Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
Video Reviews - Security and Privacy
Comodo Firewall and the E-File Data Stealer
Message
<blockquote data-quote="ForgottenSeer 100397" data-source="post: 1040446"><p>CruelCF and CF don't differ in terms of usability. The user has to handle the primary alerts with both configs. CruelCF comes into effect only after the user takes action on the primary alert.</p><p>For example, this E-File Data Stealer video: Users will see the alerts with CF and CruelCF; the protection depends on the user's action on the alerts.</p><p>CF, or CruelCF, is suitable for an average user's system only if there is someone to manage it or the user is ready to learn (at least the basics of its features); otherwise, he or she will disable or uninstall it.</p><p>You could install CF, or CruelCF, on a static system, but it’ll occasionally alert or isolate a program’s update and corrupt the installation.</p><p>CruelCF is extended security with default usability; it doesn’t improve the CF experience for users.</p><p></p><p>Also, proactive config with default (run virtual) containment is sufficient. CS recommendation to set a "restriction level" appears "optional" to me. Is there a CS video where malware bypassed proactive config with default containment?</p><p></p><p>The purpose of Comodo Containment is to isolate and analyze unknowns. Users can see the application’s behavior in the containment and decide whether to run it outside. Many applications won’t run in the containment, as the optional restriction level (recommended by CS) allows very limited access rights.</p><p></p><p>I use proactive config with default (run virtual) containment, as most applications run well in the containment and I can test or see an application's behavior. If there's a video where malware bypassed proactive config with default containment, please let me know.</p></blockquote><p></p>
[QUOTE="ForgottenSeer 100397, post: 1040446"] CruelCF and CF don't differ in terms of usability. The user has to handle the primary alerts with both configs. CruelCF comes into effect only after the user takes action on the primary alert. For example, this E-File Data Stealer video: Users will see the alerts with CF and CruelCF; the protection depends on the user's action on the alerts. CF, or CruelCF, is suitable for an average user's system only if there is someone to manage it or the user is ready to learn (at least the basics of its features); otherwise, he or she will disable or uninstall it. You could install CF, or CruelCF, on a static system, but it’ll occasionally alert or isolate a program’s update and corrupt the installation. CruelCF is extended security with default usability; it doesn’t improve the CF experience for users. Also, proactive config with default (run virtual) containment is sufficient. CS recommendation to set a "restriction level" appears "optional" to me. Is there a CS video where malware bypassed proactive config with default containment? The purpose of Comodo Containment is to isolate and analyze unknowns. Users can see the application’s behavior in the containment and decide whether to run it outside. Many applications won’t run in the containment, as the optional restriction level (recommended by CS) allows very limited access rights. I use proactive config with default (run virtual) containment, as most applications run well in the containment and I can test or see an application's behavior. If there's a video where malware bypassed proactive config with default containment, please let me know. [/QUOTE]
Insert quotes…
Verification
Post reply
Top