Leaderboard


Popular Content

Showing content with the highest reputation since 04/10/12 in all areas

  1. 7 points
    Official word is, "yes". We will give free license extensions to anyone who upgraded to Windows 10 and was unable to use the firewall. Once the issue has been resolved, please either submit a support ticket in our helpdesk system, or send a Private Message on the forums to me (English Support) or Thomas Ott (English/German Sales). Be sure to mention that you would like to have your license extended due to the Windows 10 issues and include in your message any license keys that were in use on a computer with Windows 10. Feel free to link to this forum post if you would like to.
  2. 6 points
    As announced earlier, we are changing our firewall strategy and will soon merge Emsisoft Internet Security with Emsisoft Anti-Malware, effective as of our next release in October. Instead of developing our own firewall module, we’re going to rely on the built-in Windows Firewall core that has proven to be powerful and reliable. Its only weak point is the fact that anyone can freely change the firewall configuration. In other words, if malware manages to run on the PC with sufficient administrator permissions, it’s able to allow itself to get through the firewall. To resolve this vulnerability, we’ve developed a new Firewall Fortification feature for Emsisoft Anti-Malware’s Behavior Blocker as part of our 2017.8 release. Firewall Fortification detects and intercepts malicious actions from non-trustworthy programs in real time before they can cause any damage. Behavior Blocker alert: Firewall manipulation All 2017.8 improvements in a nutshell Emsisoft Anti-Malware New: Firewall Fortification feature that blocks illegitimate manipulations of Windows Firewall rules. Improved: Forensics logging. Fixed: Rare program freezes on opening the forensics log, confirming of surf protection notifications and during malware detection. Fixed: Computer restart instead of computer shutdown executed, when set for a silent scan. Several minor tweaks and fixes. Emsisoft Enterprise Console Improved certificate handling to avoid connectivity issues. Several minor user interface improvements. Several minor tweaks and fixes. How to obtain the new version As always, so long as you have auto-updates enabled in the software, you will receive the latest version automatically during your regularly scheduled updates, which are hourly by default. New users please download the full installer from our product pages. Note to Enterprise users: If you have chosen to receive “Delayed” updates in the Update settings for your clients, they will receive the new software version no earlier than 30 days after the regular “Stable” availability. This gives you time to perform internal compatibility tests before a new version gets rolled out to your clients automatically. Have a great, well-protected day! View the full article
  3. 4 points
    Guten Tag, Wir haben mittlerweile mehrfach etabliert, dass Emsisoft nicht das Programm Ihrer Wahl ist. Sie haben sich bereits anderweitig ein Antivirus gesucht, dass auch noch dreißig weitere Funktionalitäten mitabdeckt. Fakt ist jedoch, dass viele Leute eben auch ein Antivirenprogramm suchen, dass nicht noch fünfzig Extras mitbringt, die man nicht will oder nicht braucht. Für diese Leute gibt es eben Emsisoft Anti-Malware und die meisten unserer Kunden sind mit der Tatsache, dass es eben 'nur' ein Rundumschutz für den Rechner ist und nicht mehr, zufrieden. Für all die angesprochenen Features - Passwortgenerator, Kinderschutz, etc - gibt es bereits gute Programme, die man sich bei Bedarf installieren kann. Viele Leute haben aber entweder keine Kinder oder wollen diesen den Zugang nicht beschränken, warum sollten wir diesen Leuten einen Kinderschutz mitinstallieren. Einige haben eben auch nicht RAM oder CPU im Überfluß, für diese Leute ist es noch ärgerlichr wenn das RAM durch ein AV belegt ist, dass aufgrund von ungenutzten Features die Ressourcen auffrisst. Fazit: Es gibt viele Antivirenprogramme, die die eierlegende Vollmilchsau sein wollen und versuchen alle Programme in einem zu vereinen. Es gibt User, die diesen Ansatz nicht mögen und nur ein Antivirenprogramm wollen. Nicht mehr. Für diese Leute gibt es, zum Beispiel Emsisoft Anti-Malware. Sie gehören nicht zu dieser Gruppe und das ist ok. Mit freundlichen Grüßen Kathrin
  4. 4 points
    Which for everything related to our core technologies (engine, behavior blocker, cleaning engine) would be me. Hi, nice to meet you! Next time someone looks strange at me for talking to myself I can now point them to this post and tell them you asked me to talk to me . Your argument is that we chose Bitdefender because it is "the best". Both Kaspersky as well as Avira consistently score higher in pure on-demand tests than Bitdefender does. If you consider PUP detection ESET is a superior contender as well. We considered all of them at one point or another but they were discarded for various reasons. The article is based on the submission we got through the "Submit information about detected Malware" option in all our products, which reports back meta data (infection names, number of infected objects) about all infections found by our products.
  5. 4 points
    Actually, there is a system behind it: My workstation computers are named after noble gases, like Krypton or Helium. Computers that I only use temporarily or belong to guests are named after transition metals like Titanium. Non-computer devices like smartphones are named after non-metals like Oxygen. All systems and VMs that are used for malware testing are named after radioactive elements like Uranium. Needless to say my WLAN and local workgroup is called "Periodic Table". And yes, I spent a significant amount of time coming up with that system and I am proud of it .
