Anti-Virus Apps

22K

Solutions

23K

Contributors

Anti-virus software was originally developed to detect and remove computer viruses. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect from malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious layered service providers (LSPs), dialers, fraud tools, adware and spyware. Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity theft (privacy), online banking attacks, social engineering techniques, Advanced Persistent Threat (APT), botnets and DDoS attacks.

Share tech news, updates, or what's on your mind.

Sign up to Post

We have 17 or so computers including 1 server 2003, 2 server 2012 r2s, and 2 server 2016s and the rest are windows 10.

Happened a month ago, used malwarebytes free until all the machines scanned clean.
The next day I noticed the 2003 server was reinfected, but the others were not, cleaned it up..

Came back today and noticed virus was back on most of the machines.

Does anyone have experience or suggestions on how to stop emotet / trickbot malware?
0
Build an E-Commerce Site with Angular 5
LVL 19
Build an E-Commerce Site with Angular 5

Learn how to build an E-Commerce site with Angular 5, a JavaScript framework used by developers to build web, desktop, and mobile applications.

hi, im using google chrome last time when i search something in chrome it will show google search algorithn but now it show other search algorithn call losx.xyz. how to fix. i try to uninstall and install back cannot.please assist.
0
Dear all,

My laptop (Microsoft Windows 10,  Enterprise 2016 LTSB, Build 14393). It's a Dell Latitude and a bit old but was working OK. Lately, it has been slow and displays erratic behaviors (strange processes, pop ups, power Shell down based on Event viewer, will come back to this in a second). Besides the Falcon Sensor Free trial and a paid version of Symantec End point protection, I've run different scans such as ESET  Online Scan, Restoro, I have done that for days with no luck so I think it could be a bad Windows 10 version.

Today when I checked the USERS folder in C, there was a new user! and there were traces of strange events on the event  viewer including the log on of this user (DAU1-2106).

On the other hand, I was installing Visual studio yesterday when the "log on" happened, can Visual Studio create a new user during installation?

I also tried identifying the username of the SID by using the wmic command in cmd and it was not found to be in the domain.



Please let me know if it's safe to attach the files on here as they can contain sensitive information of my network and user names, etc.


Thank you very much and I will check back in a few minutes.

Kind Regards,
D
0
I am running Windows 10 on my Lenovo laptop.  During a recent uninstall of Chromium, I noticed that there's a program called "Seguarzo" in my Processes.  I tried to "End Task" so I could uninstall it, but the Task Manager couldn't End Task either of the two Seguarzo processes that were running.  Malwarebytes was able to identify and quarantine the program, but indicated that it couldn't be removed.  Is there any way to get this off my computer?

Thanks,

Phil
0
Hi Experts,

I am trying to install the Windows 10 version 1903 update.

25% of the way I get a message:

What needs your attention:

Avast Antivirus
Uninstall this app because it isn't compatible with Windows 10

But Avast Antivirus is not installed.

Also I downloaded it (from Microsoft Store), installed it, then uninstalled it.

I still get the message:
Avast Antivirus
Uninstall this app because it isn't compatible with Windows 10

I cannot breakthrough this issue.

Regards,
Leigh
0
I visited drama.net using Chrome & since then I've been getting
pop-ups including one saying my PC is damaged/infected.

I then scan using updated Malwarebytes & the "damaged/infected"
message stops popping up but the various advertising pop-ups
continue to show in Chrome: refer to attached screen.  These will
only show up if Chrome is up & running (even if Chrome is not the
active screen currently, the popups will show;  only way to stop is
to shut down Chrome).

How else can I get rid of these persistent pop-ups?  Ideally not
reinstall Chrome as I've a few plug-ins & Bookmarks in it already
& if need to reinstall, let me know how to port over these plug-
ins & bookmarks
ChromePopups.JPG
0
Hello, I have purchased a new Laptop with Windows 10 Pro.
This version of Windows has its own built-in AntiVirus Software. (Windows Security).
I am wondering if I need to install AVG or Trend or similar for full anti-virus protection or is Windows Security enough?
Thanks.
0
Hi,

Please review the below image:

This message appear on user terminal session on each Wednesday around 4pm. We scan the server multiple times but found nothing.
Some one please let me know why this happening?

