Jump to content

Janus

Members
  • Posts

    290
  • Joined

  • Last visited

  • Days Won

    33

Everything posted by Janus

  1. Hello Gualano Marco Out of curiosity, did you also tried to launch the " specialized cleaners" that you find under "Help and support". If your trojan is a new variant (they are unfortunately quite often updated by the malware writer) then please submit it, so all of the Eset's community can benefit of your finding: How do I submita virus, website or potential false positive sample to ESET's lab? Regards Janus.
  2. Hello Linda50 Regarding the name , "Reggenie" then it comes from the quarantined file. The file should be in your quarantine.Not sure if my answer is correct regarding the name "reggenie" : But the software you are trying to download performs task like scans and repairs of registry errors. So reg. could stand for registy-genie, a program wich perform (or try to) delete some registry entries. (Which most often can cause more severe troubles). Regards Janus (Hey TomFace , I agree with you )
  3. Hello Linda50 The download is categorized by eset as " Win32/Adware.RegGenie application" so it is not a mistake by eset. The software is a potentially unwanted application, and is a program that contains adware (se the link from above). Regards Janus. To Eset ( info. from VirusTotol) :MD5 de41943335a000152b47aa1558bce077 (SHA1 aa3ac6cf0358d939165c25d48a07c75146e721a5)
  4. Hello Linda50 and wellcome If you download software from Cnet, as you said you did, then it is most likely that eset has detected an " Potentiel unwanted program" in the download. Try instead to download the same software from the vendors official website. Link: Sony Regards Janus
  5. Oh yes, I definitely know what you mean SweX, and I agree with you more than 100% ( more than 100%, didn't thought it was possible ). See you around SweX, and have a nice day.....and thanks for your feedback my friend Regards Janus :-))
  6. Thanks, Arakasi for your always very constructive feedbacks. Much appreciated. Regards Janus :-))
  7. Hello..let us think out of the box, a bit... Should Eset have a integrated image backup and recovery function, as a part of Eset Smart Security? ......The integrated total image backup and recovery function, could work like this. When you install Eset Smart Security, then it will ask you if you want to create a separate partition on your hard drive. On that partition Eset will place the image backup file of your system, so in case that your system is compromised, or other severe issues, then you will be able to do a total restoring of your system. The way, to get to the backup image file could be done by using the Eset rescue disk (in Linux), or by changes done to the MBR (master boot record), so you only have to press the F1 key to get to your image file before windows boot up. Personally I like the idea, and think it will besides Eset anti theft-media and heuristic protection, complete Eset, so it actually cover the user on all bases, regarding security of the users system. What do you think? Regards Janus :-))
  8. Hello badcompany No but I have been trying Dr.Web Security Space, for a period. Found the protection to be quite good. Was testing its abilities, in Vmware and with malwaresamples from a honeypot. Gave a overall good impression, but found it to drag down the speed of my system too much. You ask if Eset will give you the same level of protection . To be honest, then it is a hard question to answer. There is too many variables. But I have absolutely no doubt, that Eset will match the level of protection, that you were used to, from Dr. web. (That is of course an answer, you can expect to receive, when asking here in this forum ). My only advice I feel I can give you is, that I think you should choose that security solution that you feel most secure with. But if you should choose Eset, then I don't think you will be disappointed at all. Regards Janus :-))
  9. Hello :-)) Just want to draw attention towards this well written article from " We Live Security ". It is really worth the 5 - 8 minutes it takes to read. The link: 11 things you can do to protect against ransomware, including Cryptolocker Regards Janus
  10. Hey Tomface Your solution is a much more elegant Tom Face :-)), and most important, it works just fine. You truly deserve, a triple kudos, but as it is ,unfortunately. Then it is just possible with one at a time. Thank you for sharing this information with us, who use Ie 11. Regards, Janus :-))
  11. Hey ... A 3 steps workaround, for those who has problems inserting text and links when using Internet explorer 11. Regards Janus
  12. Hello everyone Well, another year has almost passed, and another stands on our doorsteps, full of expectations, hope and challenges to everyone. I will just use the this opportunity to say ,Merry Christmas and a Happy new year, to all the nice people that I have written with, here on Eset's new forum. So dear members and Moderators, I wish you all the best, for the rest of this, and the forthcoming year. And may all have, a nice christmas holiday with your family and friends. Regards Janus...
  13. Hello babcompany In my opinion there is no need to change the default settings, they are quite good and well thought out. There is just one thing that I think is very important to have enabled , and that is " potentially unwanted applications". It is not a default setting, but you are prompted, in the beginning of the installation, to enable it or have it disabled. You can always go back and change it if needed. Just press F5 key, to access advanced setup. Then expand "Computer" and click "Antivirus and antispyware". Regards Janus :-))
  14. Hello TomFace and Marcos, thanks for the feedback on my post . Have a nice weekend, to both of you :-)) Regards Janus
  15. Hello Marcos "Question", this opportunity to interact with a dialog window, does it not only counts for when the firewall is set to be interactive. I mean, you will not see this opportunity if the firewall is set to automatic filtering? ( If I have understood it correctly, you could swift to interactive firewall to resolve a situation , regarding a poisoning attack, and in those cases, where it is a know and trusted ip, for then to set your firewall in automatic mode with exceptions, if necessary. Regards Janus
  16. Hello CDuarte Try to see this link from Eset's archives : DNS Cache Poisoning Attack Regards Janus :-))
  17. Hey Tomface :-)) No doubt that we will see more and more of this kind of spearfishing (hacking, specifically targeted on one specific company). Let's hope that the users have created stong solid paswoords, (How to Create a Password You Can Remember + How secure is my password). Oh, and let us hope that they use "Two Factor Authentication". Regards Janus.....(Thanks Tomface for the link )
  18. Hello dear Eset :-)) Basically I think, that it is a lack of knowledge, of the benefits of "two factor authentication". Let us take Gmail as an eksempel. Many of my friends and colleagues use gmail, but not many use 2-step verification . The most common answer is, "oh, we didn't know that is was a possibility". And the most interesting is, that when it is explained, most of them, ....them I know of...., begins to use it. The small amount of feedback that I have, is that most people thinks, in the beginning, that it is a little bit awkward. But like many things, it is just a question about learning new habits. So the best motivation for introducing new security habits, is to begin explaining/showing, and talk about how easy it actually is. And with a little effort, from the user, he og she will recive a much better protection Regards Janus.
  19. Thanks Marcos, for following up on this, and for the very quick response, from both of you. Regards Janus :-))
  20. Hello Thanks Perte, have a nice day :-)) Regards, Janus
  21. Hello Thanks Peter, you answer make sense, but won't that difference in how the file is evaluated/rated, confuse most users? Regards Janus
  22. Hey ..... I can't remember if I have heard an explanation for this ? ...I downloaded a new version of " Winrar" 5.01 today..just released yesterday. I checked the file by using " reputation ", you know right click context menu, and the file get categorized as "attention (yellow). I installed the file,(is a known vendor) and check " Running processes" and there it is categorized as fine (green). Why the difference......yellow when you right click file repetition, and green when the file process is running? Regards Janus
  23. Hey.. my bad, ....have you followed the instructions in this article ? , " How do I use ESET SysRescue to create a bootable USB flash drive, CD or DVD on a 64-bit Windows system?" especially the steps after you have downloaded the 32 bit msi file to the desktop?, if not then browse to the 32-bit msi file in the iso properties, and press ok. Regards Janus
  24. Hello hardofhearing1 Okay...try this link instead : The Windows® Automated Installation Kit (AIK) for Windows® 7 Regards Janus
×
×
  • Create New...