Leaderboard


Popular Content

Showing content with the highest reputation since 09/30/17 in all areas

  1. 4 points
    Guten Tag, Wir haben mittlerweile mehrfach etabliert, dass Emsisoft nicht das Programm Ihrer Wahl ist. Sie haben sich bereits anderweitig ein Antivirus gesucht, dass auch noch dreißig weitere Funktionalitäten mitabdeckt. Fakt ist jedoch, dass viele Leute eben auch ein Antivirenprogramm suchen, dass nicht noch fünfzig Extras mitbringt, die man nicht will oder nicht braucht. Für diese Leute gibt es eben Emsisoft Anti-Malware und die meisten unserer Kunden sind mit der Tatsache, dass es eben 'nur' ein Rundumschutz für den Rechner ist und nicht mehr, zufrieden. Für all die angesprochenen Features - Passwortgenerator, Kinderschutz, etc - gibt es bereits gute Programme, die man sich bei Bedarf installieren kann. Viele Leute haben aber entweder keine Kinder oder wollen diesen den Zugang nicht beschränken, warum sollten wir diesen Leuten einen Kinderschutz mitinstallieren. Einige haben eben auch nicht RAM oder CPU im Überfluß, für diese Leute ist es noch ärgerlichr wenn das RAM durch ein AV belegt ist, dass aufgrund von ungenutzten Features die Ressourcen auffrisst. Fazit: Es gibt viele Antivirenprogramme, die die eierlegende Vollmilchsau sein wollen und versuchen alle Programme in einem zu vereinen. Es gibt User, die diesen Ansatz nicht mögen und nur ein Antivirenprogramm wollen. Nicht mehr. Für diese Leute gibt es, zum Beispiel Emsisoft Anti-Malware. Sie gehören nicht zu dieser Gruppe und das ist ok. Mit freundlichen Grüßen Kathrin
  2. 3 points
    Please note that Emsisoft Anti-Malware for Windows XP hasn't been updated (as in program updates) in over 2 years, and we never intended on continuing long-term database update support for it. In fact, we discontinued our own database updates for it over a year and a half ago, and those still running Emsisoft Anti-Malware on Windows XP have only been receiving BitDefender database updates. We've decided that it is time to stop redistributing those BitDefender updates for Windows XP, as all they are doing is giving those on Windows XP a false sense of security. In addition, it is extremely dangerous to continue using Windows XP. It has (for several years now) had well-known and major security vulnerabilities that Microsoft will never fix. These vulnerabilities make it trivial to infect a Windows XP system, and there is no security software in the world that is capable of preventing it. We can not, in good conscience, continue to provide any support for this version of Windows, as we announced on December 31st, 2015: https://blog.emsisoft.com/2015/12/02/why-we-believe-its-not-ethical-to-sell-antivirus-software-for-windows-xp-any-longer/ We highly recommend that you upgrade to a newer Operating System that is still supported. It doesn't matter if that's a newer version of Windows, or something free like Linux or BSD, as long as you'll be receiving security updates from whoever makes it. New vulnerabilities are discovered almost every day for every major Operating System (Windows, Linux, BSD, MacOS, Android, etc) so it is absolutely critical that you are able to receive security updates from whoever made the Operating System to help keep you and your data safe.
  3. 3 points
    Wenn alle Features eingebaut würden, die Galaxy wünscht, dann würde ich EAM sofort deinstallieren. Ich mag das Programm so wie es ist und hoffe, das bleibt auch so.
  4. 2 points
    Personally I think following the tests is a waste of time. If you are really concerned then you will need to make the effort to do your own testing. that is what I did. Also the tests don't tell you a thing about the nature of the company. I will stick with Emsisoft because I think it's the best
  5. 2 points
    > Thanks how do I turn off the notification please ? See: Settings - Notifications - Browser Security verifications
  6. 2 points
    Hello, This is legitimate. You can read more about it here: https://blog.emsisoft.com/en/32517/new-in-2018-12-safe-web-browsing-with-emsisoft-browser-security/
  7. 2 points
    FYI: https://blog.emsisoft.com/en/32110/emsisoft-anti-malware-2018-9-beta/
  8. 2 points
    https://www.bleepingcomputer.com/news/google/google-will-block-third-party-software-from-injecting-code-into-chrome/ Our Surf Protection works by filtering DNS requests made by running applications. Since EAM doesn't use network filter drivers, it has to achieve this using code injection. Now that Chromium is blocking code injection by third-party applications, our Surf Protection will not work with it until we are able to make some changes. My recommendation is to install uBlock Origin and uBlock Origin Extra (both work in Google Chrome and Vivaldi) to supplement until we can get our Surf Protection working in Chrome again. uBlock Origin is a free content blocker that not only blocks ads, but also used the extensive blacklists of malicious domains available from Malware Domain List and Malware Domains to block malicious content. Note: Vivaldi 1.15 (the current stable version) is based on Chromium 65 with backported security fixes from Chromium 66, 67, and 68. Vivaldi 2.0 is based on Chromium 69, and is currently available in testing builds. Anyone with the stable version of Vivaldi installed will not be effected by this issue. Anyone using a Vivaldi 2.0 snapshot will also experience this issue with Surf Protection. Also note: Due to the added protection of an ad blocker, we recommend uBlock Origin (with uBlock Origin Extra for Chromium based browsers like Google Chrome, Vivaldi, and Opera) regardless of whether or not our Surf Protection is working with your web browser. Anti-Virus/Anti-Malware does not block ads by default (doing so can break some websites), and the companies that sell online advertising do not do a good enough job of preventing their ads from being abused by their clients, and there have been many cases of serious threats in advertisements even on legitimate websites. Please be aware that there is another content blocker called "uBlock". This is not the same thing as uBlock Origin, and is not recommended. The main reason for recommending uBlock Origin is due to its performance and memory usage being better than popular ad blockers (AdBlock, Adblock Plus, AdGuard, etc). If you wish to use one of those instead, then please feel free to do so, however I do not know if they are configured to use Malware Domain List and Malware Domains by default and recommend checking their configuration to ensure they are offering the same level of protection as uBlock Origin. If they are not configured to use these lists of malicious websites, then you should be able to add them through FilterLists.com. Note that this site was down at the time I posted this, so I was not able to check and verify that, however this site lists almost every popular filter list for ad and content blockers and it should include important blacklists like these.
