Leaderboard

  1. GT500

    GT500

    Emsisoft Employee


    • Points

      497

    • Content Count

      9443


  2. Fabian Wosar

    Fabian Wosar

    Emsisoft Employee


    • Points

      249

    • Content Count

      4403


  3. Elise

    Elise

    Emsisoft Employee


    • Points

      224

    • Content Count

      8117


  4. Kevin Zoll

    Kevin Zoll

    Emsisoft Employee


    • Points

      210

    • Content Count

      18416



Popular Content

Showing content with the highest reputation since 03/12/13 in all areas

  1. 7 points
    Official word is, "yes". We will give free license extensions to anyone who upgraded to Windows 10 and was unable to use the firewall. Once the issue has been resolved, please either submit a support ticket in our helpdesk system, or send a Private Message on the forums to me (English Support) or Thomas Ott (English/German Sales). Be sure to mention that you would like to have your license extended due to the Windows 10 issues and include in your message any license keys that were in use on a computer with Windows 10. Feel free to link to this forum post if you would like to.
  2. 6 points
    As announced earlier, we are changing our firewall strategy and will soon merge Emsisoft Internet Security with Emsisoft Anti-Malware, effective as of our next release in October. Instead of developing our own firewall module, we’re going to rely on the built-in Windows Firewall core that has proven to be powerful and reliable. Its only weak point is the fact that anyone can freely change the firewall configuration. In other words, if malware manages to run on the PC with sufficient administrator permissions, it’s able to allow itself to get through the firewall. To resolve this vulnerability, we’ve developed a new Firewall Fortification feature for Emsisoft Anti-Malware’s Behavior Blocker as part of our 2017.8 release. Firewall Fortification detects and intercepts malicious actions from non-trustworthy programs in real time before they can cause any damage. Behavior Blocker alert: Firewall manipulation All 2017.8 improvements in a nutshell Emsisoft Anti-Malware New: Firewall Fortification feature that blocks illegitimate manipulations of Windows Firewall rules. Improved: Forensics logging. Fixed: Rare program freezes on opening the forensics log, confirming of surf protection notifications and during malware detection. Fixed: Computer restart instead of computer shutdown executed, when set for a silent scan. Several minor tweaks and fixes. Emsisoft Enterprise Console Improved certificate handling to avoid connectivity issues. Several minor user interface improvements. Several minor tweaks and fixes. How to obtain the new version As always, so long as you have auto-updates enabled in the software, you will receive the latest version automatically during your regularly scheduled updates, which are hourly by default. New users please download the full installer from our product pages. Note to Enterprise users: If you have chosen to receive “Delayed” updates in the Update settings for your clients, they will receive the new software version no earlier than 30 days after the regular “Stable” availability. This gives you time to perform internal compatibility tests before a new version gets rolled out to your clients automatically. Have a great, well-protected day! View the full article
  3. 4 points
    Guten Tag, Wir haben mittlerweile mehrfach etabliert, dass Emsisoft nicht das Programm Ihrer Wahl ist. Sie haben sich bereits anderweitig ein Antivirus gesucht, dass auch noch dreißig weitere Funktionalitäten mitabdeckt. Fakt ist jedoch, dass viele Leute eben auch ein Antivirenprogramm suchen, dass nicht noch fünfzig Extras mitbringt, die man nicht will oder nicht braucht. Für diese Leute gibt es eben Emsisoft Anti-Malware und die meisten unserer Kunden sind mit der Tatsache, dass es eben 'nur' ein Rundumschutz für den Rechner ist und nicht mehr, zufrieden. Für all die angesprochenen Features - Passwortgenerator, Kinderschutz, etc - gibt es bereits gute Programme, die man sich bei Bedarf installieren kann. Viele Leute haben aber entweder keine Kinder oder wollen diesen den Zugang nicht beschränken, warum sollten wir diesen Leuten einen Kinderschutz mitinstallieren. Einige haben eben auch nicht RAM oder CPU im Überfluß, für diese Leute ist es noch ärgerlichr wenn das RAM durch ein AV belegt ist, dass aufgrund von ungenutzten Features die Ressourcen auffrisst. Fazit: Es gibt viele Antivirenprogramme, die die eierlegende Vollmilchsau sein wollen und versuchen alle Programme in einem zu vereinen. Es gibt User, die diesen Ansatz nicht mögen und nur ein Antivirenprogramm wollen. Nicht mehr. Für diese Leute gibt es, zum Beispiel Emsisoft Anti-Malware. Sie gehören nicht zu dieser Gruppe und das ist ok. Mit freundlichen Grüßen Kathrin
  4. 4 points
    Which for everything related to our core technologies (engine, behavior blocker, cleaning engine) would be me. Hi, nice to meet you! Next time someone looks strange at me for talking to myself I can now point them to this post and tell them you asked me to talk to me . Your argument is that we chose Bitdefender because it is "the best". Both Kaspersky as well as Avira consistently score higher in pure on-demand tests than Bitdefender does. If you consider PUP detection ESET is a superior contender as well. We considered all of them at one point or another but they were discarded for various reasons. The article is based on the submission we got through the "Submit information about detected Malware" option in all our products, which reports back meta data (infection names, number of infected objects) about all infections found by our products.
  5. 4 points
    Actually, there is a system behind it: My workstation computers are named after noble gases, like Krypton or Helium. Computers that I only use temporarily or belong to guests are named after transition metals like Titanium. Non-computer devices like smartphones are named after non-metals like Oxygen. All systems and VMs that are used for malware testing are named after radioactive elements like Uranium. Needless to say my WLAN and local workgroup is called "Periodic Table". And yes, I spent a significant amount of time coming up with that system and I am proud of it .
  6. 3 points
    It means that the tests done by AV-C and AV-T have a clear image of how they think AV software should work. The problem arises when your product doesn't fit the mould. Then you get penalized for not doing what everyone else does, even though what everyone else does may not be in the best interest of the user, to begin with. Best example: Snooping around in your encrypted connections, which literally every AV vendor screwed up at least once in the past and probably will continue to happen, exposing users to potentially greater risks than most malware does. For starters, the test sets aren't nearly as representative anymore. When we participated in AV-T and AV-C both tested with less than 200 samples a month on average. 