Jump to content

peteyt

Most Valued Members
  • Posts

    2,147
  • Joined

  • Last visited

  • Days Won

    41

Posts posted by peteyt

  1. 3 hours ago, TomFace said:

    Makes perfect sense to me. If you're not a current customer, but want our help, there is a cost to pay.

    Giving away your services for free to everyone will not keep you in business for very long.

    I don't think we have the complete story from the OP (and possibly never will as things just don't add up).:huh:

    Yeah the weird thing is he says to fix eset not his computer. I can't imagine if eset wasn't working right eset charging to fix it as this would be bad for customer service. I could be wrong but it sounds fishy

  2. 18 hours ago, TomFace said:

    Just curious, who are "they"? Were "they" from a pop up on your PC, was it a scam caller who said they were monitoring your PC/MAC and saw that you're were having issues or did you call someone you trust?

    Unless you have a special arrangement with ESET for expedited support, regular ESET Support for home users is free.

    Depending on who "they" are, if you gave an unknown 3rd party remote access to your PC/MAC, you very well may have a BIGGER problem than just mail as your personal data MAY have been compromised:blink:.

    That's in addition to being out $99. :wacko:

    Yeah when I saw the post alarm bells started ringing

  3. 6 hours ago, 819b6ca said:

    Well, have downloaded the "tool," saved instructions as .pdf, and am ready to reboot.

    One thing to note: when I started having this particular issue, some two weeks ago, I had not undertaken any type of un/installation of eset.  Overall I'm not aware of anything I did that precipitated the current issue.

    Curious....

    Just make sure you do it in safe mode 

  4. 1 hour ago, 819b6ca said:

    I have not tried pre-release versions.  Certainly something to consider.

    As far as I know, I am on the latest version.  I actually ended up installing a several-years-old version I had laying around.  I installed without incident, and was followed by it updating both the program and the modules.  So, yeah...I think I am on the latest (12.2.23.0 of Internet Security).

    Was in a chat window with eset about 20 minutes ago.  They wanted to remote into my computer, so I downloaded their remote tool, and it came down as "blahblahblah.desktop."  I think their system auto-detected my browser and sent the wrong file.  My browser presented as Linux, but I'm actually on Windows 7.  Soooooooooooo, we tried to correct that by me starting a brand new chat session, but by the time I get it going, there were no more representatives available.  Andddd, it's after hours now.

    So, rather exciting day....

    Thanks for the feedback.

    Did you try the uninstaller tool? 

    Quite often  when people have upgraded from older versions there have been issues with part of the older version remaining accidentally. Uninstalling normally has sometimes still had these bits remaining. 

    The uninstaller tool is different as it's designed to remove everything eset but it has to be done in safe  mode. If you haven't tried this yet I recommend it as it does sound like bits of the old version could be left behind. The window bug could actually have been a bug from back then and while you have updated bits of the files remain so the bug also remains

  5. 23 minutes ago, 819b6ca said:

    Even when I manage to click/enable the "Allow and Remember...." radio button, the pop-up still disappears before I have the chance to say either Allow or Deny.  Thing has a mind of its own....

    I presume you are on the latest version. Have you tried enabling pre-release updates. Theres always the possibility that it's a fixed bug but the update hasn't been fully rolled out yet. Pre release updates are basically upcoming updates that they test on a few people first.

    Just to also check, you uninstalled did you use the uninstalled tool in safe mode. I believe itman gave a link earlier. While uninstalling via the standard uninstaller can sometimes work the uninstal tool is designed to remove leftovers as well that could cause issues 

  6. 2 hours ago, wood1e2 said:

    @itman I have WIN10 pro

    @Hpoonis I am fed up of Remote PC just freezing on top of disconnecting every 30 minutes.

    TeamViewer was good but as you say they only want high spending big business!! Such a shame!

    So for me RDP seems the better solution although there is some hick ups.

    A) can't get firewall to accept me :)

    B) I have to use a new different account on WIN machine. I don't know why it won't accept my standard user when try to connect . So I am going to have to back up and install all software on this new win user!

    C) I have to click on WIN machine to accept my remote access

     

    I work from home and find it really handy to be able to remote into the WIN machine to run software whilst working on my Mac.

     

    @Marcos the only way I have been able to get the system to connect is to turn off ESET firewall. If I don't the remote connection just doesn't happen.

    I do use teamviewer myself but for personal use - my dad is useless with computers so often use it to fix stuff

  7. 8 hours ago, Hpoonis said:

    You have just stated that defender DOES detect 100% of infections, and no product is best at detecting all.

    In any sane and logical world you cannot have it both ways.

    Interestingly the word he uses is "hand picked."

    I dont know how AV test runs their tests but im always wary of test results. As stated somewhere here a lot are paid for by vendors and while there is nothing wrong with this there is always the possibilty of bad practises where one secretley pays more.

    AV tests in general can be easily made to look favourably on a specifc AV.

    I am not stating that AV test does any of these just that i reccomend taking any test by anyone with a pinch of salt and they do not show normal use e.g. average users dont normally dowload all these things at once or shoudnt ha

  8. 2 hours ago, Marcos said:

    We will probably add the date/time of last rule application which will help you find obsolete rules.

    Is there still a possibility that the firewall rules will be made more user friendly in the future?

    I used to have it set to manual but use automatic now but was looking at maybe going back - However sometimes I had to play around with rules and it was hard to do this because the design was not user friendly, mainly because the firewall judges rules by an order. Allowing them to be organised by names and having an icon to represent the program certainly would make this easier to use. Also the fact that "Allow communication for" comes before the name of the program makes it much harder with the text not needed as it could just start with "Chrome" rather than "Allow communication for Chrome."

