Jump to content

peteyt

Most Valued Members
  • Content Count

    687
  • Joined

  • Last visited

  • Days Won

    12

Kudos

  1. Upvote
    peteyt gave kudos to Marcos in Eset 13 Version   
    Thanks for the heads-up peteyt, the user was banned.
  2. Upvote
    peteyt received kudos from elquenunca in Eset 13 Version   
    @MarcosCan someone please ban this user. Reported another of his posts the other week. Noticed something strange as one of his post seemed to be exactly the same post I made. User is basically copying someones post and reposting and then editing at a later date to add a spam link. Possibly hopes users will not notice because the link is not originaly included but have been keeping an eye out 
  3. Upvote
    peteyt received kudos from SCR in Eset 13 Version   
    @MarcosCan someone please ban this user. Reported another of his posts the other week. Noticed something strange as one of his post seemed to be exactly the same post I made. User is basically copying someones post and reposting and then editing at a later date to add a spam link. Possibly hopes users will not notice because the link is not originaly included but have been keeping an eye out 
  4. Upvote
    peteyt received kudos from BeanSlappers in Eset 13 Version   
    @MarcosCan someone please ban this user. Reported another of his posts the other week. Noticed something strange as one of his post seemed to be exactly the same post I made. User is basically copying someones post and reposting and then editing at a later date to add a spam link. Possibly hopes users will not notice because the link is not originaly included but have been keeping an eye out 
  5. Upvote
    peteyt received kudos from arsini in Firewall suggestions   
    Not sure if that was an error ha but thought id add that i never made that comment in regards to windows firewall.
    As i mentioned and have mentioned previously as shown by the image bellow by default you cannot see the app name because "allow communication for" is shown even though there is an action area.