200 samples out of literally tens of millions. The exact selection isn't clear and not representative of what users deal with either. None of them tests with PUPs for example, even though a simple look at any tech support community will tell you, that it is probably by far the biggest problem users are dealing with. So no, neither of those test scores represents real-life performance and it becomes blatantly obvious when you go to places like Bleeping Computer, GeeksToGo, Trojaner Board, Malekal, and all those other communities where people infected by malware show up for help and look at what products these victims used at the time they became infected. Then you will notice that a lot of these products with perfect scores don't look nearly as perfect in real-life conditions. The reason for this discrepancy is quite simple: Most AV vendors will specifically optimise their products for these tests. The most severe cases are where vendors end up outright cheating and detecting the test environments which then results in a change of behaviour of the product (think Dieselgate, but with anti-virus). But there are many ways you can game these tests. For example: you can try to figure out the threat intel feeds the companies use, then just buy those same threat intel feeds so you have all samples in advance you can track their licenses and supply different signatures to them or use your cloud to treat those test systems differently some particularly shady organisations literally also sell you their sample and malicious URL feed, so you can just outright buy the samples and URLs your product will get tested on later What you end up with as a result is a product that is optimised really really well for the exact scenario they are being tested under using the exact type of URLs and samples these testers use, but that is utterly useless when it comes to anything else. We just really don't want to create this type of product. So when we were asked whether we wanted to continue to participate this year, we discussed the matter internally, looked at what we get out of these tests (meaning: whether these tests have a discernable impact on our revenue) and decided that they are simply not worth it and that the tens of thousands of Euros we spent on them every year would be better spent on extending our team and building new ways of keeping our customers safe.
  7. 3 points
    Please note that Emsisoft Anti-Malware for Windows XP hasn't been updated (as in program updates) in over 2 years, and we never intended on continuing long-term database update support for it. In fact, we discontinued our own database updates for it over a year and a half ago, and those still running Emsisoft Anti-Malware on Windows XP have only been receiving BitDefender database updates. We've decided that it is time to stop redistributing those BitDefender updates for Windows XP, as all they are doing is giving those on Windows XP a false sense of security. In addition, it is extremely dangerous to continue using Windows XP. It has (for several years now) had well-known and major security vulnerabilities that Microsoft will never fix. These vulnerabilities make it trivial to infect a Windows XP system, and there is no security software in the world that is capable of preventing it. We can not, in good conscience, continue to provide any support for this version of Windows, as we announced on December 31st, 2015: https://blog.emsisoft.com/2015/12/02/why-we-believe-its-not-ethical-to-sell-antivirus-software-for-windows-xp-any-longer/ We highly recommend that you upgrade to a newer Operating System that is still supported. It doesn't matter if that's a newer version of Windows, or something free like Linux or BSD, as long as you'll be receiving security updates from whoever makes it. New vulnerabilities are discovered almost every day for every major Operating System (Windows, Linux, BSD, MacOS, Android, etc) so it is absolutely critical that you are able to receive security updates from whoever made the Operating System to help keep you and your data safe.
  8. 3 points
    Wenn alle Features eingebaut würden, die Galaxy wünscht, dann würde ich EAM sofort deinstallieren. Ich mag das Programm so wie es ist und hoffe, das bleibt auch so.
  9. 3 points
    Is this working OK now for everyone else? If it is, then there's no need for any more logs. All we needed was a traceroute to send to our CDN provider to help in identifying the server that was having the issue, and I managed to get one of those the other day.
  10. 3 points
    @achtsam Es wird eher langsam Zeit, dass Du deinen privaten Kreuzzug einstellst. Das nimmt ja wirklich paranoide Züge an.
  11. 3 points
    Hello, a2guard.exe is the visible protection process (to put it simple, the Emsisoft icon you see in the system tray). However actual protection drivers start a lot earlier. For example epp.sys (the Emsisoft Protection Platform driver) starts very early in the Windows boot process in order to ensure a protected system even when no user is logged in yet and no other programs have been started.
  12. 3 points
    For the following ransomware, we have decrypters: Actively spreading ransomware: MRCR or Merry X-Mas Globe Globe 2 Globe 3 Nemucod Philadelphia Stampado Xorist Actively spreading ransomware, but the decrypter only works for older infections: Al-Namrood NMoreira LeChiffre PClock FenixLocker GlobeImposter Inactive ransomware: 777 Apocalypse ApocalypseVM AutoLocky BadBlock CrypBoss CryptInfinite CryptoDefense DMALocker DMALocker2 Fabiansomware Harasom HydraCrypt Gomasom KeyBTC Marlboro OpenToYou OzozaLocker Radamant
  13. 3 points
    Today, we've received information that our Dutch team member Rob R. passed away yesterday afternoon, after suffering from an unexpected heart attack last Wednesday. Rob was our lead software tester and we always admired him for his special eye to track down the most tricky bugs. He joined our team more than five years ago by voluntarily sending over a brand new and complete Dutch translation of our software. Shortly after he initiated our efforts in offering physical delivery of our software on CD boxes and USB sticks. He also demonstrated a great interest in testing security software which recently led him to becoming our lead tester for Emsisoft Anti-Malware and Emsisoft Internet Security. Rob will truly live on in our memories as a valued team member and friend.
  14. 3 points
    Hardik587 You are indeed becoming most wearisome. There is an old expression among diehard Texans. "No matter how much you kick a dead horse it won't get up" This is exactly what you are doing.
  15. 3 points
    Hello, please send me your license key via PM (personal message). I will add some days to your key as a sign of goodwill.
  16. 2 points
    Hi Marshall. To add the MVPS Hosts list to uBlock Origin, perform the following steps (see images for more details): (1) Go to the following link: https://filterlists.com/ (2) Enter "130" in the page field. (3) Click the blue "Details" button on the "MVPS Hosts" line. (4) Click the blue "Subscribe" button. You're all done! The MVPS Hosts file should now be added to uBlock Origin in your browser. To check you can look at the uBlock Origin "Options" page by right-clicking the uBlock Origin icon in your browser, as per images. Hope this helps. Best Regards, Steen
  17. 2 points
    Other companies have 10 to 100 times the number of employees we do. Having one person there that fixes bugs in Windows Insider builds isn't much of an issue there. However, us doing that would mean ~30% of all development time disappears to keep a couple of hobbyists happy who use a system that is not intended for use in production systems on their production system. We do include insider builds in our QA runs, so we know if or what is broken so we can fix it in time for a release. But unless something is fundamentally broken, risking system security or stability, we won't fix bugs specific to insider builds before a release to web is close.
  18. 2 points
    You could also use a third-party DNS service that has DNS filtering and protects against DNS security issues. A popular example is OpenDNS (although there should be others as well): https://www.opendns.com/home-internet-security/
