Discussion in 'ESET NOD32 Antivirus/Smart Security Beta' started by zloyDi, May 7, 2011.
Does the version 5 of nod32 protects file HOST from the changes?
At first I thought that the HIPS could prevent this, by creating a rule for all applications to ask or block writing to the HOSTS file. However, it seems that the file protection only works for executable images ("modify image" option was the most approaching one), there's no "file modified" trigger; and the "modify image" one didn't work.
So, I guess the answer would be no, or not yet.
Why don't you set the HOST file as "read only" ?
I can do this, but most other users can't.
Your feature request has been logged in and is under consideration for a subsequent release of the software.
If you have UAC on isn't it already protected? Malware would need to elevate to use it.
Separate names with a comma.