Would you like to submit your own question?

These questions are questions send to us by visitors of the site as well as our questions. You can submit your own question, 1 question at a time.

Enter the email address we can reply the answer to
Enter the question you would like to ask.
By selecting public you allow VESNX to publish your question to the site.
Questions asked by others

Simple to answer really.

Answer the bellow 8 questions

  1. Have you been handing out your WiFi password to some one, especially some one you no longer have a relationship with?
  2. Have you shared an account like streaming service like Netflix, Disney, Amazon?
  3. Could some one that was at your house have gained access to your smart devices?
  4. Did some one use your phone, lets say to order food?
  5. Did you dispose of old electronics like a printer, a phone, or any wireless-enabled wearable technology like a watch or Fitbit?
  6. You're internet service provider gave you some router, or your router is cheep, or more than a year old?
  7. You any one in your household plays on-line games.
  8. You have data that ... you can't afford to loose, or would not like to share with the whole world.

If any of the above is a yes then first, before you continue reading, do this, and do this in this order

  1. change the passwords on your email accounts.
  2. change all the passwords to all financial services (banking, Credit cards, Investment portfolios...).
  3. change all passwords on all your social media accounts. Always make sure that the password recovery email address, in any of the services, is an email address that you own

Abusive relationships

If you are in any abusive relationship, think before you act. Abuse may be hard to proof in court if you deleted your accounts. Actively separating yourself from your abuser may result in violence so contact your local law enforcement.

Many of the above points should be considered when in a abusive relation as a lot of these have location sharing features and collection data that can be used to track your movements, even pinpoint your location. If you are in doubt, contact us.

Small Office/ Home Office

Common ways you may be attacked

  1. Infrastructure gets attacked from the world wide web by dual use software that will scan for vulnerabilities on your network literally giving a detailed road map of how to gain access;
  2. Your WiFi network is easily targeted by individuals that attack router via its default user name and password as well as remote management configurations. If they really want to get in, then they will get in, and they will use software like RouterSploit or MetaSploit to join your network;
  3. Infrastructure gets attacked by its own edge devices like routers and firewalls, sounds bizarre right, well it’s the most common exploit used by attackers. A hacker will take over an edge device like a router and use the router to attack the owner of the network from within;
  4. You get attacked via your local network using compromised hardware like other computers on the network. The network can be your home or office network but also that cool VPN network;
  5. Users get attacked by your IoT devices like a smart thermostat, smart TV’s, smart light bulbs, Air-conditioning, even their own phone via that cool app/ game. All these devices have software that is not designed with security in mind and has no anti-virus or firewall on it;
  6. Large organizations get attacked all the time via an employee bringing compromised hardware to the workplace or, the user gets compromised themselves when he/she connects to the office.

We do not store credit cart or any other data that would be considered identifiable GDPR related, we do not even use cookies to identify who you are when you visit the site again.

If you provide us with your email address we will use it to inform you when we detect that your personal data is being sold on the dark-web. If you do not than this feature will only work if your PC is active as your PC knows your email addresses and the intrusion detection service validates those for you.

Some services like emailing customer support or contacting us via WhatsApp requires us being able to identify who you are and that you are a client with an active support contract. It would likely speed things up but most of the time it's not needed.

IDPS comes with several extra layers of protection, the list is not complete but it represents the 6 most common ways ransomware/ cybercrime is used to bypass a firewall:

  1. Windows firewalls leaves a computer wide open to any outgoing communication, even when communicating to known malware-controlled servers, IDPS prevents that.

  2. Cyberattacks are coming at you from all places and at all times, it’s relentless and it’s automated. Windows is extremely “user friendly” in that it allows attackers an infinite number of attacks and actually never takes any defensive measures. IDPS does, if a network scan or attack is detected then any and all access from that source is blocked, even if the attacker eventually would “guess” the right login/password combination or port he will never gain access as he is already blacklisted.

  3. IDPS is fully automated and actively monitors your computer. it requires no user interaction, no data subscriptions, and therefore no computer skills to stop an attacker.

  4. IDPS will detect abnormal communication. If it does, then IDPS will shield your computer and block these computers or smart devices in your office or your home network from harming your computer.

  5. IDPS can send automated firewall abuse reports to the Internet Service Providers that are hosting these malicious activities. If after some time the activity doesn’t stop, then IDPS just blocks the whole data center from accessing your computer and your computer from accessing that data center, it’s like they no longer exist.

