Jump to content

peteyt

Most Valued Members
  • Posts

    1,622
  • Joined

  • Last visited

  • Days Won

    25

Kudos

  1. Upvote
    peteyt received kudos from Clark T in Phantom account gone after windows 10 update.   
    No the phantom account is part of eset Anti Theft - if you mark a device e.g as missing only the phantom account will work and possibly (although I'm unsure of this) if someone logs in it may help to detect their location.
    As someone who uses eset on their PC mainly (do not currently own a laptop) it is not something I have used
  2. Upvote
    peteyt received kudos from Crystal_Lake_Camper in Introduce yourself   
    Welcome to the forum. Glad to see a fellow horror fan to. I love slasher and giallo films
  3. Upvote
    peteyt gave kudos to itman in ESET failed to protect against ZeroCrypt ransomware   
    https://docs.microsoft.com/en-us/windows/win32/seccrypto/cryptoapi-system-architecture
    Additionally, applications use the Win crypto API to protect their own sensitive data.
    Using Process Explorer, display some app .dlls. One that you will find used extensively is crypt32.dll.
  4. Upvote
    peteyt received kudos from Aryeh Goretsky in Activation issue after update   
    The public license isn't the same as your main one and can be shared. You can also drop a private message to a mod e.g Marcos if you are still unsure or create a support ticket. Response may be slower right now due to it being the weekend
  5. Upvote
    peteyt gave kudos to Marcos in Stalking PUA notifications after update   
    Probably you mean AppEsteem, however, as I said each vendor applies their own criteria. The fact that vendor A adds or removes a particular PUA detection doesn't mean that ESET must necessarily follow their decision.
  6. Upvote
    peteyt received kudos from Anastasia21 in Review Of Eset   
    I'd say it's very light weight and good detection.
  7. Upvote
    peteyt received kudos from Sandratsantilis in Review Of Eset   
    I'd say it's very light weight and good detection.
  8. Upvote
    peteyt gave kudos to itman in False positives?   
    Tip: When it comes to freeware, always opt for the "portable" version. As such, no software installation is performed.
    If the freeware does not offer a "portable" version in the form of a zipped download, consider that "a big red flag" that something is suspicious about the software.
    Note that LightShot is not offered in a portable version. Now the following I find hilarious. There is a web site that supposedly offers a portable version of LightShot here: https://karanpc.com/lightshot-free-download/ . When you select the DirectLink download, you are greeted with the below screenshot. If you proceed further, you are indeed a fool.

     
  9. Upvote
    peteyt gave kudos to itman in For Individual Users, This Is One Ransomware You Should Pay Attention To   
    STOP Ransomware Decryptor Released for 148 Variants
    https://www.bleepingcomputer.com/news/security/stop-ransomware-decryptor-released-for-148-variants/
  10. Upvote
    peteyt gave kudos to Marcos in Eset 13 Version   
    Thanks for the heads-up peteyt, the user was banned.
  11. Upvote
    peteyt received kudos from elquenunca in Eset 13 Version   
    @MarcosCan someone please ban this user. Reported another of his posts the other week. Noticed something strange as one of his post seemed to be exactly the same post I made. User is basically copying someones post and reposting and then editing at a later date to add a spam link. Possibly hopes users will not notice because the link is not originaly included but have been keeping an eye out 
  12. Upvote
    peteyt received kudos from SCR in Eset 13 Version   
    @MarcosCan someone please ban this user. Reported another of his posts the other week. Noticed something strange as one of his post seemed to be exactly the same post I made. User is basically copying someones post and reposting and then editing at a later date to add a spam link. Possibly hopes users will not notice because the link is not originaly included but have been keeping an eye out 
  13. Upvote
    peteyt received kudos from arsini in Firewall suggestions   
    Not sure if that was an error ha but thought id add that i never made that comment in regards to windows firewall.
    As i mentioned and have mentioned previously as shown by the image bellow by default you cannot see the app name because "allow communication for" is shown even though there is an action area.