  9. 2 points
    Are there any plans of introducing an anti-malware for Mac in the near future? I'm very curious. We see more and more interest of our customers that are demanding a good mac protection software. Now we deliver Emsisoft for Windows but we can't for MAC OS. By canceling development of EIS is there now more of a possibility for a new product?
  10. 2 points
    I could only confirm David's post - on both my computers with Comodo (Win 7 64 bit, SSD HDD - as this probably had some impact on that unpleasant EAM behaviour) I switched to stable version and all seem to work. So yes, the problem with Comodo on some comps is probably over. I want to add my two cents to discusion above. I work with computer more than 25 years. A lot years ago I worked as programmer. This is all over now (even as I sometimes write a few lines of code in php and MySQL). My main work is with graphics software, but for a few of my customers I do also some kind of computer servis. Not that I'm any expert in LAN's or such but I could help individual users with some computer problems. So my computer knowledges are a little bit above standard. Usually I could help myself with any and all hardware or software troubles, but this time it was very frustrating and it took me a lot of precious time (which I should have spent differently) to revert my work and home computers back to working state. And it was because of EAM "no user asking" PROGRAM update (unfortunately it even didn't create system restore point - why this isn't standard upon bigger program update is above my understanding). This is why I ask you for avoiding such program behaviour. I understand your points but you should hear our opinions also. Maybe it's not wise to let some users decide about something they don't understand but I don't ask you to do this. You can let default EAM settings on stable version update but I'd appreciate the possibility for some of us to switch off this behaviour. Why couldn't you add to setup/actualization menu two choices: 1) update program without asking user 2) update program only after user confirmation? First choice could be the default one - I don't care. This would be enough. And (not only) after this experience I'd immediately switch it to the "update program only after user confirmation". And a few words to Neneduty post: no, I won't uninstall ANY of my programs only because ANY antivirus software couldn't work with it. All programs are in my computers for good reasons (this is true especially for Comodo firewall). This could end that Emsisoft (or any other antivirus producer for that reason) could ask me not to use my graphics programs, because they could be in conflict with EAM (btw. there was situation Adobe Acrobat didn't start because of conflict with EAM one time - I resolved it with Emsisoft help then - fortunately Emsisoft helpdesk didn't want me to uninstall it :-) ). Antivirus software is in any computer to help not to be infected by computer virus; it's not there to block users to work with their programs... Any other debate about this is ridiculous. Uffff. Enough from me.
  11. 2 points
    Hello RodPaulo! Over the last three months, we gradually rolled out new infrastructure for our behavior blocker as part of the monthly feature updates. We decided to introduce this new tech gradually as to avoid headaches when switching everything at once. In addition, just the infrastructure on its own had major benefits like fixing several long-standing compatibility issues with products like Kaspersky, Avast, AVG and some other products, that rendered systems unusable as no process could be started on systems running both EAM and their product in real-time. The rollout itself was pretty smooth and we didn't see anything unusual in our telemetry or continuous daily testing either. However, it turned out that there was a rare race condition with certain malware obfuscators that caused some 32-bit processes to not be monitored correctly on Windows 10 64-bit systems. AV-C did report the issue to us as part of their normal report at the end of March and we fixed and released it as an update during the 2018.3 lifecycle very shortly after, but by then we already had racked up a couple of misses in the April test period as well. You may also be interested in the AV-C business test series factsheet they just published, available here: https://www.av-comparatives.org/wp-content/uploads/2018/05/avc_biz_2018_03_factsheet_en.pdf
  12. 2 points
    Other companies have 10 to 100 times the number of employees we do. Having one person there that fixes bugs in Windows Insider builds isn't much of an issue there. However, us doing that would mean ~30% of all development time disappears to keep a couple of hobbyists happy who use a system that is not intended for use in production systems on their production system. We do include insider builds in our QA runs, so we know if or what is broken so we can fix it in time for a release. But unless something is fundamentally broken, risking system security or stability, we won't fix bugs specific to insider builds before a release to web is close.
