anyone not wanting to wait for Patch B to happen automatically, just set updating to manual, and add this url to update sources: http://dnl-test.kaspersky-labs.com/test/ap , then start an update and when its done, reboot
I had this issue and fixed it: I am mining for my windscribe account so my PC uses all available resources. Even though the miner runs with "idle" priority, it seems to still be enough to block the execution of the update. (I assume it waits for the CPU to be less active) Since I lowered the available CPU time for the miner from 100% to 94%, Kaspersky updates without problems.
there is an option in Kaspersky to delay updates if the computer is on battery/has heavy resource usage, disable that and should be fine and why is that
The test server will get you the patch but is updated less frequently. Most folks will have trouble going back to the previous settings, and you may get a test build if you stay on it.
http://any.ac/iK1I5M.png flicking enabled on the original and disabled on the test srv is hard for people? back to the application groups, it seems they tightened application control and made it so everything under 1000 users gets put to untrusted. in 2018 it was a smaller number
Simply enabling standard servers from that screen doesn't work. Updating from test servers overwrites the standard servers list and you have to manually input the standard server URL to get back. Also, switching between them isn't advisable if the patch from test servers isn't fully released across all standard servers, since you could end up with a mix of updated components.
nobody thought about reporting this to them? it seems to be a huge bug to me. you guys are right tho, went into the update details and it was using the test server.
It's not considered a bug as I have seen people complain but the test server is for test builds and I believe they consider that the end of the story.
well i reversed it back to normal, just had to find a non-test server, add it to the list, do an update and it's back to original. no clue if it reverted back to patch a tho, we will see
I have never had issues using that method with geo1 after testing a beta patch... I've been testing K for years...
Guys I just saw this. It's a feature that you can turn off, but what is the purpose of it? It seems quite weird and fishy to me, or is it normal AV behavior? https://twitter.com/netzor/status/833055382822064128
I've seen those scripts, in uBlock and such, but never looked at them. Hm... you can't trust anyone anymore. I really crave that next answer from them ... EDIT: Ah damn it. That's from 2017 Now I have to see for myself if they are still doing it. EDIT2: It disappears when you check: "Do not scan encrypted connections", which you should because it diminishes encryption or puts holes in it. EDIT3: Yep, still doing it. I attached the script for reference and testing, because I don't really know JS.
The purpose of it is actually very simple, to make Kaspersky modules (like Safe Money, Web-Antivirus, Phishing Protection, Anti-Banner) interact with the browser without need to have extensions installed on it.
http://any.ac/gymCYG.png i wonder how many people read through all the settings and what they do. christ some people
Parental Control COULD explain why it literally reads your search requests: "GetSearchRequest" But... I have trust-issues. Yes, but why? I don't see the context.