Anti-Spyware

Spyware is software that aims to gather information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge; it has also come to include programs that engage in various kinds of electronic fraud. Anti-spyware is software that removes or blocks that software; some common vendors include Malwarebytes, McAfee, Spybot-Search and Destroy, Ad-Aware and BitDefender.

Share tech news, updates, or what's on your mind.

Sign up to Post

Symantec Endpoint Protection Manager not getting updates after upgrading to 14.2 build 770

upgraded my symantec server to latest version and no live updates is getting downloaded, i uninstalled live update and reinstalled. also registered with SEPM via command prompt
1.png
0
Challenges in Government Cyber Security
Challenges in Government Cyber Security

Has cyber security been a challenge in your government organization? Are you looking to improve your government's network security? Learn more about how to improve your government organization's security by viewing our on-demand webinar!

What is the easiest and most effective way to get rid of the Trojan.JS.Dropper.E?
1
I have a Windows 10 Desktop PC.

I turn on my computer and noticed these windows on my desktop as soon as I turned on my computer.

ads on  my desktop pc
I googled it and read that these are scam ads wanting you to click on them.

How do i remove them? Anyone know?

I ran Spybot - Search & Destroy but it didn't find anything.
I ran Windows Defender and it didn't find anything also.
0
Symantec Endpoint Protection (SEP) how can I install the agent with out a SEPM server ?

I want to be able to install a SEP agent on a local machine with out pointing to any master server ,

I want to install just the agent on the windows box and at some time later point to a master server for SEPM

here is a link that is some help but does not fully answer my question
https://support.symantec.com/en_US/article.TECH171767.html

thanks !
0
Hi,
Is there any better Anti-virus tool in Windows server? In the attached screenshot, would Clamwin further totally remove the virus or not?
0
Hi,

I got this message (The file c:\...\.ost cannot be accessed because another workstation has modified it. Close and then restart mail enabled applications. You might need to restart your computer)
is this means somebody spying on my computer ?
I am afraid somebody implanted a key logger in my computer
0
If you have a Sonicwall to protect the network and Anti-Virus on each computer/server, is it safe to turn off Windows Firewall?
0
Are 32 bit computers at a higher risk of Anti-Virus, Malware or Ransomware infections?

We have a few left and I need to know if I should trash them ASAP.
0
Hi all,

we are searching for the best endpoint protection available for SMB. I am looking for the top 3. Currently we are working with Kaspersky Endpoint Security.

Anyone any suggestions?

Thank you,
0
can an installed .exe file on windows os see all my key strokes
I have a custom made .exe file that appears to me to run correctly
but may have additional secret permissions

by installing any program
could a keylogger be built in

dont just tell me to run virus scan
1
Why Diversity in Tech Matter
LVL 12
Why Diversity in Tech Matter

Kesha Williams, certified professional and software developer, explores the imbalance of diversity in the world of technology -- especially when it comes to hiring women. She showcases ways she's making a difference ithrough the Colors of STEM program.

Learn to use the POWER of Mailwasher Pro - Part 2
This is Part-2 of Learning to use the Power of Mailwasher Pro so if you haven't watched Part-1 yet, I urge you to do so before watching this video. Click this link to watch Part-1.

Ok, that out of the way, what we're going to cover here is how to setup additional Email accounts in Mailwasher, along with how to classify what "you" consider to be spam and what you don't. Also, we'll be looking at how we can recover deleted emails, even if you've cleared your Deleted Items folder in Outlook and more.

Remember the old adage of One Man's Rubbish is another Man's Treasure? Well, that's why I dislike Online Spam Filtering services and prefer tools like Mailwasher because it gives me total control - a control that you should have too and in doing so, never having to lose a genuine email again.

Finally, if you found this video helpful, please do click that Thumbs Up button below.

It really helps me out and provides me with positive feedback
.


With that said, let's get on with the show. I hope you enjoy the video(s)

Enjoy!

About the Author: Andrew Leniart is a self-employed IT Professional and Freelance Journalist with over 25 years of experience in using, fixing and troubleshooting Windows computers, dealing with a wide variety of installations, operating system versions, and software. He currently holds the Senior Editor position at Experts Exchange.

