I do have McAfee Site Advisor installed and in three colors. Like on a stoplight, red, yellow or green. Same with product, safe to go, yellow is caution (visited 2 sites with that for genealogy, Lycos.com, Tripod.com and got 3+3+3 tracking cookies). I once used this site: www.driversguide.com, tried that and it turned red! quick look at found out why, two pages of ads BEFORE you even see the site?? Got out pronto.
Originally uninstalled Comodo BOClean, CBF and IE7. So I could find out why errors on page??
Turns out that there was more to this that a simple solution would not work.
Reinstalled both Comodo products-then IE7.
Shut down it all for 3 hours after changes below. No problems now, all are playing nice now.
Went to Internet Options and put many sites into Security, Trusted and unchecked https:; tried the same with Local Intranet. Comodo was a no-go but my ISP did.
Everything works now with one small exception, have to give permission to access Local intranet.
Compared to what happened. Looks good to me. Darrell
I think it’s actually part of Firefox 2. An automatic deal. It will show by mousing over the padlock icon at the bottom of the browser, when on an encrypted site (https). I’ve seen it show for Verisign, Thawte, etc…
Hello Comodo staff and all of you who knows a little about computer security.
I’m curious about how you find out about new malware threats. Do you add malware to a black list as you get reports from users, do you manually surf the web - looking for suspicios web sites and download “cracks” or “keygens”, do you open all those spam emails we get in our mail boxes? Or do you even create your own malware - but never spread it outside your labs of course - and add it to a black list?
Perhaps your methods are secret, but again, I just wonder how it actually works.
We have many malware sources. So everything you said above is something we do. From getting submittals from our contributors, users, to having honeypots and crawling the web.
Does CAVS 2 HIPS really monitor what you execute from other partitions than drive C? I store all my installation files for software on D, and ran a setup file some days ago - but there were no warning from HIPS (and I know the file was not in safe list because I tried to launch from C too and then a HIPS warning came up). Instead there were actually an error message from Windows XP: “NSIS Error - Error launching installer”.
I don’t know what’s wrong, a month ago or so there were no problems launching setup files from D. Now I have to copy it all to C. Do you think HIPS would warn if this Windows installer error hadn’t occured? I don’t know how the HIPS technology works but I suppose it would warn if it got the chance?
Hi,
I´m somewaht mixed up on tme alternatives available to prevente malware. I´ve been usingo spybot for a long time and today decided to install BOClean, in order to have online protection. But reading another forum, I found nothing on BOClean, and found good references to spywareblaster and spywareguard.
Can somebody help me decide on what is best combination?
Thanks,
Weber
BOClean is designed as a backup to antivirus and antispyware’s. It is designed to detect what these usually miss, such as Trojans. You should have antivirus and antispyware already installed. BOClean will be an addition to these.
i know comodo has ve and i use it but is comodo going to develop an anti phising tool like mcafee site advisor,trend protect(trend micro)i think it would be a great tool from u guys?
I think VE is a great tool, however I still think the big green border is a little too intrusive.
Whilst McAfeee Site Advisor does not validate a site the same as VE does I think the interface and the way it warns is much more acceptable. I feel many more people might use VE if they did not have to put up with the huge green border.
You know, you don’t have to “put up” with it; you can change it…
Open the options. You can change the border width (to decrease or increase). You can change the color as well. I have it set to 5 for the width and a dark blue that matches my color scheme. I still notice it, but it’s not as intrusive.
Base protection against Phishing with anti-Phishing blacklist : Dangerous Internet resources listed in the g4bi database are blocked by IdnWebShield.
Blacklist extension phishing-toolkit-blocker: Dangerous link signatures which are commonly used by phishing-toolkits are detected and blocked. Phishing-toolkits are software programs designed to help Internet criminals generating large portals of different spoofed Web sites where victims are asked to provide their sensitive personal data.
Anti-phishing prophylaxis: A complex firewall-based rule-system combined with an intelligent heuristic build up a powerful protection shield to detect phishing-websites. Every day the protection-profiles are regenerated. The IdnWebShield software is automatically kept up-to-date with the latest versions of Anti-Phishing prophylaxis.
Phishing attack prevention with IdnCCD protocol : Prevents Phishing attacks with international domain names. For more details see some FAQs.
Pharming attack prevention anti-Pharming local DNS monitor: Monitors your local “hosts” file for any changes notifies you accordingly if you try to access some internet resource quoted in this file.
IdnWebShield DefCon (DEFense CONdition) Pharming attack prevention anti-Pharming authenticated DNS cache: Processing your web requests IdnWebShield accepts DNS information only from authoritative nameservers .
Phishing attack prevention with anti-Phishing URL monitor : Analyzes the format of requested links. Prevents Phishing attacks using some form of technical deception designed to make a link in an email appear to belong to a certain organization.
World-Wide-Web link detective: looks up background information about a link. It should complement your knowledge of what is going on behind the scenes.
Melih and friends? What do you think about this prog?