  19. 2 points
    You can see this on several programs. Service and drivers are up, but GUI hasn't caught up. It's not a problem.
  20. 2 points
    Guten Tag, Bei Schwachstellen in einer Software ist es eigentlich immer am Besten wenn der Softwarehersteller die Schwachstelle behebt. Er ist der einzige, der Zugriff auf den Quellcode hat und diesen direkt verändern kann. Selbst der Patch von Microsoft ist ein wenig eine Krücke in diesem Sinne, da er nur den Zugriff verhindert und nicht wirklich die Schwachstelle behebt. Intel hat jedoch angekündigt innerhalb einer Woche eine Patch zu veröffentlichen und spätestens bis Ende Januar für alle zur Verfügung zu stellen. Emsisoft kann hier nicht dasselbe leiste wie Microsoft oder Intel, da wir weder den Quellcode von Windows noch für die Intelprozessoren haben. Wir werden jedoch, wie immer, unsere Verhaltensanalyse und den Dateiwächter mit allen Signaturen ausrüsten um Malware die diese Schwachstelle nutzen will zu blockieren. Besser ist es jedoch so schnell wie möglich sämtliche Sicherheitsupdates zu installieren. Ein Antivirenprogramm ist keine Alternative zu Sicherheitupdates. Mit freundlichen Grüßen Kathrin
  21. 2 points
    The holiday season is not only a great opportunity to spend time with loved ones, but also to look back at the year gone by. For us at Emsisoft, we could finally take a brief moment to realize just how busy 2017 has been for the team and the wider security industry: from major ransomware outbreaks that took most (Emsisoft customers excluded) by surprise to constant product evolution to guarantee the best possible malware protection for our customers, this year has been anything but uneventful. Better surf protection: Both online and in the water Prevention is worth a pound of cure, so raising awareness of online security issues has always been close to our hearts. Back in November 2016 we started out with the world’s first surf protection research using drones and high technology drifters, teaming up with Surf Life Saving New Zealand to map currents and further understand threats and dangers that await unsuspecting surfers under the surface. The campaign results exceeded our highest expectations: not only was the project widely covered in media outlets across the country, but the insight gained formed the basis for future projects and was even presented at a conference sponsored by the World Health Organization. As our CEO Christian Mairoll put it: Whether online or in the water, Emsisoft always aims to observe dangerous environments, analyze specific threats and most importantly prevent dangerous situations that surfers suffer from everyday. Ransomware outbreaks take many by surprise Ransomware attacks are nothing new for our team, but the sheer size and speed of two major outbreaks this year caught many off guard. In May, Wannacry ransomware took advantage of the NSA shadow broker exploits to rapidly spread to hundreds of thousands of machines, including major corporations in Europe and beyond. A mere month later, Petya used the same exploits to wreak havoc across high-profile businesses in dozens of countries and exposed, despite repeated warnings from security experts, the general lack of basic protective measures, including up-to-date operating systems, regular backups and the use of reputable anti-malware software. Our customers were safe from these attacks thanks to Emsisoft Anti-Malware’s multi-layered protection. Yet it’s events like these that remind us of the need to constantly improve our technology and awareness to stay one step ahead of cybercriminals. Emsisoft evolves to stay ahead of malware Malware attacks of this nature require an immediate response. Luckily, one of our main advantages over many competitors is our ability to adapt quickly. Starting in January, we introduced a new product versioning scheme that aligns with our development month and laid the foundation to bring protection and usability features to our customers faster than ever, rather than waiting for a major release. Making great protection even better Our customers choose Emsisoft first and foremost for one reason: to be protected from all types of malware threats. It’s a job we take seriously, which is why we have launched a number of improvements throughout 2017. Our personal highlights: We made our Behavior Blocker even more capable, detecting malware and ransomware threats that try to disable antivirus software. We promoted our existing ransomware protection into a dedicated “Anti-Ransomware” layer. We added Double Pulsar exploit mitigation in response to the increase in ransomware outbreaks. This doesn’t include the countless under-the-hood changes to the Surf Guard to detect even more phishing scams and the performance improvements we have launched month after month to ensure your protection does not get in the way of your day. Keeping things simple Simplicity is one of our core values here at Emsisoft, and the product team made it a clear focus to deliver against it in 2017. We looked at all aspects of our software and listened to a lot of customer feedback to learn how we can make things better, faster, and simpler. The result was a raft of new and improved features that we released over the last 12 months, including: a simplified user permissions system based on 2 groups; a brand-new feature to exclude specific programs from scanning and protection; an extended Forensic Log to better reproduce malware-related events on your machine; an auto-resolve mode for the behavior blocker to reduce user-dependencies; email notifications. Merging Emsisoft Internet Security with Emsisoft Anti-Malware But perhaps the biggest change in terms of our product development has been the merging of Emsisoft Internet Security with Emsisoft Anti-Malware in October this year. What may have seemed like a sudden decision was the result of a careful evaluation of our core competencies, the realities of a changing malware landscape and the preparation for things to come. To ensure customers dependent on a firewall would receive a comparable level of protection, we released a Fortification feature for the Windows Firewall to ensure that malware will not be able to tamper with it. Business-grade security that just works As we’ve touched on earlier, this year in particular exposed just how devastating ransomware attacks can be for companies both large and small if they do not have reliable endpoint protection in place. We always believed that sophisticated, enterprise-level endpoint protection does not need to be complex, and we have continued to refine the experience of our business customers, whether that’s enhanced Emsisoft Enterprise Console connection features or new MSI setup files for time-efficient group policy deployment in larger Windows networks. Our efforts did not go unnoticed either, as independent test lab AV-Comparatives praised our business solution for its ease of use, clean design and fast deployment capabilities in this year’s Business Security Report 2017. Combined with a stellar malware protection rate powered by Emsisoft Anti-Malware, we walked away with the “Approved Business Product Award” for the second year running. The feedback that counts: yours While it’s great to get recognized with industry awards for our malware protection performance, it’s the messages we receive from our customers and partners that put a smile on our faces and give us the motivation to get up in the morning to fight the good fight. I wanted to take a moment of your time and let you know that there just isn’t a better anti-malware company than