Jump to content

Leaderboard

  1. GT500

    GT500

    Emsisoft Employee


    • Points

      866

    • Content Count

      13994


  2. Kevin Zoll

    Kevin Zoll

    Emsisoft Employee


    • Points

      300

    • Content Count

      18852


  3. Fabian Wosar

    Fabian Wosar

    Emsisoft Employee


    • Points

      298

    • Content Count

      4407


  4. Elise

    Elise

    Emsisoft Employee


    • Points

      271

    • Content Count

      8408


Popular Content

Showing content with the highest reputation since 10/13/09 in all areas

  1. Note: It is recommended to make a backup of all important files before using the decrypter. Link to decrypter download page. <- The decrypter will tell you if your files are decryptable, whether you're dealing with an "old" or "new" variant of STOP/Djvu, and whether your ID is online or offline. Link to instructions for using the decrypter (PDF). Link to "file pair" submission form. Link to more information about the decrypter. <- Article at BleepingComputer.com Link to more detailed information about STOP ransomware (covers more than just STOP/Djvu). <
    8 points
  2. Official word is, "yes". We will give free license extensions to anyone who upgraded to Windows 10 and was unable to use the firewall. Once the issue has been resolved, please either submit a support ticket in our helpdesk system, or send a Private Message on the forums to me (English Support) or Thomas Ott (English/German Sales). Be sure to mention that you would like to have your license extended due to the Windows 10 issues and include in your message any license keys that were in use on a computer with Windows 10. Feel free to link to this forum post if you would like to.
    7 points
  3. As announced earlier, we are changing our firewall strategy and will soon merge Emsisoft Internet Security with Emsisoft Anti-Malware, effective as of our next release in October. Instead of developing our own firewall module, we’re going to rely on the built-in Windows Firewall core that has proven to be powerful and reliable. Its only weak point is the fact that anyone can freely change the firewall configuration. In other words, if malware manages to run on the PC with sufficient administrator permissions, it’s able to allow itself to get through the firewall. To resolve this vulnerability
    6 points
  4. Ransomware infections are unique in many ways. Most importantly, a lot of the natural instincts which are usually correct when dealing with malware infections can make things worse when dealing with ransomware. Please see the following steps as a guideline when dealing with your ransomware infection. Do not delete the ransomware infection The natural instinct of most users is first to remove the infection as quickly as possible. This instinct is, unfortunately, wrong. In most cases, we will require the ransomware executable to figure out what exactly the ransomware did to your files. Fi
    4 points
  5. Guten Tag, Wir haben mittlerweile mehrfach etabliert, dass Emsisoft nicht das Programm Ihrer Wahl ist. Sie haben sich bereits anderweitig ein Antivirus gesucht, dass auch noch dreißig weitere Funktionalitäten mitabdeckt. Fakt ist jedoch, dass viele Leute eben auch ein Antivirenprogramm suchen, dass nicht noch fünfzig Extras mitbringt, die man nicht will oder nicht braucht. Für diese Leute gibt es eben Emsisoft Anti-Malware und die meisten unserer Kunden sind mit der Tatsache, dass es eben 'nur' ein Rundumschutz für den Rechner ist und nicht mehr, zufrieden. Für all die angesp
    4 points
  6. Which for everything related to our core technologies (engine, behavior blocker, cleaning engine) would be me. Hi, nice to meet you! Next time someone looks strange at me for talking to myself I can now point them to this post and tell them you asked me to talk to me . Your argument is that we chose Bitdefender because it is "the best". Both Kaspersky as well as Avira consistently score higher in pure on-demand tests than Bitdefender does. If you consider PUP detection ESET is a superior contender as well. We considered all of them at one point or another but they were discarded for various re
    4 points
  7. Actually, there is a system behind it: My workstation computers are named after noble gases, like Krypton or Helium. Computers that I only use temporarily or belong to guests are named after transition metals like Titanium. Non-computer devices like smartphones are named after non-metals like Oxygen. All systems and VMs that are used for malware testing are named after radioactive elements like Uranium. Needless to say my WLAN and local workgroup is called "Periodic Table". And yes, I spent a significant amount of time coming up with that system and I am proud of it .
    4 points
  8. Everything is clear, except the parts that are in Russian. I'm going to send you a private message with some instructions.
    3 points
