Jump to content


  • Content Count

  • Joined

  • Last visited

About dlguild

  • Rank
  1. Thanks Lucian for explaining why this message keeps appearing. Now that I understand, I think I will just live with the popup rather than reduce my protection level. Perhaps this annoyance will be taken care of in the next major release. Much appreciated!
  2. I tried searching the forum on this but the search function seems to be offline today. Problem description - every time SuperAntiSpyware attempts to update, I get the attached firewall popup message. I each time I select 'Allow'. I have added both the main executable & the update executable to the 'Trusted' list. I have created a firewall rule as well to allow all TCP for the update function. How can I get this message to go away permanently? Thanks.
  3. Yes I searched around. I couldn't find anything definitive, but the general impression I got is that it would be OK if used on the same machine. I just wanted to make sure. Thanks for the reply! Dan
  4. I setting up VMWare Workstation on my system for testing purposes. I have a licensed copy of KIS 7. Does the licensing agreement permit KIS 7 to be used on the same system in a virtualized OS if the underlying OS contains a licensed KIS installation? If it is not permissible, is the virtual machine protected by the underlying installation of KIS? I.E. does KIS scan inside the VM files?
  5. Thanks again Don. You (as always) have been most helpful. I left the Intrusion Detection System enabled and unchecked "Add attacking computer to the blocked list". I'd rather deal with the resultant popup warning each time I use Xming than disable Intrusion Detection.
  6. Thanks Don, solution works. Is there no way to allow this particular exception without sacrificing the entire intrusion prevention system?
  7. I use Xming ( http://freedesktop.org/wiki/Xming ) which is a Windows implementation of Xwindows to terminal into Linux servers on our LAN. KIS 7 firewall pops up a red box containing the warning "DoS.Generic.SYNFlood TCP 16001" and terminates the connection. KIS does not ask if I want to allow this connection. I have added 2 Application Rules to the firewall settings for Xming.exe & Xlaunch.exe using the template "Allow All", which is not alleviating the situation: Rules for Xming.exe & Xlaunch.exe Allow Any TCP Activity Allow Any UDP Activity Any advice would be greatly appreciated.
  8. Thanks Don, that was quick! OK, in Trusted Zone I set up: Object M:\ Component: any task Much appreciated!
  9. This topic has been enlightening. I have a dual boot system (linux & xp pro). Every time I boot linux it reports root file system corruption, which it repairs using the linux equivalent of chkdsk. On the windows partition, I have "Ext2 Installable File System for Windows" installed which allows me to work on linux files directly from XP. It is available here: http://www.fs-driver.org/ The author states "It installs a pure kernel mode file system driver Ext2fs.sys, which actually extends the Windows NT/2000/XP/2003 operating system to include the Ext2 file system." Given that it is a kernel mode driver, short of uninstalling it there is no way to turn it off. I don't think it would help in any case as iSwift data appears to be written on file access as well as during scans (whether iSwift is enabled or not), so how do I prevent KIS from messing with files on the linux partition? I can not find any settings which tells KIS to ignore the partition. Thanks in advance for your assistance
  10. You are absolutely correct to thoroughly research your choices before making a decision. As a long term user of Trend Micro, I got complacent. And I got burned. My own investigation and trials lead me to believe KIS is the best. MAPKOBKA^^'s 6 reasons stated above parallel my reasons for switching. Because of the amount of flexibility KIS affords, the learning curve can be a bit steeper than some less effective solutions, but I believe it is worth the effort. KIS 7 will add another layer of protection, making it even better!

Important Information

We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information.