Ved config

Status
Not open for further replies.

Ved

Level 3
Thread author
Verified
Jan 19, 2014
116
Operating System:Windows 8.1 Pro

Architecture:64-bit (x64)

Level of computer security knowledge and awareness:
Medium

Last malware infection on your computer:
A few years ago(when i had Windows Vista)

Virtual-Machine Malware Testing:
  • No
Number of users for this machine:
  • I'm the only one who is using this machine (Private)
User Account Control settings:
  • Default - Notify me only when apps try to make changes to my computer
Real-Time Protection:
Eset nod32 version 7
Windows 8.1 inbuilt Firewall
Malwarebytes Anti-Malware (free)

On-demand scanners:
Malwarebytes Anti-Malware
Hitman Pr-Trial version
Emsisoft a-squared anti-malware

Other security related softwares:
Sandboxie

Backup and Restore:
Portable Seagate hard disk (1 TB)

Web Browser: (all updated)
Firefox (default)
Palemoon
Comodo Dragon internet browser
Comodo Dragon Ice
Srware Iron
Opera
Google Chrome
Maxthon

Browser Extensions/Add-ons:
Adblock Plus
NoScript
Downthemall

Other software installed on this machine:
CCleaner
Everything
TrueCrypt
AxCrypt
 

Exterminator

Community Manager
Verified
Staff Member
Well-known
Oct 23, 2012
12,527
Welcome to MT :) Thanks for joining :)

Config looks good but like Bora pointed out post it using the link in his post.
 

kuttus

Level 2
Verified
Oct 5, 2012
2,697
Hello and welcome to MalwareTips.

Hope that you enjoy your stay.

Have a look around the forum. You will learn quite a few new things here ;)

Once again welcome :)
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top