  9. It means that the tests done by AV-C and AV-T have a clear image of how they think AV software should work. The problem arises when your product doesn't fit the mould. Then you get penalized for not doing what everyone else does, even though what everyone else does may not be in the best interest of the user, to begin with. Best example: Snooping around in your encrypted connections, which literally every AV vendor screwed up at least once in the past and probably will continue to happen, exposing users to potentially greater risks than most malware does. For starters, the test sets ar
    3 points
  10. Please note that Emsisoft Anti-Malware for Windows XP hasn't been updated (as in program updates) in over 2 years, and we never intended on continuing long-term database update support for it. In fact, we discontinued our own database updates for it over a year and a half ago, and those still running Emsisoft Anti-Malware on Windows XP have only been receiving BitDefender database updates. We've decided that it is time to stop redistributing those BitDefender updates for Windows XP, as all they are doing is giving those on Windows XP a false sense of security. In addition, it is extremely
    3 points
  11. Wenn alle Features eingebaut würden, die Galaxy wünscht, dann würde ich EAM sofort deinstallieren. Ich mag das Programm so wie es ist und hoffe, das bleibt auch so.
    3 points
  12. Is this working OK now for everyone else? If it is, then there's no need for any more logs. All we needed was a traceroute to send to our CDN provider to help in identifying the server that was having the issue, and I managed to get one of those the other day.
    3 points
  13. @achtsam Es wird eher langsam Zeit, dass Du deinen privaten Kreuzzug einstellst. Das nimmt ja wirklich paranoide Züge an.
    3 points
  14. Hello, a2guard.exe is the visible protection process (to put it simple, the Emsisoft icon you see in the system tray). However actual protection drivers start a lot earlier. For example epp.sys (the Emsisoft Protection Platform driver) starts very early in the Windows boot process in order to ensure a protected system even when no user is logged in yet and no other programs have been started.
    3 points
  15. Today, we've received information that our Dutch team member Rob R. passed away yesterday afternoon, after suffering from an unexpected heart attack last Wednesday. Rob was our lead software tester and we always admired him for his special eye to track down the most tricky bugs. He joined our team more than five years ago by voluntarily sending over a brand new and complete Dutch translation of our software. Shortly after he initiated our efforts in offering physical delivery of our software on CD boxes and USB sticks. He also demonstrated a great interest in testing security software wh
    3 points
  16. Hardik587 You are indeed becoming most wearisome. There is an old expression among diehard Texans. "No matter how much you kick a dead horse it won't get up" This is exactly what you are doing.
    3 points
  17. Hello, please send me your license key via PM (personal message). I will add some days to your key as a sign of goodwill.
    3 points
  18. Our recommendation is to save a backup of your encrypted files and keep it in a safe place in case decryption is possible at some point in the future. We also recommend keeping an eye on BleepingComputer's newsfeed, as they will usually report on new developments with ransomware decrypters: https://www.bleepingcomputer.com/ If you have an RSS feed reader, then they also have an RSS feed so that you don't have to manually check for news: https://www.bleepingcomputer.com/feed/ There is no way to know for certain, however it is theoretically possible that someone may be a
    2 points
  19. DrWeb support usually do not use international names of ransomware.
    2 points
  20. The ransomware doesn't need to put important information on the same hard drive/partition as the files it encrypted. This is why I recommend waiting to reinstall Windows.
    2 points
  21. My WSC does not recognise EAM either. Recommending that we should "uninstall EAM, restart the PC twice, and then reinstall EAM", on top of having to constantly disable and re-enable EAM components to deal with the still unfixed issue of excessive CPU usage, is uncceptable for a piece of software that is not exactly cheap.
    2 points
  22. We can take a look at it if you find it again, however it's more than likely that each computer will require a different private key to decrypt files, and thus the decrypter will only work on a specific computer.
    2 points
  23. I have provided links to the analyzes above. Specialists Emsisoft will receive these files.
    2 points
  24. The Emsisoft Browser Security extension is now available on the Microsoft Addons store for Chromium Edge: https://microsoftedge.microsoft.com/addons/detail/jlpdpddffjddlfdbllimedpemaodbjgn Hopefully we'll be able to update EAM soon to check whether or not it's installed when you launch Chromium Edge.
    2 points
  25. Such tests aren't reliable. They aren't actually malicious, and may not be blocked by our Behavior Blocker like real ransomware would.
