- Feb 28, 2023
- 126
"The big problem with Comodo is its anti-malware engine which is for me the BADGEST I've ever tested!"
Because you did not zoner/zillya/protegent
Because you did not zoner/zillya/protegent
@Shadowra
I rewatched the video. It's hard to review the test without text or voice, and things are tiny in the video. What I could make out is that the malware encrypted the files in the Downloads, two files on the Desktop, and the only file on the DVD. Am I right?
DVD: It contains the malware folder you copied on the desktop, right?
Downloads: Comodo containment excludes it; the contained malware can modify the files. @cruelsister Please correct me if I'm wrong.
Desktop: What are the two files the malware encrypted?
I already posted about the downloads folder.Ransomware encrypted malware folder, desktop and download yes.
And it is visible
Sorry if it's tiny, I render in 1440p but Odysee force in 1080p....
YT takes down a lot of AV videos for stupid reasons ranging from biased to "hacking"@Shadowra how come you don't use YouTube? