you think anyone else is looking at these tests from "prestigious" labs? Where does the spanish Panda have 100% detection, and your own Eset is the 5th in performance (latest performance tests by AV-Comparatives)? Where, in principle, almost all antiviruses have a protection level of 97 percent or higher (I'm talking about the latest dynamic test from AV-Comparatives), which does not coincide with the real experience of most professional PC users? Consumers either do not look at tests at all or look at live tests / reviews, but these prestigious laboratories have drawn completely stupid pictures so many times that it is a shame to even mention them. How can I recommend your antivirus to someone? Based on pictures from AV-Comparatives and AV-Test? I use your product because of the excellent firewall and web filter, but it's still a pity that progress in the development of protection is not visible at all. Ok, I will not continue this topic. I just wanted to help.
  6. Hi Eset! comss.ru is a very popular russian-language web-portal about antiviruses in Russia and the CIS, which regularly tests new versions of well-known antivirus products. For two tests in a row, Eset has unfortunately failed their testing, which makes me very sad, as a loyal fan of your product. It becomes really difficult for me to protect Eset's reputation, although I try to do it there =( Below are links to a video with tests. Test for ESET NOD32 Internet Security 13.2 - https://www.comss.ru/page.php?id=7740 Test for ESET NOD32 Internet Security 14.0 - https://www.comss.ru/page.php?id=8256 During the test, Eset perfectly blocked all threats and showed a very high detection rate, but in both cases one of the malware was able to remove all programs installed on the test machine, and in the second case it also deleted user files on the desktop. Judging by the words of the tester, this is some kind of encryptor that could not fully work, a message appears that the files are encrypted, but there is no encryption, but the programs and files on the desktop have been deleted. Perhaps you should contact the administration of this portal (this tester) and ask this malware to be included in the detection, or even better, train HIPS to resist detailed threats? I would do it myself, but I'm afraid that I will be denied this as an unofficial third party. For contact, you can use this form - https://www.comss.ru/page.php?id=1173 or the mail info@comss.ru and also just write in the comments to the last test. I hope that you do not perceive this topic as anti-advertising, but I see no reason to write that to a support, as it requires some kind of reaction from the managers.
  7. 3. Tell that to Blokada and Adguard developers. Ads can be blocked through dns filtering (Blokada), and you can also intercept https traffic using your own certificate and cut it (AdGuard) - all this is done through emulation of a local vpn or through creating a local proxy server. There are options to do this directly, if the user has root rights. 4. Your protection supports 1.5 built-in browsers, which are impossible to use if you have even a little taste and customization needs, while even another European antivirus with more powerful protection (according to the results of tests by independent laboratories) supports many more options. "future developments for android mobile platforms" - if we talk about such a title, then the mobile Eset with the current management has no future. > Protection against thieves is useless in principle, any thief immediately turns off the phone and makes a hard reset. > Phishing protection for a couple of built-in browsers is a moderately needed feature. > Virus protection - viruses for android? They are terribly rare, and most phones have free antivirus programs built in. And, as the administrator writes, here are no plans for the firewall, here are no plans for vpn, here are no plans to block ads and trackers, here are no plans to do at least something useful on the phone except battery discharge Sorry for being straightforward. I hope I don't get banned here for this. оО
  8. I use two-factor authentication whenever possible with Authy. Authy with cloud backup is free and works on all popular platforms and devices. I think that for many users it is really difficult and just an unnecessary burden. Many are not even particularly intimidated by the possibility of hacking their social media account or mail. In general, the mass user is not very smart, we cannot do anything about it.
  9. Description: Protecting bank payment mode in modern browsers without IE using Details: If Eset does not support the default browser for the protected mode, then it first must searches for the installed Edge, Firefox or Google Chrome, and IE is used only when there are no alternatives at all. Real life example: I have Vivaldi installed as the default browser, but Eset in this case launches protected banking mode in Internet Explorer, which has long been outdated and can hardly be called a safe browser. The system also has the new Edge and Firefox. After removing IE from the system, Eset began to use Firefox, but this is a little inconvenient, since IE is needed in the system for some toolkits and old applications. P.S. I really hope for Vivaldi support in future versions, including the mobile version. It is a very good, modern browser with a great development team. Support them.
