Jump to content

itman

Most Valued Members
  • Posts

    12,164
  • Joined

  • Last visited

  • Days Won

    319

Everything posted by itman

  1. Here's a ref. to netio.sys bluescreen issues: https://www.thewindowsclub.com/fix-netio-sys-bsod-error . Normally caused by network adapter driver issues. Eset sometime ago stopped using a network adapter mini-port filter to monitor web traffic. Verify that Windows Defender in 1903 has been disabled and NOD32 shows as the only realtime AV solution active.
  2. It's normal for apps to create files in that directory. It's also quite frequently happens that files remain in that directory after the app has been uninstalled. Since you seem overly concerned about residual files created by Eset's Online Scanner app, then remove the files. Just make sure you are removing files related to it and not some other currently installed app. -EDIT- https://support.eset.com/kb405/?locale=en_US&viewlocale=en_US
  3. See this thread for reference: https://forum.eset.com/topic/19751-eset-online-scanner-wont-remove/
  4. This might have something to do with the Eset detection: https://support.wix.com/en/article/staticwixstaticcommedia-appears-in-url-of-wix-images
  5. Refer to this article as a guide to things you can try: https://neosmart.net/wiki/system-recovery-options/ . Since you haven't been able to boot into Win 7 since the Eset uninstall, I would start with the the "Last Known Good Configuration" option.
  6. Below are links to free AV lab recent endpoint comparative test reports where Eset endpoint was included: https://www.mrg-effitas.com/wp-content/uploads/2019/06/201704-MRG-Ransomware-Test.pdf https://www.mrg-effitas.com/wp-content/uploads/2019/05/MRG_Effitas_2019Q1_360.pdf https://selabs.uk/en/reports/small_business https://www.av-comparatives.org/tests/business-security-test-march-april-2019-factsheet/ A few comments about NSS Labs. They don't charge AV vendors for testing. They earn their revenue from selling their test reports. Just because an AV vendor product is shown as being tested does not imply that the vendor previously consented to being tested. Eset in the past has publicly objected to NSS Labs test methods pertaining to their endpoint product. Despite repeated attempts by Eset to resolve their issues with NSS Labs, it has refused to even respond to Eset's communication to them on these issues. Ref.: https://www.eset.com/us/about/newsroom/corporate-blog/esets-response-to-nss-labs-advanced-endpoint-protection-test-results/
  7. That's a question you will have to ask NSS Labs about. Their response will probably be that you have to purchase the full report to find out why.
  8. To begin with, you should have downloaded EIS ver. 12.1.34 which is the most current version. Open a command prompt window. Copy the following into it and press enter: "C:\Program Files\ESET\ESET Security\ecmd.exe" /startprotectedbrowser Did Eset Banking and Payment protection start your Windows specified default browser?
  9. You didn't get any Eset alerts when they were all disabled as you posted previously. Personally, I would just use another browser. I for one am no big fan of anything Google produces. -EDIT- Also believe its time you open an Eset support ticket on this issue.
  10. 1. Open "Services" and for "NVIDIA Telemetry Container" stop service and set startup type "Disabled" 2. Run AutoRuns and in "Task Scheduler" section disable: + NVIDIA telemetry monitor + NVIDIA crash and telemetry reporter (2 instances) 3. You may also want to remove Telemetry logs: C:\ProgramData\NVIDIA\NvTelemetryContainer.log C:\ProgramData\NVIDIA Corporation\NvTelemetry\events.dat C:\ProgramData\NVIDIA Corporation\NvTelemetry\nvtelemetry.log C:\Users\user\AppData\Local\NVIDIA Corporation\NvTmMon\NvTmMon.log C:\Users\user\AppData\Local\NVIDIA Corporation\NvTmRep\NvTmRep.log Who needs an additional spy in your own PC?.. Awesome my friend, I forgot about those other bits We need to send a clear message to Nvidia that we will NOT tolerate their spying on us via telemetry, and we will every workaround we can think of in order to defeat it. It's bad enough that windows 10 is virtually one massive spyware collecting agency Rather than do all of the above, you can simply install nVidia drivers as normal. Once installed open an elevated command prompt and run the following: rundll32 "%PROGRAMFILES%\NVIDIA Corporation\Installer2\InstallerCore\NVI2.DLL",UninstallPackage NvTelemetryContainer This will remove all telemetry, logs, services and tasks. I use it all the time now and it's a very clean way of removing nVidia telemetry. https://forums.geforce.com/default/topic/1056140/geforce-drivers/defeating-nvidias-telemetry/post/5830317/#5830317 Personally, I just disable the Nvidia Telemetry service and leave it at that. I haven't seen any outbound Nvidia traffic after that. I also can't vouche the the above rundll32 method since I never used it. As far as blocking GeForce Experience outbound activity, the best way to stop it is never install it or uninstall it. Also according to this article, nothing Nvidia Telemetry or Geforce Experience does is supposedly nefarious: https://www.howtogeek.com/280101/relax-nvidias-telemetry-didnt-just-start-spying-on-you/