  6. 3 points
    It means that the tests done by AV-C and AV-T have a clear image of how they think AV software should work. The problem arises when your product doesn't fit the mould. Then you get penalized for not doing what everyone else does, even though what everyone else does may not be in the best interest of the user, to begin with. Best example: Snooping around in your encrypted connections, which literally every AV vendor screwed up at least once in the past and probably will continue to happen, exposing users to potentially greater risks than most malware does. For starters, the test sets aren't nearly as representative anymore. When we participated in AV-T and AV-C both tested with less than 200 samples a month on average. 200 samples out of literally tens of millions. The exact selection isn't clear and not representative of what users deal with either. None of them tests with PUPs for example, even though a simple look at any tech support community will tell you, that it is probably by far the biggest problem users are dealing with. So no, neither of those test scores represents real-life performance and it becomes blatantly obvious when you go to places like Bleeping Computer, GeeksToGo, Trojaner Board, Malekal, and all those other communities where people infected by malware show up for help and look at what products these victims used at the time they became infected. Then you will notice that a lot of these products with perfect scores don't look nearly as perfect in real-life conditions. The reason for this discrepancy is quite simple: Most AV vendors will specifically optimise their products for these tests. The most severe cases are where vendors end up outright cheating and detecting the test environments which then results in a change of behaviour of the product (think Dieselgate, but with anti-virus). But there are many ways you can game these tests. For example: you can try to figure out the threat intel feeds the companies use, then just buy those same threat intel feeds so you have all samples in advance you can track their licenses and supply different signatures to them or use your cloud to treat those test systems differently some particularly shady organisations literally also sell you their sample and malicious URL feed, so you can just outright buy the samples and URLs your product will get tested on later What you end up with as a result is a product that is optimised really really well for the exact scenario they are being tested under using the exact type of URLs and samples these testers use, but that is utterly useless when it comes to anything else. We just really don't want to create this type of product. So when we were asked whether we wanted to continue to participate this year, we discussed the matter internally, looked at what we get out of these tests (meaning: whether these tests have a discernable impact on our revenue) and decided that they are simply not worth it and that the tens of thousands of Euros we spent on them every year would be better spent on extending our team and building new ways of keeping our customers safe.
  7. 3 points
    Please note that Emsisoft Anti-Malware for Windows XP hasn't been updated (as in program updates) in over 2 years, and we never intended on continuing long-term database update support for it. In fact, we discontinued our own database updates for it over a year and a half ago, and those still running Emsisoft Anti-Malware on Windows XP have only been receiving BitDefender database updates. We've decided that it is time to stop redistributing those BitDefender updates for Windows XP, as all they are doing is giving those on Windows XP a false sense of security. In addition, it is extremely dangerous to continue using Windows XP. It has (for several years now) had well-known and major security vulnerabilities that Microsoft will never fix. These vulnerabilities make it trivial to infect a Windows XP system, and there is no security software in the world that is capable of preventing it. We can not, in good conscience, continue to provide any support for this version of Windows, as we announced on December 31st, 2015: https://blog.emsisoft.com/2015/12/02/why-we-believe-its-not-ethical-to-sell-antivirus-software-for-windows-xp-any-longer/ We highly recommend that you upgrade to a newer Operating System that is still supported. It doesn't matter if that's a newer version of Windows, or something free like Linux or BSD, as long as you'll be receiving security updates from whoever makes it. New vulnerabilities are discovered almost every day for every major Operating System (Windows, Linux, BSD, MacOS, Android, etc) so it is absolutely critical that you are able to receive security updates from whoever made the Operating System to help keep you and your data safe.
  8. 3 points
    Wenn alle Features eingebaut würden, die Galaxy wünscht, dann würde ich EAM sofort deinstallieren. Ich mag das Programm so wie es ist und hoffe, das bleibt auch so.
  9. 3 points
    Is this working OK now for everyone else? If it is, then there's no need for any more logs. All we needed was a traceroute to send to our CDN provider to help in identifying the server that was having the issue, and I managed to get one of those the other day.
  10. 3 points
    @achtsam Es wird eher langsam Zeit, dass Du deinen privaten Kreuzzug einstellst. Das nimmt ja wirklich paranoide Züge an.
  11. 3 points
    Hello, a2guard.exe is the visible protection process (to put it simple, the Emsisoft icon you see in the system tray). However actual protection drivers start a lot earlier. For example epp.sys (the Emsisoft Protection Platform driver) starts very early in the Windows boot process in order to ensure a protected system even when no user is logged in yet and no other programs have been started.
  12. 3 points
    Today, we've received information that our Dutch team member Rob R. passed away yesterday afternoon, after suffering from an unexpected heart attack last Wednesday. Rob was our lead software tester and we always admired him for his special eye to track down the most tricky bugs. He joined our team more than five years ago by voluntarily sending over a brand new and complete Dutch translation of our software. Shortly after he initiated our efforts in offering physical delivery of our software on CD boxes and USB sticks. He also demonstrated a great interest in testing security software which recently led him to becoming our lead tester for Emsisoft Anti-Malware and Emsisoft Internet Security. Rob will truly live on in our memories as a valued team member and friend.
  13. 3 points
    Hardik587 You are indeed becoming most wearisome. There is an old expression among diehard Texans. "No matter how much you kick a dead horse it won't get up" This is exactly what you are doing.
  14. 3 points
    Hello, please send me your license key via PM (personal message). I will add some days to your key as a sign of goodwill.
  15. 2 points
    That's an offline ID. Support for it should be added to STOPDecrypter soon, and once that happens it should be possible for you to decrypt your files.
