Jump to content

ruirib

Member
  • Content Count

    69
  • Joined

  • Last visited

  • Days Won

    1

ruirib last won the day on November 4 2013

ruirib had the most liked content!

Community Reputation

2 Neutral

About ruirib

  • Rank
    Active Member

Contact Methods

  • Website URL
    http://ruirib.net

Profile Information

  • Gender
    Male
  1. Is there no longer a combined offer for EAM + OA? Without it the renewal price is double when compared to last year... Thank you.
  2. Thank you for that reply, Fabian. I appreciate the candor, which I have seen in past replies, as well. My reason to use EAM and OA is to get a double layer, security wise. I am honest, and if I had to go with a single one, I would go with OA instead of EAM, for the simple reason that OA, in what regards HIPS features, is based on whitelisting and I really don't know of a more effective way to fight unknown malware. As good as behavior detection may be, even recent results show that it's not without failures. By going with the new EIS, even with a better firewall, the best OA feature, malwa
  3. In a way, I am trying to get definitive answers to that. It seems that EIS doesn't do that. There is no whitelist of allowed programs, so the HIPS part seems to be gone. The firewall may be better and clearly the interface seems simpler, but it is a lot less informative. If first impressions are confirmed, I think EIS is clearly different from EAM + OA and it provides one less layer in terms of protection. To be honest, I find the offer to upgrade EAM + OA to EIS to be a bit deceptive, as it implies the packages are identical in function. I found the program whitelist was the OA feature I valu
  4. As stated by the title, is it fair to say that? If so, what advantages does EIS (whatever the version number is) bring when compared to an EAM + OA combo? And while you are at it, would you state the disadvantages, from the perspective of the manufacturer? I am running the new EIS version, but seeing the almost complete lack of control over the firewall and the apparent loss of the HIPS features, I am wondering whether i jumped the gun, when I upgraded my licenses. That's obviously my fault, of course, but I would still like to know your opinion on the questions above. Thank you.
  5. You are really seeing the effect of the ill conceived dual nature of the Windows 8 UI. I can bet that when you are trying to add an app, if you move the mouse to the top left corner, you will see OA asking for your input. Should the notification show on the Windows 8 tiled interface? I am not an expert on what Windows 8.x allows in terms of what non Windows 8 metro apps can use for notification, but I haven't seen a such an app showing notifications when you are in the metro UI. That said, the advice given is a good one. You know when you are going to install apps, so if you are really kee
  6. Fabian, Thank you for your replies. I think there is no point in debating every single point you made, since we would disagree. I think I have stated my concerns and you have provided your views in a clear manner. I think I will agree with you on that initial statement about OA not being known for being an excellent firewall. That seems clear, now. I hope EIS is a better solution, in that respect. Regards
  7. Well, it may be a matter of semantics, but I would call it more of a power user scenario. Any user with a bit more knowledge and a willingness to experiment may install software that communicates over any given port and it should be possible to use OA to protect such ports with minimum effort (or none at all, preferably). Damn, wish you would have told me that about 5 years ago, been wasting license money all this time . Thanks, I appreciate you showing that. As I said before, many people use laptops out in the wild, with no firewall in between. These users su
  8. Why do you think only enterprise scenarios would need this? I am a developer, I have MySQL and SQL Server installed both on my desktop and laptop, as I need them for development work. I run my own network at home and I use my laptop in multiple networks. I have my network cards as untrusted in OA and I individually trust machines I want to allow access to my computers. It works fine at home but, in the case of the laptop, I want to use it in whatever networks I intend without need for reconfiguration and I would like it to be stealth and for sure wouldn't want RDP attempts to occur from machin
  9. RDP works fine when part of the restricted ports list and the connecting computer is trusted or the network is trusted. The issue is precisely of relevance when you are not behind a hardware firewall, which happens often enough, as it doesn't seem that you want OA to be bought only by those that use it behind a hardware fireall. In such a situation, it would be expected that OA provides complete stealth. Hey, the Windows firewall does it, how is it understandable that OA does not? It would provide a better degree of control. Your reply applies to multiple situations where you are
  10. It would be interesting to have a reply to the concern's about OA's default configuration here and not on Wilders. This is the place where people that use OA should expect a decent reply to the very disturbing results in AV comparative's test. I also find Fabian Wosar's reply to the RDP issue (basically confirming RDP access will always be allowed by default, since the RDP port is not part of the restricted port's list) to be quite surprising. How is it acceptable that in its default configuration, OA behaves worse than the native W7 firewall?
  11. Never mind, I see this was discussed here: http://support.emsisoft.com/topic/14065-online-armor-fares-poorly-in-latest-firewall-test/
  12. The test results are available here: http://www.av-comparatives.org/firewall-reviews/ It is quite surprising that OA had such bad results, when the network is configured as a public network, in Windows. Can anyone from Emsisoft provide a no BS assessment of these results?
  13. Another quick question - with file guard, is it enough to exclude the folder and that will mean all executables in such folder will be excluded as well?
  14. As the title says. To exclude a program from being monitored, is a program rule enough, is it enough to add a fileguard whitelist or should both be added. The manual is incredibly poor, the concepts are much more important than how you do it in the interface (which is pretty obvious).
×
×
  • Create New...