  11. Since it appears you want to still use GeForce and not uninstall it, you can download the latest non-vulnerable update here: https://www.geforce.com/geforce-experience/download . That should eliminate the update alert you have been receiving. As far as your other nVidia drivers, you have a problem. For any drivers less that release 390.65, you're vulnerable to the Spectre and Meldown vulnerablities noted here: https://nvidia.custhelp.com/app/answers/detail/a_id/4611/~/security-bulletin%3A-nvidia-driver-security-updates-for-cpu-speculative-side . I would serious considering updating your graphics card.
  12. Or, block uTube within Chrome: https://www.technorms.com/65050/best-ways-to-block-websites-on-chrome -EDIT- You can also try to block uTube using a host file entry: https://www.wikihow.com/Block-YouTube . Note this comment: http://techgenix.com/tips-and-tricks-using-windows-hosts-file/
  13. To begin with, there is a serious security vulnerability in regards to Nvidia GeForce versions prior to 3.18. You can read about that here: https://www.bleepingcomputer.com/news/security/nvidia-patches-high-severity-geforce-experience-vulnerability The article also refers to Nvidia driver vulnerabilities that have been recently discovered. So you have to verify if your Nvidia drivers have been have recently updated. As far as your screen shot goes, your Nvidia software is indicating that a GeForce software update is available. In light of the above posted, you probably want to perform the update. BTW - you don't need the GeForce software for your Nvidia drivers to function properly. It's primary purpose is to inform you that NVidia driver updates are available. It can be uninstalled via Control Panel -> Programs option.
  14. First, did you reboot after installing Eset? Sometimes Eset Bank and Payment Protection is not functional until this is done. Otherwise, do the following. Suggest you uninstall the current version of Eset using Eset's Uninstaller utility in Windows Safe mode. Note: if you have made any Eset customized settings, make sure you export those prior to uninstalling. You can then import those into Eset after it have been reinstalled. Then download your Eset version from here: https://support.eset.com/kb2885/?locale=en_US&viewlocale=en_US . You should be redirected to the appropriate Eset New Zealand download web site. Run the installer and see if that resolves the issue.
  15. To begin with, a revoked certificate is not the same security status of lets say, an expired certificate. A CA revokes a certificate for: 1. It's been stolen. 2. The concern that the certificate was issued to has been demonstrated to be untrustworthy. It's fair to assume no. 2 applies to this web site. To make matters worse, you disabled Eset's SSL/TLS scanning capability. Doing so means that if this web site does contain malware or redirects you to a site that does, Eset won't detect it and protect you from malicious activities such as drive-by downloading, coin mining, and the like.
  16. If this doesn't work, you can block uTube with a Chrome extension: https://www.techwalla.com/articles/how-to-block-youtube-on-chrome -EDIT- Assuming you're not using Google Chrome Enterprise to manage the Chrome clients, you can also checkout using GPO to do so: https://ittutorials.net/microsoft/windows-server-2016/gpo-google-chrome/
  17. @Marcos already answered this previously. On average approximately 6 per day. Most of the updates are signature ones.
  18. You can, but not recommended. Also, they run at low priority and only scan commonly used files:
  19. Here's your choices: 1. Keep adding IP address to block with your existing Eset firewall rule whenever an Eset popup alert appear with a new IP address. 2. "Live with" the existing Eset alerts. 3. Remove the Chrome extension.
  20. "My take" on this runtc.net issue is that it is some type of redirect tracker interception. Who is "infamous" for tracking activities - Google.
  21. https://www.petri.com/microsofts-upcoming-chromuim-based-edge-browser-has-few-features-for-the-enterprise In other words, the new Edge browers will employ the same security features as the old Edge browser.
  22. To begin with, Eset HIPS doesn't official support "\\" notation in a path name. If it works, it would only apply to the immediate path specified. In other words in your example for the C:\Users directory, but not for any subordinate directories specified within the C:\Users directory.
  23. Forum attachments can only be read by Eset moderators. If that that doesn't suffice, upload logs to a file share of your choice and PM both the link to the logs on the file share service.
  24. Guess I am not following you on this one. Each time you export your settings, a new .xml file is created. Just import the latest .xml file you created.
×
×
  • Create New...