Opinions about non-Comodo products?

As many have noted, there are many solutions. My take on the whole situation is that if any user can utilize a group of internet security minded individuals to help answer the really hard to answer questions that the user doesn’t have a clue to, they should. Then just maybe, the user may have a fighting chance. Safety in numbers does have many advantages.

I am still using Spyware terminator, so far no supposed ill doings, illegal accesses, things like that. This has nothing to do with the above but I think it works great as long as they stay on the straight and narrow. It has hips, which is a bit noisy but has some settings to tone it down. I will admit, if something tries to get past, it alerts you for every dll or exe or anything, haven’t had once incident of spyware, I think if they stay truthful , it’s a heck of a product.

Paul

In a word; I agree. ST is very well behaved. Their forum is very much like this one. Everyone is welcome.

Guys… does ST work with CAVS 2? I disabled ST before I installed CAVS 2 since they both run HIPS at the application level & I assumed they would conflict.

I asked Melih about this type of situation in another topic but he didn’t answer me. :cry: Anyway, I was wondering the same thing.

Paul

where?

if I didn’t answer, that means I haven’t seen it, or aliens have abducted me and not providing me internet connection in captivity, or when they transported me the technique they used has wiped off my hard disk! No other logical explanation! :SMLR

so, pls ask me the question again…uh huh… what’s that light…coming down from the sky (:NRD)

Melih

LOL, the martians have landed on planet… Hilem

No worries, I was in a goofy mood last night and was throwing this at you jokingly knowing you’d see it. Hey, extreme good moods don’t happen often ;D Besides, I sort of jumped in on that topic which wasn’t mine anyway. :wink:

STARSHIP COMODOPRISE going where no security has gone before…

Paul

Lol, yes, for what i see Melih answers just about everything he can. Which says a lot about Comodo. (V)
I just wanted to add something that i forgot. Before any HIPS, shmips, hawks, eagles and dragons, the best defense is sandbox. A pratical one. I use GeSWall. It’s no standalone, none is, but it’s best to start there, i think. That’s why i think that the next Comodo product should have a module to do just that, or to add that feature to CPF. :THNK Is it a bad idea?

Cheers :■■■■

Yes he does. lol. However my harrassment isn’t limited to just mods and some users. The admins are human as well and need a good roughing up sometimes, lol. :smiley: Melih knows me all too well by now. Poor guy! ;D

Paul

I have both installed, and no problems. However, as I noted earlier (I think it was in this thread???) I turned off the HIPS cuz it was buggin’ me so much. I kept the Real-Time shielding in place, tho, and that did cause any problems w/Beta 2 (once I got it installed after 10 hours!).

I’m interested to hear Melih’s answer, for sure; I would tend to think that two HIPS (doing the same type of thing) would conflict in general, kinda like having 2 FW’s. But since ST is pattern/definition-based and CAVS is app-based, maybe it’d be ok. Love to hear the official response…

LM

How come your CAVS2 install took 10 hours? I’ve installed it twice so far - 1 perfect the other diabolical. If I perservere with the diabolical one will it eventually come good.?

My symptoms - safelist DB created ok - desktop practically unusable after that. Double clicking anything produces the eternal hourglass, task manager wouldn’t start, nothing would start.

Sound similar?

What did you do to end up OK?

In saying that, the other installation went perfectly and the system is LOVING it! It works so nicely othat box, just not on the other.

ewen :slight_smile:

P.S> I"ll have another ■■■■■ at installing it. If I don’t reappear in a coupleof hours, you know I’m stuck in an hourglass somewhere. LOL

cheers,
e

HIPS is all about hooking apis.
so even though u might have two different products doing something slight different., they might be hooking and defending the same APIs that might cause conflicts.

Melih

I apologize Melih, I made the link into a word>Hilem, in my reply to you. and it slipped by. Why is it when you harass the CEO, that’s when jokes go wrong? It’s like the one time you may ■■■■■ up, the boss happens to be right there.lol. Anyway…

What is your opinion or thought on how different HIPS programs will work together? Like with spyware terminator, CAV , CPF or others? How many HIPS do you feel are too much or not enough? From my understanding , users only need one, however, is your HIPS going to differ? I would think list updating is one way it may be different, or ability to react.

