Hi all, moving in here from Wilders.
[Edited Pending Moderator Review]
Today I opened that computer after a couple of months, I finally had some time to spend with it.
When I left it it was infected with various infections, at least that is what Malwarebytes, Emsisoft etc. tells me.
These infection has been in WSA:s cloud now for months and it still does not detects them?
I might add that no files were monitored, just saw some flash by when the computer came into Windows, but it went so fast I could not see the file name before it disapered.
The most worrying thing is when I submit a file on my desktop (a Trojan) to Webroot and I am told the file is bad and was detected almost a year ago.
The question is: why is this file not detected and removed from my desktop if it is already known to be bad by Webroots cloud?
Am I not connected to the "good cloud" with the client or what? ;)
Confused.
/Esse
Solved
Detected or not detected, that's the question.
Best answer by Muddy7
Hi Esse.
I was also over at Wilders and contribute here (and did there) very occasionally. May I put my word in edgeways? I'm no techie but there are one or two things i've picked up along the way so here they are.
As you probably know already, WSA focusses (I am struggling to find the words to express this properly) on malware blocking as opposed to malware detection. What I am trying to say is that WSA doesn't go looking in every nook and cranny of your storage media for a malware file (which would take a very long time, which is why other AVs are slower than WSA). It considers such a course of action to be a waste of time and resources. Rather, it pounces on any malware file that executes and also actively looks for malware files that are in folders that indicate they are likely to execute in the near or even not so near future.
You may have a malware file lurking in an email attachment or in an archive folder that will probably never see the light of day. But if it ever does, WSA is onto it like a ton of bricks. Immediately.! And if perchance it hasn't pounced immediately, it will have already tracked every single malevolent action the offending executable did in those milliseconds or minutes prior to detection and will now reverse them: see this.
But I'm sure you probably know this already. Nevertheless, hope that helps 😉
View originalI was also over at Wilders and contribute here (and did there) very occasionally. May I put my word in edgeways? I'm no techie but there are one or two things i've picked up along the way so here they are.
As you probably know already, WSA focusses (I am struggling to find the words to express this properly) on malware blocking as opposed to malware detection. What I am trying to say is that WSA doesn't go looking in every nook and cranny of your storage media for a malware file (which would take a very long time, which is why other AVs are slower than WSA). It considers such a course of action to be a waste of time and resources. Rather, it pounces on any malware file that executes and also actively looks for malware files that are in folders that indicate they are likely to execute in the near or even not so near future.
You may have a malware file lurking in an email attachment or in an archive folder that will probably never see the light of day. But if it ever does, WSA is onto it like a ton of bricks. Immediately.! And if perchance it hasn't pounced immediately, it will have already tracked every single malevolent action the offending executable did in those milliseconds or minutes prior to detection and will now reverse them: see this.
But I'm sure you probably know this already. Nevertheless, hope that helps 😉
Reply
Login to the community
No account yet? Create an account
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.