Jump to content

itman

Most Valued Members
  • Content Count

    6,211
  • Joined

  • Last visited

  • Days Won

    173

itman last won the day on May 18

itman had the most liked content!

Profile Information

  • Gender
    Male
  • Location
    USA

Recent Profile Visitors

12,656 profile views
  1. Note that a real-time scan exclusion is not the same as a SSL/TLS Protocol scanning exclusion.
  2. It has in the past: https://steamcommunity.com/app/271590/discussions/0/613956964591355899/?ctp=2#c594820656469302670 However back in 2015, Eset was using a network adapter mini-port filter whereas now it uses the Windows Filtering Platform.
  3. Try this: https://minecraftirc.net/support-articles/known-incompatible-software/ Once necessary firewall rules have been created, you can switch the firewall back to Automatic mode.
  4. Eset is very "tight lipped" about what its drivers are used for; just like about almost all of their internal protection mechanisms. My prior testing with Eset yielded that the Eset helper driver is a component of their real-time scanning protection. It's primary purpose is to inject an Eset .dll into select processes when suspect malware activity is detected. This processing is also infrequently invoked and requires continuous monitoring by Eset real-time protection compnent. Since Eset Online Scanner is off-line scanning for malware primarily via signature means, real-time components that would deploy this driver are never invoked. Finally, Eset newer real-time deep behavior inspection and advanced machine learning components have superseded by need for .dll injection monitoring. As far as rootkit detection goes, they are somewhat of a moot point on Win x(64) based systems due to its built-in kernel patch protection. Additionally, most rootkits manifest at system startup time. Therefore, Eset Online Scanner won't detect this activity unless the malware creator was careless enough to place the rootkit in a disk or memory area readily accessed by both the OS and Eset, and Eset has an existing signature for the rootkit. My advice is purchase a paid license for either NOD32 or Internet Security which will fullt deploy all Eset protection mechanisms.
  5. Also, this error code relates to a networking configuration error. Refer to this for applicability to your network environment and a possible solution: https://www.kapilarya.com/error-0x800704cf-the-network-location-cant-be-reached
  6. This might be related to Memory integrity protection in Win 10. Normally, it is not enabled by default. You may have manually enabled it or it was auto enabled for some reason. Do the following. Open Windows Security Center -> Device Security -> Core isolation. Mouse click on "Core isolation details." If Memory integrity setting is set to "On," reset it to "Off." I believe a system reboot is required to make the setting change effective. Now test if this resolves the issue. I also at this point can't see how this Windows protection could be affected by Eset Internet Security in an way. -EDIT- Microsoft has confirmed there is an issue with ver. 2004 on PCs with Memory integrity enable and is currently preventing the Feature Upgrade being offered to them: https://www.neowin.net/news/microsoft-blocks-windows-10-may-2020-update-on-pcs-with-memory-integrity-enabled
  7. I picked this one up over at the Minecraft forum and its the last thing I am going to recommend to try. Once all the necessary firewall rules have been created for GTA, you can set Eset firewall back to Automatic mode. That said, I am done with this thread. https://minecraftirc.net/support-articles/known-incompatible-software/
  8. Should be able to duplicate by simply installing HEIF Image Extensions from Win Store: https://www.microsoft.com/en-us/p/heif-image-extensions/9pmmsr1cgpwg?activetab=pivot:overviewtab . It's a freebee. Then scan its app directory entry.
  9. Then the HEIF Image Extension app is not installed. This explains why you can't uninstall it. This directory, Microsoft.HEIFImageExtension_1.0.31072.0_x64_8wekyb3d8bbwe, appears to be related to your prior ver. 1909 Win Store installation. You should be able to remove it manually using PowerShell: https://answers.microsoft.com/en-us/windows/forum/windows_10-windows_store/how-to-manually-uninstall-a-store-app/963863e4-4c0b-4565-af90-f5bc7ecf3f47
  10. Also appears this app's actual path is C:\Users\xxxxx\AppData\Local\Packages\Microsoft.HEIFImageExtension_8wekyb3d8bbwe\...... ; at least on Win 10 Home ver. 1909 it is. It is also an optional Win Store download. This makes what you are showing for ver. 2004 a bit suspicious. But who knows? Maybe MS made it mandatory in ver. 2004? Or perhaps you installed it previously?
  11. That's odd. Enter the full path name manually then; e.g. C:\Windows\SystemApps\Microsoft.HEIFImageExtension_1.0.31072.0_x64_8wekyb3d8bbwe\x86\maheif_store.dll
  12. Create a performance scan exclusion for this file entry per the below screen shot. Hopefully, this is the only item Eset initial scan hangs on:
  13. You will have to obviously have to contact your company's IT security admin for the license key. Doubtful he will provide you this. He will have to remote access the device and activate the license. FYI - the admin might not be "very enthralled" with your Eset upgrade installation. He should be interested on how you were manually able to uninstall Eset.
  14. Somewhat related is it appears NODE.js has an API that will create a .lnk reference to an .exe in Startup directory which will bypass Win 10's capability to prevent such activity: https://github.com/j201/windows-shortcuts
×
×
  • Create New...