No Sir, I do not have a second username here, except kinda techy 2, which did not receive an activation email.
With regard to accusations of malware, I did note carefully that my concern was with regard to external malware, not internal.
With regard to accusations of denial of service attacks, I feel the program could be improved to prevent even the thought of such a thing being included or exploited, and should be a concern of Comodo, seeing as how the company states it is the most secure browser.
I am not allowing those connections again, and I do have a screen capture of those events, which I think is enough, but if you insist on a raw packet file, I will get one and post it publicly. I would only do so when I can ensure the packet file does not require sanitizing.
With regard to the source code, there are two files that cause me to have concerns which might appear to be outside the realm of programming, yet I am steadfast in my opinion of what they are, what they do, and what a result might be from those files. I will not go off topic in this forum, but I will be open to discussion on that with programmers who are able to understand my concerns and would be willing to make the necessary adjustments.
The source in question is the Chrome source, which is currently 1.2 GB from the dev chromium group site. I am on a somewhat fast connection, so it took less than an hour or so to download and extract the files.
I will state this rather openly - when I state that someone might be lying in an attempt to find weakness, you might want to consider that my question is valid and I will not have my concern - which is legitimate - be silenced, quashed, or withheld in any manner if the statements by others are inspired by anything other than the effort to keep the internet safe.
I take this matter very seriously. I do not like my computer being used in a way that I do not understand and I have had computers as a hobby since 1994. I did not fall off the pumpkin truck yesterday. It is my steadfast belief the code in question should either be something that is only enabled when it is called - with the intent of the user at the terminal the program is installed on - and to be unloaded if not being used. I would also :love: it if I could get a checkbox I can untick to completely disable this feature that I do not want, do not need, and have no use for.
I could go on about my personal network here, how I have certain things set up, etc, but I see no need to tell you I know what UNC actually stands for, or anything else. Yes, without searching the internet or a book for the answer.
I will also - because it was mentioned previously - ask why a hostname on my netblock would be queried when I use google / comodo / OpenDNS? Yes, my ISP has a search page. I guess you had no idea I can’t stand it and get very inspired to change my DNS when I see it. I kinda view it as a blessing in disguise 
No sir, I have no add-ons. Its bare as can be. I did have AdBlock Plus installed before I got rid of the entire %folder% Dragon was installed in previously. I do not see how blocking advertisements would initiate random hostname queries but I also want to mention I have installed Chrome, Dragon, Iron - again - after removing everything associated with them, using (you guessed it) the Comodo Programs Manager. It even got rid of stuff Windows thinks I want to hang on to.
I even went so far as to reinstall my OS, and all my regularly used programs. The OEM defaults to Chrome 7.something (didnt bother to write it down, sorry!) but after simply updating Chrome to the latest version (did that yesterday) those DNS requests appear right afterwards.
To be so very honest with you, I know of several exploit packs being available, however, I do not use them. I downloaded one about a year ago, just kinda poking around. Being aware of them, I do realize this might be something that is being actively exploited, and if so, I have no idea who it might be.
edited for clarity and completeness