And would multiple HIPS programs be called “HIPPOS?”

Paul

Ewen, don’t panic. :slight_smile: CAVS2 didn’t take 10 hours to install; what took that much time was the process of trying to get CAVS1.x uninstalled in a way that CAVS2 would accept. See my process here. Basically what happened is that tried to install CAVS2; it said CAVS1 needed to be uninstalled. I ran ccleaner; that wasn’t good enough. I ran Windows add/remove progs, maybe some other minor cleaning, and it took. Installed CAVS2, rebooted. Ran safelist (15-20minutes). System froze, some problem w/explorer.exe not responding. I rebooted in safe mode, and restored to pre-cavs2 (should’ve done diagnostics at that point, but I thought I’d just go thru the uninstall cavs1, reinstall cavs2, just like b4). From that point on, CAVS2 would not accept the uninstall of CAVS1 (I attached a screenshot over in the other thread). So every time I thought I had it but it didn’t work, I’d have to re-restore, reinstall cavs1, uninstall it, try again. That’s what took 10 hours, all in all.

Inasfar as the magic solution, I don’t know. I just kept at it, cleaning out every registry instance to all CAVS-related items. Cleaned out files, folders, etc; anything I could find. Installation setup files. I think you were the one that said regarding CAVS1 uninstall back when everyone was struggling with that, that you needed to run lspfix, so I did that to. Stopped the running processes, etc. Kept finding something else from CAVS would pop up in the processes/services, that I’d completely deleted (example, CAVS updater showed up - and ALL CAVS files were gone - no AntiSpy, no AntiVirus files in c:\Program Files\Comodo… at all. None. Yet there it was, running away to its heart’s content.)

I just kept plugging. I’m sure you can get it too; I have confidence in your ability. All I’m left w/now is a ghost installer; read more here

All in all, I don’t think it’s CAVS2 that’s the problem - it’s how it looks at CAVS1 being on the system (or not, as the case may be).

LM

Paul, you asked:

I think Melih had already answered:

(you probably passed like ships in the night…)

Regarding ur “hippos” question, isn’t there a download mirror/service called “File Hippo” or something like that? :THNK

LM

As I said, this only happens when I direct something at Melih. Anyone else, noooooo. CEO vodoo magic, that’s what it is. Anyway, thanks and obviously I missed that. I would still like to know how one HIPS will differ from another. Regardless on the HIPS , aren’t the HIPS mainly the same?

Paul

In the same way that your MIL and Elle Macpherson are both, biologically speaking, the same. LOL

Why didn’t you say so in the first place? LOL. HIPS >HIPPO, got it! :wink:

Paul

Paul, I know that somewhere in this forum someone gave a link for a great article on HIPS (in general). I don’t remember where it was, if it was under CAVS or CPF, or some general topic. But it was very informative. I don’t remember all the details (it was long), but I got that there are a couple basic types of HIPS, and much debate about which type is better.

The two basic types are pattern/definition-based and application-based (I think that’s right). Pattern-based watching for certain types of actions, regardless of the application doing them. Application-based being that it watches for known & unknown (or known dangerous) apps and stopping them, regardless of the action they take.

You could look around for the link; I know it’s here somewhere…

LM

Eureka! I have found it! https://forums.comodo.com/index.php/topic,3338.0.html

Little Mac, thank you again. Very interresting. I knew some basics about HIPS but this answered a few things. I do have a concern with HIPS though. In itself may be a vulnerability and what would likely happen if it itself was the point of attack? How long before someone modifies it? It could be our best friend but I think a hidden risk. If this gets modified by a certain attack, it could be used to spread viruses etc…easily throughout the system, almost like a mini gun virus shooter. I could be wrong but after reading the workings of HIPS, I think this may be a concern. As I said, this is only a thought and HIPS is young yet and i’m not saying it’s not safe and a good prevention currently.

Paul