- Apr 13, 2013
- 3,224
Honestly, if you've been around the forum for awhile and haven't figured out how they teleport malware to the desktop for testing, you've just not been paying attention and deserve to get infected.Haha! Where did all the noise go, my friends? Remember those days when Comodo threads were bursting with romance, drama, tragedy, comedy, and trolledy? Oh, my darling, kindly bring me my bottle
Malware needs to run through the gauntlet of forward facing defenses of a security product and fail to be declared unfit to stop it. If one only executes it from the desktop it is not truly testing the other products now is it? To claim CIS is the only one to stop this type of attack without doing so is also misleading.The Desktop is nothing more than a folder on the System. If you use a browser to download file it will be seen either in the Download or Temp folder. Malware on a USB or DVD will also appear in their respective folders on the drive.
Quite simply, Malware, in order to run, mist be initiated from somewhere (anywhere) with no magic or teleportation needed.
Oh goody, another video, should I go grab my popcorn?Looking forward to your video. When may we expect it?
Some of us were never banned but left on our own accord after being trolled then reprimanded for standing up for ourselves.I love seeing banned members coming back as fresh new users. It warms the cackles of my heart.
One thing is certain from the video. Comodo did contain it. Wether others can or can not well that is yet to be tested since from what I recall the tests done were only file scans and not executions. So I do agree that there is no consensus regarding which software might or might not contain it when the payload is executed. However, based on the evidence presented in this thread; comodo did do its job.
And I am not a comodo follower, in fact I am quite the opposite, but I can't argue with data.
I think SeaKelp mean`t your video as in a Lynx video not a Cruel Sister one.Oh goody, another video, should I go grab my popcorn?
An excellent question you posted. When can we expect a video of a true route of infection test on all other security solutions to be performed by the user claiming this software is the only way to stop this sample
The infection worked like a charm, luring my security enthusiast friends back ... comments, laughs, and love pouring in! Oh, my love, it's time to make some noise and pop that bottle in style!Honestly, if you've been around the forum for awhile and haven't figured out how they teleport malware to the desktop for testing, you've just not been paying attention and deserve to get infected.
Oh I'm sure that's what he meant. Although it was not my claim of cis being the only product capable nor did I run a test from the desktop, I don't recall volunteering a video as if I was a tester either, but this seems to have triggered those same defense responses from the crowd.I think SeaKelp mean`t your video as in a Lynx video not a Cruel Sister one.
I`ve got my popcorn ready.
Regards Eck
Actually quite a lot of products reacted and removed the malware. The infection details and products have been discussed on another thread.When can we expect a video of a true route of infection test on all other security solutions to be performed by the user claiming this software is the only way to stop this sample
That`ll be a no then ?Oh I'm sure that's what he meant. Although it was not my claim of cis being the only product capable nor did I run a test from the desktop, I don't recall volunteering a video as if I was a tester either, but this seems to have triggered those same defense responses from the crowd.
Personally I was only fulfilling a request by @rashmi who seemed to be bored with the lack of entertainment here now days. Of course pointing out that these videos half baked prove nothing just happened to be an after effect of doing so.
You have been around the forum since 2014, I don't recall you testing or proving anything here, just the usual banter where jump in and try to look as if you know what you are speaking.
You would have known me as illumination back then, the old malware hub moderator. I have done my share of testing and understand how products work well. I have probably forgotten more about this than you have ever learned.
No sense in pretending most of you don't know who I am. I never really hide it anyway now do I.
Bottem line, if it's not real world testing you are proving nothing, so making claims is misleading.
Melih you know me from back in the day your welcome to reply as well.
An excellent question you posted. When can we expect a video of a true route of infection test on all other security solutions to be performed by the user claiming this software is the only way to stop this sample
What triggers the detection here for most software is the abuse of the name svchost.exe. No useful software has any genuine reason to doppelgäng a native Windows executable.Comodo sandboxes anything unknown, that much we know. VirusScope's detection was, for me, logical, given that the malware launches various Powershell commands at runtime.