Note: Edit in my above post.
Yes, itās what is absolutely necessity with some machines, or you play dices.
I think my position is not understood. What is annoying me is not to just say the truth about security.
Yes you can take mesures to make the size risks little enough to use the internet,
but the message of the full security because of using this or that software is a bad thing as you export lies by telling that.
thatās all the point of the heart of what i want to say.
No offense, I like this forum, i like this team, but i have my own ideas anyway, and when you tell me Iām just posting something that is a little insane an paranoid⦠thatās not a way to reply if you care about telling the truth, or making business is more important ?
peace.
I did notice that, thanks friend. 8)
Kind regards, REBOL.
Iāll add something else :
I have no exemple of something that was not defeatedā¦
Ah yes ! the playstation protetion⦠it took a little timeā¦
or they just decided no to release it immediatly because sony paid a huge packet of dollars for it ?
Donāt know, but what we have to keep in mind first about computing is that āimpossibleā word has no reality in this place.
Peace to you as well, bro.
Kind regards, REBOL.
Imagine a comodo global moderator posting a potential malware for forum users ??
I bet 100 000 dollars itās a safe file.
excuse me again, it took me like 15 years to realize that i was stupid to think I was safe by using some security applications or some rules for browsers, etc.
I thought i was unbreakable because I knew nothing about what some people know about computing⦠I realized they were genious and me a joker. sometimes I thought, NO ! theyāre telling jokes this time !
nopeā¦
so today, when we talk to me about security and being so sure⦠no.
I believe the security process is continuous, and in times like today all care is needed.
We are all vulnerable to threats.
The security solution does the job, and that complements the level of safety is the responsible use of technology.
Security software must adapt to a scenario that is in constant metamorphosis or have become obsolete.
Companies that do not listen and do not have good relationships with their customers, will be forgotten.
I think Comodo offers a good level of protection and some points need to be improved.
Opinion and constructive debate here in the Community is important, well as the respect with the opinion of every member.
Just trying to be honest (just to make it clear) :
If youāre online, youāre not secure at all.
If youāre online, youāre not private anymore.
Forget about that while you read this being online (shame on you) , weāre all lost anywayā¦
And yes, we are all vulnerable to the brim as weāre all human beings.
The last words of yours impressed me the most, Sir jhkmaster.
Companies that do not listen and do not have good relationships with their customers, will be forgotten.
As Iāve already been mentioning, itād be high time.
Kind regards, REBOL.
Yes, you reply with a lot more wisdom than I did on some of my posts, Iām sorry about that for all this forum community.
The fact is that Iām not a coder so trying to give proof from something I just donāt know how it really works⦠is it credible ?
Yes, weāre not safe at all but with a crypted drive system and a crypted connexion, isnāt it what we can use that gives the best protection we can get actually ?
what will you do if you access my system as itās 100% crypted, you will do what with all those crypted data ?
so yes itās possible to decrypt thingsā¦but do you have a super computer to do that ?
I use TPM, and except the story of cold boot attack that needs physical access, thereās nothing known actually prooved that can bypass this crypted protection. or maybe Iām outdated again.
I am here to learn, collaborate and also express what I consider important as a member and consumer.
A democratic environment where there is divergence of opinionsā¦
At points I agree and others I do not agree, just that.
I did not state such thing. Please donāt put words in my mouth; itās inflamatory.
If you think that, It's no because you think it"s the truth,Where did I say that?
it's a position you protect because you're part of something to defend.Stop turning to rhetoric where you failed to convince that using Trusted Software Vendors list is a highway for troubles.
that's all for me. people can search for exploits, they'll find, there are hundred of pages on that and it can takes weeks to consult a little part of all. your sofwtare is a really great piece of code, i agree 100% on that, but it's just impossible it's not unbreakable at all, that' just not part of what is the reality and any code is facing this reality soon or late.Now you have changed to exploits to save your position as a security prophet. Remember we were talking about TSV list being an alleged highway of troubles.
Oh puleeeze, stop the prophet act. Get off your crossā¦
Yes you can take mesures to make the size risks little enough to use the internet,Agreed here.
but the message of the full security because of using this or that software is a bad thing as you export lies by telling that.I neither made statements about full security nor do I like the prophet/crucifixion trip youāre on.thatās all the point of the heart of what i want to say.
