Jump to content

itman

Most Valued Members
  • Content Count

    6,926
  • Joined

  • Last visited

  • Days Won

    183

Everything posted by itman

  1. Appears that your lack of fluency in the English language lead you to believe my reference was directed specifically to your country. It was not. It was a generic reference to if you frequent in web places where hackers reside, your presence does not go unnoticed. Remember that hacking including licensing cracking is done by criminal syndicates these days. They don't take it lightly if someone tries to expose their activities.
  2. As @Marcos posted, you have to contact the seller where you purchased your license from about this problem. Also you never mentioned to date if that license was purchased from an authorized Eset retail source. You also posted in another forum thread about how you have discovered a "perfect" Eset license crack. It may very well be that in your romp through "the land of crackers," you ticked off the wrong source and you are now paying the price for doing so.
  3. Appears ver, 13.2.16 is on all the off-load download sites. I'm still on ver. 13.2.15 using pre-release updates. Forcing updating doesn't download ver 13.2.16.
  4. I am on pre-release updating and still on 13.2.15. I suspect 13.2.16 is just a regional version of current release. 13.2.16 can be downloaded here: https://www.eset.com/int/home/internet-security/download/ . Version 13.2.16.0 Fixed: Bug that causes application freeze in limited scenarios However, Eset English language off-line download web site still shows 13.1.15: https://support.eset.com/en/kb2885-download-and-install-eset-offline-or-install-older-versions-of-eset-products
  5. Are you stating that every time you perform a license reset and upon entry of the new license key, that license key ends up being installed on devices other than your own?
  6. Eset IDS exceptions are created per work station as follows: https://support.eset.com/en/kb7052-create-ids-exclusions-on-client-workstations-in-your-eset-endpoint-product-6x For ESET Security Management Center, refer to this to create IDS exclusions for client workstations: https://support.eset.com/en/kb7054-create-ids-exclusions-for-client-workstations-in-eset-security-management-center-7x For Eset Remote Administrator, refer to this: https://support.eset.com/en/kb6624-create-ids-exclusions-in-eset-remote-administrator-6x
  7. To begin, Eset doesn't permanently delete files; it places them in Quarantine. They can always be restored from there after setting real-time scan exclusions for the files for whatever Eset detected. This is not recommended unless the files have also been verified by another malware scanning authority such as VirusTotal. Eset scans by default are set to "Remedy detection if safe, ask otherwise." Safe in this context means file removal would not adversely affect system operation. Refer to the below screen shot on how to modify default scan cleaning behavior:
  8. What is the untrusted cert. Eset is showing in the alert? What I am wondering is if Eset root CA certificate used for SSl/TLS protocol scanning has somehow expired on these endpoints.
  9. Also no problem using IE11 per below screen shot. Suspect what the Eset alert is stating is possible MITM activity is going on.
  10. No problem with cert. or Eset using FireFox. But below is what is displayed from the web site?
  11. That's the issue. The registry scanner goes "bonkers" when references exist to a file in the registry but the file doesn't physically exists. Also your audio stuttering when the startup/update scans are running are likewise either caused by the registry or WMI scanning. A restricted version of both the scan types are also employed by those scans. At present, there is no way to disable registry and WMI scanning for the starttup/update scans.
  12. Eset has predefined categories a parent for example, could restrict a child household member from accessing. See the below screen shot for a few of them. The alert Eset is displaying is because and assumed the source that installed Eset on their household devices has restricted access to one or more of these categories. Obviously, your web site is classified in one of these parental control categories. I don't know what Eset uses to determine how a web site falls in one of the categories. But there are various web site rating concerns that do so.
  13. Eset will at times flag Nirsoft utilities as hack tools. Since this wasn't flagged as such by Eset, I assume its safe. Just download and use the portable version which runs w/o installation. All this utility does is the equivalent to entering http://192.168.1.xxx in a browser to access your router settings. Actually, the utility is safer since a browser is not being deployed.
  14. In regards to the Eset ARP poisoning attack on your laptop, refer to this: https://support.eset.com/en/kb2933-arp-icmp-or-dns-cache-poisoning-attack-in-eset-home-products-for-windows
  15. I have also seen enough with this and numerous other like postings that Eset needs to "pull the plug" on registry and WMI scanning in all forms that was introduced in ver. 13.2.15. Issue a new patch release with those scan features removed until they have been thoroughly tested.
  16. When you ran the Eset scan, did you run a Custom scan with the registry and WMI options not selected: i.e. unchecked marked?
  17. Eset has an online help article about leaked licenses here: https://help.eset.com/license_manager/en-US/elm_leaked_license.html Appears the proper procedure is to first deactivate the leaked license on all devices that are not associated with the legitimate Eset license owner. Then perform the license reset and enter the new Eset license on legitimate devices. Was this the procedure followed?
  18. You can change your myEset account password as shown in the below screen shot:
  19. The question is how your Eset license keeps getting leaked. For starters, change your password to a strong one on myEset.com and see if that stops the leaking activity.
  20. Wi-Fi issues have manifested on Win 10 1909: https://zcom.tech/wifi-disconnects-automatically-windows-10.html/ . But Wi-Fi issues have also occurred on other Win 10 versions due to Wi-Fi Sense issues: https://appuals.com/wifiinternet-keeps-disconnecting-on-windows-10/
  21. Also refer to the following: [KB6957] Create and edit Web control rules in ESET business products using ESET Security Management Center (7.x) https://support.eset.com/en/kb6957-create-and-edit-web-control-rules-in-eset-business-products-using-eset-security-management-center-7x
  22. Also monitoring and analysis of employee Internet use really requires specialized software. This article references a few: https://www.information-age.com/monitor-users-internet-activity-123468034/ Another approach is to restrict employee web site access such as blocking access to pornographic web sites and the like.
  23. Does restarting the device correct the Eset real-time issue?
  24. This should be possible using Eset Remote Administrator. Refer to this: https://support.eset.com/en/kb6043-log-all-activity-blocked-by-web-control-rules-in-eset-remote-administrator-6x Although the article addresses blocked activity, appears it can also be configured for allowed activity.
  25. Are you sure Eset actually blocked the PowerShell script execution? As far as I am aware of, Eset will not unconditionally block PowerShell script execution. Eset's Knowledgebase has articles on how to block Powershell exection via HIPS rules for additional ransomware protection. Also, those rules need to be manually created unless something has changed in Eset Endpoint default settings. By default, PowerShell script execution is blocked on Win 10 via default execution policy. You have to change that as shown in this article: https://www.windowscentral.com/how-create-and-run-your-first-powershell-script-file-windows-10 .
×
×
  • Create New...