Search:

Type: Posts; User: Support; Keyword(s):

Page 1 of 3 1 2 3

Search: Search took 0.04 seconds.

  1. Replies
    3
    Views
    5,330

    Well at least for F-Secure which I am using they...

    Well at least for F-Secure which I am using they do not know what they writing. It has no schedule....yes but there is a schedule on WXP..which someone can use.....
    Scan at startup is be done...
  2. Thread: Win32.Hidrag

    by Support
    Replies
    8
    Views
    10,295

    The F-Secure response

    Guys was immediate.....almost 3 hours since I place the call........

    They send me the extra DAT's as well instructions how to solve the case......

    Isn't that wonderfull?

    Fot those have...
  3. Thread: Win32.Hidrag

    by Support
    Replies
    8
    Views
    10,295

    I already got this from Google but I am looking...

    I already got this from Google but I am looking for a removal tool until my vendor release VDU

    Win32.Hidrag


    --------------------------------------------------------------------------------
    ...
  4. Thread: Win32.Hidrag

    by Support
    Replies
    8
    Views
    10,295

    Win32.Hidrag

    Anyone knows anything about that?
  5. Replies
    11
    Views
    9,825

    The versions I use are:

    AV for wks and Servers

    F-Secure AV for wks version 5.41
    F-Secure AV for Servers version 5.41

    AV for Exchange

    F-Secure AV agent for MS Exchange 5.5 version 6.00
    F-Secure Content Scanner...
  6. Replies
    11
    Views
    9,825

    To w0rm3y

    Hello man I heard that epolicy orchestrator does bad in our days..is it true or just rumours?

    Well since 2000 I got several occurences with blue screens but their latest versions are damn good.
  7. Replies
    11
    Views
    9,825

    Trend Micro is a dissapoint....

    There rumours that Trend will change their licensed mode. I heard that once a years license would expire and you do not renew..the software will be there but it would stop functioning.

    I have had...
  8. Replies
    12
    Views
    11,697

    I tend to like Bitdefender

    They are good and their products are not so heavy on my system....but still they are not so fast in their response to virus breakdowm and worms outbreaks....but I think this is a matter of time to...
  9. Replies
    11
    Views
    9,825

    Test and compare (only for admins)

    Hi guys and girls.

    Sometimes I got the idea to use another AV vendor products in our Centralized AV installation. I currently use F-Secure centralized AV and I am pretty happy. But what a heck...
  10. Replies
    12
    Views
    11,697

    F-Secure's press release says bugbear targets banking sector

  11. Replies
    10
    Views
    9,606

    Well Tiger. Due to the fact that a virus name is...

    Well Tiger. Due to the fact that a virus name is a confusing thing sometimes I started reading how about to reslolve such a thing. I started from Wildlist : an article : How Scientific Naming Works ...
  12. Replies
    10
    Views
    9,606

    NACO.B from F-Secure:...

    NACO.B from F-Secure: http://www.f-secure.com/v-descs/naco_b.shtml
    Win32.Nocan.B@mm : http://www.bitdefender.com/bd/site/virusinfo.php?menu_id=1&v_id=128
    Naco.B from Panda:...
  13. Replies
    10
    Views
    9,606

    Well I forward the link to them in order to read...

    Well I forward the link to them in order to read it and talk with you if they wish. Sometimes it is difficult to be in the middle. :)
  14. Replies
    10
    Views
    9,606

    Well officially by Bitdefender they reply: I...

    Well officially by Bitdefender they reply:

    I read the posting of mr tiger and here are my comments:
    the virus exists, just that it has another name (for example at Symantec it's called...
  15. Replies
    10
    Views
    9,606

    Win32.Nocan.A@mm

  16. Replies
    1
    Views
    4,390

    on-line trojan scan

    Free on-line trojan scan your Pc can be found here

    http://www.trojanscan.com/trojanscan/trojanscan.htm
  17. Thread: WildList

    by Support
    Replies
    3
    Views
    4,807

    as well in here....which is provided by Trend...

    as well in here....which is provided by Trend Micro.. http://www.virusinfo.bz
  18. Replies
    5
    Views
    6,009

    MS + AV = Headaches

    If you think these words you said logically you will see that this never will happen. They cannot bundle an AV software due to the fact that they will have to maintain it. So let's say that they had...
  19. Replies
    5
    Views
    6,009

    Unforunately you are damn right. No one or at...

    Unforunately you are damn right. No one or at least of 95% concerns with security and the worst is that they do not want to know about. Only when the things go really bad start shaking and feel the...
  20. Replies
    1
    Views
    4,846

    New worm (Win32.Melare.A@mm)

  21. Sobig.B Worm is Spreading at an Alarming Rate

  22. Replies
    7
    Views
    6,321

    It is the same thread that put in the morning but...

    It is the same thread that put in the morning but I changed the title to emphasize that the worm sends fake mails with the originator address of support@microsoft.com...that is why I changed the...
  23. Replies
    7
    Views
    6,321

    Name: Win32.Palyh.A@mm Aliases:...

    Name: Win32.Palyh.A@mm
    Aliases: Win32/Palyh.A@mm
    Type: Executable Mass Mailer
    Size: 52706 (packed)
    Discovered: 18.05.2003
    Detected: 18.05.2003
    Spreading: High
    Damage: Medium
    In The...
  24. Replies
    7
    Views
    6,321

    Palyh is a massmailer e-mailer worm sends fake mails from support@microsoft.com

    Palyh is a massmailer e-mailer worm which also spreads through Windows network shares.

    During late 18th of May / early 19th of May 2003, F-Secure received several submissions of this virus from...
  25. Replies
    2
    Views
    5,347

    Dear friend Gateway content scanning products...

    Dear friend Gateway content scanning products websweeper and mailsweepers do lock hotmail and web client mails if you do not know yet. IRC as well is strictry prohibited and cutted via firewalls when...
Results 1 to 25 of 55
Page 1 of 3 1 2 3