  16. 2 points
    Hi Marshall. Not sure, but I do know that I recognize the URL of "MVPS Hosts" and I recognize the list. I don't recognize the list attached to MVPS Hosts (Domains). To view the list, click the blue "Details", "View" & "Original" buttons - see image. Sorry I couldn't offer a better explanation.
  17. 2 points
    Hello, This is legitimate. You can read more about it here: https://blog.emsisoft.com/en/32517/new-in-2018-12-safe-web-browsing-with-emsisoft-browser-security/
  18. 2 points
    I could only confirm David's post - on both my computers with Comodo (Win 7 64 bit, SSD HDD - as this probably had some impact on that unpleasant EAM behaviour) I switched to stable version and all seem to work. So yes, the problem with Comodo on some comps is probably over. I want to add my two cents to discusion above. I work with computer more than 25 years. A lot years ago I worked as programmer. This is all over now (even as I sometimes write a few lines of code in php and MySQL). My main work is with graphics software, but for a few of my customers I do also some kind of computer servis. Not that I'm any expert in LAN's or such but I could help individual users with some computer problems. So my computer knowledges are a little bit above standard. Usually I could help myself with any and all hardware or software troubles, but this time it was very frustrating and it took me a lot of precious time (which I should have spent differently) to revert my work and home computers back to working state. And it was because of EAM "no user asking" PROGRAM update (unfortunately it even didn't create system restore point - why this isn't standard upon bigger program update is above my understanding). This is why I ask you for avoiding such program behaviour. I understand your points but you should hear our opinions also. Maybe it's not wise to let some users decide about something they don't understand but I don't ask you to do this. You can let default EAM settings on stable version update but I'd appreciate the possibility for some of us to switch off this behaviour. Why couldn't you add to setup/actualization menu two choices: 1) update program without asking user 2) update program only after user confirmation? First choice could be the default one - I don't care. This would be enough. And (not only) after this experience I'd immediately switch it to the "update program only after user confirmation". And a few words to Neneduty post: no, I won't uninstall ANY of my programs only because ANY antivirus software couldn't work with it. All programs are in my computers for good reasons (this is true especially for Comodo firewall). This could end that Emsisoft (or any other antivirus producer for that reason) could ask me not to use my graphics programs, because they could be in conflict with EAM (btw. there was situation Adobe Acrobat didn't start because of conflict with EAM one time - I resolved it with Emsisoft help then - fortunately Emsisoft helpdesk didn't want me to uninstall it :-) ). Antivirus software is in any computer to help not to be infected by computer virus; it's not there to block users to work with their programs... Any other debate about this is ridiculous. Uffff. Enough from me.
  19. 2 points
    We had to turn off XP updates because the latest scan engine and its signatures are no longer compatible with it. Instead of pretending that we could protect you from malware (which we effectively can't because XP is full of holes and flaws that aren't gonna be fixed at all) we would rather strongly recommend you to upgrade your computer. If that is for any reason impossible and means that you can't use our software anymore at all, we're happy to issue a refund for the remaining period.
  20. 2 points
    Emsisoft Anti-Malware is compatible with the Windows update. We also just published an update that sets the compatibility flag for all users of the beta, stable and delayed update feed. Keep in mind, that Microsoft uses the same flag for all anti-virus vendors. That means if you are using multiple anti-viruses or anti-malware applications, you are risking one of those products, like Emsisoft Anti-Malware, flagging the system as compatible, even though one of your other products is not compatible. There is, unfortunately, nothing we can do to prevent this as Microsoft does not account for the scenario of multiple security products being installed on the same system. This is the perfect example why we are recommending against using multiple security products in parallel. For further information, feel free to stop by our blog.
  21. 2 points
    The holiday season is not only a great opportunity to spend time with loved ones, but also to look back at the year gone by. For us at Emsisoft, we could finally take a brief moment to realize just how busy 2017 has been for the team and the wider security industry: from major ransomware outbreaks that took most (Emsisoft customers excluded) by surprise to constant product evolution to guarantee the best possible malware protection for our customers, this year has been anything but uneventful. Better surf protection: Both online and in the water Prevention is worth a pound of cure, so raising awareness of online security issues has always been close to our hearts. Back in November 2016 we started out with the world’s first surf protection research using drones and high technology drifters, teaming up with Surf Life Saving New Zealand to map currents and further understand threats and dangers that await unsuspecting surfers under the surface. The campaign results exceeded our highest expectations: not only was the project widely covered in media outlets across the country, but the insight gained formed the basis for future projects and was even presented at a conference sponsored by the World Health Organization. As our CEO Christian Mairoll put it: Whether online or in the water, Emsisoft always aims to observe dangerous environments, analyze specific threats and most importantly prevent dangerous situations that surfers suffer from everyday. Ransomware outbreaks take many by surprise Ransomware attacks are nothing new for our team, but the sheer size and speed of two major outbreaks this year caught many off guard. In May, Wannacry ransomware took advantage of the NSA shadow broker exploits to rapidly spread to hundreds of thousands of machines, including major corporations in Europe and beyond. A mere month later, Petya used the same exploits to wreak havoc across high-profile businesses in dozens of countries and exposed, despite repeated warnings from security experts, the general lack of basic protective measures, including up-to-date operating systems, regular backups and the use of reputable anti-malware software. Our customers were safe from these attacks thanks to Emsisoft Anti-Malware’s multi-layered protection. Yet it’s