New Update CIS 2025 is now LIVE!

She did say "I will use it until I can prove to myself that it no longer works."
I wrote exactly this in the comodo forum and it is still my opinion. I am also concerned about protecting my data and that of others - I don't care which program I use, the main thing is that the program is useful to me. It doesn't matter which dentist treats me, the main thing is that he/she does his/her job well. It's about my teeth, not the doctor treating me.
It's not easy to turn your back on something tried and tested, which I don't intend to do, but to turn to something better, safer, more future-oriented.
Cybercrime has now become a major problem that has penetrated the highest circles.
Thank you for your factual and objective contribution.

It's quite possible in a few more years the malware scenario will be an AI war between "intelligent" malware and the resident AIs on servers and our own personal computers. Interesting times are coming.
It's quite possible in a few more years the malware scenario will be an AI war between "intelligent" malware and the resident AIs on servers and our own personal computers. Interesting times are coming.

Private users may still be too uninteresting.

Melih has stated many times over the years - publicly posting this stuff ad nauseum - that he does not care about bugs. Software has bugs and he is not going to spend the money to fix them all in a product that he gives away for free.
However, since the free version and the paid version do not differ in terms of security, this would mean that paying customers would have no advantage other than online support.
 
Last edited:
OK, but you have a problem with "fanbois and fangirlz" telling and showing the world why they like Comodo, right?
Not even that, it’s just user-dependent systems are promoted as the ultimate security, which shouldn’t be the case. It’s like me, showing threat hunting and other EDR features. Obviously through these features I will successfully remediate attacks. But this is showing my personal skills and not the software capabilities.

But on another thread we’ve had discussion with Cruelsister and we’ve pretty much understood each other. Btw she is on holiday now so no need to summon her in that many posts. She is not around to read them.

Then again, you cannot hold her or anyone else responsible for what they show. It’s up to everyone to interpret these videos and showcasing, the way they want.

I personally, am not convinced in the quality of any system that is highly user dependent and I am not convinced in the quality of systems that allow you to run live malware on the same system where you do your work.
I had the same argument with this Webroot supporter that was trying to convince me how amazing Webroot is, with the rollback system.
Allowing malware to run, whether it will be restricted, contained, disconnected is madness.
This should be your last-let incident mitigation (when everything else has failed), but not your be-all end-all.

There are cloud and appliance sandboxes that are reinforced and specially for this purpose, of running and analysing malware.

No MSSP employees in their right mind will allow malware to run on the same system where you work with information.
 
Last edited:
Allowing malware to run, whether it will be restricted, contained, disconnected is madness.

These are the kinds of tips that make me a little unsure.
How is this possible? By deactivating protective mechanisms to see what it can do and then reactivating these protective mechanisms to see how well a software protects the PC against it? If that were the case, it wouldn't be a problem, would it? Because the protective function would be there. Functions that I don't deactivate would mean that the protective effect of a software would be there. And of course (in line with the topic at hand), if comodo made it possible in this way, to allow - block, then the protection would be there (without going into other strengths or weaknesses).
Once again, to avoid any misunderstandings here: just as I care about my teeth when I go to the dentist (it doesn't matter which one, as long as he keeps my teeth), I care about "my" protection. I don't care who protects my life, and up until now comodo has done this, it's not my fault! And if the software "I'lldoitallforyou" can do it better, then it will be my bodyguard.
To stay on topic, comodo has been very successful. I'm not married to it, I could only trust it.

I researched on the Internet to see who had been the victim of malware on their PC despite having comodo, but no search results despite various search entries. If I didn't want that as proof of comodo's security, but on the contrary, if I wanted it as proof that comodo is not infallible and can easily fail, then I would have fired them immediately.
 
  • Like
Reactions: rashmi
deactivating protective mechanisms to see what it can do and then reactivating these protective mechanisms to see how well a software protects the PC against it? If that were the case, it wouldn't be a problem, would it
It will not be a problem if this is a device that is dedicated to testing, properly isolated in a lab. If you are doing that on the same device that you use to shop for clothes, be it in a VM, it is plain dumb.

I already discussed pre-execution vs post-execution protections on another thread, as well as here.

This is not a personal statement or an essay, it is the point of view of every security specialist, based on facts.

You can contact a few and enquire, and see who will advise you to allow malware to be ran on your real machine and then to press "block connection "/ "Contain" -- and will consider this optimal, recommended security. Compared to a solution that will prevent execution or even download.
They will be laughing at you.

I researched on the Internet to see who had been the victim of malware on their PC despite having comodo, but no search results despite various search entries.
How come you didn't find this evidence, when it was just there, in Rubenking's rather unadvanced and incompetent tests...?
Or you just don't want to open your eyes and see it?

