I'm using Avast Hardened Mode, & SysHardener & OSArmor, happy with it.Avast+ Syshardener combo the protection is top
I'm using Avast Hardened Mode, & SysHardener & OSArmor, happy with it.Avast+ Syshardener combo the protection is top
I deleted the BitDefender from my device and installed McAfee and discovered a trojan c:appdata
BitDefender did not detect it >
Thank you for your suggestion. I will learn a lot from it.:emoji_pray::emoji_clap:Read through the links that Kylprq has provided. I go agree with davisd. Regarding tweaking ESET @RoboMan will be able to help you out. He has helped me too but remember that copying settings is not the end thing. You have to be familiar with how each component works and learn about the product. If you allow or deny the wrong stuff, you either let malware in or you mess up your system.
Thank you for your suggestion. I will learn a lot from it.:emoji_pray::emoji_clap:
When making tests, one of the vital requirements is to have a proper test set. Unfortunately in this case you also included innoucous and grey applications / samples in the test set that are not subject to detection and then penalized ESET for not detecting or blocking the url.
Hello Marcos. I use ESET on my gaming PC and am a great fan of ESET. While ESET has great signatures malwares nowadays are becoming more sophisticated. Only using signatures is just a matter of time before an average user gets infected. I would really like ESET to implement a Behavioral Blocker with the ability to rollback changes(Kaspersky rocks here). The HIPS is pretty useless is Automatic Mode and the average user will not be able to use it in Interactive Mode since ESET does not have a list of safe applications in their cloud database. Hence the HIPS generates too much alerts. Imho ESET should really consider a BB like Kaspersky even if it means ditching the HIPS. J
Great to see you here!ESET has not used signature-based approach since NOD32 v1 which already leveraged heuristics to detect new malware not covered by signatures. Currently there are plenty of HIPS-based modules that are able to detect new malware based on its suspicious behavior. In particular it's advanced heuristics coupled with smart DNA detections, Advanced memory scanner to detect new malware upon execution, Exploit blocker to detect new exploits based on unusual behavior, ransomware shield detecting ransomware-like behavior, etc. All these leverage HIPS so HIPS is not a useless module at all. For a complete list of technologies that ESET has developed to combat new malware, please read more at ESET Technology. Moreover, in v12.1 beta a HIPS-based Behavior monitor was enabled to loudly report malware based on suspicious behavior patterns with Augur, the machine learning module, to follow soon.
ESET in default settings is meh. But if you know how to tweak it, it offers total lockdown security. My favourite paid AV's are ESET and Kaspersky. For free ones I prefer Kaspersky and Comodo.
Although I totally agree with you I think 99.% of people who buy ESET know nothing about it's need for tweaking & will never know, they don't inhabit security forums , never will & expect the product to work effectively 'out if the box' just like a vacuum cleaner or washing machine (they don't need tweaking) - Because of this they end up with 'meh' level of security. ESET among others need work on making the product people buy more effective without breaking the OS. NOD32 was really the first AV solution I bought, but if it don't work well out of the box it's more difficult to keep recommending to other who are none tweakers, so I look for solutions that do.
What I was objecting above was grey / clean samples that were included in the test set that were not subject to detection and for which ESET was penalized for not detecting them.
Do not know why you judge both ESET, it seems that Kaspersky also let pass the malware that crashed the machine.. If it is to put a module of behavior and be using too much CPU nor it would be worth it since ESET is also known for its low use of system resources, a good alternative would be to create a mode in HIPS where he would only ask if the reputation of the file was low or unknown.
If you think that ESET has missed malware that was supposed to be detected, please provide me with its hash for verification. Actually it's quite easy to find malware missed by most of other AVs which is detected and blocked by ESET but that's not a reason to consider the AVs bad. As it's been stated, there's nothing like 100% malware detection in the world of AVs.