  13. 2 points
    If you’re a regular reader, you’ve probably noticed that something has changed about our blog… That’s right: everything has changed. When we started the original blog more than a decade ago, little did we know how popular it would become. From a few hundred visits per month back in 2004 to more than 100,000 now, the Emsisoft Security blog has become a major destination for people looking for straight-talking security advice from our team of malware and online security experts. Sadly, while the actual articles have progressed in leaps and bounds since the early days, the blog page itself has received little love and was starting to feel inadequate for the breadth of content we are now offering our readers. We decided to change that and embarked on the biggest redesign of our blog ever. After lots of brainstorming and gathering feedback, we are excited to show you what we’ve been working on and hope that it will make discovering, exploring and sharing our content even better. So, go ahead and check out our redesigned security blog now, or read on about the exciting changes you can look forward to. See what’s new Without further ado, below are some key highlights from the many improvements we have made to your Emsisoft Blog experience: Home page Visitors to Emsisoft’s Blog will now be greeted by a clearly structured home page, with a prominent “Featured Article” chosen by the team to highlight the latest insights into online security. The page itself is divided into clear categories with a selection of the latest articles for each, so it’s easy to browse through each section and dive into those that you find most interesting. From the latest videos, to Protection Guides and Enterprise Security, there’s something for every security-conscious reader. Category pages All posts are now grouped into clear categories and can be accessed from any part of the blog using the new category menu. Each main category page has been designed with a clear purpose and provides an intuitive way to browse the most relevant articles. While the Emsisoft News articles are organized in a timeline, the Protection Guides are grouped by topic to allow you to find the most relevant information in one place. Go ahead, have a look around! Readability First and foremost, a blog should be a pleasure to read. Once you’ve found what you’re looking for, reading should be a pleasant, distraction-free experience. We have reduced the clutter around the actual article text and adjusted the layout and typeface, creating the feeling of reading a high-quality book, whether it’s on a desktop or on your mobile phone on the go. Quick Search Find any article in a matter of seconds with our new search function. With hundreds of online security articles published over the years, our completely new search functionality makes finding that one article about ‘ransomware payment methods’ a breeze. Simply click on the magnifying glass in the header to bring up the search box, start typing and results will appears instantly. Sharing Options To achieve our ultimate goal of a malware-free world, it’s critical to share our insights and security advice with as many people as possible. We’ve now made it easier than ever to share articles or even sections of articles via social media or email: simply click on your favorite social network on our new sharing menu on the left-hand side to share the whole article with your friends and colleagues, or select a particularly insightful sentence or paragraph and share it via the new context menu that appears. We want to hear from you This article only touches the surface of all the changes we’ve made for you in our new Emsisoft Security blog, and we plan to continue developing it over the coming months. As excited as we are about the improvements, ultimately we have made them for you, our readers and customers. Let us know what you think about the new design, the functionality and the reading experience. The post Welcome to the all-new Emsisoft Security Blog appeared first on Emsisoft | Security Blog. View the full article
  14. 2 points
    You could also use a third-party DNS service that has DNS filtering and protects against DNS security issues. A popular example is OpenDNS (although there should be others as well): https://www.opendns.com/home-internet-security/
  15. 2 points
    We had to turn off XP updates because the latest scan engine and its signatures are no longer compatible with it. Instead of pretending that we could protect you from malware (which we effectively can't because XP is full of holes and flaws that aren't gonna be fixed at all) we would rather strongly recommend you to upgrade your computer. If that is for any reason impossible and means that you can't use our software anymore at all, we're happy to issue a refund for the remaining period.
  16. 2 points
    You can see this on several programs. Service and drivers are up, but GUI hasn't caught up. It's not a problem.
  17. 2 points
    It is not the UI doing the protection, it is the service/driver, and they are the first things to be loaded during boot even before your desktop appears.