  10. Can you give a complete list of supported browsers? Only Firefox, IE, Google Chrome and maybe Edge? I have Vivaldi installed as the default browser - it's a fairly well-known browser, like Brave, for example, but instead of launching it in protected mode or even Edge, which is also installed on the system, Eset launches IE eventually, which seems absurd, since this browser has long been outdated, and at least Edge and Firefox are installed on the system too. I think that Eset needs to change its behavior and stop using the IE corpse, even if it does not support the default browser installed by a particular user. Now I had to completely remove IE from the system, after which Eset started using Firefox, but this is a rather inconvenient solution, since IE is still needed in the system for some old applications and toolkits.
  11. Hi Eset team and especially your product manager! I have been using Eset not so long ago, but I already really like it and I actively defend it on the Internet forums. I have some ideas that I would like to offer you for implementation, so that the product becomes even better and more popular. Description: Add the ability to block any hosts for applications in the firewall rules Details: Eset has one of the most flexible and powerful firewalls on the market, but sorely lacks a feature to block a specific host for a specific application. For example, I would like to block access to google-analytics [dot] com for the program, but this host has a huge number of ip addresses, and url address control in Internet access protection works only for applications similar to browsers, as I understand it, and it simply does not allow point-blocking. Description: More information in the network connection monitor and the ability to create rules there Details: Add geolocation data of remote servers to the monitor of network connections, the ability to view detailed information in some WhoIs service and create blocking rules directly from this interface. This will make it possible to flexibly, conveniently and intuitively control Internet traffic on computer. For example, it will be easy to block Chinese telemetry servers for those who care. Description: Protection against microphone use Details: At the moment, Eset IS only offers protection for the webcam. To be honest, the activation of the camera scares me much less, especially since it has a corresponding LED, than the ability to eavesdrop on me. I see microphone protection as a much more valuable function, but at the moment, even with the rules for controlling devices, it is impossible, as I understand it, to do something with a microphone. Description: Protection against trackers in browsers Details: You can add a list of spy servers to block in the web filter - it's easy, but it provides valuable functionality that many users will appreciate. Move it out as a separate setting in the Internet Protection section. I think that in the conditions of an abundance of free antiviruses and firewalls, Eset needs to take steps towards introducing additional features and functions in the field of protecting privacy in order to remain in demand for a comprehensive product for Internet security. Description: Protecting document folders with HIPS Details: I would like the setting for additional protection of user folders to be more intuitive for home users. I often have to explain to people how to configure HIPS in Eset for additional protection of directories with important documents, while many other security products offer this feature from the settings in a few clicks. I would suggest two modes of protecting the selected directories - 1.automatic based on reputation from the Live Grid, 2.completely manual with requests for any access to files Description: Control over startup, scheduled tasks and new services using HIPS Details: It's still about usability. Yes, now i can create a rule that will perform these functions, but I believe that there should be a preset HIPS mode, which gives these opportunities out of the box, without unnecessary manipulation by the user. Controlling startup is not such a frequent occurrence for hundreds of notifications, but it is an important element for protection and simply for monitoring your own system. Description: Ability to specify applications to launch game mode and system optimization Details: Add the ability to specify applications at startup which Eset will switch to game mode. Add options, such as disabling notifications and Windows updates, disabling "unnecessary" services, possibly changing the process priority for the specified application. Eset is now quite popular with gamers for its amazing lightness and decent level of protection, but it really lacks some extra gaming features to gain a foothold in this part of the market, pushing back Webroot and Bullguard. Description: Protection against keylogging and screenshots for specified applications Details: It would be very interesting to see a function in the spirit of protected mode for the browser, but for any application. For example, I use the Bitwarden password manager and Authy for two-factor authentication. It would be very convenient to be able to enable enhanced protection for these applications against data theft. There is something similar in Webroot, for example, although I'm not sure that it works fine there, I could not verify it. It might be cool to add system-wide keystroke encryption altogether, but I think it's too heavy resource task. Description: Column sorting in firewall rules Details: This just suggests itself based on usability and the rules of a good interface. It is enough to add a priority column and make the other columns clickable for sorting, which will increase visibility. P.S. I am looking for a job in the field of technical support, product management or something else in the field of a junior specialist. :))
×
×
  • Create New...