    Sorry I do know this has been brought up a few times.

  9. 3 hours ago, itman said:

    I already posted in another thread a simple solution using Group Policy that will defeat almost all RDP brute force attacks. That is simply to restrict logon on attempts to 3 tries and locking out the account thereafter.

    This isn't "rocket science." It has become increasingly apparent that a majority of SMB IT admins are not properly trained in basic Windows security fundamentals.

    Would there be any way eset could implent this e.g. flag up if the policy wasnt activated and then the user could click something in eset that would activate the policy?

    Obviously I know this is above eset as its not their probelm but it could help avoid eset being blamed. Basically what im suggesting is eset offering something that can warn of unsafe settings and automatically fix these if the user clicked yes

  10. 5 minutes ago, Marcos said:

    We already change protection status to red, e.g. if HIPS is disabled, yet I come across cases when users intentionally disable it and set up application statuses so that they are not warned about that.

    Oh yeah there will always be people like that sadly. But if you could warn them about things they might not otherwise know it may avoid issues

  11. 1 hour ago, notimportant said:

    This is not an excuse. I see this all the time in the customers logs when brute force attacks are performed against RDP.

    I have an idea that might not work but could possibly avoid issues like this.

    Years ago I used to use a program called TuneUp Utilities that wasnt tol bad until AVG bought it. One interesting thing it did was to warn users of certain settings and offer to fix things e.g. this is enabled and could do this. 

    Could something like this work with eset. E.g detect if certain stuff is enabled, possibly even unpatched. I know a lot of this is down to the users but at least if it worked eset wouldnt be blamed

  12. 8 minutes ago, MatG-DK said:

    Chrome build 76.0.3809.87 Flags Eset Security and suggest it to be removed, Why? 

    This is not the first time and i believe that it may cause some BSOD sometimes. 

    Are you guys not talking together?? Google/Eset

    Chrome Eset.jpg

    Not sure about this but remember a while back google where saying about cracking down on AVs injecting into browsers as it they claimed they put the browsers at risk rather than made them safer. I believe if chrome crashes now and it seems to be a non google or microsoft program it warns the user of all things injecting into it but im not sure about all the details of it it relates to your issue

  13. 10 hours ago, alasmi8 said:

    We want ESET sandbox

     

    now the microsoft launched windows sandbox after Windows May update 2019

     

    Marcos , please accept my suggestion

     

    we don’t want to afraid from run executable files then !

    I dont think eset will launch a  seperate sandbox and marcos has said there are currently no plans. Eset tends to focus on the main things which is why a lot of people prefer it as some AVs offer too many extras the system becomes slow. So I hope if they ever decided to it became optional.

    As mentioned before though, eset does use sandbox technologies e.g. running unknown things through one to check for suspicious activity. Also as you mentioned if you are on the latest windows 10 pro or enterprise and have the right hardware you already have access to a sandbox courtesey of windows

  14. 1 hour ago, novice said:

    I remember an antivirus ( do not recall which) asking for CAPTCHA  in order to proceed with uninstall.

    A simple and elegant solution.

    And eset has a password option if enabled. As i have pointed 100s of times and probably shouldnt anymore, the AV is only part of a security setup. Its no good using an AV with for example a no longer supported update or without all the latest patches. Until people realisle the importance of this problems like this will happen.

    But again as also mentioned we dont know what has happened and all we can do is suggest. 

  15. 18 hours ago, alasmi8 said:

    I think ESET Self protection weak

     

    otherwise , any malware tool can remove eset products from compter.

     

    someone in Dev-Point forum

     

    share tool to uninstall eset anti virus silent

     

    waiting for link , i will sent it to eset staff

    I never thought to state windows 10 now also has its own sandbox although its not included in the home version of windows and some system requirements are required

  16. 7 hours ago, alasmi8 said:

    I think ESET Self protection weak

     

    otherwise , any malware tool can remove eset products from compter.

     

    someone in Dev-Point forum

     

    share tool to uninstall eset anti virus silent

     

    waiting for link , i will sent it to eset staff

    One good security measure people often overlook is setting a password for eset settings

  17. 2 hours ago, alasmi8 said:

    Folder sheild is best way to protect folders from ransomware

    i think ESET developers can prevent malware from inject to any trusted processes , prevent macros too

    then what i should do ?

     

    download this https://qpdownload.com/folder-shield-extra-security/

     

    or using trend micro anti virus folder sheild ?

    The problem is what happens when that program gets hacked then infected. Best example of this is the ccleaner incident a few years back when someone managed to infect ccleaner. The problem is it is a well used and often respected program but if it was marked as trustworthy that could cause issues

  18. 2 hours ago, alasmi8 said:

    Description: ESET Sandbox + ESET Auto SandBox

     

    Details ; I Want add ESET sandBox  + ESET auto SandBox like avast sandbox +  auto sandbox

    The avast! Sandbox is a special security feature which allows you to run potentially suspicious applications automatically in a completely isolated environment. Programs running within the sandbox have limited access to your files and system, so there is no risk to your computer or any of your other files. This feature is connected to the FileRep cloud feature which identifies new files for additional analysis.

    Im not sure how but eset does use some sandbox technologies @Marcos might be able to explain them more. Obviously currently eset doesnt allow users to manually run things in a sandbox

×
×
  • Create New...