    Also as seen bellow previous versions had icons to help see rules

    As you said this seems to have happened when they changed to the metro design. Wonder if there was a way to show the app names with icons with the metro style design
  14. Upvote
    peteyt gave kudos to arsini in Firewall suggestions   
    You can just add another column for the priority number of each rule. You can then sort the rules without affecting the priority.
  15. Upvote
    peteyt gave kudos to Marcos in ESET and piracy   
    I've checked the VT links but there were only hacktools and cracks scanned. I would say that there's much more malware downloaded from Dropbox or One Drive with download links spammed by email, however, that wouldn't justify blocking the services and no AV will ever do so.
  16. Upvote
    peteyt gave kudos to Marcos in unable stop virus   
    It can prevent RDP bruteforce attacks which can be also accomplished by setting up an account lockout policy that has been supported by Windows for a long time.
  17. Upvote
    peteyt received kudos from ECELeader in Ransomware   
    Yeah I'd go for this and have it disabled by default.
    I get the whole thing about false positives and it is a risky balance but really the users eset wants to protect should hardly ever need to go into the advanced option. These users would probably just install eset with standard defaults.
    The thing is a lot of users like choice and I'd worry eset would put some more advanced users off by not having these options. 
    Hips for example can be dangerous in the wrong hands but it's an option and generally standard users will not enable because of the risks so things like the thing above should work as only those knowing the risks should enable them
  18. Upvote
    peteyt received kudos from fabioquadros_ in Controlled Folder feature   
    I thought I replied to this so hopefully I didn't - if my reply was deleted e.g. against rules I apologise. 
    Basically I agree - the main reason I began using Eset is because it didn't follow what other AVs did - it did its own thing but I'm wondering if this is causing issues now. I came to Eset from BitDefender which a few years back became far too unreliable due to bugs - I wanted something that didn't slow my PC. Too many other AVs did things that in my opinion should be done by separate programs e.g. I have ccleaner so don't need an AV to clean unneeded junk files. That's what sold me on eset - sticking to just security.
    However I do feel like it's behind in advanced stuff - by advanced I mean things for advanced users and not advanced technology. I get the whole thing about not wanting to confuse users. An average user should never be given a choice or at least this should be avoided e.g. is this safe or risky - the user will not know and could block something by mistake that could cause issues or even allow a dangerous file. However there should in my opinion be options to allow stuff for those with the knowledge and willing to take the risk. There is always the risk that if advanced features like this are not included in fear of how it will affect average users, those advanced users will end up going to a competitor.
  19. Upvote
    peteyt received kudos from fabioquadros_ in Ransomware   
    Does encryption run on a standard home user computer without them knowing.
    What I mean is I have windows pro but don't use any encryption software so surely if something started encrypting something there would be a cause for alarm. I've thankfully never came across ransomware but I thought for a general home computer the fact something is being encrypted would look suspicious in itself
  20. Upvote
    peteyt received kudos from fabioquadros_ in Ransomware   
    I'm new to this topic but just wanted to ask something and unsure if its been asked.
    Firstly - I have no issue with Eset - I know nothing can ever be 100 percent.  However in regards to ransomware would there not be a way to detect something is encrypting files which in turn could force an alert from Eset.
    I'm not talking about new unknown viruses, zero day etc but the act of encrypting itself. Basically could Eset not set it by default to alert users if it detects file encrypting and possibly even be set to pause the encryption until a user tells Eset to either allow or remove.
    Surely with that approach it wouldn't matter if it was a new virus unseen that eset didn't know as it would still see the encrypting part. Or are these viruses able to hide that they are encrypting things until it is too late? I don't have a lot of knowledge on these things so sorry if it is a lot more complex than that.
  21. Upvote
    peteyt received kudos from SeriousHoax in Ransomware   
    I'm new to this topic but just wanted to ask something and unsure if its been asked.
    Firstly - I have no issue with Eset - I know nothing can ever be 100 percent.  However in regards to ransomware would there not be a way to detect something is encrypting files which in turn could force an alert from Eset.
    I'm not talking about new unknown viruses, zero day etc but the act of encrypting itself. Basically could Eset not set it by default to alert users if it detects file encrypting and possibly even be set to pause the encryption until a user tells Eset to either allow or remove.
    Surely with that approach it wouldn't matter if it was a new virus unseen that eset didn't know as it would still see the encrypting part. Or are these viruses able to hide that they are encrypting things until it is too late? I don't have a lot of knowledge on these things so sorry if it is a lot more complex than that.
  22. Upvote
    peteyt gave kudos to itman in Ransomware   
    Also on Win 10, native SmartScreen goes much farther in that it will block (default setting) or warn of any executable not downloaded from the Win Store. Problem is I don't fully trust it in regards to stealthy malware code execution such as reverse shell and the like. -EDIT- Also another major issue with native SmartScreen is Microsoft in its "infinite dis-wisdom" runs it as a medium integrity process. As such, it can be easily suspended by malware to run its code.
  23. Upvote
    peteyt received kudos from wraith in Ransomware   
    Does encryption run on a standard home user computer without them knowing.
    What I mean is I have windows pro but don't use any encryption software so surely if something started encrypting something there would be a cause for alarm. I've thankfully never came across ransomware but I thought for a general home computer the fact something is being encrypted would look suspicious in itself
  24. Upvote
    peteyt received kudos from L0ckJaw in Ransomware   
    I'm new to this topic but just wanted to ask something and unsure if its been asked.
    Firstly - I have no issue with Eset - I know nothing can ever be 100 percent.  However in regards to ransomware would there not be a way to detect something is encrypting files which in turn could force an alert from Eset.
    I'm not talking about new unknown viruses, zero day etc but the act of encrypting itself. Basically could Eset not set it by default to alert users if it detects file encrypting and possibly even be set to pause the encryption until a user tells Eset to either allow or remove.
    Surely with that approach it wouldn't matter if it was a new virus unseen that eset didn't know as it would still see the encrypting part. Or are these viruses able to hide that they are encrypting things until it is too late? I don't have a lot of knowledge on these things so sorry if it is a lot more complex than that.
  25. Upvote
    peteyt received kudos from wraith in Ransomware   
    I'm new to this topic but just wanted to ask something and unsure if its been asked.
    Firstly - I have no issue with Eset - I know nothing can ever be 100 percent.  However in regards to ransomware would there not be a way to detect something is encrypting files which in turn could force an alert from Eset.
    I'm not talking about new unknown viruses, zero day etc but the act of encrypting itself. Basically could Eset not set it by default to alert users if it detects file encrypting and possibly even be set to pause the encryption until a user tells Eset to either allow or remove.
    Surely with that approach it wouldn't matter if it was a new virus unseen that eset didn't know as it would still see the encrypting part. Or are these viruses able to hide that they are encrypting things until it is too late? I don't have a lot of knowledge on these things so sorry if it is a lot more complex than that.
×
×
  • Create New...