Jump to content


  • Content Count

  • Joined

  • Last visited

Profile Information

  • Location
  1. That was very interesting. Just to elaborate, im not a cybersecurity professional - the use case here is to observe and software features and architecture and programming under the hood, as a student, but its the source/repos that im not too sure of, even though they are premium solutions. Although I have a separate isolated hardware set-up for this work than to my ‘daily drivers’ (so I can literally just bin the hardware if things go seriously troublesome) the lan is the same, so my main concern is to protect the network. Ideally I need to contain the installed desktop/web apps and be
  2. I am currently using eset’s smart security premium plan, however I wondered whether there is any add-on programmes or recommendation for containment technology so end users can run virtualised browser instances and downloads within a sandbox on their device for analysis? Something comparable to this - https://help.comodo.com/topic-72-1-451-4739-.html
  3. What I like about glasswire is that the is a small pop-up box that actively shows you the domains and ips of the servers sending/requesting data from your device. Is there a way to proactively monitor network traffic on eset this way?
  4. With wordpress in mind more specifically. I tried to look but couldn’t find any relevant solution. According to w3techs.com wordpress is now even more used than even custom coded sites with a market share just short of 40%.. So with this in mind, I was wondering whether there is a solution for the wordpress community I might have overlooked or whether there is a plugin solution such as a waf/cloud scanner in the works?
  5. Hi, I wasn't really interested in a secondary scanner as I have one (MB) (unless HMP can be used as a tertiary scanner 😉) I just needed a complimentary standalone anti-keylogger. There's not much on the market but I found one called guardedid which I think looks decent enough. Thanks for the input 🙂
  6. ok i'm not quite sure it's a full on antivirus software, but it's something along those lines, it's called hitmanproalert, does anyone know if this is known to cause conflict with eset background real-time scanning? Just out of interest if it is known to causes problem i was wondering if any security professionals know of a standalone anti-keylogger they would be kind enough to recommend (if its allowed here)
  7. Hello i would like to remain exclusively with eset however i won't name it (unless anyone needs to know about compatability specifically) but there's another security software that provides the benefit of encrypting anything written online (anti-keylogging) it does say quite clearly on the site that it's designed to work in conjunction with any other anti-virus software but I was wondering since eset is the integral part of my security stack what's eset / experienced eset members verdict here?
  8. Ah, ok yes that makes sense. I knew there would be mutual resource allocation but what I didn't know or agree to was they would allow server components to access my IP / bandwidth when there front end app isn't even running - haven't connected in about 5 days. Isn't that basically backend malware? Anyway, great little discovery for me there with your software. Thanks
  9. I checked my log on eset this morning and this is what I saw - I did not have any idea who or what this NT/authority was but I found out it is the system root access point above admin accounts, if I understood correctly. I only have one admin/user on the system. There are a few examples like this. If there is communication with domains blacklisted for phishing scams form root user then I guess I should be worried. I removed the app that was causing the problem but I am most concerned about whether this risk extends to other devices on the network. What steps should I take
  10. I don't understand how my browser is using so much memory on an 8gb system. I have one window and 4 tabs open, so I don't get why there are 11 open connections. Like is pic 1 Also whilst on the subject of logs, I checked a normal scan on eset and i'm getting a lot of entries on the log saying that certain items can't be opened Is this normal?
  11. OK I have done that. Am I supposed to send the log to the technical support now?
  12. I forgot to add - downloaded the free VPN app about 4/5 days ago... then I uninstalled it 3 days ago when this annoyance that came with it became more prominent. But these suspicious outbound connections never stopped. I imagine there's some hidden file they've left behind on my system. I've used this app before on a vm and the same thing happened then but gave them a benefit of a doubt as i wasn't certain, now i know it's the source. Besides eset scan, I tried using superantispyware, hitman pro and malwarebytes to try and clear out the gunk. Sadly none of them worked, so I don't kn
  13. It started a few days ago when I downloaded a VPN app, where I would get notification intermittently but for the past two hours or so i've been receiving messages continuously, such as in the attached files. I thank eset for blocking these connection (though I dread to think how many haven't been caught out) but what can I do to get rid them once and for all? I know for a fact it started when I downloaded the app as it started shortly after. Additionally i've noticed my laptop getting hot and power being used more quickly than usual, not sure if that's anything to do with this but how can
  • Create New...