    2 points
  26. @adityagede99, @Chinnhoo Computer, and @Kotari koteswararao this is a newer variant of STOP/Djvu, and your ID's are online ID's, so there is currently no way to decrypt your files. There is more information at the following link: https://support.emsisoft.com/topic/32045-about-the-stopdjvu-decrypter/ @Surasri this is a newer variant of STOP/Djvu. Fortunately your ID is an offline ID, however we don't yet have the private key for it. I recommend running the decrypter once every week or two so that you can see when we've been able to add the private key for your variant. There is more
    2 points
  27. @m2413 and @Juroan24 private keys for offline ID's are added to our database once we are able to find them. Just run the decrypter once every week or two in order to see when we've added the private key for your variant.
    2 points
  28. Hi @Kevin Zoll, Thanks for your comprehensive answer. Also I just read that informative post written by @GT500 I'm sure you'll find how to fix this issue someday As far as I can see for now, unfortunately, I think I should clean my driver from [useless] exe.topi files and go on... Thank you again.
    2 points
  29. Hi Marshall. Not sure, but I do know that I recognize the URL of "MVPS Hosts" and I recognize the list. I don't recognize the list attached to MVPS Hosts (Domains). To view the list, click the blue "Details", "View" & "Original" buttons - see image. Sorry I couldn't offer a better explanation.
    2 points
  30. Other companies have 10 to 100 times the number of employees we do. Having one person there that fixes bugs in Windows Insider builds isn't much of an issue there. However, us doing that would mean ~30% of all development time disappears to keep a couple of hobbyists happy who use a system that is not intended for use in production systems on their production system. We do include insider builds in our QA runs, so we know if or what is broken so we can fix it in time for a release. But unless something is fundamentally broken, risking system security or stability, we won't fix bugs specific to
    2 points
  31. You can see this on several programs. Service and drivers are up, but GUI hasn't caught up. It's not a problem.
    2 points
  32. Hello to you all, l don't know how some of you are going to react to my post but the end is what matters. On Friday morning we (company) where infected from the Cry36 Virus(Ransom). Our Server 2008R2 was with anti-virus and with Windows Update.. up to date.. At the time we had a external Hard drive connected to the server (the only one we had) since we didn't have a duplicate due the second one failed on us. Due to hard times here in Greece we thought that one hard drive was enough. Since our server was under repair with a raid problem we had an live backup.
    2 points
  33. For reinstallation media, always use the Media Creation tool to ensure as much updates as possible are included (this is generally a good idea because it also reduces the amount of updates you'll have to install after installation): https://www.microsoft.com/en-gb/software-download/windows10 As for the rest, the vulnerability is/was in the SMB (server message block) protocol, which is not something an average home user requires, if you are concerned you can just reinstall Windows without network connection, go to Programs and Features > Turn Windows Features On and Off and in the popul
    2 points
  34. It doesn't matter if it is securely transmitted or not. Your browser decrypts the HTTPS traffic when it is received, so the file would be saved in its original form, and our protection would catch it either way. HTTPS (secure connections) are only intended to keep information being exchanged over the Internet private. For instance, if you do a search on your favorite search engine, and the connection to their website uses HTTPS (and thus is secure), then when the NSA records the data that is sent from your computer to the search engine tell it what you want to search for, that data is encrypte
    2 points
  35. Browser Integration (assuming you mean browser extensions) - This sort of thing is generally used to generate revenue by hijacking your browser search settings, or tracking your browsing habits. Since we have no interest in doing such things, and a browser extension wouldn't provide any real increase in security beyond our Surf Protection, File Guard, and Behavior Blocker we don't feel that browser extensions should be bundled with our products. Pop-Up Blocker - Pretty much every modern browser already has a built-in pop-up blocker, so such a feature would just be a gimmick used to drive
    2 points
  36. The following innovations make Online Armor 5.5 our best firewall ever: Integration of Anti-Malware Network: Unknown programs are immediately cross-checked against the cloud. The Online Database contains around 4 million entries and relies on the intelligence of the cloud. Programs considered harmless are automatically permitted, while annoying pop-up windows and alerts are omitted. So you can totally focus on your work! New cloud-based scan: Our cloud scan, already used in Emsisoft MalAware, has been included in Online Armor. Even if there is no record of a file in the Anti-Malware Netw
