CIS 11 not 100%, but version 12 solved it’s problem (registry[logs] windows in version 11 allowed or write, allow Analise settings comodo internet security (is uma fail) :-\
Version 12 in progress!
CIS 11 not 100%, but version 12 solved it’s problem (registry[logs] windows in version 11 allowed or write, allow Analise settings comodo internet security (is uma fail) :-\
Version 12 in progress!
Yep!
Stopping Malware and Stopping Damage from Malware are two different things!
We do both!
Why would you want SSL, when there is TLS (1.0, 1.1, 1.2)? https://www.programmifree.com/
Hello,
SSL (Secure Socket Layer) / Transport Layer Security (TLS) is the most widely used security protocol that creates a secure channel between two machines communicating over the Internet or an internal network.
Only, the directories of the site mentioned by NDABBRU are not totally secure
(This is just a comment from me )
Hi
In this video Comodo Internet Security Review | Test vs Malware - YouTube we can see that an infection has settled.
Why Comodo did not isolate “mdscsfud.exe”?
I understood that a file not recognized by Comodo was isolated in the sandbox. Yet I have already found that some infections were not isolated.
I do not understand why ?
In which case will the sandbox act?
This happened because Embedded Code Detection was not turned on for CMD.EXE, you can see that a unsandboxed Command Prompt window appears multiple times at the video. HitmanPro detections were just leftovers at User folder which Comodo would most likely Sandbox them all if tester tried to manually open/run them.
Also “mdscsfud.exe” was rated as trusted by FLS.
the “no” reaction of COMODO is disturbing !!
???
No whitelisting system is 100%. Mistakes like this will happen. If you want protection against those situations, disable Cloud Lookup (FLS) and use a custom Trusted Vendors List.
For your info:
100% protection… naturally.
:-TU
That’ the most importent feature for me and I think not only for me…
…and why should I look for or even change to such a software when I didn’t have any problems after so many years?
In my opinion, COMODO consumer products (CIS, CAV and CCAV) are underestimated both because they are not well known or because not everyone knows their potential well.
Moreover if some bugs and the WEB protection (against phishing in the first place, eventually incorporating this protection in the main application) will be improved, surely they will be more appreciated and certainly protect the PC at 100%.
Among those free (and not only) they are among the best.
What do you think of this review?
Can it be trusted, especially on ransoware?
This is worrying:
But the rest, including the virulent disk-encrypting Petya, did their dirty deeds despite Comodo’s efforts. But the rest, including the virulent disk-encrypting Petya, did their dirty deeds despite Comodo’s efforts. The file-encrypting ransomware attacks all encrypted my files and posted a ransom note before I got any notifications from Comodo. It did automatically restrict some processes, but did so too late. Emptying the container did nothing to bring back my encrypted files. That’s not what I expected from the sandboxing system.
They tested v10 which is a year old even though CIS is currently with v12. They could also have taken v11 which is more recent. That being said I am curious to know if the same problems also arise with v12.
Did they test it with default settings? e.g Internet Security configuration? Also were the encrypted files located at Downloads folder?
They tested Comodo AV and they don’t report they made changes to the default settings.
They test by opening a folder containing selected malwares. They let the scanner detect and remove the detected malware. Then they execute the malware that is left. That’s when the events with the cryptolocker malware happened.
The tester mentioned that Ransomware samples which Encrypted files were manually tampered/modified by him. I think this maybe has something to do with “File Origin” Auto-Containment policy, which is applied by default Internet Security configuration.
He should have tested using Proactive Security configuration.
Watch this video with a last test done(Here are some excellent complete tests):
I would say that CIS is being promoted in a big way!
All we need to do is improve web protection against phishing and time and resource usage during the full scan.
Mailmen I merged your topic with this already existing topic. This test has already been mentioned in this topic 4 hours before you posted it.