recent infections amongst and rampage of portscans igmp icmp. udp. have been successful
remote connections and user rights and privleges have been changed, owner rights and user names have changed…recovery on is own partition was created. it containted the virus/worm/trojan ace dialer.
and some how magically reappeared after an xp repair. delte of registry components, and spyware terminator remove. haven’t tried your software yet. I was thinking comodo was about to pass my 6mo test period…■■■■…
clean pc and sfae mode are the current setting i have block the system from accepting an incoming connection and an attempt for a global hook from the svc host fo far… (:CLP)
just blocked msrt.exe
commodo said it could allow veiwing and manipulating of things on screen
Hey Pazsion, Welcome to the forums.
What is your problem exactly?
igmp icmp. udp. aren’t normally malware attacks… they are a way of doing things… I’ll try to outline them for you.
The Internet Group Management Protocol (IGMP) is a communications protocol used to manage the membership of Internet Protocol multicast groups. IGMP is used by IP hosts and adjacent multicast routers to establish multicast group memberships.
The Internet Control Message Protocol (ICMP) is one of the core protocols of the Internet protocol suite. It is chiefly used by networked computers’ operating systems to send error messages—indicating, for instance, that a requested service is not available or that a host or router could not be reached.
User Datagram Protocol (UDP) is one of the core protocols of the Internet protocol suite. Using UDP, programs on networked computers can send short messages sometimes known as datagrams (using Datagram Sockets) to one another. UDP is sometimes called the Universal Datagram Protocol.
^ I got all of those from Wikipedia ^
If that doesn’t answer your question, could you please post it more clearly Hope this helps!
Are you using Spyware Terminators HIPS? only use one HIPS at a time as they will compete for the control rights of your computer. D+ is far more superior.
I continue to get port scans and connection attempts from unknown and unprovocted ip’s from these ports… Any port can be used by anyone/anything to send an attack…
Yes, as of today i have 3 layers of HIPS
spybot search and destroy HIPS
Other then slower performance and lag… They seem to be working together. And each (except windows) has blocked attacks and strange behavioour…and unknown programs…
In this post, I had tested comodo alone for 6mo straight… And it failed… by allowing attacks to get through and infecting my pc…
over a 120 days later i re-install it cause its the only one i know of other then sygate that is free and works…And i think has good support. But i’m not to sure about that at this point… this thread didnt get any replies or good answers…
This wasn’t a question but a statement… These things were used in the attack that made comodo fail. or Shutdown.
If there were anything i could do to help prevent this in the future… then you could pls put those replies here TY!