    2 points
  37. Thanks, works great, thanks for all the feedback in this thread and for getting it sorted.
    2 points
  38. Perhaps add to EAM an option to disable this feature? Not all of us are gamers ..............................
    2 points
  39. Hallo und vielen Dank für die Anfrage bei uns im Support-Forum. Bitte vielmals um entschuldigung, bei einem Upgrade zu Emsisoft Internet Security wurde scheinbar die Rabattstufe nicht richtig auf den neuen Lizenzschlüssel übertragen. Ich habe das nun für Sie nachgeholt und eine Verlängerung mit angemessenen Kunden- und Mengen-Rabatt ist nun über unsere Verlängerungsseite möglich: http://www.emsisoft.de/de/order/renew/ Da das Lizenzende schon sehr bald eingetreten wäre habe ich die Lizenz ein wenig verlängert so dass genügend Zeit für eine Verlängerung übrig bleibt. Vielen Dank
    2 points
  40. just click the 'more reply options' button and attach any file to your post.
    2 points
  41. Isabelle, I am going to have you run 2 tools that target Adware and Junkware in general. Download AdwCleaner and save it on your desktop. Close all open programs and Internet browsers (you may want to print our or write down these instructions first). Double click on adwcleaner.exe to run the tool. Click on the Scan button. After the scan has finished, click on the Clean button. Confirm each time with OK. You will be prompted to restart your computer. A text file will open in Notepad after the restart (this is the log of what was removed), which you can save on your desktop. Attach that l
    2 points
  42. Hallo Marian, Testberichte die sich mit unseren Softwareprodukten befassen können gesammelt unter http://www.anti-malware-testberichte.de/ eingesehen werden. Die Entscheidung "nur" an den AV-Comparatives und VirusBulletin - Tests als große Testanbieter teilzunehmen hatte rein wirtschaftliche Gründe. Wir investieren unsere begrenzten Ressourcen in die weitere Entwicklung unserer Produkte anstatt durch weitere Tests Bestätigungen unserer Leistungsfähigkeit zu generieren.
    2 points
  43. You have to be careful if you are behind a router. You may just be testing that.
    2 points
  44. I don't have any insight in the test-methodology apart from what the article states, but a few observations make me doubt the relevancy of this test: The test compares a number of different products: antirootkit scanners and anti-malware scanners. This makes no sense to me. TDSSkiller is an excellent Antirootkit scanner in my opinion, but it is a limited tool, you cannot compare this with a anti-malware scanner like EEK or MBAM because its simply a different product. The tested malware is for the most part very, very old and not seen in the wild anymore, even though the article states 2015
    2 points
  45. At the moment it is not possible to delete multiple lines at once. I have made a suggestion internally to add it though.
    2 points
  46. I personally don't care which company within the Emsisoft program detects a pup. I just want it detected.
    2 points
  47. As long as you restart the guard process after it crashed, it shouldn't make a difference.
    2 points
  48. If a license key for Emsisoft Anti-Malware is remapped more than 5 times in a day, then our system will lock out any further remaps for 24 hours. If you contact support, we can clear the mapping history manually if needed. In your case, this shouldn't end up being an issue.
    2 points
  49. Online Armor covers all these applications except the "Behavior Blocker" part. Behavior blockers and HIPS in the same product are pretty much mutually exclusive. They essentially both refer to the same underlying technology. The only difference is the way decisions are made on whether or not to allow a certain action. A HIPS will ask the user, while a behavior blocker tries to figure everything out on its own. Given that it should be obvious why those modes are mutually exclusive and why running both at the same time makes little sense: You can't both ask a user about everything and not aski
    2 points
  50. Wow! That would be small thing to forget "ThreatFire"... you mean (?) And?... Please tell if you found the cause related to that. ====== most likely redundant info below Anyway since I prepared some after reading your previous reply I will post it ... even if nothing applies it may help in other situations ======= I am not sure I can see how that related to A-M at the moment from the description, except you are saying that disabling the guard helps. I am not using Vista but I hope that H_D may help to provide Properties info for the standard Notepad and you can do the same. a
    2 points
  • Who's Online   0 Members, 0 Anonymous, 53 Guests (See full list)

    There are no registered users currently online

  • Newsletter

    Want to keep up to date with all our latest news and information?
    Sign Up
×
×
  • Create New...