Vicky.jpg
0
Hi. I am getting the following error trying to run an exe file. Is there an easy way to let Norton antivirus know that the file is safe to run

1
0
Gurus,

Could you please explain the difference between

1. End Point Protection / Anti Virus
2. End Point Detection and Response
3. Threat Hunting

Are these three related in terms of end point protection

SID
0
CompTIA Cloud+
LVL 19
CompTIA Cloud+

The CompTIA Cloud+ Basic training course will teach you about cloud concepts and models, data storage, networking, and network infrastructure.

Hello

Can I install Windows Defender Antivirus on Windows Server 2012R2?

if yes, how can I do this?.. where can I download  Windows Defender for Windows Server 2012R2?

Thank you for your help
0
Is there an Anti-virus add-in for PowerPoint?
I need to be able to scan a PowerPoint file for malware, and was thinking of using an add-in, does anyone know of an add-in that has this functionality?
I was thinking the best way to scan a PowerPoint file for malware is to first renamed the file to have a zip extension, and scan those files for malware.
0
I've had a couple of people get the email with a password that they have used at one point or another in the subject line.
Of course the email goes on to claim they have video of the recipient having a little too much 'me time' while surfing porn sites & if they don't pay a bitcoin ransom, they'll send this video to all of the recipients contacts.

1) How are these people coming up with the password in the subject line? My only guess would be when sites have been hacked & 'up to X amount of users' personal information may have been compromised'. While the news is quick to mention the big instances of this, I'm sure there are a whole lot more that go unreported.

2) How is is that bitcoins & they payment of them can remain untraceable? For that reason alone, I can see banks & government not being to crazy about this.

While I've had one customer actually pay the ransom, no I don't believe such video ever existed, haha!
0
https://www.ubuntupit.com/best-linux-antivirus-top-10-reviewed-compared/

Referring to above URL, I'm looking for a realtime (ie on-access) AV for
Linux (RHEL, Ubuntu, Debian, CentOS) :
ClamAV requires something additional to be able to do on-access can.

Q1:
is Comodo free of charge?

Q2:
Can it run on RHEL, Ubuntu, Debian & container OS
& offer on-access scan without additional package?


Q3:
Can point me to where to download it & its install/user guide?

Q4:
Can we add hashes to it (when we get threat intel) so that
it can scan the extra IOCs besides virus signatures from Comodo?
0
I noticed I have Windows Defender (there's an obsure option under
"All Programs" which shows up as something like "Antivirus scan")
on my Win 7 Home PC.

Q1:
Is this the built-in Windows Defender for Win 7?  Don't recall I ever
install it

Q2:
When Win 7 goes EoSL (ie MS don't release patch for it) in Jan 2020,
can I still click "Check for Updates" to get the latest Defender's
signatures?   Till when MS will continue to offer the signatures
update?

Q3:
Does Win Defender offer  "on-access" protection or only "on-demand"
(ie has to manually trigger scan)?
0
Hello,

Please I need to Compare Microsoft Windows Defender vs. Symantec Endpoint Protection (SEP)
I need your advise to choose between Microsoft Windows Defender and Symantec Endpoint Protection (SEP)

Best regards,
0
Being new to Trend OfficeScan XG, I'm a bit unclear on a few things which are probably in common to most 3rd party virus scanners to be installed on Servers:

  1. Do I need to disable any native windows AV scanning if I install Trend AV on Server 2016?
  2. How about if installed on 2012?
  3. How about 2008?
  4. This MS document says Server 2016 "automatically enrolls you in certain exclusions.  Does that pertain to just Windows Defender ATP or 3rd party antivirus like Trend?  Do I need to manually enter all of these exclusions in the Trend OfficeScan XG list of folders to exclude? https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus 
  5. Trend referred me to this super confusing Microsoft article for Virus Scanning Recommendations:  https://support.microsoft.com/en-us/help/822158/virus-scanning-recommendations-for-enterprise-computers-that-are-runni  .  Its introduction says it's to determinine instability.  It goes on to talk about making windows less secure.  But then it seems to provide a comprehensive list of stuff that SHOULD be excluded from scanning.   Is this the proper guideline for what to exclude for servers?  

