5
509322
I mentioned to make uninstall tool And they mentioned to file a report.
That request has been made since time immemorial. Give it up.
I mentioned to make uninstall tool And they mentioned to file a report.
Are you referring to the concept in general or the location?A security soft running a *.bat in ProgramData...
Are you referring to the concept in general or the location?
So it's not an issue nor a bug- in spite of what some people want you to believe (sigh...).
Thanks for the helpful video. I have a conflict that I'm unable to resolve. When I open Chrome (64-bit) its Sticky Password extension triggers the auto-sandbox with a randomly named BAT file... for example...
C:\ProgramData\COMODO\Cis\tempscrp\C_cmd.exe_58EE0EADEB7D8CC3B96C25ACD53D6EBACF6D4282 [DOT] bat
This batch file then calls CONHOST which calls a Sticky Password executable (which is a trusted file).
When the Chrome extension is sandboxed it prevents login auto-fills (as you might expect). I hoped to whitelist this in some way, but each time I start Chrome, the batch file name is different... again, for example, "C_cmd.exe_D5C2F0C509B051E1FF76BE9A267B7F5B2340E19A" so that "Unblock the application" is required with each browser start.
Any thoughts on how to whitelist this extension?
FWIW, 360 A/V and VoodooShield are in use.
Under HIPS settings, the bottom option i.e down last option something script or something...I guess your prob is due to this new option. Uncheck the option & see if you get the prob or not?
Hope Comodo come up with something for this soon.
Well, the element breaks extensions in some cases by auto-sandboxing them. 360 Internet Security wouldn't work until I worked through it all. That's the main reason. Also, the script references pile up over time in the Tempscrpt folder. It's something I think they should fix, considering it shouldn't be all that hard to do and also how much it would clean up CIS/CFW/CCAV.
A few things regarding the video:
1). If you just want the setup, that starts at 6:20
2). I left the HIPS disabled throughout the video. Although having it enabled would have alerted us to the threat in the Firewall Security configuration part, as I can think of no valid reason not to switch to proactive Security Config I did not want to belabor this point.
3). I did not elaborate on the various Sandbox levels, nor the differences in Safe vs Custom Firewall modes since these topics have been covered previously.
And no one listens!someone, anyone, anybody, nobody, everybody, somebody, everyone...noone likes Comodo Standard Bug Report Format
I have to point for clarity sake , that the HIPS in Comodo is not truly "disabled" , it is just "silenced" or "hidden" to give priority to the other modules , but it is still active in the background in case the other modules don't react.
Comodo Internet Security's auto-Sandbox (BB) & HIPS interaction explanation
I have to point for clarity sake , that the HIPS in Comodo is not truly "disabled" , it is just "silenced" or "hidden" to give priority to the other modules , but it is still active in the background in case the other modules don't react.
Comodo Internet Security's auto-Sandbox (BB) & HIPS interaction explanation
I can say that it is NOT very silent when it is enabled.