No offense, I like this forum, i like this team, but i have my own ideas anyway, and when you tell me Iām just posting something that is a little insane an paranoid⦠thatās not a way to reply if you care about telling the truth, or making business is more important ?
peace.
Just responding to the part in bold from jhkmaster. If you think youāre not secure at all when on the web I am with captainsticks: disconnect from the web. :-\
The fact is that I'm not a coder so trying to give proof from something I just don't know how it really works... is it credible ?A lot of useful testing can be done and is done by none coders. See all the bugs people are reporting.
Are these really important? For Wilders Securityās regulars, maybe thatās the case. Apparently test, chart and figures are treated like a bible over there, even though it is not necessarily represent real-world scenario.
ah ah EricJH is back for the next round , " The Death OR the Homeland, Weāll Defeat ! "
I thought I read that Comodo settings coming with the install were enough to protect any user.
Maybe Iām Wrong, I donāt search, i keep my power, because Iām preparing for next round
of course itās a highway for troubles, Do you think I let process doing their life over the network ?
and on Defense+ i got 90% of my process in custom settings.
Thanks for call me by my real name, Iām a Prophet and I have to protect my people from ideas that are false.
[i]- "we were talking about TSV list being an alleged highway of troubles " ???
[/i]
what ? I started with the fact that creating predefined rules for process was not a serious position.
I didnāt make specific intervention about your TSV list o i donāt rememeber, the Ć¢ge maybe.
My message was to create your own rules because thatās the way to limit the security non-sense to trust into predefined rules.
ā¦Like it can reply for any case⦠of course not.
Please donāt call me a prophet again, I donāt want to be disrespectful with people believing in any religion and prohets. Iām serious.
okay, maybe you didnt tell it this way, bit what i memorized is the fact that comodo with common settings was good enough to protect anyone the best way , like there was no doubt on that ,
I doubt , I doubt X10 even.
about testing yes thatās easy to say, but it needs like 10 people serious cause we have to compare our resuilts and agree then post them.
so it needs some vista 32, 64, win 7 32 and 64 and which tests ??
and itās long to test
and i dont use windows 8, Iām not sure I will as long as win7 wil be supported by MS.
I used to test some years ago but I lost the faith , certainly by your fault !!! (joking)
(I can be your prophet if you really need it but not in the forum please, PM the lord but itās better to do so in the language of the universe, French I mean.)
you Irritated me first,
but itās okay for today, you are in progress, (iām joking)
and I defeteated you because I as a user am free but you as admin have to show the good exemple because all the community is watching.
hƩ hƩ hƩ
And dont forget My first intention was to reply to : Comodo Firewall worse than windows firewall
and I started maybe a little rough.
letās finish on a fair attitude : error is for you, and forgiveness is for me. logical. lol
OMFG!!!
I was away from here from about 3 weeks and now that I come back all I see is this cr$p between a user and a mod? AGAIN?
I guess its time for a cup of wine⦠and a new cis versionā¦
Man, no drama, I was in a bad mode when I first replied, then I recognized i was wrong to reply like that.
And my second reply was based on a jocking style, not againt the admin, but to minimize the importance of some of my views sometimes.
thatās all, thereās no problem with any admin and I.
ailef.
So whatās the bottom line here? I just stumbled upon this thread. I find it difficult to read 15 pages of hair pulling. How do older versions fare?
The bottom line is that yes Comodo firewall when set using the default settings is worse than the windows firewall. But if you enable ipv6 filtering and set the stealth ports setting to block incoming connections, then you will be better protected.
That pretty much sums it up.
Itās better to forget about this topic. Chip magazine had AVC run tests. Chip erroneously posted comments about Comodo even when it wasnāt tested. I think Chip later removed the part about Comodo. Other than that the topic diverted in various directions where people discussed details.
How do older versions fare?There wasnāt a real problem to begin with. No need to install older versions.
Comodo Firewall does a better job than Windows Firewall because it as sandboxing of unknown files up its sleeves.
But if you enable ipv6 filtering and set the stealth ports setting to block incoming connections, then you will be better protected.Changing stealth port settings is a question of convenience rather than security.
At the forums we advice to up the security settings from CIS following Chironās recommendations as described in his article How to Install Comodo Firewall.