I just heard back from ESET Customer Care again:
An ESET Customer Care Representative has updated this case with the following information:
Hello,
We do not have any code that logs keystrokes; in fact our new version 2.7.xx was introduced to prevent these types of tools.
We do not recommend running any other AV, Anti-malware, Anti-adware programs in conjunction with NOD32. Using two AV type scanners will eventually lead to file system corruption and eventual system failure.
Please contact that vendor for a solution.
Thank you
I very much appreciate ESET's advice and I hold them in very high regard, but I still wanted to clarify my "reasoning" to them even if I am only an average XP sp2 user. Following is the text of my reply to ESET:
The program that I mentioned is, to my understanding, a HIPS, or behavior analyzing type program. To my understanding HIPS fits within a category of security applications that has been developed to run simultaneously with conventional AV, etc. They do not rely upon "signatures" to stop viruses, etc. I am feeling somewhat "conflicted" now because, based solely upon my own "research", I do feel that these types of security applications are an important and necessary component of a comprehensive and "layered" approach to computer security.
I really need to consider this subject more because HIPS, or behavior analyzing security applications, are very well known to a certain category of computer users and, from what I can discern, are "deployed" on windows XP machines simultaneously with conventional AV and antispyware and antimalware products. I "consulted" user forums like "wilderssecurity, where it is my understanding that ESET maintins an OFFICIAL Support Forum( http://www.wildersse...isplay.php?f=15 ) , castlecops.com, geekstogo.com, and tomcoyote.org during my "research" into additional security measures that I can/should take in addition to conventional firewall, antivirus, antispyware, etc. Wilderssecurity.com has significant threads supporting the use of HIPS, or behavior analyzing type security applications, simultaneously with Nod32.
Possibly to my credit I had already developed a very high opinion of Nod32 after doing the same kind of research that led to my conclusion(s) about the use of HIPS, or behavior analyzing security applications. I ALLOWED the so called key logging, as reported by Cyberhawk Pro(HIPS), because I valued the integrity of ESET far more than that of the Cyberhawk Pro trial program. I just was not willing to believe that Nod32 on a new install of XP sp2 was specifically doing something bad nor did I believe the new XP install had been "infected" by something aggressive or effective enough to "masquerade" as or manipulate Nod32.
Researching on some of the forums that I mentioned I am told that this "false positive" is a known issue to Cyberhawk's makers; however, I am unclear of when or if the "fix" will be deployed. Again, I told it to ALLOW Nod32 though.
I used the trial version of Nod32 in just the same way before I bought the full version.
---
My question to this forum now is: Does running anything more than Nod32 and a firewall(Comodo in my case) on my XP sp2 machine "eventually lead to file system corruption and eventual system failure" like ESET stated in the email or was this possibly just a "quick" answer by an ESET representative who may not necessarily be familiar with the purported importance of and the real popularity of HIPS and other behavior analyzing software?
The security applications that I am running on my XP sp2 are listed http://www.geekstogo...ra-t165600.html
Can anyone tell me if they see any potential conflicts?