NJD30 wrote:
I have the same problem but only when using NORD VPN, I have deleted the ESET files from filters but now ESET is saying it needs to be configured so my question is, with these two being deleted, will it not affect functionality of ESET?
Thanks
A virtual private network, or VPN, is an encrypted connection over the Internet from a device to a network.
If you need to be "present" on an institutional network, a VPN is a great tool for accomplishing this. it is generally issued and supported by the institution.
Almost all other uses are a SCAM. There is generally no need for you to have a private connection to a VPN vendor's Network, except to make it easier for them to harvest your data to sell.
If VPN vendors just stopped there, it would be bad. But many of these packages also insist on scanning all your files, non-stop, -- nominally looking for viruses, but who knows for sure what data they are harvesting. Their non-stop file reading punishes your computer's performance in the process.
Some also break into your other secure connections so they can be FIRST to examine your data, often leaving your Mac MORE vulnerable to attack.
--------
MacOS shares a lot of the lock-down mechanisms developed for the iPhone. Applications are all sand-boxed with a list of the resources they require, and they cannot ask for anything outside their sandbox without crashing. Signed Applications are checked that they are from legitimate Developers, and Notarized Applications are delivered with the assurance that they have NOT been modified since their release by the Developer.
From MacOS 11 Big Sur onward, the system is on a Separate, crypto-locked System Volume, which is not writeable using ordinary means. Any unauthorized changes to the crypto-locked volume are quickly detected and you are alerted.
So you could store just about every malware known to mankind on your Mac, and your Mac would not get infected spontaneously. Scanning for virus-like patterns might make you feel a little better now, but non-stop scanning is outdated nonsense, and a tremendous waste of resources.
Nothing can become Executable Unless/Until you supply your Admin password to "make it so".
Effective defenses against malware and ot… - Apple Community