  18. 2 points
    Guten Tag, Bei Schwachstellen in einer Software ist es eigentlich immer am Besten wenn der Softwarehersteller die Schwachstelle behebt. Er ist der einzige, der Zugriff auf den Quellcode hat und diesen direkt verändern kann. Selbst der Patch von Microsoft ist ein wenig eine Krücke in diesem Sinne, da er nur den Zugriff verhindert und nicht wirklich die Schwachstelle behebt. Intel hat jedoch angekündigt innerhalb einer Woche eine Patch zu veröffentlichen und spätestens bis Ende Januar für alle zur Verfügung zu stellen. Emsisoft kann hier nicht dasselbe leiste wie Microsoft oder Intel, da wir weder den Quellcode von Windows noch für die Intelprozessoren haben. Wir werden jedoch, wie immer, unsere Verhaltensanalyse und den Dateiwächter mit allen Signaturen ausrüsten um Malware die diese Schwachstelle nutzen will zu blockieren. Besser ist es jedoch so schnell wie möglich sämtliche Sicherheitsupdates zu installieren. Ein Antivirenprogramm ist keine Alternative zu Sicherheitupdates. Mit freundlichen Grüßen Kathrin
  19. 2 points
    According to several reports, the latest Windows 10 Update pushed on Jan. 3rd is supposed to address the "Meltdown" security problem. However, due to changes to Windows kernel, Microsoft didn't make the update available to users without the "ALLOW REGKEY", and directed users to confirm with AV vendors if their products are compatible with the latest update. So is the current version of EAM compatible with this update?
  20. 2 points
    Emsisoft Anti-Malware ist vollständig mit dem Windows Update kompatibel. Wir haben ausserdem grade ein Update für alle Nutzer des Beta, Stable und Delayed Update Trees veröffentlicht, dass den entsprechenden Kompatibilitätsmarker in der Registry platziert. Wir möchten an dieser Stelle zu bedenken geben, dass Microsoft den selben Kompatibilitätsmarker für alle Anti-Virus und Anti-Malware Anwendungen verwendet. Sollten also mehr als ein Anti-Virus oder Anti-Malware Programm in Benutzung sein, besteht das Risiko das eine der Anwendungen, wie Emsisoft Anti-Malware z.B., das System als kompatibel markiert, obwohl eines der anderen installierten Sicherheitsprodukte nicht kompatibel ist. Es gibt für uns leider keine Möglichkeit dies zu verhindern oder abzufangen, da Microsoft die Verwendung mehrerer Schutzprogramme auf dem selben System schlicht nicht vorsieht. Dies ist übrigens ein perfektes Beispiel dafür, wieso wir seit Windows 10 von der parallelen Verwendung mehrerer Sicherheitsprogramme abraten. Weitere Informationen, gibt es auch in unserem Blog.
  21. 2 points
    Emsisoft Anti-Malware is compatible with the Windows update. We also just published an update that sets the compatibility flag for all users of the beta, stable and delayed update feed. Keep in mind, that Microsoft uses the same flag for all anti-virus vendors. That means if you are using multiple anti-viruses or anti-malware applications, you are risking one of those products, like Emsisoft Anti-Malware, flagging the system as compatible, even though one of your other products is not compatible. There is, unfortunately, nothing we can do to prevent this as Microsoft does not account for the scenario of multiple security products being installed on the same system. This is the perfect example why we are recommending against using multiple security products in parallel. For further information, feel free to stop by our blog.
  22. 2 points
    The holiday season is not only a great opportunity to spend time with loved ones, but also to look back at the year gone by. For us at Emsisoft, we could finally take a brief moment to realize just how busy 2017 has been for the team and the wider security industry: from major ransomware outbreaks that took most (Emsisoft customers excluded) by surprise to constant product evolution to guarantee the best possible malware protection for our customers, this year has been anything but uneventful. Better surf protection: Both online and in the water Prevention is worth a pound of cure, so raising awareness of online security issues has always been close to our hearts. Back in November 2016 we started out with the world’s first surf protection research using drones and high technology drifters, teaming up with Surf Life Saving New Zealand to map currents and further understand threats and dangers that await unsuspecting surfers under the surface. The campaign results exceeded our highest expectations: not only was the project widely covered in media outlets across the country, but the insight gained formed the basis for future projects and was even presented at a conference sponsored by the World Health Organization. As our CEO Christian Mairoll put it: Whether online or in the water, Emsisoft always aims to observe dangerous environments, analyze specific threats and most importantly prevent dangerous situations that surfers suffer from everyday. Ransomware outbreaks take many by surprise Ransomware attacks are nothing new for our team, but the sheer size and speed of two major outbreaks this year caught many off guard. In May, Wannacry ransomware took advantage of the NSA shadow broker exploits to rapidly spread to hundreds of thousands of machines, including major corporations in Europe and beyond. A mere month later, Petya used the same exploits to wreak havoc across high-profile businesses in dozens of countries and exposed, despite repeated warnings from security experts, the general lack of basic protective measures, including up-to-date operating systems, regular backups and the use of reputable anti-malware software. Our customers were safe from these attacks thanks to Emsisoft Anti-Malware’s multi-layered protection. Yet it’s events like these that remind us of the need to constantly improve our technology and awareness to stay one step ahead of cybercriminals. Emsisoft evolves to stay ahead of malware Malware attacks of this nature require an immediate response. Luckily, one of our main advantages over many competitors is our ability to adapt quickly. Starting in January, we introduced a new product versioning scheme that aligns with our development month and laid the foundation to bring protection and usability features to our customers faster than ever, rather than waiting for a major release. Making great protection even better Our customers choose Emsisoft first and foremost for one reason: to be protected from all types of malware threats. It’s a job we take seriously, which is why we have launched a number of improvements throughout 2017. Our personal