Leaderboard

  1. GT500

    GT500

    Emsisoft Employee


    • Points

      525

    • Content Count

      9416


  2. Fabian Wosar

    Fabian Wosar

    Emsisoft Employee


    • Points

      286

    • Content Count

      4403


  3. Kevin Zoll

    Kevin Zoll

    Emsisoft Employee


    • Points

      259

    • Content Count

      18413


  4. Elise

    Elise

    Emsisoft Employee


    • Points

      239

    • Content Count

      8116



Popular Content

Showing content with the highest reputation since 01/03/12 in all areas

  1. 7 points
    Official word is, "yes". We will give free license extensions to anyone who upgraded to Windows 10 and was unable to use the firewall. Once the issue has been resolved, please either submit a support ticket in our helpdesk system, or send a Private Message on the forums to me (English Support) or Thomas Ott (English/German Sales). Be sure to mention that you would like to have your license extended due to the Windows 10 issues and include in your message any license keys that were in use on a computer with Windows 10. Feel free to link to this forum post if you would like to.
  2. 6 points
    As announced earlier, we are changing our firewall strategy and will soon merge Emsisoft Internet Security with Emsisoft Anti-Malware, effective as of our next release in October. Instead of developing our own firewall module, we’re going to rely on the built-in Windows Firewall core that has proven to be powerful and reliable. Its only weak point is the fact that anyone can freely change the firewall configuration. In other words, if malware manages to run on the PC with sufficient administrator permissions, it’s able to allow itself to get through the firewall. To resolve this vulnerability, we’ve developed a new Firewall Fortification feature for Emsisoft Anti-Malware’s Behavior Blocker as part of our 2017.8 release. Firewall Fortification detects and intercepts malicious actions from non-trustworthy programs in real time before they can cause any damage. Behavior Blocker alert: Firewall manipulation All 2017.8 improvements in a nutshell Emsisoft Anti-Malware New: Firewall Fortification feature that blocks illegitimate manipulations of Windows Firewall rules. Improved: Forensics logging. Fixed: Rare program freezes on opening the forensics log, confirming of surf protection notifications and during malware detection. Fixed: Computer restart instead of computer shutdown executed, when set for a silent scan. Several minor tweaks and fixes. Emsisoft Enterprise Console Improved certificate handling to avoid connectivity issues. Several minor user interface improvements. Several minor tweaks and fixes. How to obtain the new version As always, so long as you have auto-updates enabled in the software, you will receive the latest version automatically during your regularly scheduled updates, which are hourly by default. New users please download the full installer from our product pages. Note to Enterprise users: If you have chosen to receive “Delayed” updates in the Update settings for your clients, they will receive the new software version no earlier than 30 days after the regular “Stable” availability. This gives you time to perform internal compatibility tests before a new version gets rolled out to your clients automatically. Have a great, well-protected day! View the full article
  3. 4 points
    Guten Tag, Wir haben mittlerweile mehrfach etabliert, dass Emsisoft nicht das Programm Ihrer Wahl ist. Sie haben sich bereits anderweitig ein Antivirus gesucht, dass auch noch dreißig weitere Funktionalitäten mitabdeckt. Fakt ist jedoch, dass viele Leute eben auch ein Antivirenprogramm suchen, dass nicht noch fünfzig Extras mitbringt, die man nicht will oder nicht braucht. Für diese Leute gibt es eben Emsisoft Anti-Malware und die meisten unserer Kunden sind mit der Tatsache, dass es eben 'nur' ein Rundumschutz für den Rechner ist und nicht mehr, zufrieden. Für all die angesprochenen Features - Passwortgenerator, Kinderschutz, etc - gibt es bereits gute Programme, die man sich bei Bedarf installieren kann. Viele Leute haben aber entweder keine Kinder oder wollen diesen den Zugang nicht beschränken, warum sollten wir diesen Leuten einen Kinderschutz mitinstallieren. Einige haben eben auch nicht RAM oder CPU im Überfluß, für diese Leute ist es noch ärgerlichr wenn das RAM durch ein AV belegt ist, dass aufgrund von ungenutzten Features die Ressourcen auffrisst. Fazit: Es gibt viele Antivirenprogramme, die die eierlegende Vollmilchsau sein wollen und versuchen alle Programme in einem zu vereinen. Es gibt User, die diesen Ansatz nicht mögen und nur ein Antivirenprogramm wollen. Nicht mehr. Für diese Leute gibt es, zum Beispiel Emsisoft Anti-Malware. Sie gehören nicht zu dieser Gruppe und das ist ok. Mit freundlichen Grüßen Kathrin
  4. 4 points
    Which for everything related to our core technologies (engine, behavior blocker, cleaning engine) would be me. Hi, nice to meet you! Next time someone looks strange at me for talking to myself I can now point them to this post and tell them you asked me to talk to me . Your argument is that we chose Bitdefender because it is "the best". Both Kaspersky as well as Avira consistently score higher in pure on-demand tests than Bitdefender does. If you consider PUP detection ESET is a superior contender as well. We considered all of them at one point or another but they were discarded for various reasons. The article is based on the submission we got through the "Submit information about detected Malware" option in all our products, which reports back meta data (infection names, number of infected objects) about all infections found by our products.
  5. 4 points
    Actually, there is a system behind it: My workstation computers are named after noble gases, like Krypton or Helium. Computers that I only use temporarily or belong to guests are named after transition metals like Titanium. Non-computer devices like smartphones are named after non-metals like Oxygen. All systems and VMs that are used for malware testing are named after radioactive elements like Uranium. Needless to say my WLAN and local workgroup is called "Periodic Table". And yes, I spent a significant amount of time coming up with that system and I am proud of it .
  6. 3 points
