Jump to content

Janus

Members
  • Posts

    290
  • Joined

  • Last visited

  • Days Won

    33

Posts posted by Janus

  1. Hello Gualano Marco

    Out of curiosity, did you also tried to launch the " specialized cleaners" that you find under "Help and support". If your trojan is a new variant (they are unfortunately quite often updated by the malware writer) then please submit it, so all of the Eset's community can benefit of your finding: How do I submita virus, website or potential false positive sample to ESET's lab?

    Regards Janus.

    post-65-0-32690700-1387531529_thumb.png

  2. Hello Linda50

    Regarding the name , "Reggenie" then it comes from the quarantined file. The file should be in your quarantine.Not sure if my answer is correct regarding the name "reggenie" : But the software you are trying to download performs task like scans and repairs of registry errors. So reg. could stand for registy-genie, a program wich perform (or try to) delete some registry entries. (Which most often can cause more severe troubles).


    Regards Janus


    (Hey TomFace , I agree with you )

  3. Hello Linda50

    The download is categorized by eset as " Win32/Adware.RegGenie application" so it is not a mistake by eset. The software is a potentially unwanted application, and is a program that contains adware (se the link from above).

    Regards Janus.

    To Eset ( info. from VirusTotol) :MD5 de41943335a000152b47aa1558bce077 (SHA1 aa3ac6cf0358d939165c25d48a07c75146e721a5)

  4. Hey Janus and Arakasi. I agree that it is useful.

     

    As long as it is developed "in-house" and not licensed of another company, e.g how another vendors "password manager" is licensed from LastPass and not developed in-house by the vendor. There's nothing wrong with Lastpass but I think you know what I mean ;).

     

    Since that's one of several reasons I like about ESET software it's all developed in-house by ESET and I really hope the "whole package" continues to be developed in-house! :)

     

    And/Or do what Arakasi mention take advantage of what the OS already provides and simply integrate it in some form.

    Oh yes, I definitely know what you mean SweX, and I agree with you more than 100% ( more than 100%, didn't thought it was possible :D ).

    See you around SweX, and have a nice day.....and thanks for your feedback my friend

    Regards Janus :-))

  5. Hello..let us think out of the box, a bit...

    Should Eset have a integrated image backup and recovery function, as a part of Eset Smart Security? ......The integrated total image backup and recovery function, could work like this. When you install Eset Smart Security, then it will ask you if you want to create a separate partition on your hard drive. On that partition Eset will place the image backup file of your system, so in case that your system is compromised, or other severe issues, then you will be able to do a total restoring of your system. The way, to get to the backup image file could be done by using the Eset rescue disk (in Linux), or by changes done to the MBR (master boot record), so you only have to press the F1 key to get to your image file before windows boot up. Personally I like the idea, and think it will besides Eset anti theft-media and heuristic protection, complete Eset, so it actually cover the user on all bases, regarding security of the users system. What do you think?

    Regards Janus :-))

  6. Hello Forum, Has anyone here changed from Drweb to Eset.

    Hello badcompany

    No but I have been trying Dr.Web Security Space, for a period. Found the protection to be quite good. Was testing its abilities, in Vmware and with malwaresamples from a honeypot. Gave a overall good impression, but found it to drag down the speed of my system too much. You ask if Eset will give you the same level of protection . To be honest, then it is a hard question to answer. There is too many variables. But I have absolutely no doubt, that Eset will match the level of protection, that you were used to, from Dr. web. (That is of course an answer, you can expect to receive, when asking here in this forum :)). My only advice I feel I can give you is, that I think you should choose that security solution that you feel most secure with. But if you should choose Eset, then I don't think you will be disappointed at all.

    Regards Janus :-))

  7. Hey Tomface

    Your solution is a much more elegant Tom Face :-)), and most important, it works just fine. You truly deserve, a triple kudos, but as it is ,unfortunately. Then it is just possible with one at a time. Thank you for sharing this information with us, who use Ie 11.

    Regards, Janus :-))

    post-65-0-37222100-1386859510_thumb.png

  8. Hello everyone

    Well, another year has almost passed, and another stands on our doorsteps, full of expectations, hope and challenges to everyone. I will just use the this opportunity to say ,Merry Christmas and a Happy new year, to all the nice people that I have written with, here on Eset's new forum. So dear members and Moderators, I wish you all the best, for the rest of this, and the forthcoming year. And may all have, a nice christmas holiday with your family and friends.

     

    Regards Janus...

    post-65-0-66925400-1386597878_thumb.png

  9. Hello babcompany

     

    In my opinion there is no need  to change the default settings, they are quite good and well thought out. There is just one thing that I think is very important to have enabled , and that is " potentially unwanted applications". It is not a default setting, but you are prompted, in the beginning of the installation, to enable it or have it disabled. You can always go back and change it if needed. Just  press F5 key, to access advanced setup. Then expand "Computer" and click "Antivirus and antispyware".

     

    Regards Janus :-))

  10. Hello Marcos

     

    "Question", this opportunity to interact with a dialog window, does it not only counts for when the firewall is set to be interactive. I mean, you will not see this opportunity if the firewall is set to automatic filtering? ( If I have understood it correctly, you could swift to interactive firewall to resolve a situation , regarding a poisoning attack, and in those cases, where it is a know and trusted ip, for then to set your firewall in automatic mode with exceptions, if necessary.

     

    Regards Janus

  11. Hey Tomface :-))

     

    No doubt that we will see more and more of this kind of spearfishing (hacking, specifically targeted on one specific company). Let's hope that the users have created stong solid paswoords, (How to Create a Password You Can Remember + How secure is my password). Oh, and let us hope that they use "Two Factor Authentication".

     

    Regards Janus.....(Thanks Tomface for the link )

  12. Hello dear Eset :-))

     

    Basically I think, that it is a lack of knowledge, of the benefits of "two factor authentication". Let us take Gmail as an eksempel. Many of my friends and colleagues use gmail, but not many use 2-step verification . The most common answer is, "oh, we didn't know that is was a possibility". And the most interesting is, that when it is explained,  most of them, ....them I know of...., begins to use it. The small amount of feedback that I have, is that most people thinks,  in the beginning, that it is a little bit awkward. But like many things, it is just a question about learning new habits. So the best motivation for introducing new security habits, is to begin explaining/showing, and talk about how easy it actually is. And with a little effort, from the user, he og she will recive a much better protection

     

    Regards Janus.

  13. Hey .....

     

    I can't remember if I have heard an explanation for this ? ...I downloaded a new version of " Winrar" 5.01 today..just released yesterday. I checked the file by using " reputation ", you know right click context menu, and the file get categorized as "attention (yellow). I  installed the file,(is a known vendor) and check " Running processes" and there it is categorized as fine (green). Why the difference......yellow when you right click file repetition, and green when the file process is running?

     

    Regards Janus

     

     

     

     

     

    post-65-0-63069600-1386148479_thumb.png

    post-65-0-06370000-1386148488_thumb.png

×
×
  • Create New...