    Also as seen bellow previous versions had icons to help see rules

    As you said this seems to have happened when they changed to the metro design. Wonder if there was a way to show the app names with icons with the metro style design
  6. Upvote
    peteyt gave kudos to arsini in Firewall suggestions   
    You can just add another column for the priority number of each rule. You can then sort the rules without affecting the priority.
  7. Upvote
    peteyt gave kudos to Marcos in ESET and piracy   
    I've checked the VT links but there were only hacktools and cracks scanned. I would say that there's much more malware downloaded from Dropbox or One Drive with download links spammed by email, however, that wouldn't justify blocking the services and no AV will ever do so.
  8. Upvote
    peteyt gave kudos to Marcos in unable stop virus   
    It can prevent RDP bruteforce attacks which can be also accomplished by setting up an account lockout policy that has been supported by Windows for a long time.
  9. Upvote
    peteyt received kudos from ECELeader in Ransomware   
    Yeah I'd go for this and have it disabled by default.
    I get the whole thing about false positives and it is a risky balance but really the users eset wants to protect should hardly ever need to go into the advanced option. These users would probably just install eset with standard defaults.
    The thing is a lot of users like choice and I'd worry eset would put some more advanced users off by not having these options. 
    Hips for example can be dangerous in the wrong hands but it's an option and generally standard users will not enable because of the risks so things like the thing above should work as only those knowing the risks should enable them
  10. Upvote
    peteyt received kudos from fabioquadros_ in Controlled Folder feature   
    I thought I replied to this so hopefully I didn't - if my reply was deleted e.g. against rules I apologise. 
    Basically I agree - the main reason I began using Eset is because it didn't follow what other AVs did - it did its own thing but I'm wondering if this is causing issues now. I came to Eset from BitDefender which a few years back became far too unreliable due to bugs - I wanted something that didn't slow my PC. Too many other AVs did things that in my opinion should be done by separate programs e.g. I have ccleaner so don't need an AV to clean unneeded junk files. That's what sold me on eset - sticking to just security.
    However I do feel like it's behind in advanced stuff - by advanced I mean things for advanced users and not advanced technology. I get the whole thing about not wanting to confuse users. An average user should never be given a choice or at least this should be avoided e.g. is this safe or risky - the user will not know and could block something by mistake that could cause issues or even allow a dangerous file. However there should in my opinion be options to allow stuff for those with the knowledge and willing to take the risk. There is always the risk that if advanced features like this are not included in fear of how it will affect average users, those advanced users will end up going to a competitor.
  11. Upvote
    peteyt received kudos from fabioquadros_ in Ransomware   
    Does encryption run on a standard home user computer without them knowing.
    What I mean is I have windows pro but don't use any encryption software so surely if something started encrypting something there would be a cause for alarm. I've thankfully never came across ransomware but I thought for a general home computer the fact something is being encrypted would look suspicious in itself
  12. Upvote
    peteyt received kudos from fabioquadros_ in Ransomware   
    I'm new to this topic but just wanted to ask something and unsure if its been asked.
    Firstly - I have no issue with Eset - I know nothing can ever be 100 percent.  However in regards to ransomware would there not be a way to detect something is encrypting files which in turn could force an alert from Eset.
    I'm not talking about new unknown viruses, zero day etc but the act of encrypting itself. Basically could Eset not set it by default to alert users if it detects file encrypting and possibly even be set to pause the encryption until a user tells Eset to either allow or remove.
    Surely with that approach it wouldn't matter if it was a new virus unseen that eset didn't know as it would still see the encrypting part. Or are these viruses able to hide that they are encrypting things until it is too late? I don't have a lot of knowledge on these things so sorry if it is a lot more complex than that.
  13. Upvote
    peteyt received kudos from SeriousHoax in Ransomware   
    I'm new to this topic but just wanted to ask something and unsure if its been asked.
    Firstly - I have no issue with Eset - I know nothing can ever be 100 percent.  However in regards to ransomware would there not be a way to detect something is encrypting files which in turn could force an alert from Eset.
    I'm not talking about new unknown viruses, zero day etc but the act of encrypting itself. Basically could Eset not set it by default to alert users if it detects file encrypting and possibly even be set to pause the encryption until a user tells Eset to either allow or remove.
    Surely with that approach it wouldn't matter if it was a new virus unseen that eset didn't know as it would still see the encrypting part. Or are these viruses able to hide that they are encrypting things until it is too late? I don't have a lot of knowledge on these things so sorry if it is a lot more complex than that.
  14. Upvote
    peteyt gave kudos to itman in Ransomware   
    Also on Win 10, native SmartScreen goes much farther in that it will block (default setting) or warn of any executable not downloaded from the Win Store. Problem is I don't fully trust it in regards to stealthy malware code execution such as reverse shell and the like. -EDIT- Also another major issue with native SmartScreen is Microsoft in its "infinite dis-wisdom" runs it as a medium integrity process. As such, it can be easily suspended by malware to run its code.
  15. Upvote
    peteyt received kudos from wraith in Ransomware   
    Does encryption run on a standard home user computer without them knowing.
    What I mean is I have windows pro but don't use any encryption software so surely if something started encrypting something there would be a cause for alarm. I've thankfully never came across ransomware but I thought for a general home computer the fact something is being encrypted would look suspicious in itself
  16. Upvote
    peteyt received kudos from L0ckJaw in Ransomware   
    I'm new to this topic but just wanted to ask something and unsure if its been asked.
    Firstly - I have no issue with Eset - I know nothing can ever be 100 percent.  However in regards to ransomware would there not be a way to detect something is encrypting files which in turn could force an alert from Eset.
    I'm not talking about new unknown viruses, zero day etc but the act of encrypting itself. Basically could Eset not set it by default to alert users if it detects file encrypting and possibly even be set to pause the encryption until a user tells Eset to either allow or remove.
    Surely with that approach it wouldn't matter if it was a new virus unseen that eset didn't know as it would still see the encrypting part. Or are these viruses able to hide that they are encrypting things until it is too late? I don't have a lot of knowledge on these things so sorry if it is a lot more complex than that.
  17. Upvote
    peteyt received kudos from wraith in Ransomware   
    I'm new to this topic but just wanted to ask something and unsure if its been asked.
    Firstly - I have no issue with Eset - I know nothing can ever be 100 percent.  However in regards to ransomware would there not be a way to detect something is encrypting files which in turn could force an alert from Eset.
    I'm not talking about new unknown viruses, zero day etc but the act of encrypting itself. Basically could Eset not set it by default to alert users if it detects file encrypting and possibly even be set to pause the encryption until a user tells Eset to either allow or remove.
    Surely with that approach it wouldn't matter if it was a new virus unseen that eset didn't know as it would still see the encrypting part. Or are these viruses able to hide that they are encrypting things until it is too late? I don't have a lot of knowledge on these things so sorry if it is a lot more complex than that.
  18. Upvote
    peteyt received kudos from TomFace in Blank screen when pressing F5. Cannot launch scanning either...   
    The best way is always to create a support ticket
  19. Upvote
    peteyt gave kudos to TomFace in AV-TEST and ESET   
    I use the daily "seat of my pants" results. I know what works for me.
    No A/V program is 100%...that's why they get updated and evolve.
    In my opinion, these A-V test results (no matter who publishes them) only provide the trolls with food (in addition to being (for me) worthless data). We all know (or at least should know) that you never feed a troll.
    Regards,
    Tom
  20. Upvote
    peteyt received kudos from Azure Phoenix in Future changes to ESET Internet Security and ESET Smart Security Premium   
    Eset doesn't have a way for users to directly test programs in a way for example like Sandboxie does. However Eset does use sandbox technologies. This link talks briefly about the technologies used by Eset https://www.eset.com/uk/about/technology/
     
