Since a lot of users ask about the Applications Certified by Comodo, can you give us some info how the “ceritfication” takes place?
We have 2 Labs…
1)Executable Research Team
When we receive files from our end users, we first try to identify the source of the file. If we find the source of the file. If we find the source, then we analyse the application for any suspicious behaviour in our AV labs. If file is found to be safe, its passed to our Executable Research Team (ERT) for certification. ERT team will then create relevant signatures, entry in our db and then launch it into our safelist as a Certified application.
Of course this is a more complex process than I explained above, but i think the above is a good summary
Thanks Melih. Nice to know. But what happens with cracked/patched/modified apps?
How will they be treated? If they do not have any malicious code in them will Comodo add them at the certified/safe list?
. But what happens with cracked/patched/modified apps?
Was there an answer to this?
well, if a file is modified, then its signature won’t match hence won’t be allowed.