Furthermore, Comodo audience is extremely small and very highly technical. Such audience deals with potential security incidents, doesn't go on forums to cry on somebody's shoulder.
 
Last edited:
1) Of course I assume that this is not done on a PC on which I have sensitive data or temporarily save it for processing - please don't think I'm that stupid. But even on a lab PC I would do both. That's why I tried to prevent misunderstandings, which you seem to want to misunderstand. That won't work.

2) I did it for myself to be sure that I had reliable protection or whether there were any loopholes. You wanted to misunderstand that too. Then read @bazang's post again: factual, objective. That's why I'm going to say goodbye here now, I don't feel like answering people who want to misunderstand me. Closing words: No problems for decades, protected for decades on all Windows versions, laptops, programs, working with sensitive data. No rootkits, worms or other burglars for decades. The IT specialist who introduced me to Comodo knew a lot more than those here who don't want to accept it and just bashing Comodo. Many thanks also to @bazang - he encouraged me and I'm now sticking with Comodo. It may be that Bitdefender or Norton would have done the same, but why do some people have problems with ransomware and rootkits and I didn't? It's a fact and not a bedtime story - that's why I was afraid that it would lead to deliberate misunderstandings, even though I meant it openly.
 
Not even that, it’s just user-dependent systems are promoted as the ultimate security, which shouldn’t be the case. It’s like me, showing threat hunting and other EDR features. Obviously through these features I will successfully remediate attacks. But this is showing my personal skills and not the software capabilities.
I agree. (y)

I personally, am not convinced in the quality of any system that is highly user dependent and I am not convinced in the quality of systems that allow you to run live malware on the same system where you do your work.
The typical user should not be permitted nor have the capability to do much more than blow their nose and wipe their a s s while sitting in front or using any digital device.

"Users want to use stuff" is so outmoded, out-of-touch, unrealistic that it is pathetic.

Our world is based upon "We will pass along the costs to you - the consumer or taxpayer - for all the dumb stuff that others do."

That last sentence sums up the current state of cybersecurity.
 
These are the kinds of tips that make me a little unsure.
You shouldn't overthink these tips. Every protection or mechanism can have flaws. Use software that meets your requirements, and customize it if you have the skills. For example, I've been using Comodo Firewall with proactive configuration and default containment. Our kids' systems have the Comodo containment set to block unrecognized files or programs.
 
Xcitium from what I see on their forums, is actively updated and because it is pushed to "Enterprises", I would bet that care is taken to ensure stability and reliability.
Is xcitium base on comodo Internet security? if yes does it mean that comodo IS/AV will get updated more often?

BTW where are the release notes of CIS?
 
Is xcitium base on comodo Internet security? if yes does it mean that comodo IS/AV will get updated more often?

BTW where are the release notes of CIS?
Xcitium has a free version. I don't know what in contains as opposed to paid. I'm still in the thinking phase, whether to continue with Portmaster firewall, go back to Comodo firewall, or try xcitium free.
I do this at least once a year, remove Comodo to try something else then miss Comodo.
 
  • Like
Reactions: New_Style_xd
Has comodo fixed its updates failing??? When i first installed the updates failed. This to me is sad even in beta form you are at least supposed to make sure the major functions as developers are working which is not hard to do. I do not want to see Comodo's quality control. ☠️☠️
 
Is xcitium base on comodo Internet security? if yes does it mean that comodo IS/AV will get updated more often?
Xcitium and Comodo both use the same source code, however Xcitium (paid) has more features but source code is the same.
Xcitium gets way more updates than Comodo unfortunately.
 
  • Like
Reactions: New_Style_xd
Any solution that allows you to run malware (be it contained) and then dwells on this malware, desperately trying to take a decision if it should be remediated or not, exposes your system and information to a risk, and is not optimal. Ask a few IT professionals and they will tell you the same -- even executing malware on virtual machines without the proper hardware enforcement measures in place is not recommended
Also, according to experts, the Comodo sandbox can be bypassed. There is a 3-year-old conversation about it on Wilders.
 
Also, according to experts, the Comodo sandbox can be bypassed. There is a 3-year-old conversation about it on Wilders.
Hello, this post was published in 2021.
Do you still have this problem?
 
Hello, this post was published in 2006.
im not talking about the post date but DavidXanatos replies from 2021:
1726010284337.png
 
Xcitium free looks like it hasn't been updated since 2022
And it requires a cloud account where your logs will be sent

I have seen that xcitium free UI is basically comodo + ERD, so what is the point of using only comodo if xcitium free has more feature and better support?

 
Last edited: