App Review Comodo Internet Security 7 Beta Review (The PC Security Channel)

It is advised to take all reviews with a grain of salt. In extreme cases some reviews use dramatization for entertainment purposes.

cruelsister

Level 43
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Apr 13, 2013
3,224
Note that the sandbox at all levels except Full V may allow the deposition of spawned daughters on the drive. As noted in the review these files would be orphaned and if run directly would be back in the sandbox loop. Another issue with the Partially Limited setting is that various PUP's will be allowed to install themselves to some extent. This can be a pain when the parent PUP spawns multiple installation routines.

The use of the Full V level will contain all spawn and PUPs, deleting them from the (virtual) drive on sandbox flush or reboot.
 
  • Like
Reactions: Venustus and Ink

Venustus

Level 59
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Dec 30, 2012
4,809
Note that the sandbox at all levels except Full V may allow the deposition of spawned daughters on the drive. As noted in the review these files would be orphaned and if run directly would be back in the sandbox loop. Another issue with the Partially Limited setting is that various PUP's will be allowed to install themselves to some extent. This can be a pain when the parent PUP spawns multiple installation routines.

The use of the Full V level will contain all spawn and PUPs, deleting them from the (virtual) drive on sandbox flush or reboot.

Agreed!
I always run Full V.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top