Jump to content

phr3n1c

Members
  • Content Count

    1,670
  • Joined

  • Last visited

7 Followers

About phr3n1c

  • Rank
    Forum is my faith

Recent Profile Visitors

6,755 profile views
  1. Ich würde an Deiner Stelle die Dinger ganz fix für die Kunden sperren / unzugänglich machen. Ihr verbreitet damit aktuell bewusst Malware.
  2. Is this server used as terminalserver or do you use rdp just for remote administration?
  3. Falls Du bei den Kämpfen zwischen der NC und den Dronenrussen dabei bist, mach zusätlich noch die Ingame-Effekte aus. Sry für OT
  4. Please check, which kind of threat has been detected and which module detected it (File AV, Web AV, ...).
  5. If you're using Administration Kit, you could disable or change password via policy.
  6. I do not think, it's a matter of x64 but of Office 2010. It's actually not supported, as there was no Office 2010 available as MP4 was released.
  7. Integrier die Updates in die Installationspakete, dann sparst Du Dir zumindest Punkt 5
  8. Please create a zone in Anti-Hacker for 127.0.0.1 and give it another try.
  9. Dass zusätzlich der Systemspeicher, Autostart-Objekte, etc. gescanned werden, Netzlaufwerke jedoch nicht.
  10. I tries to update from the master server, which you connected the slave to.
  11. msi 1603 is a allround msi error. Please provide installation logs, created by the product you tried to install (usually found in user temp folder).
×
×
  • Create New...

Important Information

We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information.