Jump to content

just

Members
  • Posts

    73
  • Joined

  • Last visited

About just

  • Rank
    Newbie
    Newbie

Profile Information

  • Location
    Turkey

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. So just by turning on Secure Data, my files won't be encrypted at all, right? @itman @peteyt
  2. Hi I have activated the Secure data feature but as far as I remember I didn't do anything else, Still my data, files etc. Is it encrypted and protected, or do I need to do something else to get it encrypted and protected?
  3. When you say no, what is done from the stolen person cannot be hidden, right? I know it doesn't fit in this forum but I've been searching but can't find it @itman
  4. So, when there is no subscription, is it possible to hide the things done with this ID number to the owner of the ID number or to make sure that he does not know about it? @itman
  5. Ok thanks. Well, it's not about that, but I want to ask a question that I can't find the answer to: I would like to say that at first I did not ask this with any malicious intent, but because I was suspicious. When the identity number is stolen, I think it is possible to open a company with the identity number, etc. I know that it can be used in many things, such as when someone's ID number is stolen, can the transactions made with it (such as opening a company again, etc.) be hidden from the owner of the ID number and it can be ensured that the owner of the ID number does not know about this? I would be glad if you answer. @itman
  6. Ok but I downloaded ESET after I thought it was infected, so if there was no access later it wouldn't run a scan and continue stealing data before it was found? Can't Threatsense find viruses in boot partitions/UEFI whose parameters are not in ESET's signature but that do malicious activity? @itman @peteyt
  7. I suspect. Is there anything I can be absolutely sure it is infected with or something I can be absolutely sure it is not?
  8. What do you mean when something tries to access it? I installed ESET afterwards and if there is no access after being infected, can't it scan? @peteyt
  9. What do you mean by accessing? Doesn't the system and ESET access it every time it's turned on? @Marcos
  10. You might think it's the same issue but in my question I was told to just leave ESET at the defaults. I am asking this: When we enable runtime packers and boot sectors/UEFI in Eset's threatsense parameters, I'm asking if ESET's threatsense parameters always scan those selected locations without stopping and without background scanning like a real-time file protection system. But you told me to leave it at default. can you help with this issue? @Peter Randziak @Minimalist
  11. So threatsense parameters can't replace real-time file protection? @peteyt
  12. Look, you can scan it, I'm not asking when i choose that location you real-time file protection game files etc. I'm asking if the threatsense parameters scan the selected places constantly as it scans the places
×
×
  • Create New...