Why CIS Premium is Superior..

Watch this video to truly understand the issue and how we solved it.

It certainly will be worth your time!

thank you

Melih

Great video, Melih. Easy to follow.
Btw, your handwriting on a white board is better than mine :slight_smile:

lol…i do have a bad handwriting :), maybe we can create a club :slight_smile:

Melih

LOL

This is a great video that explains very simply how Comodo works and what does the security offered by this product compared with traditional AV. I think this video would be good to be known by as many people to understand better the new Comodo technology compared to other products.
What I think is very important in this video is the simple and familiar way in which Melih explained what Comodo has to offer. :-TU

1 I wish I had as much hair as you do.

2 This video could/should be 5 minutes long.

3 Most words you used only make sense to a above average user.

i like the strategically placed comodo mug :-TU

Well done video Melih

John

Nice video. Like SG65 said, many parts could be condensed, but for the regular user, it may be good to have long explanations.

My handwriting deteriorates notably when I’m using a whiteboard/chalkboard. :slight_smile:

Hi Guys,

Melih, that was probably the 1st video, which I will not “severely criticize” ;D

Regarding the hand writing compare to mine - you can be the “role model”
I will not go near any Pageant hand-writing Competition hosted by Donald Trump & where you are participating… not saying that the “hair issue” was touched here in this thread as well, in one of the replies (see above) :smiley:
( as a matter of fact I have long hair … my own… and much much more!!! hahahaa!)

Now, closer to more serious matter - the video is definitely good and educational especially because many users ( new / less experienced/ etc. ) indeed having no idea when the are hearing those terms : denies / defaults / black & white lists/ the concept of the architecture & so on …

Well done! … no matter what … some may say that it’s very simplified … not enough … and alike … , but I may say that is important message to start with for such category of users.

As for sandboxing - the concept is correct … but you know about my negative opinion about Comodo’s implementation in particular … I will not dwell on this here ( !ot!)

There is another thing that probably deserves more explanation though most likely in a different video similar to this :

  • What is this white list?
  • How you (Comodo) check those white-listed Applications?.. and compare/confirm - that is what you “dear user” having on your PC now;
  • Don’t we know that many “decent” applications including the system ones (even as kernel) can be compromised???;
  • What is this panacea about “digitally signed” applications? … and creating that huge list of those? Do we really need all of that?;
  • Does the “digital signing” the way it works currently really completely workable concept? I have real doubts…;
  • Can or cannot those be compromised as well… it seems actually - they can be … hmmm…;
    That issue was touched in one of our old discussions and at the time you agreed that “digital signatures” as they are implemented currently are not enough…

My point here is - mainly those particular issues mentioned deserve a separate and serious discussion(s) … probably another article and/or video as decent as this one

I personally not a big fan/believer of “Trusted / Signed” … - they can be poisoned

So probably you & your team will come up with another (popular) explanation regarding the matter

Cheers!

for this video - have one :■■■■
for the sandbox - give it back to me! ;D

My wife said noone would notice the hair :slight_smile: (honeeeyyy…someone did!!!)

1)Whitelist applications: There is a huge process 8 page long flowcharts as to how to determine if a file is safe or not…

2)Anything can be comprimised: But system files are usually digitall signed, hence any comprimise will cause the digital signature to be invalid. There is no way of comprimising a digitally signed file without invalidating its digital signature.

3)I wish all applications were digitally signed…life would be much much easier for us.

4)Its totally workable…the whole infrastructure is there from your browser to your OS to your email client…they all support it and its a widely accepted standard…

5)digital certs/signatures cannot be comprimised…there is no way (mathematically) and practically etc etc…its a solid foundation of trust…

Melih

1st – saying that your wife was wrong regarding hair would be wrong :slight_smile:
…but she was - don’t tell her, please

Other than that…

“mathematically” ??? R U serious? Or you are just joking?

My point was that you have to address & prove the issue & that it is bloody (sorry for inappropriate word) it is a working solution

It is not!
Since you did not provide the links I will not do that as well - Let the users find out

It is proven “mathematically” that md5 and SH(whatever) can be broken … ha!

Then “mathematically”… white or black lists are ■■■■ anyway , aren’t they?

You do not worry, or as they use to say here in “Oz Land”: No worries , mate!”

I have a special PC for testing those “unknown”

97% (do you like this figure?) that are flagged by many (most) security packages are pure ■■■■

Not all security are engaging this “technology”, but many do & Comodo (AV part) is the one, which is notorious in this area (not speaking about the real enormous!!! amount of real FPs) - you just go and gather any possible link/software in P2P and add it to the signatures …

That is Bad!

Sure , I do not want to promote using cracks & keygens – that is wrong indeed …
but …
… how can I put it here diplomatically -
cut the ■■■■ (sorry again) with “mathematical” signed and whatever you are trying to drill into users brains

as I said 97% of them are indeed “unknown” … but not malicious …. hmm…

and please provide the links were the experts are talking about dig.Signatures as well are they completely safe? That was the main point … not the “mathematically impossible” incorrect statement that many do not ever understand

The special PC I’ve mentioned is running :
Multi- boot (all cracked) XP, Vista,Win 7 x64, MS Office; Nero (the latest), Sony Suite; Cubase H2O - cracked dongle - protected!!! made brilliantly (!!! seven exclamation marks), Adobe CS 3 /4 /5 (!!!) … do you need more ?

