I followed the “how to…” and set comodo to proactive with all the suggested changes except increasing display of error messages–I don’t want to see these…
And yet I had to re-install yesterday ??? (thank you Norton ghost for saving me TIME) because “anti-malware doctor” somehow turned off CAV and infected my machine! >:(
I have XP PRo w/sp3 installed with the server service, microsoft networking, java, and flash all turned off(disabled or not installed) for extra security, and yet this program was able to somehow turn off CAV (4.1.150349.920-fresh install, not upgrade) and infect my machine.
Is there a way to further enhance comodo security so I don’t have to worry about little proggies slipping through and disabling my (what I thought was supposed to be a) firewall? I really hate re-installing.
Thanks in advance…please let me know if I need to submit any other info…
I don’t know where anti-malware doctor came from, I ran a couple google and amazon searches and logged into hotmail only…
It really shouldn’t be necessary to increase security even more than that, although the next version allows it. Do you have any information about the type of infection that you say bypassed CIS? Did you receive any popups at all?
It’s possible that is was digitally signed in a way that V4 doesn’t protect you from, but the soon to be released V5 does.
I’ll be relasing an updated post after V5 comes out and I have a chance to evaluate the settings that will be included in the final release.
There were some malware that V4 didn’t account for but V5 will.
well, first of all, anti-malware doctor is bona-fide malware.
When it popped up without my permission, I tried to kill its processes- to no avail: it re-started upon reboot.
Now I have read your forums and I can see that your first reaction is always to blame the user and deny their observations, but to me, a program which installs itself without warning, pops up and runs without being asked, and refuses to be removed without purchasing somebodies product is (as I said-to me) a virus. Be it malware, or any other technical term meant to skirt the facts.
also, when I looked, there were neither comodo agents, nor cfp in the task manager.
right now, I am on-line and the comodo taskbar has a red crossed circle on it…disabled. Running a diagnostic results in “no errors being found”…
I know my ghost backup is perfect: I install XP sp3 off-line, update all my drivers and install the updates from my technet subscriptions. and then save the backup image to a secure folder.
Upon re-installation (…via ghost…) I install the latest cfp, and after a reboot connect to the internet and update the AV component… Which leads me off-topic to a complaint: why must I download the complete 80-100 mb definitions every time there is an update? can’t the package be appended? Especially since each new release never has the complete definitions and immediately needs updating every time. And it seems impossible to use your product in my back office, as being isolated from the internet effectively incapacitated updates, as there is no portable-separately downloadable- definition file. Anyway, sorry to digress.
I will now re-install Comodo(again), since I know that the disabled symbol disappear upon reboot, but in my experience it will pop up again at random every once in a while.
I hope you’re not talking about me personally. I was just trying to make sure you hadn’t accidently allowed it. If it actually bypassed CIS that is a major problem and the simplest solutions need to be explored first. I hope you understand.
Can you start the modules manually? What happens when you try?
Also, I have a question about this
Did you run any executables or do you think the malware was possibly a script?
If so then you may have been hit with a type of malware that V4 didn’t account for, but the soon to be released V5 does.
It mainly occurs through search redirection: in such a circumstance, the user actively clinks a links he thinks to be valid, and thus infects himself.
Only visiting the said site can be enough without actually clicking anything if you are using older versions of softwares subject to some vulnerabilities.
Rogue threats are probably the worst ones and, under the said circumstances, the security software is not of much help, as it most often shall use a vulnerability in a trusted software.