It is not the upcoming version, but here is the most recent Comodo Internet Security Premium 12.2.4.8032 test that I have seen:
Comodo Internet Security Premium Tested 2.23.23:
Comodo Internet Security Premium Tested 2.23.23:
Don't mean to intrude, but Contained files will always be blocked by the Firewall. The firewall acts synergistically with Containment.True, but knowing that trapped (contained) malware might be able to phone home doesn't feel good.
@Pico is talking about when using VPN. That really shouldn't matter, but I suppose there is some corner case they are referring to. Inbound and outbound connections for sandboxed processes are permitted by default; users have to enable "block inbound" and "block outbound" for the sandbox.but Contained files will always be blocked by the Firewall. The firewall acts synergistically with Containment.
For those so inclined to figure out the sandbox, Comodo is overall the most effective 3rd party freeware localhost protection.Free 'as is' and Comodo still created probably the strongest firewall out there. In all the years I used Comodo, It just worked. I never experienced any of the bugs, but I never tried digging deep into the software. I installed it and used it, later adopting Cruelsister's recommendations.
How is Comodo FW suppose to block traffic when it doesn't see or know about traffic like in case traffic through npcap or VPN tunnels?Don't mean to intrude, but Contained files will always be blocked by the Firewall. The firewall acts synergistically with Containment.
No such settings in premium or pro.@Pico is talking about when using VPN. That really shouldn't matter, but I suppose there is some corner case they are referring to. Inbound and outbound connections for sandboxed processes are permitted by default; users have to enable "block inbound" and "block outbound" for the sandbox.
View attachment 273348
I'm not 100% certain but running containment set at "Restricted" doesn't allow the contained application to access network adapters whereas if it was run as Partially Limited (default), you'd see a Firewall prompt.No such settings in premium or pro.
Partially Limited - The application is allowed to access all operating system files and resources like the clipboard. Modification of protected files/registry keys is not allowed. Privileged operations like loading drivers or debugging other applications are also not allowed. (Default)Restricted - The application is allowed to access very few operating system resources. The application is not allowed to execute more than 10 processes at a time and is run with very limited access rights. Some applications, like computer games, may not work properly under this setting.
Not setting. Configuration. Research it.No such settings in premium or pro.
But you guys can all try the OpenEDR. It’s for free, maintained and if you have less knowledgeable people you will be able to manage it for them.The simplest option is to set the rule to Block that way it won't even run in the first place. I wonder if we'll get the same customisation options. The screenshots so far don't seem to indicate much. Anyway, it does some things well and others not.
Malware would still be able to sniff around in your system and collect (some or all of) your (sensitive) data stored in the registry and in files on the file system and phone home that collected data.Even if isolated apps are allowed to listen and send data, it is unlikely that they will be able to obtain anything. If Comodo can properly secure access to keyboard by preventing global hooks and screen/screenshots (I don’t think there is evidence that it doesn’t, correct me if I am wrong) there will be nothing that can be transmitted over the not-secured traffic. Apart from another piece of malware that will be just as restricted.
I meant no such checkboxes are available in pro or premium so those protection settings cannot be activated/deactivated in pro or prmeium.Not setting. Configuration. Research it.
Highly sensitive data is not to be stored in the system registry. The registry is for settings and configuration and whilst *some* user data can be stored there (such as software activation data) attackers are unlikely to be interested - for them the registry is a place to maintain persistence.Malware would still be able to sniff around in your system and collect (some or all of) your (sensitive) data stored in the registry and in files on the file system and phone home that collected data.
Yes, best way is to block it completely when trapped so it has no change to run and collect your stuff and send home.
Emeralds would preferable as they are a better match for my eyes...his Melihness should buy CruelsSister a set of priceless diamonds
You posted that you never used Comodo and ypu are able to show us these settings. Do you read user manuals of IT-programs as a hobby?@Pico is talking about when using VPN. That really shouldn't matter, but I suppose there is some corner case they are referring to. Inbound and outbound connections for sandboxed processes are permitted by default; users have to enable "block inbound" and "block outbound" for the sandbox.
View attachment 273348
I do itYou posted that you never used Comodo and ypu are able to show us these settings. Do you read user manuals of IT-programs as a hobby?![]()
Optimizing for efficiency is considered bad practice since a few decades. Only for performance critical systems and processes optimization is recommended. So I understand this message from a CEO of security companies (security should be seamless for the user experience), but it is not generally applicable (considered a waist of time and resources with computing power doubling every two years. Although this third step might become relevant again (chip engineering is thought to be maxing out to 2-3 nm with current state of technology).And, finally, his "Melihness" has a message for all of you:
![]()
3 Steps to Software Development
Successful software development requires the right approach. Melih Abdulhayoglu breaks down the three key steps to building efficient, scalable, and secure software. Learn more.melih.com