Jump to content

peteyt

Most Valued Members
  • Posts

    1,672
  • Joined

  • Last visited

  • Days Won

    26

Everything posted by peteyt

  1. I should also note that Eset's password manager is not actually developed by Eset or is at least based on another companies product. It previous used StickyPassword but can't remember who it uses now or if Eset adds its own stuff to it. So I presume it probably depends on what the original developer plans. I should note this seems to be a common practise for AVs and is no reason to be concerned. As far I'm aware this is the only feature not developed in house
  2. I believe what the user is meaning is using the password manager as an authenticator. Found this for 1Password https://support.1password.com/one-time-passwords/ What this basically seems to suggest is with some password managers you can use the app to also show the 2FA codes, similar to the Google Authentication App. I myself use an app called Authy for this. This is an interesting idea but not sure what i think as having your passwords and the authentication tokens in the same place could also be risky
  3. Do you use Powerline adapters by any chance? Sounds like a similar issue I've had a few times but not in a while. The problem seemed to be happen with me when I'd turned my computer on but not turned my downstairs powerline adapter on (my router is downstairs). Like you some things wouldn't work and I'd have an alert that the firewall couldn't be reached but Google would work. Some sites wouldn't however work
  4. Not sure myself but someone else may have more knowledge. Their are also a load of guides online. One thing I will say is be wary of addons. Often addons that are no longer updated or aren't well known can be vulnerable. Also make sure you use a good secure password that you haven't used anywhere else for login and enable 2FA
  5. If you exclude them should be fine. I think you can exclude them as a PUA
  6. With a PUA it is up to the user if the pros outweigh the negatives. Some PUA's are mainly annoyances e.g try to install extra stuff, hard to get rid of etc. For example the popular CCleaner program I believe comes up as a PUA as it's installer tries to get you to install extra but that doesn't mean it doesn't have its uses
  7. Really? Is that a recent thing? Years ago I used zonealarm which is part of checkpoint but I always thought they had their own engine
  8. Have you confirmed Hips is also working fine? I remember you had issues with Hips last time this happened although as you stated you tried to stop the update last time
  9. There are reputation extensions out there but I have noticed in the past that hackers can abuse them, certainly those that are based on user reviews e.g. by making false reviews to make the site appear fine
  10. The first problem is nothing can ever be 100 percent secure. AVs will protect people to a degree but they are limited like everything. The other problem is finding these backdoors and proving government and the vendors themselves knew about them. Then there's the legal issues if AVs where to openly blame someone.
  11. What I find funny is the people behind pegasus keep saying this person and this person etc. weren't being tracked by the software and the next thing they say they don't have access to customer data so can't see who/what their customers are spying on, which contradicts the previous statements
  12. Yeah they claim they are just for using on your own account then talk about accessing multiple accounts, accessing people's private information etc. I'm curious how it works or if it indeed even works
  13. Like itman I'm suspicious of any hacking tool as I'd presume they where illegal or in a very grey area. What I'm curious about is your linked article and website which claims links to Intel and Microsoft yet googling it there appears to be no links.
  14. Yeah I do have a lifetime license for malwarebytes which as far as I know is still honoured even though it's no longer offered but don't run the software. But yeah most don't offer it as in theory if everyone bought it they wouldn't be able to get more sales. Red dwarf, the British SC-FI show made a good joke about this. Their lifetime engine actually broke but as they where supposed to last a lifetime the company went bust
  15. Because of what the website hosts? The same as a website that hosts malware is itself flagged. Because your software is basically classed as potentially risky so is the website
  16. Even with a serial it could be misused e.g. someone purchases the software and uses it alongside malware to infect a user and then using your software steals their passwords. For this reason any password recovery software could be flagged
  17. Eset is blocking it with a warning as potentially unwanted due to the content e.g. password recovery tools. This is due to the fact that these tools could be misused e.g. used to hack someone else's account. For example Kali Linux a pen testing OS will detect stuff because the tools it includes can be misused in the wrong hands. TeamViewer a remote access program will also flag up when being installed as it can be used by scammers
  18. Possibly but I never heard it called that and Googling pure nod32 shows its also the name of a cracked version although I'm reluctant to mention this as I didn't want anyone to think I was accusing anyone (as I'm not) of using a pirated version
  19. While I don't think that is fully available right now if you have Eset set to detect potentially unwanted applications most remote access software will flag up when trying to install due to the fact these can be used maliciously
  20. I'm curious what do you mean by pure?
  21. If your using secure browser it will warn you if it detects a remote access program but not all the options you mentioned. You simply can close the warning or you would need to find and close the remote access. I found this as I was using TeamViewer
  22. As the article posted above states there are no plans at the moment desktop wise but they plan to implement it at some point for mobile apps
  23. Yeah the problem with these tests is it helps to know everything. E.g. was an AV installed when downloading and installing. It's important to note most people wouldn't remove an AV to install something. This is why I'm also very wary of a YouTube testers because it's often what you don't see rather than what you don't e.g. has the AV been updated and has any changes been made to settings and options. I've seen a lot of YouTubers download something that AVs seem to miss but they don't show they disabled the AVs Web protection that would have blocked it from being downloaded in the first place
  24. I should add I know of people who move from AV to AV. This may be due to test results which can vary from what tests are done, what malware is used and the methodology used. I wouldn't be surprised if people would move to another one after their trial ends.
×
×
  • Create New...