    It means that the tests done by AV-C and AV-T have a clear image of how they think AV software should work. The problem arises when your product doesn't fit the mould. Then you get penalized for not doing what everyone else does, even though what everyone else does may not be in the best interest of the user, to begin with. Best example: Snooping around in your encrypted connections, which literally every AV vendor screwed up at least once in the past and probably will continue to happen, exposing users to potentially greater risks than most malware does. For starters, the test sets aren't nearly as representative anymore. When we participated in AV-T and AV-C both tested with less than 200 samples a month on average. 200 samples out of literally tens of millions. The exact selection isn't clear and not representative of what users deal with either. None of them tests with PUPs for example, even though a simple look at any tech support community will tell you, that it is probably by far the biggest problem users are dealing with. So no, neither of those test scores represents real-life performance and it becomes blatantly obvious when you go to places like Bleeping Computer, GeeksToGo, Trojaner Board, Malekal, and all those other communities where people infected by malware show up for help and look at what products these victims used at the time they became infected. Then you will notice that a lot of these products with perfect scores don't look nearly as perfect in real-life conditions. The reason for this discrepancy is quite simple: Most AV vendors will specifically optimise their products for these tests. The most severe cases are where vendors end up outright cheating and detecting the test environments which then results in a change of behaviour of the product (think Dieselgate, but with anti-virus). But there are many ways you can game these tests. For example: you can try to figure out the threat intel feeds the companies use, then just buy those same threat intel feeds so you have all samples in advance you can track their licenses and supply different signatures to them or use your cloud to treat those test systems differently some particularly shady organisations literally also sell you their sample and malicious URL feed, so you can just outright buy the samples and URLs your product will get tested on later What you end up with as a result is a product that is optimised really really well for the exact scenario they are being tested under using the exact type of URLs and samples these testers use, but that is utterly useless when it comes to anything else. We just really don't want to create this type of product. So when we were asked whether we wanted to continue to participate this year, we discussed the matter internally, looked at what we get out of these tests (meaning: whether these tests have a discernable impact on our revenue) and decided that they are simply not worth it and that the tens of thousands of Euros we spent on them every year would be better spent on extending our team and building new ways of keeping our customers safe.
  7. 3 points
    Please note that Emsisoft Anti-Malware for Windows XP hasn't been updated (as in program updates) in over 2 years, and we never intended on continuing long-term database update support for it. In fact, we discontinued our own database updates for it over a year and a half ago, and those still running Emsisoft Anti-Malware on Windows XP have only been receiving BitDefender database updates. We've decided that it is time to stop redistributing those BitDefender updates for Windows XP, as all they are doing is giving those on Windows XP a false sense of security. In addition, it is extremely dangerous to continue using Windows XP. It has (for several years now) had well-known and major security vulnerabilities that Microsoft will never fix. These vulnerabilities make it trivial to infect a Windows XP system, and there is no security software in the world that is capable of preventing it. We can not, in good conscience, continue to provide any support for this version of Windows, as we announced on December 31st, 2015: https://blog.emsisoft.com/2015/12/02/why-we-believe-its-not-ethical-to-sell-antivirus-software-for-windows-xp-any-longer/ We highly recommend that you upgrade to a newer Operating System that is still supported. It doesn't matter if that's a newer version of Windows, or something free like Linux or BSD, as long as you'll be receiving security updates from whoever makes it. New vulnerabilities are discovered almost every day for every major Operating System (Windows, Linux, BSD, MacOS, Android, etc) so it is absolutely critical that you are able to receive security updates from whoever made the Operating System to help keep you and your data safe.
  8. 3 points
    Wenn alle Features eingebaut würden, die Galaxy wünscht, dann würde ich EAM sofort deinstallieren. Ich mag das Programm so wie es ist und hoffe, das bleibt auch so.
  9. 3 points
    Is this working OK now for everyone else? If it is, then there's no need for any more logs. All we needed was a traceroute to send to our CDN provider to help in identifying the server that was having the issue, and I managed to get one of those the other day.
  10. 3 points
    @achtsam Es wird eher langsam Zeit, dass Du deinen privaten Kreuzzug einstellst. Das nimmt ja wirklich paranoide Züge an.
  11. 3 points
    Hello, a2guard.exe is the visible protection process (to put it simple, the Emsisoft icon you see in the system tray). However actual protection drivers start a lot earlier. For example epp.sys (the Emsisoft Protection Platform driver) starts very early in the Windows boot process in order to ensure a protected system even when no user is logged in yet and no other programs have been started.
  12. 3 points
    For the following ransomware, we have decrypters: Actively spreading ransomware: MRCR or Merry X-Mas Globe Globe 2 Globe 3 Nemucod Philadelphia Stampado Xorist Actively spreading ransomware, but the decrypter only works for older infections: Al-Namrood NMoreira LeChiffre PClock FenixLocker GlobeImposter Inactive ransomware: 777 Apocalypse ApocalypseVM AutoLocky BadBlock CrypBoss CryptInfinite CryptoDefense DMALocker DMALocker2 Fabiansomware Harasom HydraCrypt Gomasom KeyBTC Marlboro OpenToYou OzozaLocker Radamant
  13. 3 points
    Today, we've received information that our Dutch team member Rob R. passed away yesterday afternoon, after suffering from an unexpected heart attack last Wednesday. Rob was our lead software tester and we always admired him for his special eye to track down the most tricky bugs. He joined our team more than five years ago by voluntarily sending over a brand new and complete Dutch translation of our software. Shortly after he initiated our efforts in offering physical delivery of our software on CD boxes and USB sticks. He also demonstrated a great interest in testing security software which recently led him to becoming our lead tester for Emsisoft Anti-Malware and Emsisoft Internet Security. Rob will truly live on in our memories as a valued team member and friend.
