
Peter2150
-
Posts
591 -
Joined
-
Last visited
-
Days Won
18
Posts posted by Peter2150
-
-
Well you have basically two choices. Use EIS and forgo all the windows stuff, or PM one of the support staff and see if they will switch your key to EAM.
Pete
-
So if I disable Online Armor it must work?
Edit: I tried that, but no.
You'd be better off switching to Nat Networking. Then it will work well. I use Nat networking in VMware Workstation 11 and everything works fine, EIS, OA etc
Pete
-
Hello Peter,
What troubling me is not the windows firewall or the EIS firewall, i am using some tools in combination with windows firewall which have protected me for so long without causing me any trouble. Now, if i opt for EIS firewall, i have to forego all those tools and totally depend on EIS firewall.
scorpion
Hi Scorpion
Have you considered EAM and your firewall?
Pete
-
Hi Scorpion
One thing as I think about it. A bit ago I did try disabling the EIS firewall, and Installing OA. I don't remember any details, other than it wasn't a happy combo. Candidly I don't see what windows firewall gains you over EIS firewall.
Pete
-
HI Scorpion
I don't know on the firewall issue. I'd wait for the support guys on that. On the returnil thing, I can see that happening. I currently use ShadowDefender on occastion, and I don't know what would happen. One solution depending on how long you are in Returnils "shadow" configuration, might be when you go there turn off updates. Once you boot out it will reset. The other option is leave it on, do your work, and then turn it off prior to reboot.
I've never seen the issue with Shadow Defender, but I don't know if that was by design or chance.
Pete
-
EIS works fine with Sandboxie. It also works fine with Shadowdefender, so I see no reason it won't work with Returnil products. Only minor thing is if you reboot out of Returnil the signature will update. As to continuing to use Windows firewall, bad idea to ever use two firewalls.
Pete
-
Unfortunately, you do.
-
Hi PeterNauta
This last incident was unfortunate, but I think a lot of the testers like me don't yet have ipv6. Me thinks you would be a welcome addition to the test group, as you do have it. Might consider it.
Pete
-
I've run shadowed with SD, or accomplishing the same thing with AX64. Easiest thing is the latter, do nothing. When you reboot out of shadow mode or accomplish the same things with AX64, EIS will indded just update itself. Why chance messing something up with exclusions.
Pete
-
In a way this all makes me chuckle. First for the typical home user I agree with Fabian's assesment 1000%. I run other security software, because I am not a typical home user. I run my business on my computers, keep no paper records at all, have client financial information on these computers. Since my business is already a trust business, I feel obligated to close any and all holes, even if the probably of attack is near zero. Also a bit of research can be enlightening. Two examples
1. When the Bromium folks published their "work" they claimed to show how kernel exploits could undermine sandboxes, and almost every piece of software out there except of course theirs. And of course it's only sold to businesses. Well this kicked off a firestorm of OMG's, what do I do now stuff. FInally I did a bit of reseach on kernel expolits. Turned out better then 85% of the hits were bromium posts, the a bunch on kernel exploits in Linux, and finally a few pointing out how hard it was to write kernel exploits. I now consider it marketing.
2. Then there was the dequ epside and again people were wringing there hands. Once I realized it came via word docs, I yawned. EIS, plus most of my other software would have stopped it. But then a bit of reseach pointed out, it only targeted command and control facilities, and all but two of the attacks were all in one country. Would the typical user of EIS/EAM be a target? I don't think so, so Fabian's conclusions are spot on.
Pete
-
Hot fixes don't automatically seem to make it to windows update. I have installed it on all my machines and it solves a problem, and if there is no problem it doesn't do any harm.
Also don't assume being on windows updates means full testing. With the updates problems that for sure isn't true. Simple solution which you should do anyway. Back up your system, and then try it.
Pete
-
This needs to be answered by Emsisoft staff. If one doesn't know what fileless infection even is, you can't begin to answer the question
-
And hopfully all is well with your girlfriend
Pete
-
It is indeed a complete application. I have the system firewall totally disabled.
Pete
-
ROFL. Yeah the dinner date is the best solution. And yep rule 3 is appropriate.
Gee having your computer cry when it detects malware is almost laughable. Funny thing is when I accept the "suite" concept with EIS, I started looking at other suites out there. I found a) I didn't like them, and b) they weren't as effective. Emsisoft reigns as far as I am concerned.
Pete
-
Hi Hawki
Okay I'll byte. Since malware doesn't care about your girlfriend, I would go with what gives you the best and easiest protection. To me that clearly is EIS. Then I would sit down and have a heart to heart with your girlfriend about it.
Pete
-
Hello
I just routinely installed the hotfix on all my computers/snapshots when I did the last windows update. Fixed the bsod problem, and even where it wasn't yet needed caused no side effects what so ever. I'd recommend imaging and then install it.
Pete
-
Stay on 4570 until a beta is announced with LAN fixes. I've had the same types of problems, and a fix is being worked on.
-
Hi Steptoe
I would recommend looking at some system imaging programs like Macrium Reflect. That way you can restore your system to the exact same condition it was at the time the image was taken.
Also I can almost bet the OA driver can't be dropped into EIS code.
Pete
-
My first recommendation would be stop using Revo. There is a cleanup file, but I can't find the link. One of the emsisoft guys will help you on that.
What you might try in the mean time is reinstall the last one you installed, and uinstall it with the regular uninstaller.
-
I wouldn't do that. Are you behind a router. That will mess up results from Shields up. They way I tested there was no router.
-
I can answer no. 2 for you. I have one notebook, that I can connecct out via Verizons broadband network, so there is no router involved, hence no firewall in the router. I've tested EIS 9.0 agains GRC's port stealth test. Passed 100%.
Pete
-
Interesting the the original poster came here new, made three posts and has yet to return. Me thinks this thread is a good candidate for the trash can.
-
You don't actually have to add any exclusions. Just understand if you stay shadowed all day, when you leave shadow mode, the signatures will re download. Not a big deal.
Pete
VMWare and Online Armor
in Other Emsisoft products
Posted
Open workstation. Then open your machine, but don't power it on. You should see the devices on the left side. Double click on the network adapter, and change it from bridged to Nat.
Pete