Thank you, but no thank you. I paid for a product. I should be able to use it without disabling it.
I'm sure what that last reply refers to, but I was suggesting earlier that maybe you have a Bit torrent toolbar in one of your browsers? If so that would no doubt have a key to all and any of the various Bit torrent clients, I would imagine.
If you are referring to disabling Vulnerability Scan's automatic scan, that's all I'm suggesting, turning off the auto-feature so it only scans when you tell it to.
I'm not psychic, I have no idea what is on your machine nor what settings you have.
You can empty Firefox's download list. That has no bearing on stored stuff in your personal folders. Just click Downloads in FF,. then Show all Downloads, then click Clear all Downloads. VUL may be reading your temporary files and those are temporary ones.
I heard back from my McAfee contact and he says:
I’d probably check the Uninstall registry keys first:
* Note that many of the subkeys under the keys (above) are in the form of GUIDs, so he may have to manually search each and every subkey and hope that it clearly references the name uTorrent so he’ll know which to delete**.
**Also, please mention the usual caveat about Exporting the specific key before deleting it so he’s got a way to recover if he accidentally butchers his system – there’s a Microsoft KB on backing up the registry etc. – you can find a link to it on any of our FAQs on service.mcafee.com that talk about altering the registry (sorry, I don’t have time to go searching).
If this doesn’t help, I’d suggest
1) Searching regedit for the term “uTorrent” and carefully** deleting those it finds.
2) Googling for how to remove all traces of uTorrent
The last thought – P2P apps, as mentioned above, open inbound ports to his system (so that other people can download from his system). I’d strongly suggest he review the ports that have been opened in Firewall by uTorrent and make sure he closes them again. He can Google what those specific port numbers are
To back up the registry go to Start > Run > type in regedit and OK any prompts. Go to the top of the page and click File > Export and save the current registry to your desktop or removable media, your choice. That way you have salvation should something go drastically wrong.
So, in summary, MVM will scan the hard drive for files (even for files which aren't installed) and will deem them a vulnerability
and then introduce a new potential vulnerability by installing software onto the machine as well as retaining the original files
in their original locations which is supposedly a vulnerability in the first place.
That is incorrect. VUL will not install anything unless you tell it to - so it leaves everything up to you. If it is detecting software you feel you no longer have, there has be a remnant of it hanging around in the registry..
Do as my contact suggested, Google how to completely remove utorrent.
Sorry the board is acting up regarding quotes