Many security just gather those from P2P and flagging.

Sitting here working with all of those… enjoying & laughing (:TNG)

Not all security do that -
but Comodo is the most of the notorious in this area - wrong & ■■■■ no matter whether it’s “Black or White” list – “disguising disgrace” no other word I can find,… well My English as usual is not perfect, but I hope some users will get it

Do not try that at home folks - you digitally signed … but “compromised” MS (whatever) will work … but … my point was different
I hope you got that

Grrrr! Goose bumps I’m having now

Cheers!

Mathematically I am serious… there is no easy way to come up with what made the keys for a public key pair. it requires brute force to ■■■■■ the algorithm and if you use a large size key like 2048bit key, then you are safe till about 2030 as there won’t be enough computing power to ■■■■■ it etc etc.

dunno why say black/whitelist is ■■■■…? ■■■■ for what?

The issue you discussed before: If our way of checking a file based on digital signature could be comprimised.

So in order to stick to the discussion point: digital signatures cannot be broken now.

Your issue of “what is signed” with those signatures is a different issue.

At the end of the day its all about mainly a human judgement as to what gets digitally signed as good or bad etc etc.

cheers

Melih

I dont know about all of this I just am eyeing up that comodo mug…

Edit by EricJH: fixed your quote

Not on YouTube…?

Here it is: Gifts - CafePress (:WIN)

Thanks,A little steep for a mug but I am getting one!! :-TU

Dear Mr. Abdulhayoglu,

I would like to reply in two parts.
1: This is probably against forum rules but here goes; I appreciate your video very much and would like to thank you for taking the time to go into so much detail. :-TU Very well done!

2: I would like to respond to forum user “SG65” and his comments:
"1 I wish I had as much hair as you do.

2 This video could/should be 5 minutes long.

3 Most words you used only make sense to a above average user."

I totally disagree and feel there is no need for negative mean spirited comments as those toward anyone trying to “teach” or inform. No one on earth knows EVERYTHING!

My case in point is this; I am listed as a “newbie” on this forum (as I believe he is also) but that in no way means that I am a “newbie” to computing in general. I began my computing career while in college working for the University in the (Mainframe) computer room. Working with a “Sperry-Univac 9200”. I say room but it really took up the entire basement of the mathematics / science building. It had an elevated floor with air conditioning blowing from the bottom up to keep the system cooled. it was restricted access, with argon fire control. It was enclosed in glass walls and the “Administrator/Operator” wore a white lab jacket to maintain a sterile environment, because it used banks and banks of “UNISERVO 8C” tape drives either 7 or 9 track, 800 BPI and ran on Disk Operating Systems of "COBOL-74, RPG2,FORTRAN or ASSEMBLER. Imput was primarily through “Data Card Punch” machines and subsequent card punch reader machines.
My first computer was a small keyboard/cpu unit that you plugged into a television antenna jack (75 Ohm coaxial connection) and the Hard Drive was a regular cassette tape deck/player and I used “Basic” as the script writer.
That was the late 70’s I’ve had a vast and storied life/career since and I’ve tried to keep up with computing in general all these years. But you know what? It’s impossible. As I said no one person can know it all. Just like in the Engineering field or the Medical field there are specialist who know more about one part of the overall field than someone else does. Over the years I’ve become aware of AV programs and began using them years ago mostly Peter Norton’s to begin with and on to Symantec (Since he sold it to them, which by the way sucks!). I’ve used Enterprise versions of Norton (Symantec) and McAfees’ etc., but guess what? I really didn’t know HOW they worked and I did not care. I simply did not need to. I just needed them to work.

Melih’s demonstration was very informative and I think on a level that ANY kind of user could understand and appreciate. As I said I’m a “newbie” to this forum, mainly because I don’t really care for forums because usually they’re made up of people like you who want to criticize people instead of being constructive. I’m NOT a “newbie” at computing, I’m NOT a “Newbie” with Comodo’s Firewall and have been using it for several years now with NO problems on the machines I running Comodo on, but I do not consider myself above average either. NO ONE gets to old to learn and I for one “Learned” something from Melih’s video (although he probably won’t win any hollywood awards for acting ;D) as i’m sure other’s did.

I know this has been long, but to sum it up I’d say this; Thanks Melih, I understand the “Sandbox” now and felt that your other analogies were good as well. And to Mr. SG65 you could learn from what my Mother used to teach us: “If you can’t say something GOOD about some one then don’t say anything at all”!

Good job Melih, keep up the good work. I love your products!

Thank you blue01! Really appreciate it.

Melih

I am waiting to see the next video, then I might petition the catholic church to name another Saint… " The Saint of Internet Security" Saint Melih I will just have to think up a “protect my computer” prayer. lol

LOL…I am just an Idealist Geek who is lucky to understand business…So my vision is driven by the Idealist Geek in me, and the entrepreneur in me tries to make money from it so that it can fund the Idealist Geek’s vision :slight_smile:

Idealist Geek wants to Create Trust Online!

Melih