Popular Content

Showing content with the highest reputation on 10/05/17 in all areas

  1. 1 point
    Benutze Win 10 64, folgendes fiel mir auf. starte ich einen Scan kann ich das Fenster nicht schließen, weil sonst der Scan abgebrochen wird, bei anderen Anbietern kann man das Fenster schließen und der Scan lauft in der Taskleiste weiter. Mein Startmenü ist StartisBack, wenn ich das Startmenü öffne und auf Systemsteuerung gehe, dauert es sehr lange bis das Menü sich öffnet, daß ist bei allen Einträgen die ein Menü haben. EAM Version 2017.9.0.8006
  2. 1 point
    > I am thinking allow google chrome to communicate on public network? I think so, unless you want browsing not to work on a public network to prevent you from visiting needed-to-be-secure websites in an possibly-insecure way. The FW siftware and advice can't distinguish between genuinely unsafe public networks and home networks set up in the same way.
  3. 1 point
    I don't understand why the default for all outbound connections is "allow". If there is a rogue program on my PC which wants to send out personal details, how does that work? Sure, the rogue program should not be there in the first place if EAM has done its job, but what if it is? I would have thought that when such a program attempts to send its data, I should see a message asking to allow or block, and the response would then become a rule for that program. I can't find anything like that in the Windows Firewall - am I missing something? I have tried with all outbound connections blocked. in the expectation that when a legitimate program tries to connect, I would see a similar message, but no - the legitimate program just gets an error, such as "Socket error" or "cannot connect to server". So it appears to be all or nothing, which I am not too happy about. Advice would be welcomed.
  4. 1 point
    WFC is now on version (released yesterday)
  5. 1 point
    To my knowledge, there has been no news about a free cry36 decryption tool. In the case of ransomware like this, which uses secure encryption and generates new public/private keys for every computer it infects, usually there is no way to decrypt the files without getting the private key from the criminals who made the ransomware. You can try a tool such as ShadowExplorer, however ransomware like this usually deletes Volume Shadow Copies, so ShadowExplorer will usually find nothing. Even if the Volume Shadow Copies were not deleted, the odds of finding backup copies of files in them is pretty slim, since Windows would normally only leave backup copies of files in the Volume Shadow Copies if you were using Microsoft's own backup software for data backups (although sometimes the System Restore will save copies of files in the Volume Shadow Copies). http://www.shadowexplorer.com/ In cases where the Volume Shadow Copies are deleted, then note that ransomware doesn't generally delete them securely, so it might be possible to use a file undelete utility to undelete the old Volume Shadow Copies, and then use ShadowExplorer to recover files, however this isn't necessarily straightforward to do (the computer will need to be running from a bootable disk to have write access to the "System Volume Information" folder, or the hard drive will need to be connected to another computer), and even if you can recover the old Volume Shadow Copies, as mentioned above the odds of there being backup copies of important files in them are low to begin with. Note that you may need to find a local computer technician who can assist you with this if you do want to try it. Here's a link to a list of file recovery tools at Wikipedia: https://en.wikipedia.org/wiki/List_of_data_recovery_software#File_Recovery
  • Newsletter

    Want to keep up to date with all our latest news and information?
    Sign Up