  14. 3 points
    Hardik587 You are indeed becoming most wearisome. There is an old expression among diehard Texans. "No matter how much you kick a dead horse it won't get up" This is exactly what you are doing.
  15. 3 points
    Hello, please send me your license key via PM (personal message). I will add some days to your key as a sign of goodwill.
  16. 2 points
    Hello, This is legitimate. You can read more about it here: https://blog.emsisoft.com/en/32517/new-in-2018-12-safe-web-browsing-with-emsisoft-browser-security/
  17. 2 points
    If you’re a regular reader, you’ve probably noticed that something has changed about our blog… That’s right: everything has changed. When we started the original blog more than a decade ago, little did we know how popular it would become. From a few hundred visits per month back in 2004 to more than 100,000 now, the Emsisoft Security blog has become a major destination for people looking for straight-talking security advice from our team of malware and online security experts. Sadly, while the actual articles have progressed in leaps and bounds since the early days, the blog page itself has received little love and was starting to feel inadequate for the breadth of content we are now offering our readers. We decided to change that and embarked on the biggest redesign of our blog ever. After lots of brainstorming and gathering feedback, we are excited to show you what we’ve been working on and hope that it will make discovering, exploring and sharing our content even better. So, go ahead and check out our redesigned security blog now, or read on about the exciting changes you can look forward to. See what’s new Without further ado, below are some key highlights from the many improvements we have made to your Emsisoft Blog experience: Home page Visitors to Emsisoft’s Blog will now be greeted by a clearly structured home page, with a prominent “Featured Article” chosen by the team to highlight the latest insights into online security. The page itself is divided into clear categories with a selection of the latest articles for each, so it’s easy to browse through each section and dive into those that you find most interesting. From the latest videos, to Protection Guides and Enterprise Security, there’s something for every security-conscious reader. Category pages All posts are now grouped into clear categories and can be accessed from any part of the blog using the new category menu. Each main category page has been designed with a clear purpose and provides an intuitive way to browse the most relevant articles. While the Emsisoft News articles are organized in a timeline, the Protection Guides are grouped by topic to allow you to find the most relevant information in one place. Go ahead, have a look around! Readability First and foremost, a blog should be a pleasure to read. Once you’ve found what you’re looking for, reading should be a pleasant, distraction-free experience. We have reduced the clutter around the actual article text and adjusted the layout and typeface, creating the feeling of reading a high-quality book, whether it’s on a desktop or on your mobile phone on the go. Quick Search Find any article in a matter of seconds with our new search function. With hundreds of online security articles published over the years, our completely new search functionality makes finding that one article about ‘ransomware payment methods’ a breeze. Simply click on the magnifying glass in the header to bring up the search box, start typing and results will appears instantly. Sharing Options To achieve our ultimate goal of a malware-free world, it’s critical to share our insights and security advice with as many people as possible. We’ve now made it easier than ever to share articles or even sections of articles via social media or email: simply click on your favorite social network on our new sharing menu on the left-hand side to share the whole article with your friends and colleagues, or select a particularly insightful sentence or paragraph and share it via the new context menu that appears. We want to hear from you This article only touches the surface of all the changes we’ve made for you in our new Emsisoft Security blog, and we plan to continue developing it over the coming months. As excited as we are about the improvements, ultimately we have made them for you, our readers and customers. Let us know what you think about the new design, the functionality and the reading experience. The post Welcome to the all-new Emsisoft Security Blog appeared first on Emsisoft | Security Blog. View the full article
  18. 2 points
    You could also use a third-party DNS service that has DNS filtering and protects against DNS security issues. A popular example is OpenDNS (although there should be others as well): https://www.opendns.com/home-internet-security/
  19. 2 points
    We had to turn off XP updates because the latest scan engine and its signatures are no longer compatible with it. Instead of pretending that we could protect you from malware (which we effectively can't because XP is full of holes and flaws that aren't gonna be fixed at all) we would rather strongly recommend you to upgrade your computer. If that is for any reason impossible and means that you can't use our software anymore at all, we're happy to issue a refund for the remaining period.
  20. 2 points
    Guten Tag, Bei Schwachstellen in einer Software ist es eigentlich immer am Besten wenn der Softwarehersteller die Schwachstelle behebt. Er ist der einzige, der Zugriff auf den Quellcode hat und diesen direkt verändern kann. Selbst der Patch von Microsoft ist ein wenig eine Krücke in diesem Sinne, da er nur den Zugriff verhindert und nicht wirklich die Schwachstelle behebt. Intel hat jedoch angekündigt innerhalb einer Woche eine Patch zu veröffentlichen und spätestens bis Ende Januar für alle zur Verfügung zu stellen. Emsisoft kann hier nicht dasselbe leiste wie Microsoft oder Intel, da wir weder den Quellcode von Windows noch für die Intelprozessoren haben. Wir werden jedoch, wie immer, unsere Verhaltensanalyse und den Dateiwächter mit allen Signaturen ausrüsten um Malware die diese Schwachstelle nutzen will zu blockieren. Besser ist es jedoch so schnell wie möglich sämtliche Sicherheitsupdates zu installieren. Ein Antivirenprogramm ist keine Alternative zu Sicherheitupdates. Mit freundlichen Grüßen Kathrin
