App Review Comodo Firewall vs a new Data Stealer

It is advised to take all reviews with a grain of salt. In extreme cases some reviews use dramatization for entertainment purposes.
Content created by
cruelsister
Dang! I remember that SONG before. Been a long time. Stop The Steal With Comodo- and i would add MUCH MORE in between.

I assume the test was on a Windows 10/11 or one of those. My Win 10 sits accumulating cobwebs for Halloween. Strictly Windows 8.1 for me all the way unless 12 shows me some long vacant GRIT and no forced updates. My Windows 8.1 i consider has been upgraded personally by me which i call conveniently Windows 9.

Back on topic, this video has offered me the temptation to reinstall Comodo FW again as i still have the one for my antiquated system and is never failed one single time in numerous salvos of ransomware, stealers or cleverest file infectors as well as MBR dumpers. Just ain't happening with Comodo's superior Containment granite wall.

@cruelsister is fearless. Some malwares used in testing are vicious and sneaky.
 
Dang! I remember that SONG before. Been a long time. Stop The Steal With Comodo- and i would add MUCH MORE in between.

I assume the test was on a Windows 10/11 or one of those. My Win 10 sits accumulating cobwebs for Halloween. Strictly Windows 8.1 for me all the way unless 12 shows me some long vacant GRIT and no forced updates. My Windows 8.1 i consider has been upgraded personally by me which i call conveniently Windows 9.

Back on topic, this video has offered me the temptation to reinstall Comodo FW again as i still have the one for my antiquated system and is never failed one single time in numerous salvos of ransomware, stealers or cleverest file infectors as well as MBR dumpers. Just ain't happening with Comodo's superior Containment granite wall.

@cruelsister is fearless. Some malwares used in testing are vicious and sneaky.
Well said.

Give it a go Easter, CS settings of course.

Regards Eck:)
 
The Desktop is nothing more than a folder on the System. If you use a browser to download file it will be seen either in the Download or Temp folder. Malware on a USB or DVD will also appear in their respective folders on the drive.

Quite simply, Malware, in order to run, mist be initiated from somewhere (anywhere) with no magic or teleportation needed.
Can the same be said about fileless malware?
 
Can the same be said about fileless malware?
Thorough evaluation of all security suite components is crucial for verifying its effectiveness. Restricting testing to post-execution behavior could leave critical security gaps unaddressed.

Fileless malware presented in a generalized manner.

Initial Access:

Exploiting Vulnerabilities: Malware can infiltrate a system by exploiting vulnerabilities in software applications, operating systems, or web browsers.

Phishing Attacks: Users are tricked into clicking malicious links or downloading attachments that contain malicious code.

Leveraging Legitimate Tools: Malware can use legitimate tools and scripts like PowerShell, WMI, or VBA to execute malicious commands.

Payload Delivery:

Downloaded Directly into Memory: The malicious code is downloaded and executed directly in the computer's memory, bypassing the file system altogether.

Leveraging Legitimate Applications: Malware can be embedded within legitimate applications or documents, executed when the file is opened.
 
Can the same be said about fileless malware?
Yeah- the term fileless is too often though of as being magic. Far from it as such malware operate in traditional ways. In order to infect a system such malware need to get access to the environment in some way (such as downloading and running a Dropper, opening a Document containing a macro, clicking an Email link with Powershell code embedded into it. Even Registry resident malware must be initiated before anything can drop into the registry and persist. A LoLBin (yes, considered Fileless as it needs no additional added code to work) must also be first executed.

So Fileless malware must always be initiated in some way by the user; doing so from the Download folder, from an email link, from Roaming, or from the desktop is of no consequence, and certainly not Magic.
 
As you can see your post is gone. Pls keep this kind of things personally, we and me are not waiting for your life story. Get some professional help if you want to let people hear you.
I understand its way to personal to share. I live my life like an open book with people and sometimes that is not appropriate, My apologies, and thanks for the advice, I'm fine now, that was almost 20 yrs ago.
 
  • Like
Reactions: Digmor Crusher