highlights: We made our Behavior Blocker even more capable, detecting malware and ransomware threats that try to disable antivirus software. We promoted our existing ransomware protection into a dedicated “Anti-Ransomware” layer. We added Double Pulsar exploit mitigation in response to the increase in ransomware outbreaks. This doesn’t include the countless under-the-hood changes to the Surf Guard to detect even more phishing scams and the performance improvements we have launched month after month to ensure your protection does not get in the way of your day. Keeping things simple Simplicity is one of our core values here at Emsisoft, and the product team made it a clear focus to deliver against it in 2017. We looked at all aspects of our software and listened to a lot of customer feedback to learn how we can make things better, faster, and simpler. The result was a raft of new and improved features that we released over the last 12 months, including: a simplified user permissions system based on 2 groups; a brand-new feature to exclude specific programs from scanning and protection; an extended Forensic Log to better reproduce malware-related events on your machine; an auto-resolve mode for the behavior blocker to reduce user-dependencies; email notifications. Merging Emsisoft Internet Security with Emsisoft Anti-Malware But perhaps the biggest change in terms of our product development has been the merging of Emsisoft Internet Security with Emsisoft Anti-Malware in October this year. What may have seemed like a sudden decision was the result of a careful evaluation of our core competencies, the realities of a changing malware landscape and the preparation for things to come. To ensure customers dependent on a firewall would receive a comparable level of protection, we released a Fortification feature for the Windows Firewall to ensure that malware will not be able to tamper with it. Business-grade security that just works As we’ve touched on earlier, this year in particular exposed just how devastating ransomware attacks can be for companies both large and small if they do not have reliable endpoint protection in place. We always believed that sophisticated, enterprise-level endpoint protection does not need to be complex, and we have continued to refine the experience of our business customers, whether that’s enhanced Emsisoft Enterprise Console connection features or new MSI setup files for time-efficient group policy deployment in larger Windows networks. Our efforts did not go unnoticed either, as independent test lab AV-Comparatives praised our business solution for its ease of use, clean design and fast deployment capabilities in this year’s Business Security Report 2017. Combined with a stellar malware protection rate powered by Emsisoft Anti-Malware, we walked away with the “Approved Business Product Award” for the second year running. The feedback that counts: yours While it’s great to get recognized with industry awards for our malware protection performance, it’s the messages we receive from our customers and partners that put a smile on our faces and give us the motivation to get up in the morning to fight the good fight. I wanted to take a moment of your time and let you know that there just isn’t a better anti-malware company than Emsisoft. Your dedication to the world of online protection is the best in the business. I have 100% confidence in Emsisoft to keep me safe on line no matter what. It’s just something I never have to think about. Joel Gardner, Switzerland Emsisoft is about security. Looks good, works good, is light and what is most important, Emsisoft is about trust. My is over 8 years as paid customer, without any single security PC problem. Franky via Twitter Another gold star for Emsisoft! I’ve been with you since a-squared, and it’s always been prompt, professional and excellent service all the way, not to mention the superb software solutions. These days, companies that care are unfortunately few and far between. Douglas Sharp, Germany I own a brick and mortar retail computer repair shop. We have sold hundreds if not thousands of copies of Emsisoft through our retail business. I have to say Emsisoft works so well that I feel like it may be hurting our repair business. Our customers like it and that’s what matters. David Gentry, Lantean Systems LLC, USA What lies ahead in 2018? Ransomware once again dominated the year, and we are expecting this trend to continue into 2018. Wannacry and Petya attacks made sure that even the most technophobic among us have at least a basic level of awareness. But they also laid bare the ample opportunities for cyber crime as too many business still don’t have credible security strategies in place. We covered the emergence and increasing sophistication of Ransomware-as-a-Service (RaaS) business models, allowing anyone with malicious intentions to execute their own ransomware attack and share the ill-gotten gains with the RaaS creators. Given the ease of using these services and the proliferation of cryptocurrencies, we at Emsisoft expect the ransomware campaigns to continue unabated into the new year. The other trend to keep an eye on is also connected to the rise of digital currencies: Cryptomining. Online criminals and even some „legitimate“ websites are experimenting with the use of crypto-miners to extract revenue from users. Whether it will evolve into a legitimate alternative to the established ad model or remain mostly a tactic by malware authors remains to be seen. Whatever the outcome, as long as cryptocurrencies continue to rise, we expect to come across increasingly sophisticated variants. But what will Emsisoft look like in 2018? We plan to continue our efforts to declutter Emsisoft Anti-Malware to make it the easiest to use protection software on the market. Our Malware Lab is working relentlessly on a new malware detection and protection system that is going to raise the bar in the industry. In addition, our product development teams have started working on a major project a couple of months ago that is expected to be launched no earlier than mid 2018. We can’t wait to share more details as we get closer to the actual release and to hear what you think. But until then, you can count on Emsisoft to protect you from all the current and future threats that may lurk out there. Malware never sleeps, and nor do we. Have a brilliant, malware-free 2018! View the full article
  23. 2 points
    Thanks Umbra. I've also done step 2, and I suspect your right that is good enough.