  21. 2 points
    According to several reports, the latest Windows 10 Update pushed on Jan. 3rd is supposed to address the "Meltdown" security problem. However, due to changes to Windows kernel, Microsoft didn't make the update available to users without the "ALLOW REGKEY", and directed users to confirm with AV vendors if their products are compatible with the latest update. So is the current version of EAM compatible with this update?
  22. 2 points
    Ich kann EMSI-Soft nur bestärken bei dem bloatfreien Konzept zu bleiben. Jeder der Ahnung von der Materie hat, weiß dass diese extra Features Mist sind und nur die Angriffsfläche erhöhen. Siehe diverse Project Zero (google) Security-Bugs bei AV-Herstellern.... EMSISOFT scheinen der einzigen AV Hersteller mit Verstand zu sein, dem man sogar in diesem sensiblen Bereich die Achtung der Privatsphäre abnimmt. Das wissen genug Leute zu schätzen!
  23. 2 points
    Arbeite doch einfach selbst Deine Profilneurose auf, oder suche Dir professionelle Hilfe. Ich bin ziemlich sicher, daß das Sammeln von likes und dislikes Dir nicht wirklich weiterhelfen wird...
  24. 2 points
    From (very) humble beginnings in a Windows XP Service Pack update, the Windows Firewall has evolved into a capable security tool. Today, its performance is on par with – if not better than – any modern third-party desktop firewall on the market. In light of this, and after a lot of careful consideration, the Emsisoft team made a very conscious decision to rely on the Windows Firewall moving forward, which ultimately led to us merging Emsisoft Internet Security with Emsisoft Anti-Malware. This will allow us to concentrate our efforts on building a bulletproof product while using our Behavior Blocker technology to further strengthen the already rock-solid Windows Firewall. To put it simply, using Windows Firewall in conjunction with Emsisoft Anti-Malware will provide better protection for our users, and that is our number one objective above all else. Since our announcement of the Emsisoft Internet Security and Emsisoft Anti-Malware merger, we have received a lot of positive feedback. However, we also got a lot of questions. We want to take the time to answer the most frequently asked questions in a bit more detail: So are you going to remove the firewall completely? The answer to that question is not as simple as it may seem at first. Firewalls are usually divided into two parts: A so-called packet filter, which usually deals with incoming packets and is therefore often called an inbound firewall; and an application filter that deals with applications wanting to access the network or internet, which is why it is often also referred to as an outbound firewall. Emsisoft Anti-Malware has always had an application filter as part of its Behavior Blocker and that will continue to be true. The difference between the outbound firewall in Emsisoft Anti-Malware and Emsisoft Internet Security is that the former makes decisions autonomously, while the later, at least in theory, allowed you to also use your manual rules. In practice, the default for Emsisoft Internet Security was to automatically allow all outbound connections and the majority of all our users never changed it. Why did you make the change? Was Emsisoft Internet Security less secure than the Windows Firewall? No. All firewalls on modern versions of Windows are based on the same technologies provided by Microsoft. In addition, inbound firewalls in particular are incredibly straightforward to implement, as they only block or allow access based on simple rules. That is why there is absolutely no difference in protection provided between any of the inbound firewalls on the market, including the Windows Firewall. However, the Windows Firewall does have some benefits: Support for Windows Networking like Home Groups is a lot better in the Windows Firewall out of the box. There is no need to tweak any rules manually as was often the case for Emsisoft Internet Security. It is easier to use. This is mostly because third-party applications will take care of creating all necessary firewall rules for you. That is not an option that Emsisoft Internet Security could provide, as most software vendors don’t care about third-party firewalls. The Windows Firewall also provides much better compatibility. Third-party software vendors usually test their products with the Windows Firewall as it is part of Windows, but almost never test their product’s compatibility with aftermarket firewall products. Last but not least, the Windows Firewall also provides a lot more configuration possibilities to expert users and allows for much more complex rulesets than the inbound firewall offered as part of Emsisoft Internet Security. But there are also a couple of disadvantages, which is where Emsisoft Anti-Malware 2017.8 comes in: Intelligent outbound firewall: The outbound firewall part of the Windows Firewall will by default allow every application to connect. This behaviour is actually identical with Emsisoft Internet Security, which also allowed any application to connect to the network or the internet unhindered by default. While both products can be manually configured to block programs from accessing the internet, most users don’t want to deal with this responsibility. This is where the intelligent outbound firewall that is part of our Behavior Blocker comes in, which will prevent malicious applications from communicating with the internet automatically while not getting in the way of benign applications. Enhanced malware protection: The Windows Firewall on its own does not provide any protection against more sophisticated attempts to bypass its outbound firewall through advanced techniques like code injection. Code injection essentially allows malware to take over a trusted program in order for its internet communication to pass through the firewall unhindered. Again, the Behavior Blocker in Emsisoft Anti-Malware is incredibly good at detecting and preventing these kinds of attacks. Windows Firewall Fortification: The functions Windows Firewall provides to software vendors to automatically create rules for their applications in the Windows Firewall for ease of use are also pretty much unprotected. That means that malware can and does create rules for itself automatically. In version 2017.8, we extended our Behavior Blocker technology to protect the exposed Windows Firewall functions from malicious usage. This gives you control over which of your applications are allowed to create Windows