TNRoadHog44 Posted April 18, 2011 I do not understand how to use the log file that is generated after the scan is complete. When I review the file that is generated and then access the "Explain Dectected Item" online the answer that I recieve is practically useless as it provides no specific action. An answer such as "Listed below is basic information about the detected application/process. This application may not be safe to have on your system" does not tell me what to do with the problem, delete it,quarantine it or keep it. I purchased your program to provide me with answers but I cannot find them. If I arbitrarily delete all items in the log I usually end up with an inoperativesystem. How do I determine the action necessary? What am I missing? Additionally how does Real Time Protection work to protect me when the program cannot provide an answer as to the disposition of the items in question? Share this post Link to post Share on other sites
SUPERAntiSpy Posted April 18, 2011 I do not understand how to use the log file that is generated after the scan is complete. When I review the file that is generated and then access the "Explain Dectected Item" online the answer that I recieve is practically useless as it provides no specific action. An answer such as "Listed below is basic information about the detected application/process. This application may not be safe to have on your system" does not tell me what to do with the problem, delete it,quarantine it or keep it. I purchased your program to provide me with answers but I cannot find them. If I arbitrarily delete all items in the log I usually end up with an inoperativesystem. How do I determine the action necessary? What am I missing? Additionally how does Real Time Protection work to protect me when the program cannot provide an answer as to the disposition of the items in question? Our product is designed to detect and remove threats found on your system - it's not designed as a research tool - meaning we don't spend the time doing large write-ups on threats - we spend the time finding and removing them Share this post Link to post Share on other sites
TNRoadHog44 Posted April 21, 2011 I do not understand how to use the log file that is generated after the scan is complete. When I review the file that is generated and then access the "Explain Dectected Item" online the answer that I recieve is practically useless as it provides no specific action. An answer such as "Listed below is basic information about the detected application/process. This application may not be safe to have on your system" does not tell me what to do with the problem, delete it,quarantine it or keep it. I purchased your program to provide me with answers but I cannot find them. If I arbitrarily delete all items in the log I usually end up with an inoperativesystem. How do I determine the action necessary? What am I missing? Additionally how does Real Time Protection work to protect me when the program cannot provide an answer as to the disposition of the items in question? Our product is designed to detect and remove threats found on your system - it's not designed as a research tool - meaning we don't spend the time doing large write-ups on threats - we spend the time finding and removing them You do not understand my question. Share this post Link to post Share on other sites
Seth Posted April 21, 2011 Hello. As stated, SAS is designed to detect and remove infections, not to educate people on what may or not be an infection. No antimalware can effectively address your concern. The time and money involved in such would be extremely prohibitive. In addition, the descriptions would have to be constantly monitored, researched, and updated. Like SAS, some antimalware programs will give some sort of description, but it's up to the end user to Google the file if they're not sure about it. Alternatively, you can post the file here if you're unsure. To answer your second question, Real time protection will block threats before running, at which point SAS will prompt you to run a scan. Following that, see my previous paragraph Share this post Link to post Share on other sites