Emsisoft. Your dedication to the world of online protection is the best in the business. I have 100% confidence in Emsisoft to keep me safe on line no matter what. It’s just something I never have to think about. Joel Gardner, Switzerland Emsisoft is about security. Looks good, works good, is light and what is most important, Emsisoft is about trust. My is over 8 years as paid customer, without any single security PC problem. Franky via Twitter Another gold star for Emsisoft! I’ve been with you since a-squared, and it’s always been prompt, professional and excellent service all the way, not to mention the superb software solutions. These days, companies that care are unfortunately few and far between. Douglas Sharp, Germany I own a brick and mortar retail computer repair shop. We have sold hundreds if not thousands of copies of Emsisoft through our retail business. I have to say Emsisoft works so well that I feel like it may be hurting our repair business. Our customers like it and that’s what matters. David Gentry, Lantean Systems LLC, USA What lies ahead in 2018? Ransomware once again dominated the year, and we are expecting this trend to continue into 2018. Wannacry and Petya attacks made sure that even the most technophobic among us have at least a basic level of awareness. But they also laid bare the ample opportunities for cyber crime as too many business still don’t have credible security strategies in place. We covered the emergence and increasing sophistication of Ransomware-as-a-Service (RaaS) business models, allowing anyone with malicious intentions to execute their own ransomware attack and share the ill-gotten gains with the RaaS creators. Given the ease of using these services and the proliferation of cryptocurrencies, we at Emsisoft expect the ransomware campaigns to continue unabated into the new year. The other trend to keep an eye on is also connected to the rise of digital currencies: Cryptomining. Online criminals and even some „legitimate“ websites are experimenting with the use of crypto-miners to extract revenue from users. Whether it will evolve into a legitimate alternative to the established ad model or remain mostly a tactic by malware authors remains to be seen. Whatever the outcome, as long as cryptocurrencies continue to rise, we expect to come across increasingly sophisticated variants. But what will Emsisoft look like in 2018? We plan to continue our efforts to declutter Emsisoft Anti-Malware to make it the easiest to use protection software on the market. Our Malware Lab is working relentlessly on a new malware detection and protection system that is going to raise the bar in the industry. In addition, our product development teams have started working on a major project a couple of months ago that is expected to be launched no earlier than mid 2018. We can’t wait to share more details as we get closer to the actual release and to hear what you think. But until then, you can count on Emsisoft to protect you from all the current and future threats that may lurk out there. Malware never sleeps, and nor do we. Have a brilliant, malware-free 2018! View the full article
  22. 2 points
    Just for fun (and reference) I took a screenshot of the visitor stats from my own private server. The screenshot is censored so it doesn't show IP addresses, the names of files visitors accessed, or what websites they were referred from. Here's a link if anyone wants to see it: https://www.gt500.org/images/http_stats.png This is just general statistics compiled from server logs, and you can actually get a little more information than what you see there from those logs. I guess what I'm trying to say is simply that if website owners really want to track you, they don't don't need Google or other analytics services to do it. Especially since there's no way to prevent the server from logging all of this data (since the servers do that automatically and have access to all of that data when your web browser loads anything from the server). If this is something you're concerned about then TOR, VPN's, and Virtual Machines are going to do you much more good than worrying about what "trackers" are being used by any individual webpage. TOR and VPN's help keep your IP address private and make it very difficult to determine where you actually are, and of course Virtual Machine's give a generic system for you to browse on and you can restore to a snapshot to reset everything to the condition it was in before you started browsing. Some things may be unique to your Virtual Machine, such as the combination of your CPU and the amount of RAM and disk space, so in theory it would still be possible to "fingerprint" it, however does it really matter if a website "fingerprints" a Virtual Machine (especially when they can't determine the geographical location)? Also note that "browser fingerprinting" isn't something that I tend to worry much about. It's unfortunate that it's possible, but it's also benign in the vast majority of cases, and the lengths you have to go to in order to prevent it are... well... more that I would be willing to do for something that isn't going to effect me enough for me to care. uBlock Origin blocks most advertising and tracking stuff, so the amount of money that advertisers can make by "fingerprinting" my browser and targeting me is minimal, and if the NSA wants to monitor me then I expect the only way to truly prevent that is to live in a lead box and never connect to the Internet again.
  23. 2 points
    Arbeite doch einfach selbst Deine Profilneurose auf, oder suche Dir professionelle Hilfe. Ich bin ziemlich sicher, daß das Sammeln von likes und dislikes Dir nicht wirklich weiterhelfen wird...
  24. 2 points
    I think you have made your point of view crystal clear for everyone, iwarren. Do we really nede more posts?
  25. 2 points
    Starting 1 October 2017, Emsisoft Internet Security will be merged with Emsisoft Anti-Malware. While this may come as a bit of a surprise, there are many factors that have prompted this decision, and I would like to use this as an opportunity to share our reasoning: A common base Technically, both products have shared the same code base and even the same file feeds for online updates for the last couple of years. From a branding perspective, Emsisoft Internet Security has kind of been framed as an extended feature set edition of Emsisoft Anti-Malware. The only difference between the two products is Emsisoft Internet Security’s built-in firewall component, which is responsible for its slightly higher price tag. While Emsisoft Internet Security was definitely a valuable product in years gone by, we believe that whatever protective advantages desktop firewalls once had over Windows Firewall are now minimal, if not negligible. The job of firewalls The main purpose of a desktop firewall is to shield your computer from attacks from the Internet. It does so by interrupting network communications initiated by foreign computers when they attempt to connect to a program that listens for input on your computer. However, there are two things to consider here: Most attack attempts from the outside are made impossible by the use of NAT routers (which includes just about every modern DSL modem), as they separate your inside network (LAN) from the Internet. The built-in Firewall in Windows 7, 8 and 10 already does a pretty good job of blocking connection attempts from potentially dangerous computers that reside in the same network (e.g. in public WiFi) or on the Internet. Malware and firewalls We see our main job as protecting your computer from malware – and today’s malware is