    As mentioned by Azure Phoenix Eset does use machine learning. Like he said they have done articles about the issues of ML and AI - Right now it seems to be a buzzword and often spoken about as something new yet it's not. I'm sure a group of people released a new ML/AI product that just used buzzwords and was fake and everyone jumped on the bandwagon - it was done to show how easily it is to hype something up as something it isn't with a few words
     
  21. Upvote
    peteyt received kudos from Aryeh Goretsky in Future changes to ESET Internet Security and ESET Smart Security Premium   
    Description: More information in system cleaner
    Detail: I have mentioned this previously. System cleaner is the new tool in version 11 that alerts you to system settings that have been changed from default the idea being that they could have been changed by malware.
    The issue is they give no information on the actual setting just the type of setting. I tested this feature by clicking to change settings hoping I would be shown the changes and able to make a decision.
    What would make more sense is having a way to see the actual changes and a way to ignore certain changes that the user wants to keep. Many people change things themselves e.g Windows tweakers and this feature could cause issues if they change things without realising. This could always be a more advanced option disabled by default.
    If this cannot happen at least have a lot for this feature so that advanced users can see the changes made. If eset is changing a Windows option it shouldn't be too hard to log the change somewhere. Also an undo feature might be handy as when I tried it out hoping i would be given options eset just changed them and with no lot I have no idea what got changed 
  22. Upvote
    peteyt received kudos from persian-boy in Future changes to ESET Internet Security and ESET Smart Security Premium   
    Description: More information in system cleaner
    Detail: I have mentioned this previously. System cleaner is the new tool in version 11 that alerts you to system settings that have been changed from default the idea being that they could have been changed by malware.
    The issue is they give no information on the actual setting just the type of setting. I tested this feature by clicking to change settings hoping I would be shown the changes and able to make a decision.
    What would make more sense is having a way to see the actual changes and a way to ignore certain changes that the user wants to keep. Many people change things themselves e.g Windows tweakers and this feature could cause issues if they change things without realising. This could always be a more advanced option disabled by default.
    If this cannot happen at least have a lot for this feature so that advanced users can see the changes made. If eset is changing a Windows option it shouldn't be too hard to log the change somewhere. Also an undo feature might be handy as when I tried it out hoping i would be given options eset just changed them and with no lot I have no idea what got changed 
  23. Upvote
    peteyt received kudos from persian-boy in Eset Internet Security and Eset Nod32 Antivirus 10 Beta is available   
    It's only available for a couple of countries at the moment but I think they are rolling out to more very soon
×
×
  • Create New...