events like these that remind us of the need to constantly improve our technology and awareness to stay one step ahead of cybercriminals. Emsisoft evolves to stay ahead of malware Malware attacks of this nature require an immediate response. Luckily, one of our main advantages over many competitors is our ability to adapt quickly. Starting in January, we introduced a new product versioning scheme that aligns with our development month and laid the foundation to bring protection and usability features to our customers faster than ever, rather than waiting for a major release. Making great protection even better Our customers choose Emsisoft first and foremost for one reason: to be protected from all types of malware threats. It’s a job we take seriously, which is why we have launched a number of improvements throughout 2017. Our personal highlights: We made our Behavior Blocker even more capable, detecting malware and ransomware threats that try to disable antivirus software. We promoted our existing ransomware protection into a dedicated “Anti-Ransomware” layer. We added Double Pulsar exploit mitigation in response to the increase in ransomware outbreaks. This doesn’t include the countless under-the-hood changes to the Surf Guard to detect even more phishing scams and the performance improvements we have launched month after month to ensure your protection does not get in the way of your day. Keeping things simple Simplicity is one of our core values here at Emsisoft, and the product team made it a clear focus to deliver against it in 2017. We looked at all aspects of our software and listened to a lot of customer feedback to learn how we can make things better, faster, and simpler. The result was a raft of new and improved features that we released over the last 12 months, including: a simplified user permissions system based on 2 groups; a brand-new feature to exclude specific programs from scanning and protection; an extended Forensic Log to better reproduce malware-related events on your machine; an auto-resolve mode for the behavior blocker to reduce user-dependencies; email notifications. Merging Emsisoft Internet Security with Emsisoft Anti-Malware But perhaps the biggest change in terms of our product development has been the merging of Emsisoft Internet Security with Emsisoft Anti-Malware in October this year. What may have seemed like a sudden decision was the result of a careful evaluation of our core competencies, the realities of a changing malware landscape and the preparation for things to come. To ensure customers dependent on a firewall would receive a comparable level of protection, we released a Fortification feature for the Windows Firewall to ensure that malware will not be able to tamper with it. Business-grade security that just works As we’ve touched on earlier, this year in particular exposed just how devastating ransomware attacks can be for companies both large and small if they do not have reliable endpoint protection in place. We always believed that sophisticated, enterprise-level endpoint protection does not need to be complex, and we have continued to refine the experience of our business customers, whether that’s enhanced Emsisoft Enterprise Console connection features or new MSI setup files for time-efficient group policy deployment in larger Windows networks. Our efforts did not go unnoticed either, as independent test lab AV-Comparatives praised our business solution for its ease of use, clean design and fast deployment capabilities in this year’s Business Security Report 2017. Combined with a stellar malware protection rate powered by Emsisoft Anti-Malware, we walked away with the “Approved Business Product Award” for the second year running. The feedback that counts: yours While it’s great to get recognized with industry awards for our malware protection performance, it’s the messages we receive from our customers and partners that put a smile on our faces and give us the motivation to get up in the morning to fight the good fight. I wanted to take a moment of your time and let you know that there just isn’t a better anti-malware company than Emsisoft. Your dedication to the world of online protection is the best in the business. I have 100% confidence in Emsisoft to keep me safe on line no matter what. It’s just something I never have to think about. Joel Gardner, Switzerland Emsisoft is about security. Looks good, works good, is light and what is most important, Emsisoft is about trust. My is over 8 years as paid customer, without any single security PC problem. Franky via Twitter Another gold star for Emsisoft! I’ve been with you since a-squared, and it’s always been prompt, professional and excellent service all the way, not to mention the superb software solutions. These days, companies that care are unfortunately few and far between. Douglas Sharp, Germany I own a brick and mortar retail computer repair shop. We have sold hundreds if not thousands of copies of Emsisoft through our retail business. I have to say Emsisoft works so well that I feel like it may be hurting our repair business. Our customers like it and that’s what matters. David Gentry, Lantean Systems LLC, USA What lies ahead in 2018? Ransomware once again dominated the year, and we are expecting this trend to continue into 2018. Wannacry and Petya attacks made sure that even the most technophobic among us have at least a basic level of awareness. But they also laid bare the ample opportunities for cyber crime as too many business still don’t have credible security strategies in place. We covered the emergence and increasing sophistication of Ransomware-as-a-Service (RaaS) business models, allowing anyone with malicious intentions to execute their own ransomware attack and share the ill-gotten gains with the RaaS creators. Given the ease of using these services and the proliferation of cryptocurrencies, we at Emsisoft expect the ransomware campaigns to continue unabated into the new year. The other trend to keep an eye on is also connected to the rise of digital currencies: Cryptomining. Online criminals and even some „legitimate“ websites are experimenting with the use of crypto-miners to extract revenue from users. Whether it will evolve into a legitimate alternative to the established ad model or remain mostly a tactic by malware authors remains to be seen. Whatever the outcome, as long as cryptocurrencies continue to rise, we expect to come across increasingly sophisticated variants. But what will Emsisoft look like in 2018? We plan to continue our efforts to declutter Emsisoft Anti-Malware to make it the easiest to use protection software on the market. Our Malware Lab is working relentlessly on a new malware detection and protection system that is going to raise the bar in the industry. In addition, our product development teams have started working on a major project a couple of months ago that is expected to be launched no earlier than mid 2018. We can’t wait to share more details as we get closer to the actual release and to hear what you think. But until then, you can count on Emsisoft to protect you from all the current and future threats that may lurk out there. Malware never sleeps, and nor do we. Have a brilliant, malware-free 2018! View the full article