generally quite unimpressed by firewalls. Connection attempts from the outside in are blocked by the Windows Firewall by default, and connections from the inside out are prevented by Emsisoft’s multi-layer real time protection, and the Behavior Blocker in particular. Emsisoft Firewall vs Windows Firewall When Microsoft introduced the Windows Firewall in a late Windows XP Service Pack update, it was a bit of an embarrassing performance and the software could not be taken too seriously, which led us to build a stronger alternative. But with the release of Windows 7, the Windows Firewall started to do its job much more effectively, and the latest Windows 10 version pretty much does everything you could expect from a desktop firewall. Its only architectural flaw is that its settings (and firewall rules) can be freely edited by anyone or anything that attains the required permission level. In other words, if malware manages to run on the PC, it’s able to allow itself to get through the firewall. That was one of the main reasons for us to maintain our own firewall component. A better approach: Fortifying the Windows Firewall Emsisoft Internet Security has always been highly configurable. While some of our more technically minded users might have appreciated the freedom to tweak settings to their heart’s content, it has to be said the majority of our customers are (understandably!) not familiar with the technical intricacies of firewalls and were not always confident when using the software. This was problematic given the fact that a wrong configuration can potentially cause a lot of damage when it comes to malware protection. So, in the interests of protecting our customers, we thought it would be most beneficial if, moving forward, we simply rely on the Windows Firewall and use our software to cover its blind spot and ensure its settings can’t be manipulated by malware from the inside. How are we going to do that? Well, one of Emsisoft’s key strengths is creating Behavior Blocking technology that works. It allows us to detect and intercept malicious actions from active programs in real time before they can cause any damage. This technology now allows us to define behavior patterns that indicate illegitimate manipulations of Windows Firewall rules. We make sure Windows Firewall is as safe to use as our own firewall, so we can remove the redundancy of building and maintaining our own firewall code. Therefore, we decided to end the product life-cycle of Emsisoft Internet Security and merge it with Emsisoft Anti-Malware, which receives the Windows Firewall fortifying enhancements in the version 2017.8 release. Timeline September 1st, 2017: The new Windows Firewall Fortify feature will be part of the version 2017.8 release of Emsisoft Anti-Malware. October 1st, 2017: Existing Emsisoft Internet Security software will directly update to Emsisoft Anti-Malware version 2017.9 and the remaining license period will be extended as described below. No manual actions required. Advantages for Emsisoft Internet Security customers We appreciate that the decision and swift merging will come as a surprise to our loyal customers, so apart from the additional features already mentioned that ensure capable and secure firewall protection, we are sweetening the transition for existing Emsisoft Internet Security license holders: By switching to Emsisoft Anti-Malware, your annual software license fee gets about 20% cheaper. To compensate for the already paid higher product price, we will extend all active Emsisoft Internet Security license periods by 50%. E.g. if you have 1 year left on your license, it will change to 1.5 years for free. Malware protection capabilities of Emsisoft Anti-Malware will be improved due to less interference with firewall code. Your Emsisoft protection software will get lighter on the system and there will be fewer incompatibilities with other products. Less risk of misconfiguring the protection features. We hope you think this is a fair deal and will make the transition to our flagship product as smooth as possible. Should you still be unhappy with the upcoming changes, we’re happy to do partial refunds for your remaining license period. As the cybersecurity landscape continues to evolve, we are continuing our mission towards a safer digital world for everyone. Today we have taken an important step in this journey, and we are excited to continue to improve our protection services for our customers. Have a great, malware-free day! View the full article
  26. 2 points
    It doesn't matter if it is securely transmitted or not. Your browser decrypts the HTTPS traffic when it is received, so the file would be saved in its original form, and our protection would catch it either way. HTTPS (secure connections) are only intended to keep information being exchanged over the Internet private. For instance, if you do a search on your favorite search engine, and the connection to their website uses HTTPS (and thus is secure), then when the NSA records the data that is sent from your computer to the search engine tell it what you want to search for, that data is encrypted, and thus the NSA can't actually tell what you searched for if they were to review the data they had collected (obviously they may have other ways of finding out, but at least they can't get it from the HTTPS traffic). Of course, I'm using the NSA as an example due to the various leaks revealing that they record everything that is transmitted across the Internet. The original purpose of HTTPS was to secure online purchases and other information you submit to websites from criminals snooping on data sent across the Internet. If malware is downloaded over a secure connection, then all it really does is keep anyone from snooping on your Internet traffic (or government agencies recording everything you do online) from seeing what you downloaded. That sort of thing would generally be done either with malicious extensions, or some sort of malicious program on your computer. If there is something malicious on your computer, then everything is compromised, and not just a single tab. Note that most modern browsers (except maybe Firefox) have a sandbox for each tab in the browser, which should isolate the tabs from each other. I have never saw these words before and do not know what they are . ClassicShell is a program for Windows 8, Windows 8.1, and Windows 10 that adds the classic Windows 7 Start Menu to these newer versions of Windows. AmmyAdmin is a remote access software similar to TeamViewer. There are testing organizations/companies that will test websites for security problems periodically, and some website owners will sign up for those services to ensure their websites are secure. With paid services the website owners are usually allowed to put some sort of graphic on their website that links back to the latest test results to allow visitors to verify whether or not the website is secure. If you see one of those graphics on a page, and can click on it to verify that it is valid, then the website is more than likely secure. If there is no such graphic on a website, then there will be no publicly available way to verify the website is secure, however this does not mean the website unsafe. As an example, GT500.org doesn't have a graphic/button/etc. that you can click on to see if the website has been tested, however it is tested weekly for security vulnerabilities by Beyond Security and is almost always given the highest possible score (when it isn't, any security issues are dealt with quickly).
  27. 2 points
