Hi Huwge: If you scroll to the right in the Threat Log, it should show under the "Action" column "Connection terminated". If this is the case,...
I added the following to the Future Changes thread. *Submission System* Currently if a sample does not exist and is submitted, an entry is...
*Submission System* Currently if a sample does not exist and is submitted, an entry is made in the Event Log. An Event Log entry showing the...
Hi RejZoR: It should help. Just because you are submitting does not mean the system has to accept it. If the sample has already been...
Hi RejZoR: You may want to check out this thread. ;)
I know them all by heart. ;)
The /quit+ should perform that function.
Yes. The "/break-" is used to stop that from happening from a command line scan. ;)
Hi jim28277: Yes this provides the same protection as long as both are set to scan the same (files, types of infiltrations, etc). Using the...
To all who have been following this thread. ;) It appears to be a new strain of the Rbot series with the XTreme-Protector 1.05 packing method....
I have many samples that other AV detect as a threat, but when run come back as an "Invalid Win32 application" (i.e. non-functional sample). One...
Hi trock: In the Outlook message store (database where all e-mails are kept) when importing to Thunderbird there was a piece of malware in one...
You are welcome. In the configuration editor, those items marked in blue-green (turqoise?) will overwrite current settings. Items grayed will...
Hi Techie_Mark: Welcome to Wilders! Yes, when the client machine contacts the internal mirror for updates, the .xml (usually nod32.xml) file...
Hi burf: Please shut down Outpost and see if the files load normally. It may be a Trusted applications or Partially allowed applications...
Hi CyberMew: If NOD32 is set to Silent mode in the NOD32 System Tools/NOD32 System Setup - Setup, then the balloon will not appear (in addition...
Hi seamaiden: In the past 17 days 2 improvements have been made to NOD32. 1. The AH module has been improved for better detection...
Hi pc-support: This question is better suited for the Reseller forum. ;)
Hi Brian N: The ThreatSense technology uses the http protocol and not smtp to send the information/files to Eset.
Hi tp2005: A normal NOD32 exit code of 3 is virus in memory. Is the computer in question already infected? One could share out the...
Hi seamaiden: At the end is a good spot. ;) "%f" /scanfile+ /scanboot- /scanmbr- /arch+ /sfx+
Hi zilla1126: The Passview would most likely not be considered a "false positive" due to the nature of revealing passwords in protected...
Hi seamaiden: One can use the google toolbar features, right click on the page and have it translated into English. ;)
Hi cliff: One would have to manually add the file to quarantine and this only places a copy and does not delete the original. Check your...
Hi iNsuRRecTioN: No one is supposed to offer a 3 year license. 2 years is the limit and that comes directly from Eset. I hope this helps.
Separate names with a comma.