  22. 2 points
    Just for fun (and reference) I took a screenshot of the visitor stats from my own private server. The screenshot is censored so it doesn't show IP addresses, the names of files visitors accessed, or what websites they were referred from. Here's a link if anyone wants to see it: https://www.gt500.org/images/http_stats.png This is just general statistics compiled from server logs, and you can actually get a little more information than what you see there from those logs. I guess what I'm trying to say is simply that if website owners really want to track you, they don't don't need Google or other analytics services to do it. Especially since there's no way to prevent the server from logging all of this data (since the servers do that automatically and have access to all of that data when your web browser loads anything from the server). If this is something you're concerned about then TOR, VPN's, and Virtual Machines are going to do you much more good than worrying about what "trackers" are being used by any individual webpage. TOR and VPN's help keep your IP address private and make it very difficult to determine where you actually are, and of course Virtual Machine's give a generic system for you to browse on and you can restore to a snapshot to reset everything to the condition it was in before you started browsing. Some things may be unique to your Virtual Machine, such as the combination of your CPU and the amount of RAM and disk space, so in theory it would still be possible to "fingerprint" it, however does it really matter if a website "fingerprints" a Virtual Machine (especially when they can't determine the geographical location)? Also note that "browser fingerprinting" isn't something that I tend to worry much about. It's unfortunate that it's possible, but it's also benign in the vast majority of cases, and the lengths you have to go to in order to prevent it are... well... more that I would be willing to do for something that isn't going to effect me enough for me to care. uBlock Origin blocks most advertising and tracking stuff, so the amount of money that advertisers can make by "fingerprinting" my browser and targeting me is minimal, and if the NSA wants to monitor me then I expect the only way to truly prevent that is to live in a lead box and never connect to the Internet again.
  23. 2 points
    Ich kann EMSI-Soft nur bestärken bei dem bloatfreien Konzept zu bleiben. Jeder der Ahnung von der Materie hat, weiß dass diese extra Features Mist sind und nur die Angriffsfläche erhöhen. Siehe diverse Project Zero (google) Security-Bugs bei AV-Herstellern.... EMSISOFT scheinen der einzigen AV Hersteller mit Verstand zu sein, dem man sogar in diesem sensiblen Bereich die Achtung der Privatsphäre abnimmt. Das wissen genug Leute zu schätzen!
  24. 2 points
    Arbeite doch einfach selbst Deine Profilneurose auf, oder suche Dir professionelle Hilfe. Ich bin ziemlich sicher, daß das Sammeln von likes und dislikes Dir nicht wirklich weiterhelfen wird...
  25. 2 points
    From (very) humble beginnings in a Windows XP Service Pack update, the Windows Firewall has evolved into a capable security tool. Today, its performance is on par with – if not better than – any modern third-party desktop firewall on the market. In light of this, and after a lot of careful consideration, the Emsisoft team made a very conscious decision to rely on the Windows Firewall moving forward, which ultimately led to us merging Emsisoft Internet Security with Emsisoft Anti-Malware. This will allow us to concentrate our efforts on building a bulletproof product while using our Behavior Blocker technology to further strengthen the already rock-solid Windows Firewall. To put it simply, using Windows Firewall in conjunction with Emsisoft Anti-Malware will provide better protection for our users, and that is our number one objective above all else. Since our announcement of the Emsisoft Internet Security and Emsisoft Anti-Malware merger, we have received a lot of positive feedback. However, we also got a lot of questions. We want to take the time to answer the most frequently asked questions in a bit more detail: So are you going to remove the firewall completely? The answer to that question is not as simple as it may seem at first. Firewalls are usually divided into two parts: A so-called packet filter, which usually deals with incoming packets and is therefore often called an inbound firewall; and an application filter that deals with applications wanting to access the network or internet, which is why it is often also referred to as an outbound firewall. Emsisoft Anti-Malware has always had an application filter as part of its Behavior Blocker and that will continue to be true. The difference between the outbound firewall in Emsisoft Anti-Malware and Emsisoft Internet Security is that the former makes decisions autonomously, while the later, at least in theory, allowed you to also use your manual rules. In practice, the default for Emsisoft Internet Security was to automatically allow all outbound connections and the majority of all our users never changed it. Why did you make the change? Was Emsisoft Internet Security less secure than the Windows Firewall? No. All firewalls on modern versions of Windows are based on the same technologies provided by Microsoft. In addition, inbound firewalls in particular are incredibly straightforward to implement, as they only block or allow access based on simple rules. That is why there is absolutely no difference in protection provided between any of the inbound firewalls on the market, including the Windows Firewall. However, the Windows Firewall does have some benefits: Support for Windows Networking like Home Groups is a lot better in the Windows Firewall out of the box. There is no need to tweak any rules manually as was often the case for Emsisoft Internet Security. It is easier to use. This is mostly because third-party applications will take care of creating all necessary firewall rules for you. That is not an option that Emsisoft Internet Security could provide, as most software vendors don’t care about third-party firewalls. The Windows Firewall also provides much better compatibility. Third-party software vendors usually test their products with the Windows Firewall as it is part of Windows, but almost never test their product’s compatibility with aftermarket firewall products. Last but not least, the Windows Firewall also provides a lot more