Jump to content

Recommended Posts

  • Administrators
Posted

It's either a Deceptor or PUA. If PUA, you must have opted for detection of potentially unwanted applications. If you think that benefits of using a particular PUA outweigh possible risks, you can exclude such application from detection via the advanced options in the yellow alert windows -> Exclude signature from detection.

Posted

thanks  marcos

If I remove the tick potentially unwanted applications  eset internet security
My system is not endangered?

way esle is?

Posted
4 hours ago, mahmood.hashmabady said:

If I remove the tick potentially unwanted applications  eset internet security
My system is not endangered?

Employ a bit of deductive log here. Eset would not have created the option if they felt it would not prevent unwanted process behavior on your system.

Putting PUA allow/block activity in the user' hands is more of a legal strategy than a preventive one. Translated to the simplest level, Eset is informing you of prior observed unwanted activities by the software itself or its developer. It is your decision to ignore Eset's classification if you so desire. This also means if you chose to ignore Eset's classification, you can only blame yourself for any undesirable consequences of your allow decision.

  • 2 weeks later...
Posted

I'm glad that this attitude has saved me a lot of trouble

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...