Jump to content


Most Valued Members
  • Content Count

  • Joined

  • Last visited

  • Days Won


Everything posted by itman

  1. When performing a scan at VT, always verify the date the last analysis was done. The scan link reference you posted was two months old. I just rescanned with this result:
  2. Norton Safe Web is reputation based. You also don't need an extension to use it. You can look up a web site status manually here: https://safeweb.norton.com/ . A equivalent and more established service is W.O.T.: https://www.mywot.com/ . The main thing to realize when using web site reputation processors is their reputation status determination is based on end user input which can be questionable. Its status validity is also based on access frequency. A high use web site might show more negative use comments than a low use web site. Also there have been past complaints that reputatio
  3. Read this article and draw your own conclusions: https://www.cyberscoop.com/lojack-computrace-fancy-bear-absolute-kaspersky/ . The gist of the issue is Absolute, the creator of the Lojack software, states they patched the vulnerability in newer versions of Lojack. The problem is they never offered any verifiable proof this is the case.
  4. Here's a thread from 2007 on the Themida issue: https://www.wilderssecurity.com/threads/win32-packed-themida.184840/ . It starts with this comment: and ends with this comment from Eset: It's your choice to use or not use this app. If you want to use it and accept the risk of doing so, create an Eset real-time exclusion for the Eset detection for the app.
  5. There really is no reason to add the extension. Chrome includes Google Safe Browsing by default: https://safebrowsing.google.com/ How to configure it is shown here: https://support.google.com/chrome/answer/9890866?co=GENIE.Platform%3DDesktop&hl=en
  6. Assuming you are running Win 10 and have a newer PC that uses UEFI versus BIOS, you can access UEFI settings via Win 10 Advanced Startup settings: https://www.wikihow.com/Enter-the-BIOS-on-a-Lenovo-Laptop . The article references Lenovo but this should work for most PCs with a UEFI. Just be careful about any modifications done in the UEFI. Modifying the wrong one can bork your device unless you know what you are doing.
  7. If you have doubts about Eset's detection, submit the downloaded .zip file here: https://www.virustotal.com/gui/ Multiple AV solutions will scan it and render their verdicts.
  8. Here's the URL Eset is blocking: https://indianpunchline.com/ Rightfully so. Not only is the site cert. revoked but the intermediate cert. to boot. QUALS SSL cert. analysis here: https://www.ssllabs.com/ssltest/analyze.html?d=indianpunchline.com
  9. The fact that files on the drive are corrupt and the drive can't be formatted would be indicative of a faulty USB drive. Rather than fooling around trying to find and correct if possible the issue, I would just return the drive for refund or replacement with another USB drive.
  10. This article clarifies that Eset Mobile Security & Antivirus version will run on a Chromebook: https://www.lifewire.com/best-antivirus-software-for-chromebooks-4770661 . Is this what was installed? On the other hand, this Eset article on enabling anti-phishing feature for Eset Mobile only references Android OS; I know nothing about Chromebooks but this article states that Android apps do run on Chromebooks: https://www.androidauthority.com/what-is-a-chromebook-873948/ . The question is if Eset Mobile is one of those apps? I guess not: https://support.eset.com
  11. Eset has a partnership relationship with Google that allows for limited components of Eset's protection to be used in Chrome This is called Chrome Cleanup and its very limited in scope as to what it detects and protects: https://www.eset.com/us/about/newsroom/press-releases/google-chrome-and-eset-collaborate-in-fight-against-online-threats/ Specifically, this Eset extension is only scanning anything downloaded from Chrome plus browser based malware and other undesirable behavior. Ref.: https://www.eset.com/int/google-chrome-cleanup/#:~:text=What is Chrome Cleanup%3F,remove th
  12. Unless you installed Windows on the Chomebook as far as I am aware of, Eset will not run on it. Eset can only be installed on Windows or Linux based OSes: https://support.eset.com/en/kb37-compatible-operating-systems-for-eset-home-products-home-users
  13. Not surprised with Paypal's decision here. Most security software purchases these days from e-tailers are not refundable. This is absolutely the case if the software is used; i.e. installed. Bottom line - when buying a license from any source other than from Eset eStore or an authorized partner, you're on your own when an issue occurs.
  14. Refer to @Marcos prior posting. You can: 1. Exclude the Eset PUA detection. 2. "Live with" the detection being displayed. 3. Contact your laptop/notebook manufacturer as to methods to remove/deactivate Computrace feature - Recommended.
  15. You might want to also read this Eset article: https://www.eset.com/us/about/newsroom/corporate-blog/what-you-need-to-know-about-lojax-the-new-stealthy-malware-from-fancy-bear/ . Lojax is the malicious malware associated with Computrace's Lojack firmware software. Lojax needs Lojack present to operate. If you receive an Eset alert related to Lojax malware present, then you have a real problem. The present alert you are receiving from Eset is a warning that Computrace's Lojack software exists. In other words, that you are vulnerable to a Lojax attack.
  16. Search the Eset forum. There are multiple postings on Computrace. The short description of Computrace is it is installed by the device manufacture as an anti-theft mechanism. Depending on how it was installed, if it was activated, etc., etc., it may be possible to disable it via BIOS/UEFI settings. Contact your device manufacturer for further details on your specific Computrace installion.
  17. This happened to me on my Win 10 PC when manually updating last Tues.. Normally, updates would start immediately after downloads completed. This didn't happened and I was presented with an "Install" window /button that I had to manually mouse click on for update installation to proceed. Appears to me Microsoft changed Win Update processing ............. again.
  18. Please post in English. This is an English language forum. I have translated your posting using Google Translate web site: This is the second posting where Grindsoft "mysteriously" detected malware that other mainstream AV solutions did not. As such, I find Grindsoft's detection's suspicious.
  19. Confirmed in FireFox that it is uBlock Origin filters blocking this web page content:
  20. I finally converted the entire blog article into English. SKD Labs refers to the McAfee product tested as "McAfee Comprehensive Security Protection Suite." Since no product of that name exists, I assume they are referring to McAfee Total Security. Ditto for Kaspersky and Norton. Appears they are referring to their Internet Security versions.
  21. Eset appears to be detecting CPU-Z driver as a Potentially Unwanted Application; i.e. PUA. Appears Speccy has the utility embedded in it. It's your decision as to whether you want to create an exclusion for it.
  22. McAfee Avert, aka Stringer, is not a real-time AV solution but rather a malware stand-alone cleaning tool: https://www.mcafee.com/enterprise/en-us/downloads/free-tools/stinger.html This raises some serious questions as to what this comparative test is about. -EDIT- Likewise, Kaspersky has a free stand-alone scanner named Virus Removal Tool; i.e. KVRT, that is also quite effective in removing pre-existing entrenched resident malware: https://support.kaspersky.com/us/8527 Norton has a stand-alone scanner and cleaner named Power Eraser: https://support.norton.com/sp/en/us/h
  23. Appears this has something to do with West Coast Labs affiliation with NEWSKY SECURITY LLC in 2015. NewSky concentrates on IoT security. It also is the developer of checkmarkcertified.com.
  24. Appears Piriform Speccy attempted or did modify the currently executing ver. of equi.exe. This is odd because equi.exe is only loaded when the Eset GUI is manually started. Also there is no default firewall rule for equi.exe in ver. 14.0.22. The Application Modification alert appears to indicate that a rule for equi.exe is possibly attempting to be created.
  • Create New...