Thanks so much.  I'm a bit anxious to push out Trend and brick a bunch of servers :-)
-Mike
0
Over the last 20-30 years I have gone from Norton Corporate to Trend Micro and now Webroot SecureAnywhere. Now Webroot has followed the others. They have gone to hell. I need a console that will differentiate my Customers from each other. Need a good virus/malware package. Want to keep it simple. Are there any clear cut winners out there today?
0
Last year i moved our company from BitDefender to TrendMicro. We've been having huge performance issues with TrendMicro across the board. it Consumes a huge amount of CPU and disk access bandwidth. All of our client computers are i5, i7 with SSDs and 16GB RAM, Win 10 Pro

It seems it doesn't play nicely with DropBox and OneDrive. When we disable syncing in either DP or OD performance goes back to normal. TM Support solution is to reinstall TM but that doesn't guarantee a fix.
0
Success in ‘20 With a Profitable Pricing Strategy
Success in ‘20 With a Profitable Pricing Strategy

Do you wonder if your IT business is truly profitable or if you should raise your prices? Learn how to calculate your overhead burden using our free interactive tool and use it to determine the right price for your IT services. Start calculating Now!

We're trying to update our McAfee Agent from 5.0.5.658 to 5.6.1.  We don't use ePO, we're in an isolated network, & have no access to McAfee downloads.  I tried creating an account to login, but it wanted a Grant Number which we didn't have.
0
OMG: This is driving me crazy!!!!

A user keeps getting his AD account locked every 20 minutes.

I've googled this to death, and even reached out to our ManageEngine AD Audit techs.

In a nutshell, Microsoft isn't capturing the source machine name or IP if the logon request is not from the MS platform (linux/mac) or the authentication request isn't Kerberos.

How in the world am I supposed to figure out the offending machine?

Using this command, then stopping and starting the logon service:
nltest /dbflag:0x2080ffff

The widows\debug log reveals:
07/09 14:38:14 [LOGON] [4304] ECPHFD: SamLogon: Transitive Network logon of (null)\victim_user@ourdomain.com from (none) (via DC-2008-01) Entered
07/09 14:38:14 [LOGON] [4304] ECPHFD: SamLogon: Transitive Network logon of (null)\victim_user@ourdomain.com from (none) (via DC-2008-01) Returns 0xC000006A

"(NONE)" is NOT HELPFUL Microsoft !!!

I've ruled out that these are coming from the outside world so I'm left thinking this is a malicious internal brute force attack or a forgotten app using the user's old password.  We've shut down all of his devices and the problem persists.

#HELP!

Any ideas would be very much appreciated!

Helplessly yours,
Mike
0
I saw an error with the backup (Retrospect)

I looked at the log, and I see an odd user name, and a file that ends with DECRYPT_INSTRUCTION.HTML
It's late now, so I can't talk to anybody.
Error Log with Bad information
I'm not sure if it's Ransomware
System has Trend Micro Total Secure
Windows 7 Pro

The user had reported that the computer took longer than usual to start up.

If it is Ransomware, I assume that I should isolate the machine - Unplug from the network.

What other steps should I take?
There is a cloud backup of files
This is a workstation connected to a server

Thanks
0
BitDefender is deleting my computer ID.  Thus every time I log into various sites, I have to do two factor authentication.  Not sure what setting is called or what to look for to disable or not have it run every single night.   My computer is locked down and doesn't have any passwords remembered etc. so I feel comfortable turning this off.

Any ideas what I look for?
0
Dear Experts

We are replacing firewall to cisco ASA and planning to go for cisco AMP for endpoints, would like to understand if we go for AMP do we still need antivirus solution please suggest, thanks.
0
We had a none critical server get infected with the Cheetah virus.  I have run Sophos and Malwarebytes and neither has fixed it.  I can change the extensions manually but that will take forever.

There must be a simple solution that one of you have tried.   HELP!
0

Anti-Virus Apps

22K

Solutions

23K

Contributors

Anti-virus software was originally developed to detect and remove computer viruses. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect from malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious layered service providers (LSPs), dialers, fraud tools, adware and spyware. Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity theft (privacy), online banking attacks, social engineering techniques, Advanced Persistent Threat (APT), botnets and DDoS attacks.