Jump to content

VanillaHaze

Members
  • Posts

    22
  • Joined

  • Last visited

Everything posted by VanillaHaze

  1. I need cover for two devices right now. In three-six months time possibly up to three more devices. Can I still get the multi-device/multi-discount offer for the additional devices as and when you need them or do you have to buy a license for all five devices at one time?
  2. OK, I found out that belongs to the IT guy that setup the subscription. I guess i’ll get him to sort it. Shame I don’t even have control over my own local myeset account here though.
  3. Is that synced to the myeset account? That shouldn’t be what’s synced to the myeset account it should be a personal account. Is there anyway you can indicate what email is linked to the myeset using my activation key?
  4. Just to add: or is there a way to find out what email is synced to myset if it makes it easier? Thanks Edit: OK wait I found it: 33B-2S3-3AK. Apologies for the confusion!
  5. I was given a username (and a password) which is: EAV-0135255843. No idea where I'm supposed to login with this though? I just tried setting up a myeset account and it said my activation key is linked to another account? Which is odd as cannot recollect setting one up in the past. As for public ID, I can't see one here. It just username, password and license key. I'm stuck. Should I PM you the license key if it helps?
  6. Oh yeah I see that now, there's a separate section for Mac customers. I will post there instead?
  7. Just to add to this. I found out that the error is apparently due to an overuse of the license even though it's currently only active on two devices right now and I have no idea how to manage/remove obsolete activations (if their are any). Any advice?
  8. Hello, I'm getting this error when I try to activate my license (please see attached): How to resolve? Thanks
  9. That was very interesting. Just to elaborate, im not a cybersecurity professional - the use case here is to observe and software features and architecture and programming under the hood, as a student, but its the source/repos that im not too sure of, even though they are premium solutions. Although I have a separate isolated hardware set-up for this work than to my ‘daily drivers’ (so I can literally just bin the hardware if things go seriously troublesome) the lan is the same, so my main concern is to protect the network. Ideally I need to contain the installed desktop/web apps and be able to force bridged connections from system wide VPN on host OS to the guest so that any nefarious snooping via malicious applications will not find wi-fi gateway or know my local ip. Im being extremely cautious but thats just for the sake of everyone else on the network!
  10. I am currently using eset’s smart security premium plan, however I wondered whether there is any add-on programmes or recommendation for containment technology so end users can run virtualised browser instances and downloads within a sandbox on their device for analysis? Something comparable to this - https://help.comodo.com/topic-72-1-451-4739-.html
  11. What I like about glasswire is that the is a small pop-up box that actively shows you the domains and ips of the servers sending/requesting data from your device. Is there a way to proactively monitor network traffic on eset this way?
  12. With wordpress in mind more specifically. I tried to look but couldn’t find any relevant solution. According to w3techs.com wordpress is now even more used than even custom coded sites with a market share just short of 40%.. So with this in mind, I was wondering whether there is a solution for the wordpress community I might have overlooked or whether there is a plugin solution such as a waf/cloud scanner in the works?
  13. Hi, I wasn't really interested in a secondary scanner as I have one (MB) (unless HMP can be used as a tertiary scanner 😉) I just needed a complimentary standalone anti-keylogger. There's not much on the market but I found one called guardedid which I think looks decent enough. Thanks for the input 🙂
  14. ok i'm not quite sure it's a full on antivirus software, but it's something along those lines, it's called hitmanproalert, does anyone know if this is known to cause conflict with eset background real-time scanning? Just out of interest if it is known to causes problem i was wondering if any security professionals know of a standalone anti-keylogger they would be kind enough to recommend (if its allowed here)
  15. Hello i would like to remain exclusively with eset however i won't name it (unless anyone needs to know about compatability specifically) but there's another security software that provides the benefit of encrypting anything written online (anti-keylogging) it does say quite clearly on the site that it's designed to work in conjunction with any other anti-virus software but I was wondering since eset is the integral part of my security stack what's eset / experienced eset members verdict here?
  16. Ah, ok yes that makes sense. I knew there would be mutual resource allocation but what I didn't know or agree to was they would allow server components to access my IP / bandwidth when there front end app isn't even running - haven't connected in about 5 days. Isn't that basically backend malware? Anyway, great little discovery for me there with your software. Thanks
  17. I checked my log on eset this morning and this is what I saw - I did not have any idea who or what this NT/authority was but I found out it is the system root access point above admin accounts, if I understood correctly. I only have one admin/user on the system. There are a few examples like this. If there is communication with domains blacklisted for phishing scams form root user then I guess I should be worried. I removed the app that was causing the problem but I am most concerned about whether this risk extends to other devices on the network. What steps should I take?
  18. I don't understand how my browser is using so much memory on an 8gb system. I have one window and 4 tabs open, so I don't get why there are 11 open connections. Like is pic 1 Also whilst on the subject of logs, I checked a normal scan on eset and i'm getting a lot of entries on the log saying that certain items can't be opened Is this normal?
  19. OK I have done that. Am I supposed to send the log to the technical support now?
  20. I forgot to add - downloaded the free VPN app about 4/5 days ago... then I uninstalled it 3 days ago when this annoyance that came with it became more prominent. But these suspicious outbound connections never stopped. I imagine there's some hidden file they've left behind on my system. I've used this app before on a vm and the same thing happened then but gave them a benefit of a doubt as i wasn't certain, now i know it's the source. Besides eset scan, I tried using superantispyware, hitman pro and malwarebytes to try and clear out the gunk. Sadly none of them worked, so I don't know what to try next. My main concern is assessment of something more nefarious like a keylogger
  21. It started a few days ago when I downloaded a VPN app, where I would get notification intermittently but for the past two hours or so i've been receiving messages continuously, such as in the attached files. I thank eset for blocking these connection (though I dread to think how many haven't been caught out) but what can I do to get rid them once and for all? I know for a fact it started when I downloaded the app as it started shortly after. Additionally i've noticed my laptop getting hot and power being used more quickly than usual, not sure if that's anything to do with this but how can I get rid of this from the root of the problem?
×
×
  • Create New...