K
KGBagent47
The critical flaw with comodo is there is nothing stopping a noob from panicking and paying the ransom.
Last edited by a moderator:
Your problem nikos200 is you live in the real world. You're not allowed to bring up real world scenarios when talking about CIS, all must proclaim it the perfect anti-malware solution.comodo is not for everyone!!!!....for exaple..i download one video player..but its not its a virus but i dont know it.i run it and boom autosandbox because their av is bad...comodo protect me!!!!but i still believe that i downloaded its a video player...ofc installation fail because of sandbox.so i click at dont sandbox again....and boom!!!! infection!!!comodo will do nothing about it!!!(thats my experience ofc and keeps me away from comodo...sorry for my bad english!!!)
No solution is perfect.Your problem nikos200 is you live in the real world. You're not allowed to bring up real world scenarios when talking about CIS, all must proclaim it the perfect anti-malware solution.
I think he was being sarcastic.No solution is perfect.
If you use a multi-layered approach, including native Windows security features, you are pretty much free from the "boom, infected!" syndrome, because your system is by nature very difficult to infect. Then, COMODO is an elegant icing on the cake.
but if they consider it a FP, run it anyway outside of AG and it turns out to be malicious, then...
At the end of the day people press always “Yes”: because the average user, despite the warning message may be very clear, he will press on “Yes” if the window will continue to repeat itself. After all, who reads the messages of security app ?bottom line is: user cannot escape decision making, even with COMODO or VoodooShield or whatever.
Security softs just stop things from happening behind your back.
That argument goes for all security software. If a kid downloads a game hack / crack and it is sandboxed by Comodo, blocked by an anti-executable or detected by an antivirus, the kid will just disable the software und run the malware anyway.
That argument goes for all security software. If a kid downloads a game hack / crack and it is sandboxed by Comodo, blocked by an anti-executable or detected by an antivirus, the kid will just disable the software und run the malware anyway.
Then there are installers of legitimate software which are bundled with PUPs. The user will disable the precious anti-executable to run the installer, doesn't pay attention and boom, the PUP is installed along with the legitimate software. Precious comodo auto-sandbox would be silent during the whole fiasco as well, because the legitimate software and the PUP are both digitally signed and installed on hundreds of thousands or millions of computers.
Despite the industry-wide best efforts, software cannot be made "fool-proof." There is one way that comes close outlined below.
I am not interested in any kind of debate. I am not promoting one product versus another. I am not promoting one protection model versus another. To each his own...
The purpose of this is just to point out how some enterprises have tackled the issue of unrestrained, unknowledgeable users and thereby protect their systems (almost completely).
Various enterprise case studies have shown that this methodology will invariably protect the system from being physically infected:
1. Start with a verified-clean baseline operating system
2. Install verified-clean desired softs
3. Install or configure software restriction policies and enable protections
4. Password protect the SRP and lock the user out so that they cannot disable protections and modify the baseline system configuration
In one case study, workstations were configured with obsolete versions of the most commonly exploited programs and OS built-in protections disabled. The SRP was configured as above and not modified for two years. The workstation users had tried to download and run all manner of stuff. The final review showed Poweliks, Kovter, Ursnif, PUAs\PUPs, malware, adware, riskware, malicious scripts, etc - none of which had been able to execute on the system. Exploits had succeeded, but the payloads had been blocked from execution. Encrypted malicious registry keys from file-less malware had been neutered.
With the above protection in-place, there was no impact on typical computing and productivity tasks such as online activities, working with PDFs, creating documents - including those with macros, video creation, etc.
In other words, the best option all the way around is to prevent any user decisions or actions from modifying the system.
It does not get any more simple than that.
Exact, the user is and will always been the weak link. You don't need the best security software to be protected, just restrict the rights of the user to infect himself, SUA is the first step.
What happened to all the other machines?In one test, the workstation was configured to use Admin account. Even then, SRP kept system safe.
However, Admins forgot to apply same restrictions to all of their servers. Forgot one. So that server got infected.
What happened to all the other machines?
The first line of defense cannot be the web protection because the first line of defense is yourself, not any software. You as the user make the decisions at the end of the day, all the security on your system (e.g. layered protection) all comes after yourself.Then Comodo should discontinue the farce that their AV has proven to be IMO
I mean the way I look at it is a layered approach but comodo has it backwards which is good as in its different but as nikos pointed out it really isn't for all users because of it.
for me its:
Web protection- very first line stops web threats (exploits malvertising, malicious URL's ect.)
AV- Second line (speaks for itself hopefully takes out 90%+ of threats)
Behavior blocker/Sandbox/HIPS- Takes out the leftovers.
Backups- IF something somehow bypasses detection then behavior blockers you have backups.
with comodo doing it backwards the AV really is redundant...why even develop one?