Jump to content

danielocdh

Members
  • Content Count

    16
  • Joined

  • Last visited

About danielocdh

  • Rank
    Candidate

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Is there any way or configuration to prevent software updater from restarting windows? I did a manual scan+update and when it finished it forcefully restarted without asking or letting me know it was gonna happen. I was working on a couple of VMs that are set to be suspended when windows shutdowns/restarts, they were shut down incorrectly. I also had a windows 95 dosbox open which became corrupted/unusable (luckily this time I have a backup from yesterday). Thanks
  2. I have had this issue with KIS 2018 since I upgraded from windows 1703 to 1803, when I uninstalled KIS I was able to use bluetooth normally, the trouble came back when reinstalling KIS 2018. So I contacted technical support because I kinda want to keep buying kaspersky as my next antivirus. With their advice my phone can see my computer listed but I was not able to transfer photos, also I can't add new devices on the computer (the dialog closes), but I was able to connect my xbox controller again (I had it paired before installing KIS so I'm not sure how much this will help you), this is the advice they gave me: For security, by default Kaspersky Internet Security restricts certain communication on new networks. Please follow the steps in the following article to set any known networks to 'Trusted': http://support.kaspersky.com/us/12043?cid=pe#block2 *Note: the article is applicable to 2018. Kaspersky restricts certain local communication on networks even when the network is set to Trusted. Please make this change: Open Kaspersky. Click on 'Settings'. Click on 'Protection' on the left. Scroll down the right side and click on 'Firewall'. Click on 'Configure packet rules'. Right-click on 'Local Services (TCP)' and click 'Edit'. Change the 'Action' from 'Block' to 'Allow'. Click the 'Save' button. Right-click on 'Local Services (UDP)' and click 'Edit'. Change the 'Action' from 'Block' to 'Allow'. Click the 'Save' button. Close the window. Click the Back arrow in the upper left twice to return to the main window. They asked me for system information and a trace report, my ticket has been escalated and I'm waiting for a solution. I might try installing KIS 2019 when I have time but for now it is more likely that my ticket is answered before.
  3. Same version as yours. I was referring to Kaspersky's support (from the company), every single one of my tickets with them have been really bad, the people on support didn't have a clue on how to use basic functionality of the product (even misguided me) or they just didn't know/understand basic terminology that anyone can read on wikipedia, and sometimes they tried to answer with a copy paste that was not related at all but had a similar term as my question. For me the "apply always" option seems to only be working when you block something, not when you allow something. For example, while selecting the option "Apply always", I had to allow many dns request one by one when trying to browse the internet with Chrome, every time I clicked allow, another popup with the next system resolver appeared, then the resolver list just got repeated, over and over. Chrome never loaded anything. Then I clicked block on a single dns request by mistake and all my dns requests on the whole system stopped working (chrome, ping, ftp clients, etc). I couldn't find the rule created that was blocking all the dns, so I had to restore the whole KIS settings(from a backup) to fix it. The main thing I got from all this is that I'm really glad that I had a settings backup, I have dozens of specific settings, exclusions and firewall rules that would take me too long to re-create.
  4. Still not working, it simply feels to me like they don't want the user to have control over the protection, I believe they don't have this option enabled just so you get tired and frustrated and simply enable the "perform recommended actions automatically". But who know, certainly not the people from support.
  5. I stopped using avast free because it was disabling virtualization on my new computer (ryzen 7 cpu), after the virtualization was disabled I couldn't start VM or if I had VMs open the whole system would crash, I'm looking at options right now based on av-comparatives.org tests, still not decided but bitdefender perhaps
  6. The reuters article is really recent and an eye opener, I don't know if Eugene messed up on the interview but after reading what he said investing time on all this doesn't seem useful anymore, I only paid 30 bucks for kaspersky so not a big loss. I'll just move on. Thanks for the links @hitandrun
  7. Even on an escalated ticket which should be answered by a person with more expertise they are still lying. Either it is by incompetence or trying to hide something, it's just weird. I've been meaning to try a deeper analysis of the packets but I just have had a lot of work, I'll post anything I find when I do.
  8. zerkms I haven't changed the language/country yet, just busy days. So you can try and let me know please. I kept going at them on the México spanish support request, they told me next that it is because kaspersky works as a proxy and the IPs were local addresses which is false, then I mentioned if it was UDS and they just copied pasted UDS information without confirming if the connections came from that or telling me how to disable it. But for what they pasted it seems like UDS is specifically related to email. I tested with mail related protections disabled(just in case), the connections are still being made and they are created when opening programs so most likely not email/UDS related.
  9. So I tried "my kaspersky", so far they have told me how to stop kaspersky from monitoring port 443 and how to block incoming traffic to port 443 with kaspersky. They seem to be idiotic (support for México), I'll try with another country support next time and see how it goes.
  10. Honestly, you made me more curious to know what this is. I found out with sysinternals tcpview that the connections aren't as persistent as I thought, usually they vary from 0 to 5 to the same ip ranges but I have seen up to 10 maybe a bit more, I also noticed that they are using the remote port 443, usually used in https, using nirsoft smartsniff I can see what it is being transmitted, it seems to be encrypted but looks a bit different than other https connections there. I also noticed that most connections are being open when I open programs/processes for the first time after a reboot, but not every program seems to be triggering this. I'll keep digging and post if I find anything interesting.
×
×
  • Create New...

Important Information

We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information.