configuration possibilities to expert users and allows for much more complex rulesets than the inbound firewall offered as part of Emsisoft Internet Security. But there are also a couple of disadvantages, which is where Emsisoft Anti-Malware 2017.8 comes in: Intelligent outbound firewall: The outbound firewall part of the Windows Firewall will by default allow every application to connect. This behaviour is actually identical with Emsisoft Internet Security, which also allowed any application to connect to the network or the internet unhindered by default. While both products can be manually configured to block programs from accessing the internet, most users don’t want to deal with this responsibility. This is where the intelligent outbound firewall that is part of our Behavior Blocker comes in, which will prevent malicious applications from communicating with the internet automatically while not getting in the way of benign applications. Enhanced malware protection: The Windows Firewall on its own does not provide any protection against more sophisticated attempts to bypass its outbound firewall through advanced techniques like code injection. Code injection essentially allows malware to take over a trusted program in order for its internet communication to pass through the firewall unhindered. Again, the Behavior Blocker in Emsisoft Anti-Malware is incredibly good at detecting and preventing these kinds of attacks. Windows Firewall Fortification: The functions Windows Firewall provides to software vendors to automatically create rules for their applications in the Windows Firewall for ease of use are also pretty much unprotected. That means that malware can and does create rules for itself automatically. In version 2017.8, we extended our Behavior Blocker technology to protect the exposed Windows Firewall functions from malicious usage. This gives you control over which of your applications are allowed to create Windows Firewall rules for you and which aren’t. This is what we refer to as “Windows Firewall Fortification”. To sum things up, for inbound filtering, the Windows Firewall is just as solid a choice as any other firewall product on the market, including Emsisoft Internet Security. It provides better compatibility and is easier to use for the majority of users. Its drawbacks mostly revolve around its outbound filtering capabilities, which are perfectly complemented by the enhanced Behavior Blocker that is part of Emsisoft Anti-Malware 2017.8 and later. Where can I find the new Windows Firewall Fortification options? The new options are part of the Emsisoft Anti-Malware Behavior Blocker. As such, you can find them under Protection/Application Rules: In addition, whenever the Behavior Blocker sees any application it doesn’t know to be trustworthy attempting to create new firewall rules or change the firewall status, it will attempt to auto-resolve the situation by blocking the attempt: If you have auto-resolve disabled, it will simply ask. Where can I find the “advanced configuration possibilities” you talk about? My Windows Firewall only has a couple of options! The default dialog to configure the Windows Firewall can be incredibly deceptive at first. The advanced configuration dialog is stashed away behind an innocuous looking link in the normal Windows Firewall configuration dialog: Windows Firewall dialog with link to Advanced settings Clicking that link will expose the real configuration of the Windows Firewall where you have full access to all the rules it adheres by. That looks awfully complicated. Are there easier methods? There exist a slew of additional applications that sit on top of the Windows Firewall and attempt to enhance it by making rule creation and management easier. Some of the most popular are: TinyWall (Free) – http://tinywall.pados.hu/ Windows Firewall Control (Freemium) – https://www.binisoft.org/wfc.php Glasswire (Paid) – https://www.glasswire.com/ That being said, we think that the majority of users probably won’t find these tools to be necessary. That is also why we decided against creating our own Windows Firewall front-end and focus our development efforts on improving the complementary and enhanced technology in our Behavior Blocker instead. So what do you recommend I should do? We strongly believe that the combination of Emsisoft Anti-Malware and the Windows Firewall is the best option for almost every user. For the past 12 years while developing our product, we used this exact combination in all of our internal performance evaluations of our technology. Our malware research team works hard to make sure that even the most advanced threats are blocked immediately across all our products. So yes, Emsisoft Anti-Malware blocks the same malware that Emsisoft Internet Security blocks out of the box – no configuration, paying extra or jumping through hoops needed. If you do feel the need to make sure that certain legitimate applications can’t access the internet, the Windows Firewall does offer the ability to do so via its Advanced Settings. If you find that method to be too inconvenient, going with one of the many front-ends may be an option for you. We do know that a small minority of Emsisoft Internet Security users believe that the Windows Firewall must have backdoors implemented by Microsoft to allow them to spy on their users. In all our research, we haven’t found one and neither have hundreds of other security professionals that constantly review Windows for possible backdoors and vulnerabilities. We also think it is important to keep in mind that every single firewall product for Windows Vista and later uses the very same frameworks to implement packet and application filtering. There is no difference between the Windows Firewall, Emsisoft Internet Security and any other third party firewall from a technical point of view. If Microsoft were to backdoor their products to allow unhindered communication, this backdoor would probably be part of the Windows Filter Platform or the NDIS Lightweight Filter Framework, which are the underlying technologies all firewall products are built upon, and affect every firewall product equally. If you still prefer to use a firewall product other than the Windows Firewall, we recommend you contact the software company creating your new firewall product of choice beforehand to ask them whether they implement their own firewall or rely on the Windows Firewall as well. Most firewalls and internet security suites dropped their own implementation in favour of the Windows Firewall many years ago. So we suggest you ask them first to make sure you don’t end up with a Windows Firewall front-end instead. Do you have more questions? Post them in the comments and we’ll answer them. Have an excellent (malware-free) day! View the full article
  26. 2 points
    Ah, I see everyone already saw the stable build. You're welcome.