  24. 2 points
    Just for fun (and reference) I took a screenshot of the visitor stats from my own private server. The screenshot is censored so it doesn't show IP addresses, the names of files visitors accessed, or what websites they were referred from. Here's a link if anyone wants to see it: https://www.gt500.org/images/http_stats.png This is just general statistics compiled from server logs, and you can actually get a little more information than what you see there from those logs. I guess what I'm trying to say is simply that if website owners really want to track you, they don't don't need Google or other analytics services to do it. Especially since there's no way to prevent the server from logging all of this data (since the servers do that automatically and have access to all of that data when your web browser loads anything from the server). If this is something you're concerned about then TOR, VPN's, and Virtual Machines are going to do you much more good than worrying about what "trackers" are being used by any individual webpage. TOR and VPN's help keep your IP address private and make it very difficult to determine where you actually are, and of course Virtual Machine's give a generic system for you to browse on and you can restore to a snapshot to reset everything to the condition it was in before you started browsing. Some things may be unique to your Virtual Machine, such as the combination of your CPU and the amount of RAM and disk space, so in theory it would still be possible to "fingerprint" it, however does it really matter if a website "fingerprints" a Virtual Machine (especially when they can't determine the geographical location)? Also note that "browser fingerprinting" isn't something that I tend to worry much about. It's unfortunate that it's possible, but it's also benign in the vast majority of cases, and the lengths you have to go to in order to prevent it are... well... more that I would be willing to do for something that isn't going to effect me enough for me to care. uBlock Origin blocks most advertising and tracking stuff, so the amount of money that advertisers can make by "fingerprinting" my browser and targeting me is minimal, and if the NSA wants to monitor me then I expect the only way to truly prevent that is to live in a lead box and never connect to the Internet again.
  25. 2 points
    Ich kann EMSI-Soft nur bestärken bei dem bloatfreien Konzept zu bleiben. Jeder der Ahnung von der Materie hat, weiß dass diese extra Features Mist sind und nur die Angriffsfläche erhöhen. Siehe diverse Project Zero (google) Security-Bugs bei AV-Herstellern.... EMSISOFT scheinen der einzigen AV Hersteller mit Verstand zu sein, dem man sogar in diesem sensiblen Bereich die Achtung der Privatsphäre abnimmt. Das wissen genug Leute zu schätzen!
  26. 2 points
    If you change the setting (for Malware hosts) on that screen (eg to Block silently) then all instances of malware-host alerts would become silent. That's not necessarily sensible - yes, fewer alerts, but also you'd be less aware of sites that maybe you shouldn't trust so much. If you see alerts for that specific malware host frequently, you could add a rule to treat it differently eg just silently blocking it. But again, you'd then not be warned that such sites had embeded links to that host. Is that wise?
  27. 1 point
    Hallo Moreau, vielen Dank für Ihre positive Rückmeldung. Immer wieder gerne und vielen Dank für die freundliche Kommunikation. Ich wünsche Ihnen einen guten Start in die (noch fast) neue Woche!
  28. 1 point
    The Behavior Blocker will catch the payload. While it does have some exploit protection, it isn't intended to provide a full range of exploit protection, and thus will only catch certain exploits.
  29. 1 point
    https://support.emsisoft.com/topic/30471-beta-9188/?tab=comments#comment-190459
  30. 1 point
    Got this update but no blog post? this other forum post raises concern as well https://support.emsisoft.com/topic/30341-is-this-legitimate/ My program is on stable channel i have never used beta
  31. 1 point
    For now is ok ~2 days system boot no freeze... but will see for sure confirmation next 7-12 days...
