Jump to content

Seth

Members
  • Posts

    74
  • Joined

  • Last visited

Everything posted by Seth

  1. Im also hoping that ESET will let users to disable alerts. As someone mentioned before if a user changes a secuiry setting just give them a warning message and then let the user do whatever they want.
  2. I would love to see a customizable GUI. Add app icon in firewall rules. Sort rules by Allow, Deny. Add colors to rules. Green=Allow. Red=Deny. Maybe search window in firewall. Create categories in firewall and be able to send created rules to desired catogery. That way you can get firewall rules better organized and easier to find rules. Everything now feels grey and hard to find.
  3. https://weakdh.org/ ESET forum and website vulnerable. Test: https://weakdh.org/sysadmin.html
  4. that's right, has always been the case. Even if you have a NOD32 v2 or 3 license, as long as it's valid, it would work on the latest version provided you are installing the same product (ie. NOD32 or ESS) Great. Thanks.
  5. Does old license work on every future upgrade as long as the license has not expired? Does it matter if you buy it online or from a store?
  6. then you could remove the AV and disable every security and protection feature of the OS. that way you won't worry about programs meant to protect you if they sniff around Lets not exaggerate
  7. Calling querying about hashes sniffing is way too strong word for that operation. Lets say im happy with LiveGrid disabled But I would love to disable the alert. Is there any way around it now or maybe in future V9 updates? I still cant update to latest signature database. Stuck with 12383.
  8. Why would you disable LiveGrid and thus lose protection against newly emerging threats? It's an essential feature similar to real-time protection that should remain enabled at all times. Users used to get infected mainly when they had LiveGrid disabled so it's ok to alert the user by changing the protection status in such case. Thanks for the reply. I dont like programs sniffing around my system live even if its for protecting the system. This alert did not appeared when disabled in V8. Is there anyway around it in V9? I also have the same issue like OP and tried clearing the cache and it did not help.
  9. I know that LiveGrid uses the cloud to keep up with the latest threats. Does this mean that LiveGrid sniffing around everything you do? I can understand its for a good purpose but I dont think everyone is comfortable with this. I Know you can disable it but I have read on other forum that with LiveGrid disabled somehow ESET still transmitting data. Even if LiveGrid is unchecked upon installation LiveGrid is still activated after a clean installation Maybe just a bug? Does ESET collect any data and how do you disable it? I like to have my system protected without ESET sending any data. Is this possible with V9?
  10. How do you disable the notification message for LiveGrid when its disabled?
  11. ​ sorry didn't understand that........can you elaborate please? is there anything I need to edit in my hosts file? Would like to know also? Maybe add all IPv4 addresses to IPv6 (::1) too? ​ ​@ Matrix Leader You wrote in the guide that you should install the Disable IE 10 and IE 11 toolkit to prevent KB2670838 that come bundled with them wich breaks AERO functionality. Dont you think its wise to have the latest version of Internet Explorer for security reasons in case older versions have security flaws? I know there are other web browser but Windows depends on Internet Explorer for some cases and having an updated version that may have less or even not at all security flaws is more wiser? Is it not possible to uninstall KB2670838 after updated to newest version of Internet Explorer?
  12. Thank you TomFace. I am curious about this too. Can ESET staff answer this please?
  13. I was thinking about running MBAM Premium and Malwarebytes Anti-Exploit with ESS 8 and 9 when its released. Do I need to exclude any MBAM and MB Anti-Exploit services in ESS and vice versa? Anything I need to know about running all together?
  14. What if you add those URLs to an external hardware firewall? As long as URLs dont change every IP will be blocked that is connected to the URLs?
  15. OT: (Not ESET related) What do you think about this list? Go with 0.0.0.0 or 127.0.0.1? Why " ::1 localhost " at the end? https://github.com/trcyberoptic/WindowsLies/blob/master/hosts This is the General Discussion forum so it's fine to discuss OT I believe. Do not use 0.0.0.0 . From my testing, 0.0.0.0 doesn't always block the IP, tested on both Windows 10 and 8 so that's why now I always use 127.0.0.1 and the IPs do actually get blocked. This is my custom hosts file that I use which blocks telemetry, OpenCandy malware, and a few bad sites like SourceForge which now inject malware into the open source/free software downloads. Why the ::1 localhost at the end? well that's how the example is set in the hosts file when you first open it in any Windows, don't know the technicality behind it, but that's what it says it should have at the end of the list..... my hosts file: # Copyright (c) 1993-2009 Microsoft Corp. # # This is a sample HOSTS file used by Microsoft TCP/IP for Windows. # # This file contains the mappings of IP addresses to