  27. 2 points
    Hello, When it comes to surfing: keep it simple, a browser is only as safe as it's user. I'd advice against using any browser "security" that intercepts https traffic, for an explanation see here: http://blog.emsisoft.com/2017/02/09/https-interception-what-emsisoft-customers-need-to-know/ Choose the browser that suits you best en practice safe surfing (use an adblocker, use a password manager as alternative to using easy to guess or identical passwords), don't visit shady sites and if you're not sure about a site, scan the URL on http://www.virustotal.com Personally I use Google Chrome with uBlock origin, Lastpass, and a few small add-ons that help facilitate certain routine tasks. never had any browser-related security issues.
  28. 2 points
    The secure connection (HTTPS vs HTTP) has nothing to do with whether or not the website is secure. It has to do with whether or not your connection to the website is secure, which is intended to prevent snooping on communication between you and the server more than it is anything else. Man-in-the-middle attacks can still expose the contents of secure connections, but if a website is configured correctly then it is extremely difficult to do that. A hacker can compromise a website and replace legitimate downloads with infected copies, and this has happened before (ClassicShell and AmmyAdmin are a couple of examples). With popular software (7-Zip for instance) there shouldn't be a BB alert, since it would be trusted by our Anti-Malware Network. With less popular software, it does become more problematic, however a user can search for the SHA-1 hash provided in the alert and try to find information about the file in question.
  29. 2 points
    That would help in this particular instance (alerts during an uninstall), however every rule that exists can decrease performance, so rules are generally not kept if they are not needed.
  30. 2 points
    hi, as you know Online Armor and the latest Emsisoft Internet security v9 can't be installed when Virtual box is present (it will generates a BSOD) ; so there is the procedure to to have them both. If Virtual Box is not installed yet (and was never installed) 1- Install OA/ EIS 2- install Vbox If Virtual Box was installed before but removed 2- open "Regedit" (via Run) 3- check this registry key : HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\VBoxNetFlt 4- if it's still present, delete it 5- reboot (not necessary, but better if done) 6- install OA/EIS 7- install Vbox If Virtual Box is already installed 1- uninstall Vbox 2- open "Regedit" (via Run) 3- check this registry key : HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\VBoxNetFlt 4- if it's still present, delete it 5- reboot (not necessary, but better if done) 6- install OA/EIS 7- install Vbox hope this will help you note: i did this procedure since ages so it really works ^^
  31. 2 points
    Yes, this is normal. It's possible that there may be something we can do to prevent the extra notification, so I'll talk to our QA team and see what they think about this.
  32. 2 points
    We have made a workaround for the above mentioned incompatibility. If you are experiencing the above behavior, please try the following build (no need to uninstall first). HitmanPro.Alert 3.1.7 Build 357 PreRelease Changelog Fixed incompatibility with Emsisoft Internet Security 11.0.0.6131Download http://test.hitmanpro.com/hmpalert3b357.exe Please let me know if this update fixes the incompatibility.
  33. 2 points
    just click the 'more reply options' button and attach any file to your post.
  34. 2 points
    Hallo Thomas, vielen Dank für die ganzen Informationen, ich bin begeistert von der Reaktion des Supportteams hier im Forum, bei Avast hat es Tage gedauert und die ganzen Moderatoren haben sich schon nicht mehr ins Forum getraut grade bei dem Thema Win 10 Update erst 6 Monate nach Veröffentlichung von Win 10 ..... und das für zahlende Kunde... der Witz daran die Consumer Version ist von Anfang an win 10 kompatibel ... Egal das Thema ist Geschichte aber es ärgert mich immer noch ;-) Es freut mich auch schon direkt ein Key im Postfach zu haben ich mach mich an die Arbeit zu testen, der Großteil aller Fragen ist schon von dir beantwortet worden eine Wichtige wär für mich noch das Thema Rückmeldung der Updates und Notebooks extern. 6) Wie bekommen Notebook Clients Updates die nur selten im Netzwerk sind vielleicht 2-10 mal im Jahr ? Wie kommen die Informationen von den Clients zurück in die Console wird eine VPN Verbindung benötigt ? Gibt es dazu ein Best practice? Ich hoffe ihr geht immer mehr in die Richtung Business Lösung mit einer sehr guten Console und guten Support könnt ihr da ganz viele Kunden generieren mache da gerne Werbung für wenn ich mit eurem Produkt zufrieden bin. Fangt bitte nur nicht an die alle anderen AV Hersteller alles in die Cloud zu packen das sehe ich bei dem Thema AV sehr kritisch wenn dann jmd. mal an den Account kommt. Klar ne art proxy für Rückmeldung andere Clients ist ja ok aber die komplette Kontrolle der Console sollte immer im geschützten Netzwerk bleiben! Irgendwie freu mich mich jetzt aufs testen Gruß Zwergenmeister
  35. 2 points
    I would only recommend one Sandboxing program, Sandboxie. I have used it for years, and it works fine with Emsisoft products. When you install it, Sandboxie will detect the presence of Emsisoft products and ask you if you want to enable compatibility settings. You would want to do this. Any questions, feel free to ask. Pete
  36. 2 points
    I know, that is why I only counted signature updates. Whenever you see an exact signature count in the change log above, one of our signatures was updated. Sorry, what you ask is impossible. It should be obvious to anyone, that if you have a scan engine that already detects 95% of all malware out there, that the other engine can't suddenly detect more than that without causing gross redundancy. In general we can choose to waste hundreds of megabytes of RAM on hundreds of thousands of systems to keep duplicate signatures around so you feel validated in your purchase, or we can choose not to do that, not to waste everyone's resources. To be honest, that's not even a choice really.
