Most Valued Members
  • Content count

  • Joined

  • Last visited

  • Days Won


peteyt last won the day on February 21

peteyt had the most liked content!

1 Follower

Recent Profile Visitors

2,103 profile views
  1. I persume these updates every few minutes are small? Are they safe for example on a metered connection
  2. Mark says he's sorry!

    He's only sorry because he got caught. I'm sure I read somewhere they knew about this at least for a year but I believe it was longer. Social media is a great way to harvest information and often used by hackers to aid things like phishing and other forms of social engineering e.g. getting information for identity theft. In the UK there is a bank advert that shows this with a hacker going through pictures and finding key information including finding a picture which has the users card allowing the hacker to zoom in and read it.
  3. I'm not the only one who finds this annoying in general - I see it a lot. It's not a big deal I have just always wondered over the years if it was americans trying to claim they invented it ha
  4. Eset failed to stop ransomware

    I dont know about esets side but it is important to remember that a security suite is only part of protection. Users are generally the weakest chain in security and having an unpatched computer can make a security product useless
  5. This is also an issue at the end of a scan if eset finds anything. The window that comes up asking you what actions to take e.g. delete, ignore etc is very small and to see things like filenames you have to drag the Columns
  6. Not sure if it will help but in setup - network protection there is a firewall troubleshooter that shows you the latest blocked stuff and allows you to unblock them if you need to
  7. ESET detected that malware

    Why when eset detects it already?
  8. ESET detected that malware

    Read this the other day and was going to bring it up but forgot to. I can understand the issues and annoyances developers will have with pirates but installing a chrome password stealer is not the answer. They have tried to claim it was only used for those using pirated keys but as it was included by default genuine users also had this which isnt right. It takes one hacker or simply a dodgy or fired colleague and they now have all these passwords. Apparently they are already using this method to catch people but i cannot see any court allowing this considering their own method would be classed as illegal
  9. I think I'm endangered in Internet :(

    There's always debates on what information companies collect and hold on the public. There are tools like VPNs but software even security software can have bugs so nothing is ever 100 percent safe. Most hacks these days however tend to be social engineering, basically tricking people. Always hover over links in emails to make sure they go to where they say and even if the link seems safe if it looks suspicious or is something like banking just delete it. You can always go to the website directly or contact your bank to be safe. A lot of websites lately have suffered from data breaches so while having a good strong hard to guess password is a much it becomes pointless if you reuse that password on multiple sites. During a data breach passwords are often put online and/or sold on black markets. The first thing someone will try to do is access other accounts using the same login details. If they get access to your email account even if you used different passwords they can often use your email address to prove they are you and change passwords for other sites. To be safe id recommend two factor authentication where available. You can also use popup blockers and tracker blockers to try and get some privacy. While some sites may block them i often use temporary email sites when signing up to sites im not sure of
  10. Might be related to what @Marcos posted in this topic
  11. Eset nod32 does not contain a firewall so while it will not block this anymore you will lose protection options. Best thing to do is create a support ticket.
  12. Description: change the way update is displayed when installing or updating to a newer version Detail: when updating to a newer version via the live installer the latest updates are downloaded. The user will be alerted after installation that an update has not been ran yet. However if they run the updater and already have the latest updates as no update has been ran the alert telling the user no update has been ran will remain. I have seen many confused by this not realising they already have the latest version. This alert should be either removed or reworded into a way that lets them know that they have the current version
  13. I read about this the other month but the stable version of chrome has just been released with a handy new feature. Now you can set chrome to block website redirects. You may have seen these when your on a website and suddenly the website changes to something like a fake virus warning. Now you can prevent this from happening although it isn't apparently enabled by default for every user but it appears the plan is to at some point have it set as enabled by default. You can however enable it - copy and paste this into chrome's navigation bar chrome://flags/#enable-framebusting-needs-sameorigin-or-usergesture Then use the drop down menu of the highlight part and select enabled. It obviously doesn't prevent people from being phished and common sense and good security practises will always help but I do think this will be handy. hxxp://
  14. It has been asked a lot but I don't think we will see it. The issue eset has is choice e.g. what should happen if something new and unknown turns up, could simply be an update e.g. a windows update, but if eset doesn't have any reputation for the files it will have to ask the user and it seems like they want to avoid this in case the user clicks the wrong thing e.g. allows or blocks