Firewall rules for you and which aren’t. This is what we refer to as “Windows Firewall Fortification”. To sum things up, for inbound filtering, the Windows Firewall is just as solid a choice as any other firewall product on the market, including Emsisoft Internet Security. It provides better compatibility and is easier to use for the majority of users. Its drawbacks mostly revolve around its outbound filtering capabilities, which are perfectly complemented by the enhanced Behavior Blocker that is part of Emsisoft Anti-Malware 2017.8 and later. Where can I find the new Windows Firewall Fortification options? The new options are part of the Emsisoft Anti-Malware Behavior Blocker. As such, you can find them under Protection/Application Rules: In addition, whenever the Behavior Blocker sees any application it doesn’t know to be trustworthy attempting to create new firewall rules or change the firewall status, it will attempt to auto-resolve the situation by blocking the attempt: If you have auto-resolve disabled, it will simply ask. Where can I find the “advanced configuration possibilities” you talk about? My Windows Firewall only has a couple of options! The default dialog to configure the Windows Firewall can be incredibly deceptive at first. The advanced configuration dialog is stashed away behind an innocuous looking link in the normal Windows Firewall configuration dialog: Windows Firewall dialog with link to Advanced settings Clicking that link will expose the real configuration of the Windows Firewall where you have full access to all the rules it adheres by. That looks awfully complicated. Are there easier methods? There exist a slew of additional applications that sit on top of the Windows Firewall and attempt to enhance it by making rule creation and management easier. Some of the most popular are: TinyWall (Free) – http://tinywall.pados.hu/ Windows Firewall Control (Freemium) – https://www.binisoft.org/wfc.php Glasswire (Paid) – https://www.glasswire.com/ That being said, we think that the majority of users probably won’t find these tools to be necessary. That is also why we decided against creating our own Windows Firewall front-end and focus our development efforts on improving the complementary and enhanced technology in our Behavior Blocker instead. So what do you recommend I should do? We strongly believe that the combination of Emsisoft Anti-Malware and the Windows Firewall is the best option for almost every user. For the past 12 years while developing our product, we used this exact combination in all of our internal performance evaluations of our technology. Our malware research team works hard to make sure that even the most advanced threats are blocked immediately across all our products. So yes, Emsisoft Anti-Malware blocks the same malware that Emsisoft Internet Security blocks out of the box – no configuration, paying extra or jumping through hoops needed. If you do feel the need to make sure that certain legitimate applications can’t access the internet, the Windows Firewall does offer the ability to do so via its Advanced Settings. If you find that method to be too inconvenient, going with one of the many front-ends may be an option for you. We do know that a small minority of Emsisoft Internet Security users believe that the Windows Firewall must have backdoors implemented by Microsoft to allow them to spy on their users. In all our research, we haven’t found one and neither have hundreds of other security professionals that constantly review Windows for possible backdoors and vulnerabilities. We also think it is important to keep in mind that every single firewall product for Windows Vista and later uses the very same frameworks to implement packet and application filtering. There is no difference between the Windows Firewall, Emsisoft Internet Security and any other third party firewall from a technical point of view. If Microsoft were to backdoor their products to allow unhindered communication, this backdoor would probably be part of the Windows Filter Platform or the NDIS Lightweight Filter Framework, which are the underlying technologies all firewall products are built upon, and affect every firewall product equally. If you still prefer to use a firewall product other than the Windows Firewall, we recommend you contact the software company creating your new firewall product of choice beforehand to ask them whether they implement their own firewall or rely on the Windows Firewall as well. Most firewalls and internet security suites dropped their own implementation in favour of the Windows Firewall many years ago. So we suggest you ask them first to make sure you don’t end up with a Windows Firewall front-end instead. Do you have more questions? Post them in the comments and we’ll answer them. Have an excellent (malware-free) day! View the full article
  25. 2 points
    Starting 1 October 2017, Emsisoft Internet Security will be merged with Emsisoft Anti-Malware. While this may come as a bit of a surprise, there are many factors that have prompted this decision, and I would like to use this as an opportunity to share our reasoning: A common base Technically, both products have shared the same code base and even the same file feeds for online updates for the last couple of years. From a branding perspective, Emsisoft Internet Security has kind of been framed as an extended feature set edition of Emsisoft Anti-Malware. The only difference between the two products is Emsisoft Internet Security’s built-in firewall component, which is responsible for its slightly higher price tag. While Emsisoft Internet Security was definitely a valuable product in years gone by, we believe that whatever protective advantages desktop firewalls once had over Windows Firewall are now minimal, if not negligible. The job of firewalls The main purpose of a desktop firewall is to shield your computer from attacks from the Internet. It does so by interrupting network communications initiated by foreign computers when they attempt to connect to a program that listens for input on your computer. However, there are two things to consider here: Most attack attempts from the outside are made impossible by the use of NAT routers (which includes just about every modern DSL modem), as they separate your inside network (LAN) from the Internet. The built-in Firewall in Windows 7, 8 and 10 already does a pretty good job of blocking connection attempts from potentially dangerous computers that reside in the same network (e.g. in public WiFi) or on the Internet. Malware and firewalls We see our main job as