host names. Each # entry should be kept on an individual line. The IP address should # be placed in the first column followed by the corresponding host name. # The IP address and the host name should be separated by at least one # space. # # Additionally, comments (such as these) may be inserted on individual # lines or following the machine name denoted by a '#' symbol. # # For example: # # 102.54.94.97 rhino.acme.com # source server # 38.25.63.10 x.acme.com # x client host # localhost name resolution is handled within DNS itself. # 127.0.0.1 localhost # ::1 localhost 127.0.0.1 localhost 127.0.0.1 bi.bisrv.com 127.0.0.1 www.softonic.com 127.0.0.1 softonic.com 127.0.0.1 sourceforge.net 127.0.0.1 www.bestvistadownloads.com 127.0.0.1 image.online-convert.com/convert-to-ico 127.0.0.1 tracking.opencandy.com.s3.amazonaws.com 127.0.0.1 media.opencandy.com 127.0.0.1 cdn.opencandy.com 127.0.0.1 tracking.opencandy.com 127.0.0.1 api.opencandy.com 127.0.0.1 offer.alibaba.com 127.0.0.1 a.ads1.msn.com 127.0.0.1 a.ads2.msads.net 127.0.0.1 a.ads2.msn.com 127.0.0.1 ads1.msads.net 127.0.0.1 ads1.msn.com 127.0.0.1 adsmockarc.azurewebsites.net 127.0.0.1 ads.msn.com 127.0.0.1 b.ads1.msn.com 127.0.0.1 b.ads2.msads.net 127.0.0.1 bingads.microsoft.com 127.0.0.1 dl.delivery.mp.microsoft.com 127.0.0.1 oca.telemetry.microsoft.com 127.0.0.1 oca.telemetry.microsoft.com.nsatc.net 127.0.0.1 reports.wes.df.telemetry.microsoft.com 127.0.0.1 services.wes.df.telemetry.microsoft.com 127.0.0.1 sb.scorecardresearch.com 127.0.0.1 spynet2.microsoft.com 127.0.0.1 spynetalt.microsoft.com 127.0.0.1 sqm.df.telemetry.microsoft.com 127.0.0.1 sqm.microsoft.com 127.0.0.1 sqm.telemetry.microsoft.com 127.0.0.1 sqm.telemetry.microsoft.com.nsatc.net 127.0.0.1 redir.metaservices.microsoft.com 127.0.0.1 survey.watson.microsoft.com 127.0.0.1 telecommand.telemetry.microsoft.com 127.0.0.1 telecommand.telemetry.microsoft.com.nsatc.net 127.0.0.1 telemetry.appex.bing.net 127.0.0.1 telemetry.microsoft.com 127.0.0.1 telemetry.urs.microsoft.com 127.0.0.1 vortex-sandbox.data.microsoft.com 127.0.0.1 vortex-win.data.microsoft.com 127.0.0.1 vortex.data.microsoft.com 127.0.0.1 settings-sandbox.data.microsoft.com 127.0.0.1 settings-win.data.microsoft.com 127.0.0.1 watson.live.com 127.0.0.1 watson.microsoft.com 127.0.0.1 watson.ppe.telemetry.microsoft.com 127.0.0.1 watson.telemetry.microsoft.com 127.0.0.1 watson.telemetry.microsoft.com.nsatc.net 127.0.0.1 wes.df.telemetry.microsoft.com 127.0.0.1 choice.microsoft.com 127.0.0.1 choice.microsoft.com.nstac.net 127.0.0.1 df.telemetry.microsoft.com ::1 localhost You will notice that my Telemetry list does not include all the addresses found on other sites, reason being, I removed some addresses which if added will break a lot of the OS functionality like the ability to login to OneDrive for example, so I only kept the safe ones. This will not mess up your OS yet still give you very good protection in addition to NOD32 offcourse Ok. I did not know that. Great job on the guide I also read your guide for Windows 10 and noticed that you install the drivers last after creating a system image and it make sense. But when you do a clean install of Windows you need the LAN driver installed if you gonna install the updates. What do you think about this? 1. Clean install of Windows 7 2. Setup the Services, Group Policy, Task Scheduler and Hosts file 3. Install LAN driver 4. Update 5. Create a system image (this could be done also after 2) 6. Install remaining drivers
  16. OT: (Not ESET related) What do you think about this list? Go with 0.0.0.0 or 127.0.0.1? Why " ::1 localhost " at the end? https://github.com/trcyberoptic/WindowsLies/blob/master/hosts
  17. Got the Stagefright update and checked with ESET Stagefright Detector and it still shows vulnerable. Checked with Zimperium Stagefright Detector and it passed. I belive Zimperium was the one who found out about the Stagefright exploit and I think they were first out with a Stagefright Dectector app. Any comment from ESET staff?
  18. I think that is true. One another thing. Is there any way to block all traffic except what is necessary for access to the Internet?
  19. Does it do the same job as firewall would do? The URL:s are from Microsoft and used to collect data from the user. Im not trying to block those URL:s from web browsing but from blocking any data leaking to those URL:s that happens in the background.
  20. Thanks for the reply. I know how to do that, but I only have URL addresses and the Remote tab requires IP address. Since its 106 URL addresses I wanted to have them all in one folder/group. Would be nice to have all the rules organized in the firewall. Is it even possible to create groups in firewall and send other individual created rules afterwards to desired group? If not it would be a great feature to have.
  21. Hello Eset community Im guessing you allready heard about Microsoft collecting data in Windows 10 and even in Windows 7/8/8.1 and would like to block some addresses. Its 106 addresses I want to block from in and outbound traffic. I want to have my settings in firewall organized so creating a group for all those 106 addresses would be great. What I need help with is to create a group and add the addresses I have to be within that group. How do I achieve that?
×
×
  • Create New...