  32. 1 point
    Please upload an encrypted file or ransom note to ID-Ransomware and copy/paste the results here for one of the experts to look at. https://id-ransomware.malwarehunterteam.com
  33. 1 point
    Hallo Taurec, vielen Dank dass Sie unseren Support kontaktiert haben. Bitte entschuldigen Sie die Umstände, ohne einen genaueren Blick auf das System zu werfen lässt sich nicht sagen was hier vermutlich passiert ist. Gibt es vielleicht auch noch eine weitere Sicherheitslösung am System? Die Neuinstallation von Emsisoft Anti-Malware funktioniert nicht weil noch Komponenten vom Programm am System sind, leider gibt es keinen Reparatur-Installer wie Sie schon bemerkt haben. Stattdessen müssen die restlichen Komponenten von Emsisoft Anti-Malware am einfachsten mit Emsiclean entfernt werden (wenn die Deinstallation über die Windows Systemsteuerung nicht funktioniert oder möglich ist). Laden Sie bitte von https://dl.emsisoft.com/Emsiclean.zip unseren Cleaner herunter und speichern Sie die Datei auf Ihrem Desktop ab. Im Zip-Archiv befinden sich zwei Dateien welche Sie mit einem Rechtsklick auf "Emsiclean.zip" über den Eintrag "Alle extrahieren..." entpacken können. Je nachdem ob Sie eine 64-Bit Version oder ein 32-Bit Version von Windows verwenden, verfahren Sie bitte weiter mit der mit "32" bzw. mit "64" markierten Datei. Wenn Sie sich nicht sicher sind verwenden Sie bitte zuerst die mit "64" markierte Datei und sollte diese nicht funktionieren dann ist die mit "32" markierte Datei die richtige. 1) Führen Sie nun bitte die entsprechende Datei als Administrator aus (Rechtsklick auf"EmsiCleanXX.exe") und bestätigen Sie bitte den Disclaimer wenn Sie einverstanden sind. 2) Sollte Emsiclean noch Überreste von Emsisoft Anti-Malware finden markieren Sie bitte alle Einträge. 3) Falls ein Ordner gefunden wurde stellen Sie bitte sicher dass sich keine wichtigen Daten in dem Ordner befinden weil diese sonst gelöscht werden würden. 4) Wenn alle Einträge markiert sind klicken Sie bitte "Remove selected objects" und starten Sie das System einmal neu. Verwenden Sie nun eine frische Installationsdatei für Emsisoft Anti-Malware um einen Neuinstallation vorzunehmen: https://cdn.emsisoft.com/EmsisoftAntiMalwareSetup.exe Bitte lassen Sie mich wissen ob dieser Vorgang für Sie wie vorgesehen funktioniert. Für weitere Fragen stehe ich in der Zwischenzeit gerne zur Verfügung.
  34. 1 point
    Confirmed here (by the way 'mode change' is listed because I was taking a screenshot)
  35. 1 point
    Do you mean something like this ? -Default: Best speed, good detection of malware (recommended) -Thorough: Slightly slower, triggers file scans of most events. -Paranoid: Very slow, triggers files scans of all events.
  36. 1 point
    Not a big fan of the GUI. Way too much white space, too much scrolling and I do not like sidebars. Its also starting to look like a web page which I think is what you guys are going for but I hate it. A gui should be compact, crisp and intuitive, this one is none of the above. I need to put on sunglasses for this one.
  37. 1 point
    I am using the Command Line Scanner within my Application scanning incoming files in a certain directory. My Application opens a DOS process in which we run the command line scanner, capturing the output and analysing the results (I wrote a little parser for the output). This worked for the last years without any problems. We use it on three servers, 2 of them are running Windows Server 2008 R2 and 1 server runs on Windows Server 2012 R2. Since yesterday the 2012 R2 server had problems running the command line scanner, the process hangs and did not finish. The other 2 servers on 2008 R2 are still running without any problems. I did a reinstall of EMSIsoft on the 2012 R2, the problem still exists. Are there any known problems on 2012 R2 using the Command Line Scanner?
  38. 1 point
    Guten Tag Skandal, Vielen Dank für die Informationen. Sie sind bisher der einzige, der dieses Problem meldet. Allerdings haben viele das Update wahrscheinlich auch noch nicht installiert. Ich würde Sie gerne einmal bitten Emsisoft zu deinstallieren und neu zu installieren um zu schauen ob das Problem damit gelöst werden kann: Öffnen Sie das Startmenü und klicken Sie auf Systemsteuerung, dort auf Programme und Funktionen. Wahlen Sie Emsisoft mit einem Rechtsklick aus und klicken anschließend auf deinstallieren. Wenn die Deinstallation fertig ist, starten Sie den Rechner bitte neu. Anschließend laden Sie bitte EmsiClean herunter:: https://dl.emsisoft.com/Emsiclean.zip Führen Sie das Programm aus, es sucht nach Überbleibseln von Emsisoftprogrammen und führt diese als Liste auf. Normalerweise können Sie sämtliche Einträge auswählen und entfernen. Ordner sind standardmäßig nicht ausgewählt und sollten nur gelöscht werden, wenn Sie dort keine persönlichen Dateien gespeichert haben. Wenn Sie die Dateien ausgewählt haben, klicken Sie auf "remove selected objects". Das Programm wird Sie bitten den Rechner nochmals neuzustarten. Schließen Sie vorher bitte alle Programme um einen Datenverlust zu verhindern. Anschließend können Sie Emsisoft Anti-Malware hier neu herunterladen und installieren: https://www.emsisoft.com/de/software/antimalware/ Mit freundlichen Grüßen Kathrin
  39. 1 point
    Please stop accusing people of saying things they did not. Everyone is entitled to their own opinion and terms related to criminal behavior can certainly be discussed, but this forum is not the right place for that. Since your original question has already been answered, I am locking this topic.