protecting your computer from malware – and today’s malware is generally quite unimpressed by firewalls. Connection attempts from the outside in are blocked by the Windows Firewall by default, and connections from the inside out are prevented by Emsisoft’s multi-layer real time protection, and the Behavior Blocker in particular. Emsisoft Firewall vs Windows Firewall When Microsoft introduced the Windows Firewall in a late Windows XP Service Pack update, it was a bit of an embarrassing performance and the software could not be taken too seriously, which led us to build a stronger alternative. But with the release of Windows 7, the Windows Firewall started to do its job much more effectively, and the latest Windows 10 version pretty much does everything you could expect from a desktop firewall. Its only architectural flaw is that its settings (and firewall rules) can be freely edited by anyone or anything that attains the required permission level. In other words, if malware manages to run on the PC, it’s able to allow itself to get through the firewall. That was one of the main reasons for us to maintain our own firewall component. A better approach: Fortifying the Windows Firewall Emsisoft Internet Security has always been highly configurable. While some of our more technically minded users might have appreciated the freedom to tweak settings to their heart’s content, it has to be said the majority of our customers are (understandably!) not familiar with the technical intricacies of firewalls and were not always confident when using the software. This was problematic given the fact that a wrong configuration can potentially cause a lot of damage when it comes to malware protection. So, in the interests of protecting our customers, we thought it would be most beneficial if, moving forward, we simply rely on the Windows Firewall and use our software to cover its blind spot and ensure its settings can’t be manipulated by malware from the inside. How are we going to do that? Well, one of Emsisoft’s key strengths is creating Behavior Blocking technology that works. It allows us to detect and intercept malicious actions from active programs in real time before they can cause any damage. This technology now allows us to define behavior patterns that indicate illegitimate manipulations of Windows Firewall rules. We make sure Windows Firewall is as safe to use as our own firewall, so we can remove the redundancy of building and maintaining our own firewall code. Therefore, we decided to end the product life-cycle of Emsisoft Internet Security and merge it with Emsisoft Anti-Malware, which receives the Windows Firewall fortifying enhancements in the version 2017.8 release. Timeline September 1st, 2017: The new Windows Firewall Fortify feature will be part of the version 2017.8 release of Emsisoft Anti-Malware. October 1st, 2017: Existing Emsisoft Internet Security software will directly update to Emsisoft Anti-Malware version 2017.9 and the remaining license period will be extended as described below. No manual actions required. Advantages for Emsisoft Internet Security customers We appreciate that the decision and swift merging will come as a surprise to our loyal customers, so apart from the additional features already mentioned that ensure capable and secure firewall protection, we are sweetening the transition for existing Emsisoft Internet Security license holders: By switching to Emsisoft Anti-Malware, your annual software license fee gets about 20% cheaper. To compensate for the already paid higher product price, we will extend all active Emsisoft Internet Security license periods by 50%. E.g. if you have 1 year left on your license, it will change to 1.5 years for free. Malware protection capabilities of Emsisoft Anti-Malware will be improved due to less interference with firewall code. Your Emsisoft protection software will get lighter on the system and there will be fewer incompatibilities with other products. Less risk of misconfiguring the protection features. We hope you think this is a fair deal and will make the transition to our flagship product as smooth as possible. Should you still be unhappy with the upcoming changes, we’re happy to do partial refunds for your remaining license period. As the cybersecurity landscape continues to evolve, we are continuing our mission towards a safer digital world for everyone. Today we have taken an important step in this journey, and we are excited to continue to improve our protection services for our customers. Have a great, malware-free day! View the full article
  26. 2 points
    Hello to you all, l don't know how some of you are going to react to my post but the end is what matters. On Friday morning we (company) where infected from the Cry36 Virus(Ransom). Our Server 2008R2 was with anti-virus and with Windows Update.. up to date.. At the time we had a external Hard drive connected to the server (the only one we had) since we didn't have a duplicate due the second one failed on us. Due to hard times here in Greece we thought that one hard drive was enough. Since our server was under repair with a raid problem we had an live backup. All our files where encrypted.. Most you will probably understand. We called local Police, Internet Crime Center Greece and Interpol. We had support for a number o techs, antivirus profs in Greece and around the world. We had no choice but to gamble with the hackers. They asked for $800 in bit coin. We had nearly every day email exchange with them. The process to obtain bit coin was a long and stressing time. The amount of money we where loosing day by day was nightmare. After 8 days we had the bit coin, we transferred them to the people responsible and in 15min we had the unlock.exe we our ID and a password from Greece to US. They even gave us instructions and warnings not to damage the files. We got all our files back!!!!!!!!!!!!!! Yes we did the wrong thing and payed. In the end we lost a lot of money and lived 10 days of hell!!!!! The virus was infected from a personal email...
  27. 2 points
    I believe everyone here are all frustrated that we still can't recover our file back. So am I. I'm also thinking the possibility to pay to the terrorists to get my file saved. But I still have some hope that Emsisoft Team can make the decryptor . I hate cry36.
  28. 2 points