  6. IDPS will block domains and IP addresses from known active malicious and or infected domains. This prevents any application on your computer, and not just browsers, from accessing these infected sites. By blocking these domains IDPS also protects you from other attack vectors like spear-phishing emails or macros that use these sites to download malicious payloads. Being able to block malicious domains is important as a blocked domains can’t be used to infect your system.

The cold hard truth is that an Antivirus application only reacts. An anti-virus application works by checking your files against a list of known virus signatures. Think about it this way, last week’s viruses will make it into next week’s anti-virus definitions. If a virus is new and yet unknown, there is nothing to compare it to. IDPS offers a safe environment for these files to be opened, if they execute malicious code, it will do so without causing harm and you won’t get infected.

No, all products are licensed per machine as it is a machine that is protected. The machine can have several users, they will all be protected, that’s fine.

If IDPS is to blame then there are likely 2 reasons why it does that. Reason 1: You connect via a VPN and the VPN was used to attack you. IDPS blocked the attacker thereby blocking you from accessing the world wide web while using the VPN, perhaps switch connection to another location offered by the VPN provider. Reason 2: IDPS detected that you have been hacked and a hackers installed software to remotely control your computer; b a virus was detected on your computer; c an attempt was made to transfer your confidential files to a server known to be used for data theft or ransomware attacks.

We do not recommend, un-installing IDPS or attempt to bypass its security as it is likely going to result in you loosing control over your computer and data.

We do offer support and assist you regain control over your systems and protect your data. Perhaps give us a call?

Typically, it would update automatically. However, if you like you can simply install the latest trail version and it will pick-up on the existing license.

It's the license key that updates the machine learning models and ant-malware rules, the software can be up or downgraded as you see fit.

We refund to the same payment method you used when you bought the product. We will refund the same credit card or refund to the same bank account. To prevent abuse, we do not accept one type of payments and use a different type for the refund.

All our customers have the same refund policy, we do not differentiate between EU and non-EU clients when it comes to service, every one by law gets 14 days on any items bough. There are some limitations, but in general we are happy to refund within 30 day. have a look at the refund policy for details.

Typically a operating system that is still in supported. The software typically doesn't need any particular software other than that what we bring with us in the installer.

If you run into an issue just re-install or opt to repair the software and it will update it for you

First of all, let me answer the 2nd part of your question, Yes IDPS, will work after your subscription expires and you will be able to get security updates for IDPS. Without the subscription however you will no longer receive automated updates of:

  1. the ICAN who-is Internet Service Provider data, this reduces the accuracy of knowing who is responsible for facilitating attacks against your system;
  2. the proprietary thread database containing our real time collection of systems controlled by malicious actors;
  3. the database that contains the domains and IP addresses of malware hosting sites, it’s not a critical database but nice to have as after the subscription expires you can instruct IDPS to “manually” perform the scrubbing of the malware hosting sites for your computer, using your own computer.

Having to data mine the Internet locally will cause IDPS to use more memory and your computer will be “busy”. However, you will stay protected and on a powerful PC this manual processing could be a viable option;

  1. notify you when your email gets hacked or your private data is sold on the dark-web, nor do we update the data that’s being offered like social security number, credit cards, physical address, medical data etc. Not affected are the anti-virus capabilities’, nor the protection that is provided from being able to block the dark-web from accessing your PC.

VPN stands for Virtual Private Network; this might be true when you connect to the office from home as you virtually join the office network, this is not the case when you join a commercial VPN network as you join the network where a bunch of other users are, perhaps, not behaving at their best. Windows build-in Firewall and it’s build-in computer policies are configured to trust the network you are a member of. By joining the VPN, you disable over 50% of your protection. Perhaps it's unwise to use a VPN without IDPS

We are a small company and masking the software compatible cross-platform will take more time. Perhaps we will offer protection on other devices like Mac, Linux and phones in the future as there definitely is a market for it as hacking these other platforms is easier as they are less protected, we just haven’t gotten to it.

None, IDPS is plug and play and will take care of itself as well as it’s user. We assume no technical skills of the users, if they can install software, they can use IDPS. Sometimes we are a bit too technical in our descriptions and documentation, we are nerds, we can’t always help ourselves, and we apologies for that.

Sure, we will even do you one better. Install the 30day trail version (no email required) and run a penetration test (PEN) on your own machine. You can use this link to run a test against your system and compare the before and after results and see for yourself. Please note that you have to be the owner of the system or you need to be authorized to do a penetration test or you could be liable.

;