    Browser Integration (assuming you mean browser extensions) - This sort of thing is generally used to generate revenue by hijacking your browser search settings, or tracking your browsing habits. Since we have no interest in doing such things, and a browser extension wouldn't provide any real increase in security beyond our Surf Protection, File Guard, and Behavior Blocker we don't feel that browser extensions should be bundled with our products. Pop-Up Blocker - Pretty much every modern browser already has a built-in pop-up blocker, so such a feature would just be a gimmick used to drive sales rather than something really useful for our users. Beyond that, there are already popular and safe extensions that supplement web browser pop-up protection, with included ad blocking, that do a rather good job and we tend to recommend those to our users. Password Manager - There are so many password managers these days that any attempt by us to make one would just be a gimmick to drive sales. These days you can use LastPass for free on multiple devices, and sure beats needing to get used to a new password manager when you change your anti-virus software. And if you don't like LastPass, there are others that are just as good, and even one that is open source (although I would believe it lacks an official browser extension). Encryption / Safes (assuming you mean encrypted storage) - Windows has had a built-in encryption tool called BitLocker for about 10 years, although I would believe it is restricted to only certain editions of Windows. In cases where users don't have BitLocker, or simply don't like it, there are free tools such as CipherShed and VeraCrypt (both are updated versions of TrueCrypt) that should fulfill that role reasonably well. Adding such a feature to our own software would also be nothing more than a gimmick. I know I'm starting to sound like a broken record with the word "gimmick", but trying to re-create all of these features that other people already do for free (and do rather well) is really just something anti-virus software vendors do to make their software stand out in the crowd. If they can't drive sales with superior protection, then at least they can wow potential customers in a store with a bunch of extra bullet points on the box. My biggest recommendation is uBlock Origin for your browser, and if it is also available then uBlock Origin Extras. You can also try things like Ghostery if privacy is a major concern for you. We don't generally recommend extra software with real-time protection in addition to our own, however if you feel it is necessary then we recommend no more than two softwares with real-time protection be installed at the same time. If you want on-demand scanners (Malwarebytes Anti-Malware, Hitman Pro, etc) then those should be OK. We issue license keys, similar to a "serial key". They'll be in the form AAA-BBB-CCC-123 (for reference only, that is not a valid license key). I'll have to ask one of our sales representatives about any available discounts, however you may want to take a look at this information about how to get free license time. Spyware and Adware are malicious software, and thus are classified as "malware" (as are viruses, trojans, ransomware, etc). Our software provides protection against all of these as part of its normal functionality through its File Guard and Behavior Blocker. The only thing you will see separate settings for are Potentially Unwanted Programs (PUPs), since these are not real threats we make detection of them optional. There are known compatibility issues with our software and anti-virus software from both Kaspersky and AVG. I recommend avoiding anything from those vendors that includes real-time protection. All I really know about MBAM these days is that it isn't going to detect droppers (trojans that install another infection) for Locky since they are JavaScript, and not executable files. Beyond that, I know very little about its effectiveness or functionality. I'm not familiar with software from Heimdal, so I can't say whether it would be any help with security.
  28. 2 points
    Fabian who works on the decrypters has been ill recently, but we are looking into this. Please be patient. Regards, Sarah
  29. 2 points
    Vielen Dank für die Antwort. Ein Lösegeld ist geflossen, aber die Entschlüsselung funktioniert nicht sauber. Am Ende der meisten Dateien bleiben Codereste übrig, die natürlich die Funktion des Systemes stark einschränken und die ganze Aktion ist für die Katz. Ich kann die Dateien teilweise per Hand bereinigen, aber das ist keine Lösung. Sollte eine saubere Entschlüsselung möglich sein, wäre ich sehr dankbar, da sonst alle Patientendaten einfach mal weg sind. Das wäre ein Totalschaden. Im Moment setze ich das System neu auf und versuche die Oracledatenbank wiederherzustellen und brauchbar zu machen. Wenn es von Interesse ist, kann ich die Entschlüsselungsdatei zur Verfügung stellen. Aber bei diesem Trojaner ist eine Zahlung sinnlos.
  30. 2 points
    Hi CBMan, Thank you for your suggestion. As the idea seems fair to me, I added your suggestion in our tracker. Will be discussed soon and then we will decide if discard or work on it. Thanks again, Orlando
  31. 2 points
    Zum AV-C Test: Bei dem Test gab es ein Problem mit dem Testsetup. Es ist nicht ganz klar ob entweder das automatische Testsystem von AV-C oder EAM versagt hat. Allerdings gab es 13 Samples die als nicht erkannt klassifiziert wurden. Weder AV-C noch wir konnten das Problem reproduzieren, weshalb nach einem Nachtest alle "misses" in "user decisions" umgeklariert wurden. Allerdings ist auch die Klassifizierung irrefuehrend. Das Problem ist, dass unsere Cloud die meisten Anfragen automatisch haette beantworten koennen. Allerdings wurden alle Nachtests ohne Cloud durchgefuehrt, weil wir halt schummeln und alle Dateien in der Cloud haetten Blacklisten koennen und AV-C keine Moeglichkeit hat, unsere Cloud zum Zeitpunkt des Originaltests zurueck zu drehen. Fehlalarme wurden durch Setups verursacht die Double Signed sind. EAM hatte in dem Fall Probleme die digitalen Signaturen korrekt zu erkennen. Das Problem wurde mittlerweile allerdings behoben.
  32. 2 points
    Ich kann diesen beinahe hysterischen Umgang mit dem Virenschutz ohnehin nicht nachvollziehen. Ich vertraue Emsisoft, weil es im Unterschied zu sehr vielen anderen nicht spioniert und keinen Crap mitinstalliert bzw. anbietet. Das ist fast ein - und mir persönlich sehr wichtiges - Alleinstellungsmerkmal. Außerdem arbeiten an der Software Menschen, da kann es durchaus vorkommen, daß jemand temporär mal ein Brett vorm Kopf hat, es urlaubsbedingt oder aus anderen Gründen (Todesfall) zu personeller Unterbesetzung kommt oder man kurz hinter einer Erkennungsrate herhinkt, weil da jemand bei XXX einen Geistesblitz hatte oder besonders empathisch war. In solchen Fällen wird dann schnellstmöglich "aufgeholt". Folglich kein Problem und bei jedem Hersteller so vorkommend. Außerdem soll und kann jeder Schutz ja auch nur "Spitzen kappen". In erster Linie ist bei jeder Maschine derjenige gefragt, der davor sitzt, also brain.exe. In Grunde hat dieses permanente Vergleichen der Tests mit etwas Abstand betrachtet so'n Beigeschmack von Pimmellängevergleichen - oder auch dieser Anspruch, daß Deutschland gefälligst die Goldmedaillen holen muß, das ist eine verzerrte Sicht aus der gleichen Ecke. Gelassenheit und ehrliche Fairness, daran mangelt's immer häufiger. Und das obwohl das ständige "cool" doch in aller Munde ist...
  33. 2 points
    Thanks, works great, thanks for all the feedback in this thread and for getting it sorted.
  34. 2 points