    It doesn't matter if it is securely transmitted or not. Your browser decrypts the HTTPS traffic when it is received, so the file would be saved in its original form, and our protection would catch it either way. HTTPS (secure connections) are only intended to keep information being exchanged over the Internet private. For instance, if you do a search on your favorite search engine, and the connection to their website uses HTTPS (and thus is secure), then when the NSA records the data that is sent from your computer to the search engine tell it what you want to search for, that data is encrypted, and thus the NSA can't actually tell what you searched for if they were to review the data they had collected (obviously they may have other ways of finding out, but at least they can't get it from the HTTPS traffic). Of course, I'm using the NSA as an example due to the various leaks revealing that they record everything that is transmitted across the Internet. The original purpose of HTTPS was to secure online purchases and other information you submit to websites from criminals snooping on data sent across the Internet. If malware is downloaded over a secure connection, then all it really does is keep anyone from snooping on your Internet traffic (or government agencies recording everything you do online) from seeing what you downloaded. That sort of thing would generally be done either with malicious extensions, or some sort of malicious program on your computer. If there is something malicious on your computer, then everything is compromised, and not just a single tab. Note that most modern browsers (except maybe Firefox) have a sandbox for each tab in the browser, which should isolate the tabs from each other. I have never saw these words before and do not know what they are . ClassicShell is a program for Windows 8, Windows 8.1, and Windows 10 that adds the classic Windows 7 Start Menu to these newer versions of Windows. AmmyAdmin is a remote access software similar to TeamViewer. There are testing organizations/companies that will test websites for security problems periodically, and some website owners will sign up for those services to ensure their websites are secure. With paid services the website owners are usually allowed to put some sort of graphic on their website that links back to the latest test results to allow visitors to verify whether or not the website is secure. If you see one of those graphics on a page, and can click on it to verify that it is valid, then the website is more than likely secure. If there is no such graphic on a website, then there will be no publicly available way to verify the website is secure, however this does not mean the website unsafe. As an example, GT500.org doesn't have a graphic/button/etc. that you can click on to see if the website has been tested, however it is tested weekly for security vulnerabilities by Beyond Security and is almost always given the highest possible score (when it isn't, any security issues are dealt with quickly).
  29. 2 points
    Fabian who works on the decrypters has been ill recently, but we are looking into this. Please be patient. Regards, Sarah
  30. 2 points
    Hi Deco, You can get the beta version of our software by switching to "Beta" feedback in Settings > Update settings, you can choose it from the dropdown menu. You can switch back to the "Stable" version at any time. We give a free license to the testers that participate actively in reporting any bugs or feedback. Orlando
  31. 2 points
    Yes, this is normal. It's possible that there may be something we can do to prevent the extra notification, so I'll talk to our QA team and see what they think about this.
  32. 2 points
    just click the 'more reply options' button and attach any file to your post.
  33. 2 points
    I know, that is why I only counted signature updates. Whenever you see an exact signature count in the change log above, one of our signatures was updated. Sorry, what you ask is impossible. It should be obvious to anyone, that if you have a scan engine that already detects 95% of all malware out there, that the other engine can't suddenly detect more than that without causing gross redundancy. In general we can choose to waste hundreds of megabytes of RAM on hundreds of thousands of systems to keep duplicate signatures around so you feel validated in your purchase, or we can choose not to do that, not to waste everyone's resources. To be honest, that's not even a choice really.
  34. 2 points
    You can go ahead and have EEK safely delete: Value: HKEY_USERS\S-1-5-21-3104866962-3908348715-1408370962-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM -> DISABLETASKMGR detected: Setting.DisableTaskMgr (A) Value: HKEY_USERS\S-1-5-21-3104866962-3908348715-1408370962-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM -> DISABLEREGISTRYTOOLS detected: Setting.DisableRegistryTools (A)Everything else looks good.Unless you are having problems, it is time to do the final steps. Now to remove most of the tools that we have used in fixing your machine: Download Delfix from here and save it to your desktop. Ensure Remove disinfection tools is checked.Also place a checkmark next to:Create registry backupPurge system restoreClick the Run button.When the tool is finished, a log will open in notepad. I do not need the log. You can close Notepad.Empty the Recycle Bin Download to your Desktop: - CCleaner Portable UnZip CCleaner Portable to a folder on your Desktop named CCleanerRun CCleanerOpen the CCleaner Folder on your Desktop and double click CCleaner.exe (32-bit) or CCleaner64.exe (64-bit) Click "Options" and choose "Advanced" Uncheck "Only delete files in Windows Temp folders older than 24 hours" Then go back to "Cleaner" and click the "RunCleaner" button. Exit CCleaner. Turn off System restore to flush all your restore points then turn system restore back on. See How To Enable and Disable System Restore.You can delete and uninstall any programs I had you download, that you do not wish to keep on the system. Run Windows Update and update your Windows Operating System. Install and run the , this will inspect your system for software that is out-of-date and in need of updating. Update anything program/application detected as being out-dated. Articles to read: How to Protect Your Computer From Malware How to keep you and your Windows PC happy Web , email, chat, password and kids safety 10 Sources of Malware Infections That should take care of everything. Safe Surfing!
  35. 2 points
    Dear nine9s, Thank you for contacting our support. If you change hardware when your license key is still active our system will make no troubles if you simply install Emsisoft Anti-Malware on the new computer and activate it with your existing license key. If the old system should still be in use at this point you would need to remove Emsisoft Anti-Malware from the old computer before you use your existing license key to unlock the full version on the new system, otherwise no additional actions would be necessary. Thank you for using our software solutions! Should you have any further questions, please just let us know.