1. Introduction.

(00:00 - 00:20) An introduction on what is going to be covered in this episode.

2. Manually setting up an email account.

1
Learn to use the POWER of Mailwasher Pro - Part 1
If you, like me, have a dislike for using Online Subscription anti-spam services, then this video series is for you. I have an inherent dislike of leaving decisions such as what is and what isn't spamming to other people or services for me and insist on being able to make those decisions for myself.

Why?

Because as the old adage goes, one man's trash is another man's treasure. This video series is about a tool that I've been using for over 15 years now and as a result, my Outlook inbox has been 99.99% free of spam for many, many years. Yours can be too and it's easier than you may think!

This Video Tutorial shows how to obtain and install a tool called Mailwasher Pro which in this authors opinion, is one of the best Anti-Spam utilities available on the market. As mentioned previously, I've been using Mailwasher for over 15 years now and can honestly say that my Outlook Inbox is 99.9% free of Spam.

This is a multi-part series that goes into not just installation and use but shows you advanced configuration options to train Mailwasher Pro to know exactly what YOU consider to be spam, rather than rely on online services who make those decisions for you.

For those of you that prefer to read articles rather than watch videos, please check out the articles I've written on this topic and published on experts exchange at the following links:

Learn to use the POWER of Mailwasher Pro - Part 1
Learn to use the POWER of Mailwasher Pro - Part 2

1
Mailwasher Pro
Tutorial: In this part of my series, I'll be explaining how to set up an IMAP connection in Mailwasher and Outlook and also explain the differences of how Mailwasher handles POP and IMAP connections. Enjoy!
1

Expert Comment

by:Nick Bolton
Comment Utility
Excellent, I think a lot of users get stuck on the email settings parts and what they mean, so this guide makes that a lot clearer.
1
LVL 20

Author Comment

by:Andrew Leniart
Comment Utility
Thanks for your comments Nick and I'm glad you approve. I'm writing these articles so that people can learn to use the power of this tool and enjoy it's functionality just as I have been for so many years.

Regards, Andrew
0
Mailwasher Pro
An explanation of How the Recycle Bin works and how to configure it so that it works for you just as you want. Enjoy!
1

Expert Comment

by:Nick Bolton
Comment Utility
Thanks again Andrew, you write so well!
1
LVL 20

Author Comment

by:Andrew Leniart
Comment Utility
Thank you very much for the kind compliment Nick!

If you would be so kind as to endorse the article by clicking the thumbs up at the bottom of the article, (to the left of the word comment) I'd very much appreciate it :)

Part-4 of the series is almost written and will be published soon!

Best regards,

Andrew
0
Mailwasher Pro
Part 2 of my series about Mailwasher Pro. Learn about what Mailwasher is and how to massage this tool to your own specifications with some powerful configuration options that many users overlook, and by doing so, you can, like me, enjoy a totally spam-free inbox. Enjoy...
1

Expert Comment

by:Nick Bolton
Comment Utility
A great follow on from Part 1 on how to get the spam filters to work for you.
0
LVL 20

Author Comment

by:Andrew Leniart
Comment Utility
A great follow on from Part 1 on how to get the spam filters to work for you.

Thanks for the kind comment Nick and once again, welcome to Experts Exchange! Watch out for Part-3, being written now and will soon be published.

Best...

Andrew Leniart
0
Mailwasher Pro
Mailwasher Pro by Firetrust is powerful anti-spam utility, ideal for managing both POP and IMAP connections. Read this series of articles to learn how to setup and take advantage of its great features!
1

Expert Comment

by:Nick Bolton
Comment Utility
Great introduction to setting up and getting started with MailWasher Pro. Thanks Andrew!
1
LVL 20

Author Comment

by:Andrew Leniart
Comment Utility
Great introduction to setting up and getting started with MailWasher Pro. Thanks Andrew!

