Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
Video Reviews - Security and Privacy
ESET Internet Security 2019 Review
Message
<blockquote data-quote="509322" data-source="post: 780860"><p>Not really. Most publishers really don't care what security soft geeks and enthusiasts think. There are people who have brought stuff to me. I look at it carefully. And except for 1 or 2 cases I've just blown the reports off because the issue wasn't really an issue. In the mind of the reporter it was a big deal, but in reality it was nothing to fret about.</p><p></p><p>When people get all bent out of shape over a soft, then that is entirely irrational behavior. The reactions to this ESET test are way disproportionate to the actual issue - from both sides. Those that are upset that ESET failed and those who are doing their best to discredit the test. The emotions are very obviously running quite high.</p><p></p><p>ESET signature detection failed in a single instance. So what ? If a user downloads unknown files, opens those files on their system, and gets infected, guess whose fault that is ? It certainly isn't the AV publisher... because in their EULA it puts all responsibility onto the user.</p><p></p><p>Security software do not guarantee perfect protection. That's certainly true of default allow. Had the HIPS been used, ESET would have alerted the user and it's the responsibility of the user to know what to do.</p><p></p><p>People would do themselves a big favor by educating themselves instead of being entirely dependent upon (enslaved) to default allow security softs.</p><p></p><p>I know what Leo's opinion is... that the soft needs to do everything on behalf of the user. Wanting security softs that get it right 100 % of the time without user involvement is an unrealistic expectation. That's false hope. Technologically it is an impossibility. Go sell that crap somewhere else. However, the sad part is people keep buying into and believing the crap. And some don't understand how or why they got infected.</p></blockquote><p></p>
[QUOTE="509322, post: 780860"] Not really. Most publishers really don't care what security soft geeks and enthusiasts think. There are people who have brought stuff to me. I look at it carefully. And except for 1 or 2 cases I've just blown the reports off because the issue wasn't really an issue. In the mind of the reporter it was a big deal, but in reality it was nothing to fret about. When people get all bent out of shape over a soft, then that is entirely irrational behavior. The reactions to this ESET test are way disproportionate to the actual issue - from both sides. Those that are upset that ESET failed and those who are doing their best to discredit the test. The emotions are very obviously running quite high. ESET signature detection failed in a single instance. So what ? If a user downloads unknown files, opens those files on their system, and gets infected, guess whose fault that is ? It certainly isn't the AV publisher... because in their EULA it puts all responsibility onto the user. Security software do not guarantee perfect protection. That's certainly true of default allow. Had the HIPS been used, ESET would have alerted the user and it's the responsibility of the user to know what to do. People would do themselves a big favor by educating themselves instead of being entirely dependent upon (enslaved) to default allow security softs. I know what Leo's opinion is... that the soft needs to do everything on behalf of the user. Wanting security softs that get it right 100 % of the time without user involvement is an unrealistic expectation. That's false hope. Technologically it is an impossibility. Go sell that crap somewhere else. However, the sad part is people keep buying into and believing the crap. And some don't understand how or why they got infected. [/QUOTE]
Insert quotes…
Verification
Post reply
Top