  36. 2 points
    You must have had Beta Updates enabled as EIS 11 is still beta, and that kind of problems can happen with Betas Remedy. Uninstall 11 and then install 10 again and make sure that "Beta Updates" is disabled (unchecked)
  37. 2 points
    Hallo, Ja das ist kein Problem. Vermieden werden sollte lediglich zwei Desktopfirewalls parallel zu installieren. Zum Beispiel Emsisoft Internet Security und Bitdefender Internet Security gleichzeitig zu installieren. Sollten weitere Fragen bestehen kontaktieren Sie uns bitte erneut.
  38. 2 points
    At the moment it is not possible to delete multiple lines at once. I have made a suggestion internally to add it though.
  39. 2 points
    Dies ist die Kernaussage des m.M.n exzellenten Artikels auf der offiz. HP: http://blog.emsisoft.com/de/2015/06/26/antivirensoftware-schutz-fuer-ihre-dateien-aber-auf-kosten-ihrer-privatsphaere/ Ich finde, dieser wichtige Aspekt wird viel zu wenig gewürdigt, sei es in den Tests der ganzen Testinstitute, die meist nur nach Erkennung, Beseitigung und Performance unterteilen oder in den ganzen "Fach"zeitschriften wie computerbild oder chip, etc. Aber auch bei den Usern: Wenn ich mir anschaue, dass auf dem beliebtesten Donwload-Portal Deutschlands Avira über 400.000 Mal diesen Monat heruntergeladen wurde, dann muss man sich fragen, ob es den meisten Usern nicht schlichtweg egal ist, was mit Ihren Daten passiert oder sie wissen es erst gar nicht: Motto, Hauptsache, es ist umsonst. Erschwerend dazu kommt der Herdentrieb: Soviele User können sich ja gar nicht irren. Umsonst soll ja heute sowieso alles am besten sein; wer bezahlt die Malware-Analysten, die Developer, die an den Erkennungsroutinen und am Selbstschutz des Programms arbeiten, die normale Verwaltung und die angebundene Hardware/Server u.v.m? Das alles wird ausgeblendet. Wirklich umsonst ist heute fast nichts mehr, sei es Avast (in o.a. Artikel ja erwähnt), AVG (Toolbar) oder Avira - lange Jahre Ask-Toolbar in Verwendung, heute angeblich eine eigenständig entwickelte ("Hust"!). Hier bezahlt man m.M.n indirekt mit den persönlichen Daten. Ich finde, jede Software ist heute immer Vertrauenssache, das trifft vor allem auf AV Programme zu. In dem Kontext finde ich Emsisoft und seine Datenschutzpolitik klasse , neben der sehr guten Erkennung war das für mich das Hauptkriterium bei der Kaufentscheidung! Weiter so Emsisoft!
  40. 2 points
    As long as you restart the guard process after it crashed, it shouldn't make a difference.
  41. 2 points
    Supi, AdwCleaner bitte öffnen und Deinstallieren drücken. FRST samt Logfiles, sowie den Ordner C:\FRST, einfach löschen.
  42. 2 points
    Bitte das alles deinstallieren. Vor allem LPT, dann geht auch das Internet wieder. Downloade Dir bitte AdwCleaner auf deinen Desktop. Starte die adwcleaner.exe mit einem Doppelklick. Klicke auf Suche, dann Löschen. Nach Ende des Suchlaufs öffnet sich eine Textdatei. Poste mir den Inhalt mit deiner nächsten Antwort. Die Logdatei findest du auch unter C:\AdwCleaner[s1].txt. Zum Schluss bitte einen frischen Scan mit FRST machen und das Logfile anhängen.
  43. 2 points
  44. 2 points
    Derzeit bieten wir Email Support auf Deutsch, Englisch, Franzoesisch, Spanisch, Niederlaendisch, Russisch und Italienisch an.
  45. 2 points
    If a license key for Emsisoft Anti-Malware is remapped more than 5 times in a day, then our system will lock out any further remaps for 24 hours. If you contact support, we can clear the mapping history manually if needed. In your case, this shouldn't end up being an issue.
  46. 2 points
    Hi und Herzlich Willkommen beim Emsisoft Support Forum! Systemscan mit FRST Bitte lade dir die passende Version von Farbar's Recovery Scan Tool auf deinen Desktop: FRST 32-Bit | FRST 64-Bit (Wenn du nicht sicher bist: Start > Computer (Rechtsklick) > Eigenschaften) Starte jetzt FRST. Ändere ungefragt keine der Checkboxen und klicke auf Scan. Die Logdateien werden nun erstellt und befinden sich danach auf deinem Desktop. Bitte beide Logfiles in der nächsten Antwort anhängen.
  47. 2 points
    In general the behavior blocker ignores most scripting hosts, as it is not possible to distinguish which actions are triggered by the script and which are triggered by the scripting host. The File Guard however does trigger when trying to execute the scripts you uploaded.
  48. 2 points
    Nee, alles in Ordnung Downloade dir bitte Combofix vom folgenden Downloadspiegel Link 1 WICHTIG - Speichere Combofix auf deinem Desktop Deaktiviere bitte all deine Anti Viren sowie Anti Malware/Spyware Scanner. Diese können Combofix bei der Arbeit stören.Starte die Combofix.exe und folge den Anweisungen auf dem Bildschirm. Wenn Combofix fertig ist, wird es eine Logfile erstellen. Bitte poste die C:\Combofix.txt in deiner nächsten Antwort. Hinweis: Solltest du nach dem Neustart folgende Fehlermeldung erhalten starte den Rechner einfach neu. Dies sollte das Problem beheben.
  49. 2 points
    Online Armor covers all these applications except the "Behavior Blocker" part. Behavior blockers and HIPS in the same product are pretty much mutually exclusive. They essentially both refer to the same underlying technology. The only difference is the way decisions are made on whether or not to allow a certain action. A HIPS will ask the user, while a behavior blocker tries to figure everything out on its own. Given that it should be obvious why those modes are mutually exclusive and why running both at the same time makes little sense: You can't both ask a user about everything and not asking him and figuring it out internally on your own at the same time. You can install two different products (one HIPS, one behavior blocker) at the same time, but the only thing you achieve will be that you have to allow things twice. So either go with a HIPS or with a behavior blocker. But not both.
  50. 2 points
    Hello, please take a look in the Registryeditor for the key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\VBoxNetFlt and remove it. If you have any more questions or problems, just let me know.
  • Who's Online   0 Members, 0 Anonymous, 50 Guests (See full list)

    There are no registered users currently online

  • Newsletter

    Want to keep up to date with all our latest news and information?

    Sign Up