    Yes, this is normal. It's possible that there may be something we can do to prevent the extra notification, so I'll talk to our QA team and see what they think about this.
  35. 2 points
    We published our fix as a beta update a couple of minutes ago. So if you are affected by it, switching the update feed to Beta under Settings/Updates should get you the new build.
  36. 2 points
    Hallo und vielen Dank für die Anfrage bei uns im Support-Forum. Bitte vielmals um entschuldigung, bei einem Upgrade zu Emsisoft Internet Security wurde scheinbar die Rabattstufe nicht richtig auf den neuen Lizenzschlüssel übertragen. Ich habe das nun für Sie nachgeholt und eine Verlängerung mit angemessenen Kunden- und Mengen-Rabatt ist nun über unsere Verlängerungsseite möglich: http://www.emsisoft.de/de/order/renew/ Da das Lizenzende schon sehr bald eingetreten wäre habe ich die Lizenz ein wenig verlängert so dass genügend Zeit für eine Verlängerung übrig bleibt. Vielen Dank dass Sie unsere Softwarelösungen verwenden. Sollten noch weitere Fragen bestehen, so stehe ich gerne dafür zur Verfügung.
  37. 2 points
    Hallo Thomas, vielen Dank für die ganzen Informationen, ich bin begeistert von der Reaktion des Supportteams hier im Forum, bei Avast hat es Tage gedauert und die ganzen Moderatoren haben sich schon nicht mehr ins Forum getraut grade bei dem Thema Win 10 Update erst 6 Monate nach Veröffentlichung von Win 10 ..... und das für zahlende Kunde... der Witz daran die Consumer Version ist von Anfang an win 10 kompatibel ... Egal das Thema ist Geschichte aber es ärgert mich immer noch ;-) Es freut mich auch schon direkt ein Key im Postfach zu haben ich mach mich an die Arbeit zu testen, der Großteil aller Fragen ist schon von dir beantwortet worden eine Wichtige wär für mich noch das Thema Rückmeldung der Updates und Notebooks extern. 6) Wie bekommen Notebook Clients Updates die nur selten im Netzwerk sind vielleicht 2-10 mal im Jahr ? Wie kommen die Informationen von den Clients zurück in die Console wird eine VPN Verbindung benötigt ? Gibt es dazu ein Best practice? Ich hoffe ihr geht immer mehr in die Richtung Business Lösung mit einer sehr guten Console und guten Support könnt ihr da ganz viele Kunden generieren mache da gerne Werbung für wenn ich mit eurem Produkt zufrieden bin. Fangt bitte nur nicht an die alle anderen AV Hersteller alles in die Cloud zu packen das sehe ich bei dem Thema AV sehr kritisch wenn dann jmd. mal an den Account kommt. Klar ne art proxy für Rückmeldung andere Clients ist ja ok aber die komplette Kontrolle der Console sollte immer im geschützten Netzwerk bleiben! Irgendwie freu mich mich jetzt aufs testen Gruß Zwergenmeister
  38. 2 points
    I would only recommend one Sandboxing program, Sandboxie. I have used it for years, and it works fine with Emsisoft products. When you install it, Sandboxie will detect the presence of Emsisoft products and ask you if you want to enable compatibility settings. You would want to do this. Any questions, feel free to ask. Pete
  39. 2 points
    You can go ahead and have EEK safely delete: Value: HKEY_USERS\S-1-5-21-3104866962-3908348715-1408370962-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM -> DISABLETASKMGR detected: Setting.DisableTaskMgr (A) Value: HKEY_USERS\S-1-5-21-3104866962-3908348715-1408370962-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM -> DISABLEREGISTRYTOOLS detected: Setting.DisableRegistryTools (A)Everything else looks good.Unless you are having problems, it is time to do the final steps. Now to remove most of the tools that we have used in fixing your machine: Download Delfix from here and save it to your desktop. Ensure Remove disinfection tools is checked.Also place a checkmark next to:Create registry backupPurge system restoreClick the Run button.When the tool is finished, a log will open in notepad. I do not need the log. You can close Notepad.Empty the Recycle Bin Download to your Desktop: - CCleaner Portable UnZip CCleaner Portable to a folder on your Desktop named CCleanerRun CCleanerOpen the CCleaner Folder on your Desktop and double click CCleaner.exe (32-bit) or CCleaner64.exe (64-bit) Click "Options" and choose "Advanced" Uncheck "Only delete files in Windows Temp folders older than 24 hours" Then go back to "Cleaner" and click the "RunCleaner" button. Exit CCleaner. Turn off System restore to flush all your restore points then turn system restore back on. See How To Enable and Disable System Restore.You can delete and uninstall any programs I had you download, that you do not wish to keep on the system. Run Windows Update and update your Windows Operating System. Install and run the , this will inspect your system for software that is out-of-date and in need of updating. Update anything program/application detected as being out-dated. Articles to read: How to Protect Your Computer From Malware How to keep you and your Windows PC happy Web , email, chat, password and kids safety 10 Sources of Malware Infections That should take care of everything. Safe Surfing!
  40. 2 points
    Upgrade from EIS 10.0.0.5735 to EIS 11.0.0.5847 (Beta) I currently have for the 'Advanced Firewall Settings' to "Ask" to allow incoming/outgoing firewall rules. (all 4 options are set to Ask) Application Rules did not Update after Upgrade ----------------------------------------------------------- After the upgrade/restart i deleted the custom rules to allow ports 80/443 and yet it still allowed the connection even after restarting firefox and did not prompt me to allow it again either. So I went to Settings -> "Factory Defaults" this seemed to do the trick, and this time asked me to allow the port connections 80 / 443. Real-Time Firewall Blocking ------------------------------------ At first I allowed port 80 / 443, and then tried adding a BLOCK TCP/UDP 0-65535 (below to the first rule) i could still browse successfully (where before in v10, 0-65535 was over-riding everything) However then i removed the rules, then tried this time to "block" the connections, except it was still allowing the connection, even though 80 / 443 were blocked. It wasn't until I restarted firefox that the blocking rule took effect. so it appears real-time firewall blocking of the application is not quite working. Real-time Application Blocking (or Suggestion) ------------------------------------------------------------------- Another issue ,prevalent in v10 also, is when you block an application in Application Rules or Behaviour Blocker, it does not close the application once blocked, it just prevents it from running the next time. Where in v9 i remember it used to close the application immediately once blocked. Automatic Custom Montioring (Suggestion) ------------------------------------------------------------------- Even though I have automatic firewall settings set to "Ask" about trustworthy applications, the behaviour blocker still sets everything to "All Allowed", so each time I do say.. a Factory Reset or new install, I have to reset each application to "Custom Monitoring" if I want to be confronted with potential behavioural threats. The behavioural blocking is the pride and joy of EIS, so I think it should be an option in "Advanced Firewall Settings" to set "All Allowed" to "Custom Monitoring" by default. Which will warn you about code injection and such. Automatic Behavior Blocking Template(Suggestion) ----------------------------------------------------- Also think you should be able to create something like a Template that applies to all applications by default, for example.. "Block Backdoor Related Activity" "Block Spyware Related Activity" could be set by default, based on your template you