Hi Nick and welcome to Experts Exchange! Thank you for your kind comment and also for endorsing the article with a thumbs up. That means a lot to me so much appreciated.
0
I have an issue where I'm sure someone is hacking our network, specifically four machines.  I have witnessed them going into my home folder and deleting my trash on these machines.  They are also able to change the camera settings.  For example, they're zooming in to locations.  They are doing playback.  This all happens between the hours of 12am-2am.

I'm using:
Windows 10
Palo Alto Networks
Security Camera Milestone software.  https://www.milestonesys.com
The cameras are made by Mobitics.

What I've narrowed it down to is this happens when the security camera milestone software is up and running on the four machines.  When I turn that software off there's no connectivity or suspicious things going on.

What I need to know is how do I find out who is doing this?  How can I get an IP address?  Are they inside my network or outside my network?

I would even appreciate a recommendation of a security company that knows how to track intruders down.

Note:
I've checked the parking lot and areas of the campus to see if someone is psychically here, but I don't see anyone.  I've also contacted Milestone software and they've recommended I change my password and the camera's password, but we are still having an issue.
0
Has anyone implemented a rule on  ESET ERA Admin Portal which blocks USB devices but still allows phones to be charged?
0
AV software best compatible with O365. Any suggestion? Local outlook emails? Thanks
0
Webinar: What were the top threats in Q2 2018?
LVL 1
Webinar: What were the top threats in Q2 2018?

Every quarter, the WatchGuard Threat Lab releases an Internet Security Report that describes and analyzes the top threat trends impacting companies around the world. Are you ready to learn more about the top threats of Q2 2018? Register for our Sept. 26th webinar to learn more!

A Trickbot Infestation has ravaged my network. It has wormed its way on to all workstations and servers. Does anyone know how to eradicate it and keep it from re-infecting other computers? If not, does anyone know of a company that specializes in removing this particular malware. I've tried different malware software removal tools and they identify and  remove it but it keeps coming back.
0
I have a question about Symantec Endpoint Protection.  We are trying to block USB access but are running into an issue with one of our devices.  From what I can tell, things like imaging devices are not supposed to be blocked.

However, many of our stations have ID scanners that are being blocked.  When I look in the device manager the ID scanners do show up as imaging devices.  

I'm not seeing how you white list a device.  

Thanks in advance for any help.
0
A friend is using Windows 10 (which is kept up to date).
He also has AVG Antivirus.
He normally uses Paypal for purchases (without any problems).

This morning, within an hour of using his actual Visa Debit Card on Government
website (motortax.ie) his card number was fraudulently used on some dating website.
(The bank phoned and cancelled the transaction and his card).

I'm going to run some scans tomorrow
- MalwareBytes scan in safe mode
- Hitman pro
- AVG

Any other suggestions?
0
Good evening Experts,
I have just been repairing my computer from a malicious virus. I could not use virus/malware software (MalwareBtyes, Superantispyware, and Spyhunter, on my machine because the malware/virus disabled them, so I used BitDefenders Rescue usb to kill most of the problems. I finished off the rest of the malware/viruses using my regular software (MalwareBtyes, Superantispyware, and Spyhunter). The system stable except for a couple of issues:
1.      My folder indexing does not work and I would like an expert to help me fix it. However I did download a free search program call everything and it is more robust than the Windows 10 index\search. I still need a solution for why the windows indexing\search is not letting me search inside of folders.
2.      This second issue is more critical than the previous one. For some reason when I login to any of my accounts: THANOS, IMRIC , ADMINISTRATOR, the desktop icon for the user profile defaults to (Folders)

Any help the experts can give me will be appreciated.
Regards,
Regis Hyde (BlackTHanos)
0
does norton go after viruses
malware bytes goes after malware

do I need both

windows10
0
How can I remove maleware bytes trial and get another trial


windows 10
0

Anti-Spyware

Spyware is software that aims to gather information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge; it has also come to include programs that engage in various kinds of electronic fraud. Anti-spyware is software that removes or blocks that software; some common vendors include Malwarebytes, McAfee, Spybot-Search and Destroy, Ad-Aware and BitDefender.