Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Security Apps
Comodo
Comodo CIS Bug fix policy
Message
<blockquote data-quote="Decopi" data-source="post: 1101323" data-attributes="member: 67091"><p>The literature is abundant, it is very common to see a virus/malware hijacking the official SVCHOST signed by Microsoft. The same goes for other Windows Services.</p><p></p><p>In the case of Comodo, there is an accumulation of serious technical failures:</p><p></p><p>1. Comodo does not detect or identify virus/malware. Comodo is just a blocker, so Comodo puts the user at risk by forcing him to execute the virus/malware;</p><p></p><p>2. Once the virus/malware is being executed, it can easily hijack other executables, for example the official SVCHOST signed by Microsoft. I repeat, signed or not signed, at Comodo any "Safe"/"Trusted" file has free comms;</p><p></p><p>3. By default, Comodo labels as "Safe"/"Trusted" all the Windows Services, the Svchost, and hundreds of other files. It doesn't need to be signed! If the user or Comodo labeled a file as "Safe"/"Trusted", that's it, end of history, that file will have free comms. All "Safe"/"Trusted" files have free comms at Comodo. It's worth remembering that in the past, Comodo labeled executables (that were viruses/malware) as "Safe"/"Trusted". Those executables were not containerized/sandboxed, and Comodo Firewall gave them free comms. Again, this has happened in the past!;</p><p></p><p>4. Considering that Comodo does not allow the customization of firewall rules for these "Safe"/"Trusted" files, every virus/malware can hijack these files, and obtain comms;</p><p></p><p>5. Comodo is built in modules. The failure of a module (Firewall) cannot be justified by alleging that another module (Containment) avoids virus/malware comms. If Containment fails (and in the past it already failed many times), a virus/malware can hijack all the files considered "Safe"/"Trusted", and Comodo not only does not detect or remove that virus/malware, as worse, Comodo Firewall allows free comms for that virus/malware.</p><p></p><p>Comododo Firewall is a placebo.</p></blockquote><p></p>
[QUOTE="Decopi, post: 1101323, member: 67091"] The literature is abundant, it is very common to see a virus/malware hijacking the official SVCHOST signed by Microsoft. The same goes for other Windows Services. In the case of Comodo, there is an accumulation of serious technical failures: 1. Comodo does not detect or identify virus/malware. Comodo is just a blocker, so Comodo puts the user at risk by forcing him to execute the virus/malware; 2. Once the virus/malware is being executed, it can easily hijack other executables, for example the official SVCHOST signed by Microsoft. I repeat, signed or not signed, at Comodo any "Safe"/"Trusted" file has free comms; 3. By default, Comodo labels as "Safe"/"Trusted" all the Windows Services, the Svchost, and hundreds of other files. It doesn't need to be signed! If the user or Comodo labeled a file as "Safe"/"Trusted", that's it, end of history, that file will have free comms. All "Safe"/"Trusted" files have free comms at Comodo. It's worth remembering that in the past, Comodo labeled executables (that were viruses/malware) as "Safe"/"Trusted". Those executables were not containerized/sandboxed, and Comodo Firewall gave them free comms. Again, this has happened in the past!; 4. Considering that Comodo does not allow the customization of firewall rules for these "Safe"/"Trusted" files, every virus/malware can hijack these files, and obtain comms; 5. Comodo is built in modules. The failure of a module (Firewall) cannot be justified by alleging that another module (Containment) avoids virus/malware comms. If Containment fails (and in the past it already failed many times), a virus/malware can hijack all the files considered "Safe"/"Trusted", and Comodo not only does not detect or remove that virus/malware, as worse, Comodo Firewall allows free comms for that virus/malware. Comododo Firewall is a placebo. [/QUOTE]
Insert quotes…
Verification
Post reply
Top