created. More Detailed Information About Intrusions (Suggestion) ---------------------------------------------------------------------------------- I mentioned in the previous suggestion about behavioural blocking, and how it warns you about code injection and potential intrusions. These errors can come from system applications, for example... when changing personalize settings, a message appears saying Explorer.exe wants to change something, or when Firefox tries to run a program from the downloads menu, it will say something along the lines that Firefox is acting like a trojan or something to that nature. These are scenarios where it was likely a false detection, but was warning of a potential problem, which is great! However, there are also scenarios where Explorer.exe or Firefox.exe may be doing something it shouldn't, and yet the options are to Allow something potentially bad, or Block, which closes the application, not really knowing what you just blocked. So what i'd really love to see.... is the offending command, i believe v9 had it right... when it popped up the behaviour, it gave you much more verbose input, like Explorer.exe -> Shell32.dll -> hotdog.dll -> somethingweird.exe then i could tell the difference between, a simple desktop entry being modified, or of an actual threat that needs to be dealt with. So would really really love to see an option in "Advanced rule settings" for [ X ] verbose behaviour messages Application Rules & Behavior Rules Merging (Suggestion) ---------------------------------------------------------------------- I think v9 also had it right in this case.... all of the application rules were all in one neat tidy window, maybe i'm a little daft, but i don't quite understand why these two are seperated, and why some applications will show up in Behavior Blocker and not in Application Rules, and if i want one in the other, i have to create the rule myself. Then tediously set everything to Custom Monitored, to get it to monitor its behavior. Theming (Suggestion) ---------------------------- I know i've said this before, but i'll say it again... i'd love to have an option to theme/skin the EIS application, maybe to something with more neutral colors. Insights ---------- If everything gets automatically allowed, then its only passively protecting the system for the sake of letting Windows run smoothly, The goal here is easy to use security, i think its important not to let security take a back seat for the sake of making it easy to use. In the Blog you make mention that everything should be kind of behind the scenes without much intervention and fiddling around with settings, however I think a lot of people don't really mind the extra popups as long as they know their system is actually being protected. Special Thanks -------------------- I'd like to thank the emsisoft team for their dedication and hard work on this amazing application. I hope everything i've said has not been discouraging but has inspired you to keep working to make this program even better. Keep up the good work, and please tell Santa about everything on my wish list.
  41. 2 points
    You have to be careful if you are behind a router. You may just be testing that.
  42. 2 points
  43. 2 points
    It's been more than a week now since the issue was reported here. Is there a deadline to get this issue fixed?
  44. 2 points
    I don't have any insight in the test-methodology apart from what the article states, but a few observations make me doubt the relevancy of this test: The test compares a number of different products: antirootkit scanners and anti-malware scanners. This makes no sense to me. TDSSkiller is an excellent Antirootkit scanner in my opinion, but it is a limited tool, you cannot compare this with a anti-malware scanner like EEK or MBAM because its simply a different product. The tested malware is for the most part very, very old and not seen in the wild anymore, even though the article states 2015 and "in the wild" in the title. To give a few examples: Alureon/TDL3/4 hasn't been around "in the wild" for at least 3 years (and thats estimating it very loosely) The article listed is from 2010 (!) http://contagiodump.blogspot.gr/2011/02/tdss-tdl-4-alureon-32-bit-and-64-bit.html?m=1 The same goes for ZeroAccess/Max++. The latest usermode version of that rootkit was active in 2013 and after the botnet was taken down for a large part, there has been no re-emergence of this malware. However, its kernelmode version was quite a bit older, this was last seen in 2011. Sure, its interesting to see how products perform against such rootkits, but how useful is it? Those rootkits were "retired" for a very good reason, they can no longer infected today's OS versions. Finally, I'm not one to make accusations, but I don't like "sponsored by..." tests. I'm fully willing to believe that Zemana was indeed the best product to remove all these infections, but I just think its not the best strategy for any testing lab to let a sponsor also participate in the tests, just to avoid any possible doubt as to the objectiveness of the test results.
  45. 2 points
    At the moment it is not possible to delete multiple lines at once. I have made a suggestion internally to add it though.
  46. 2 points
    I personally don't care which company within the Emsisoft program detects a pup. I just want it detected.
  47. 2 points
    Looks like my system is still the fastest: Emsisoft Internet Security - Version 10.0 Last update: 4/12/2015 12:05:17 AM User account: Krypton\Fabian Scan settings: Scan type: Malware Scan Objects: Rootkits, Memory, Traces, Files Detect PUPs: On Scan archives: Off ADS Scan: On File extension filter: Off Advanced caching: Off Direct disk access: Off Scan start: 4/12/2015 12:06:09 AM C:\Users\Fabian\AppData\Roaming\tmpUQC0.exe detected: Trojan.MSIL.Inject (A) Scanned 74807 Found 1 Scan end: 4/12/2015 12:06:27 AM Scan time: 0:00:18 This is the first scan after a cold boot. Later scans go down to 11 seconds .
  48. 2 points
    The value listed in msconfig is a registry value, so if you feel comfortable editing the Windows registry then yes you can change it. The entry you are seeing is for the Guard (the part of Emsisoft Anti-Malware that draws the System Tray icon and handles displaying notifications). It needs to wait for the service the be running before it tries to start, and since the server takes longer to load than it does it is best to have a small delay to prevent issues.
  49. 2 points
    Hello, Jenn Welcome to the Emsisoft Support Forums. My name is Kevin, and I will be helping you fixing your problems. Please change your user name to something that is not your email address. All posters requesting Malware Removal assistance are required to follow all procedures in the thread titled START HERE, if you don't we are just going to send you back to this thread also read the Emsisoft Support Forums Terms of Use To Highlight a few:
  50. 2 points
    Nee, alles in Ordnung Downloade dir bitte Combofix vom folgenden Downloadspiegel Link 1 WICHTIG - Speichere Combofix auf deinem Desktop Deaktiviere bitte all deine Anti Viren sowie Anti Malware/Spyware Scanner. Diese können Combofix bei der Arbeit stören.Starte die Combofix.exe und folge den Anweisungen auf dem Bildschirm. Wenn Combofix fertig ist, wird es eine Logfile erstellen. Bitte poste die C:\Combofix.txt in deiner nächsten Antwort. Hinweis: Solltest du nach dem Neustart folgende Fehlermeldung erhalten starte den Rechner einfach neu. Dies sollte das Problem beheben.
  • Newsletter

    Want to keep up to date with all our latest news and information?

    Sign Up