  40. 1 point
    Sorry, I don't know. We'll need to wait for EMSI Support to comment. If it's really a bad choice for whole-disk scans maybe the GUI should prevent it from being ticked in such circumstances. If it's been speedy in the past and isn't now that does suggest either a problem in the newest version, or something that wasn't working properly in older versions has just been fixed and slowed things right down.
  41. 1 point
    The only thing I would like is to know what ports are used on the remote computer for it to work through the Internet. Indeed on my local network I have no problem. It's through the Internet that it does not work. The ideal would be to create a brochure specific to the installation and setting up only Especially a procedure for setting up through the internet on remote computers is where the big problem. Ideally, provide detailed examples with port numbers so that you can understand. Understand what are the settings on the remote machine. ** For example if I install the antivirus locally no problem I find it on my interface as soon as the computer leaves my network and he goes to another place I do not see it anymore ....... Sorry for my English I do not speak a word at all I use the translator Thank you for your help because I do not find the appropriate settings
  42. 1 point
    If you just used the sample command that GT500 supplied you will have a problem. He specified the log location as: "..\Reports\Cmd_Scan_2017_12_29.txt" which is a filepath that means somewhere that is relative to whatever your working directory was when you issued the command (because the initial ".." means go up a level in the file structure form where you are now". You'd probably be better to use a value like: "C:\where\ever\you\want\logfile.txt" which is absolute - always the same place each time it is used. Or maybe something like: "%TEMP%\eekscans\logfile.txt" so at least the log will end up in your temporary files folder.
  43. 1 point
    That's the way non-administrator accounts are supposed to be. No permission to make important changes, therefore users who don't have administrator rights can't disable protection and infect the system (or worse). This is also why we give the option to tweak those permissions on a per-account basis and set a password, so that you have quick access to all of those features if you need them.
  44. 1 point
    This was fixed in beta version 8100
  45. 1 point
    Ich habe die vergangenen Tage vergeblich versucht eine Software auf meinem Rechner zu installieren, was mir allerdings nicht geglückt ist. Die Installation bzw. der Download brach immer ohne Fehlermeldung oder Kommentar ab. Ich habe dann irgendwann total entnervt aufgegeben und den ganzen, entschuldigt meine Wortwahl, Scheiß wieder von der Platte geschmissen. Nun habe ich gerade in die Benutzeroberfläche von EAM geschaut und musste feststellen, das EAM "ungefragt" die entsprechende EXE von oben in Quarantäne verschoben hat. Das kuriose dabei ist, das im Protokoll steht "Von Benutzer in Quarantäne". Wie kann es sein, das ich hier keinerlei Infos von EAM zu o.g. Verhalten bekomme?
  46. 1 point
    Yes! That worked, I not sure how that got checked but it was. Thanks GT
  47. 1 point
    I don't really have a problem with the chance & will probably use a Windows FW addition - But I am a little worried about being away for a few days when the change is done on 02 October in case there are problems with this PC accessing the net for example. Is there any way I can do it today 30 September before I go away as others will be relying on this PC & concerned I wont be Superb service - Contacted support & got key converted & uninstalled EIS & installed EAM while I was at it - No problems whatsoever. Was going to add a secondary firewall but decided to leave things as they are unless I encounter problems. Thanks!
  48. 1 point
    Arbeite doch einfach selbst Deine Profilneurose auf, oder suche Dir professionelle Hilfe. Ich bin ziemlich sicher, daß das Sammeln von likes und dislikes Dir nicht wirklich weiterhelfen wird...
  49. 1 point
    It's not abnormal for Windows to say that when a program update for Emsisoft Internet Security gets installed. When that happens, Emsisoft Internet Security has to restart itself in order to update itself, and during that brief period of time Windows will report that Emsisoft Internet Security is turned off. I would believe we made some changes recently so that Windows doesn't do that anymore, however I have not tested to verify that (I would have checked before posting, but there's currently no beta version for me to install in order to test).
  50. 1 point
    Hallo und vielen Dank für die Anfrage bei uns im Support-Forum. Bitte vielmals um entschuldigung, bei einem Upgrade zu Emsisoft Internet Security wurde scheinbar die Rabattstufe nicht richtig auf den neuen Lizenzschlüssel übertragen. Ich habe das nun für Sie nachgeholt und eine Verlängerung mit angemessenen Kunden- und Mengen-Rabatt ist nun über unsere Verlängerungsseite möglich: http://www.emsisoft.de/de/order/renew/ Da das Lizenzende schon sehr bald eingetreten wäre habe ich die Lizenz ein wenig verlängert so dass genügend Zeit für eine Verlängerung übrig bleibt. Vielen Dank dass Sie unsere Softwarelösungen verwenden. Sollten noch weitere Fragen bestehen, so stehe ich gerne dafür zur Verfügung.
  • Newsletter

    Want to keep up to date with all our latest news and information?

    Sign Up