Jump to content

itman

Most Valued Members
  • Content Count

    5,856
  • Joined

  • Last visited

  • Days Won

    167

Everything posted by itman

  1. Also are you referring to G-mail access via e-mail client or web mail access.
  2. @Smithannae2 no where in your postings do I see any mention that your father actually paid for an Eset license. Appears the repair guy is using a cracked/hacked license key or the like. If your father was not explicitly charged for an Eset license, he needs to purchase one to resolve this issue. Or alternatively, uninstall Eset.
  3. It appears Eset is not activated. That is the only explanation I have for this Eset screen appearing. The computer repair person should have given your father the Eset license key. If not, he needs to specifically request it from him. An Eset license key is formatted as USAX-XXXX-XXXX-XXXX-XXXX where the first three characters is the country code. Once the licensing key is received, he can then select "Use a purchased license key" option in the above Eset activation screen. Then enter the license key including the dash marks. Eset will then connect to its licensing servers and verify the license key. If the key is not a valid one, a message will be displayed indicating this. If the key shows it was invalid, I would demand that the purchase money be refunded. You father can then purchase a license for Eset Internet Security here: https://www.eset.com/us/home/internet-security/ .
  4. I'll answer two of these questions. Most definitely. Have yet to find something that can get around it. First, Eset HIPS is not a "full feature" HIPS along the lines of Comodo's Defense+ or OutPost's now default HIPS. The Eset HIPS lacks features such as a Trusted Publishers feature and the like that auto allow trusted System processes and the like. "The rub" is when you start monitoring a process for modification, you also must also manually create allow rules for trusted processes that do likewise. This means you must have the technical knowledge to know what those trusted processes are and if its normal activity for them to perform such modification. And in reality, it doesn't end here. Those trusted processes could be possibly be injected by malware, so those should also be monitored ........ ad infinitum. Most browsers are sandboxed; e.g. Edge's AppContainer, or run at low Integrity level which prevents malware from infecting the rest of the system. There are also products designed for this like Sandboxie although it appears, its days are numbered.
  5. Read this above posting: https://forum.eset.com/topic/22995-latest-update-bsod/?do=findComment&comment=111480 The last update to 2004 borked things. Also as I posted previously but apparently you did not read, Eset doesn't officially support Win 10 Preview builds.
  6. If you're using a Win 10 Preview build, the solution is to uninstall it and use the the latest released version of Win 10 which is 1909.
  7. Which message? The previously shown Win 10 notification message relating to Eset Proxy GUI?
  8. As far as candidconcepts.com goes, the IP addresses associated with it are 88.208.222.179 and 88.208.222.180. As far as domain name blocking goes, have you tried *.candidconcepts.com/* and *.candidconcepts.net/*? I assume Eset mail server supports that wildcard notation. Block that IP address then. Doing so might end up blocking a lot of legit e-mail though. It appears a lot of Internet traffic routes through those relay backbone servers.
  9. @Aryeh Goretsky can you check this out and verify the origin of this Win 7 upgrade alert.
  10. No. Per the below screen shot, is Anti-Theft enabled? Also, I don't know how it could have been enabled without you knowing about it. It requires you to either sign-on with your existing my.eset.com account or create a new account.
  11. True. But Linux ones will run just fine. However, the "Window Subsystem for Linux" would need to be installed via Control Panel -> Turn Window features on or off. -EDIT- Can also be done from PowerShell: Open PowerShell as Administrator and run: PowerShell Enable-WindowsOptionalFeature -Online -FeatureName Microsoft-Windows-Subsystem-Linux
  12. If you father can access the Eset GUI interface by either the Eset icon on the desktop toolbar or via Win 10 Start menu, refer to the below screen shot on how to retrived his Eset public license ID. He can relay that to you via phone or e-mail. You can then post same in this forum thread:
  13. CHINANET Anhui PROVINCE NETWORK China Telecom No.31,jingrong street Beijing 100032 It's a backbone server, CHINANET-BACKBONE No.31,Jin-rong Street. As such, it wouldn't be the origin of the e-mail but just an intermediary delivering it.
  14. If Eset is properly installed, the answer is no. The Eset installer basically disables Windows Defender and the Win 10 firewall (Internet and Smart Security installations) and modifies Windows Security Center to reflect this status.
  15. Comment from the above posted link article site: Time you ensure your router's firmware is updated to the lastest version if its a D-Link or Linksys router.
  16. Appears something is borked in the Eset installation in regards to your first screen shot showing a Win 10 notification in regards to the Eset GUI. It might be best just to run Eset's Uninstaller tool in Safe mode as described here: https://support.eset.com/en/kb2289-uninstall-eset-manually-using-the-eset-uninstaller-tool . Reboot after the Eset uninstall. Then reinstall Eset again. One of the first things the installler does is show a screen similar to your second screen shot. The "Use a purchased License key" option should be selected and the Eset license key entered there. Prior to performing the above, your father's PC should be checked for any existing other third party AV software; e.g. Avast, Symantec, etc., being installed and that software uninstalled. If issues arise with that, Eset has an AV remover tool that can be downloaded and run to assist in the removal: https://www.eset.com/int/support/av-remover/
  17. This has been fixed in the latest WD engine update to be pushed via Win Updates: https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-windows-defender-scan-bug-with-new-update/
  18. My suggestion again is to go to the malware removal sites I posted previously for assistance. Or, contact your in-country Eset support representative for assistance as long as you are using a paid licensed version of Eset. -EDIT- As far as malwaretips.com and also possibly bleepingcomputer.com, note the following restriction: https://malwaretips.com/threads/piracy.38446/
  19. Are you stating you are getting the same alert in Edge and that you have no extensions installed in it?
  20. Another FYI observation in regards to the above posted script code. Of note is the amptylogick.com domain reference. Both Eset and Fortinet detect this domain as malicious on Virus Total; the only two listed solutions to do so. So I assume Eset's detection in this regard is by blacklist.
  21. As far as JS/Adware.Revizer malware is concerned, this FireFox posting might be informative: https://support.mozilla.org/en-US/questions/1228037 . It is definitely extension related. Also appears MalwareBytes might be able to get rid of it; at least in FireFox.
  22. I don't use Chrome, But I suspect it works similar to FireFox in regards to the user's profile. That is it is not deleted and when Chrome is reinstalled existing settings, extensions, and the like are retained and reestablished. It might come down to you having to manually delete this profile along with all traces of Chrome on your device. Then if the malware alerts cease upon reinstall, one by one reinstall your prior extensions. If Eset starts alerting after an extension installation, that is your culprit. An alternative to the above is to go to the malware support sections of either malwaretips.com or bleepingcomputer.com and have one of their malware remediation experts assist. They will instruct you to download and run a number of specialized tools for malware diagnostics along with other tools that specialize in removing browser based malware.
  23. Agreed. I was referring to past forum postings where the issue was traced back to a recent signature update.
  24. This issue has already been reported in the forum. There is a hash problem with eamsi.dll. It does not affect its functionality in any way and the .dll is being loaded into applicable processes.
  25. For the registry services key mentioned, verify that Administrators is listed and it has Full Control as shown in the below screen shot. -EDIT- Likewise, Creator Owner should be also listed. It should show Special permissions assigned. Mouse clicking on the "Advanced" tab should it has Full Control. Note: Do not change any registry permissions or anything unless else unless you know what you are doing. Do you have UAC set at its default level? You should be receiving a UAC alert from the Eset installer when it starts to allow escalation to Admin level as I recollect.
×
×
  • Create New...