  37. 2 points
    Dear nine9s, Thank you for contacting our support. If you change hardware when your license key is still active our system will make no troubles if you simply install Emsisoft Anti-Malware on the new computer and activate it with your existing license key. If the old system should still be in use at this point you would need to remove Emsisoft Anti-Malware from the old computer before you use your existing license key to unlock the full version on the new system, otherwise no additional actions would be necessary. Thank you for using our software solutions! Should you have any further questions, please just let us know.
  38. 2 points
  39. 2 points
    A summary of the improvements in version 11 can be found in our blog as usual: http://blog.emsisoft.com/2015/10/24/a-sneak-peek-on-emsisofts-version-11-series/ Keep in mind that it is currently only available via the Beta updates option.
  40. 2 points
    Good morning. Can we expect to get a fix for the updates not working soon, please? Having to disable the firewall to get updates seems an important bug to me. Thanks in advance and best regards, François
  41. 2 points
    Hallo, Ja das ist kein Problem. Vermieden werden sollte lediglich zwei Desktopfirewalls parallel zu installieren. Zum Beispiel Emsisoft Internet Security und Bitdefender Internet Security gleichzeitig zu installieren. Sollten weitere Fragen bestehen kontaktieren Sie uns bitte erneut.
  42. 2 points
    I don't have any insight in the test-methodology apart from what the article states, but a few observations make me doubt the relevancy of this test: The test compares a number of different products: antirootkit scanners and anti-malware scanners. This makes no sense to me. TDSSkiller is an excellent Antirootkit scanner in my opinion, but it is a limited tool, you cannot compare this with a anti-malware scanner like EEK or MBAM because its simply a different product. The tested malware is for the most part very, very old and not seen in the wild anymore, even though the article states 2015 and "in the wild" in the title. To give a few examples: Alureon/TDL3/4 hasn't been around "in the wild" for at least 3 years (and thats estimating it very loosely) The article listed is from 2010 (!) http://contagiodump.blogspot.gr/2011/02/tdss-tdl-4-alureon-32-bit-and-64-bit.html?m=1 The same goes for ZeroAccess/Max++. The latest usermode version of that rootkit was active in 2013 and after the botnet was taken down for a large part, there has been no re-emergence of this malware. However, its kernelmode version was quite a bit older, this was last seen in 2011. Sure, its interesting to see how products perform against such rootkits, but how useful is it? Those rootkits were "retired" for a very good reason, they can no longer infected today's OS versions. Finally, I'm not one to make accusations, but I don't like "sponsored by..." tests. I'm fully willing to believe that Zemana was indeed the best product to remove all these infections, but I just think its not the best strategy for any testing lab to let a sponsor also participate in the tests, just to avoid any possible doubt as to the objectiveness of the test results.
  43. 2 points
    I personally don't care which company within the Emsisoft program detects a pup. I just want it detected.
  44. 2 points
    We have offered it to some of our business contacts and we definitely wouldn't charge too much. But it's not only about compiling a set of code files. The product requires some online backend infrastructure that can't be developed within a few days. A good part of its power relies on the server side databases and algorithms that require ongoing maintenance and improvements. To be future proof, the product also requires some code changes. Just to name a few: IPv6, full unicode support, Windows 8 driver model changes, etc. These all are doable but not trivial I'm afraid. Only a very small number of software developers have the required skills to code firewall drivers that don't crash all day long. Based on our experience firewall development is one of the most challenging areas of software development you can think about. Windows API documentation is generally poor and you have to expect to find bugs in Windows that Microsoft doesn't even know about (had a few cases in the last year).
  45. 2 points
    The Shariff solution looks very elegant and I'm watching the project for quite some time. They released a new version a few months ago https://github.com/heiseonline/shariff It doesn't 100% meet our requirements but we may adapt some things from it and replace our current social media buttons. It's already in the works.
  46. 2 points
    As long as you restart the guard process after it crashed, it shouldn't make a difference.
  47. 2 points
    Supi, AdwCleaner bitte öffnen und Deinstallieren drücken. FRST samt Logfiles, sowie den Ordner C:\FRST, einfach löschen.
  48. 2 points
    If a license key for Emsisoft Anti-Malware is remapped more than 5 times in a day, then our system will lock out any further remaps for 24 hours. If you contact support, we can clear the mapping history manually if needed. In your case, this shouldn't end up being an issue.
  49. 2 points
    Nee, alles in Ordnung Downloade dir bitte Combofix vom folgenden Downloadspiegel Link 1 WICHTIG - Speichere Combofix auf deinem Desktop Deaktiviere bitte all deine Anti Viren sowie Anti Malware/Spyware Scanner. Diese können Combofix bei der Arbeit stören.Starte die Combofix.exe und folge den Anweisungen auf dem Bildschirm. Wenn Combofix fertig ist, wird es eine Logfile erstellen. Bitte poste die C:\Combofix.txt in deiner nächsten Antwort. Hinweis: Solltest du nach dem Neustart folgende Fehlermeldung erhalten starte den Rechner einfach neu. Dies sollte das Problem beheben.
  50. 2 points
    Hello, please take a look in the Registryeditor for the key HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\VBoxNetFlt and remove it. If you have any more questions or problems, just let me know.
  • Newsletter

    Want to keep up to date with all our latest news and information?
    Sign Up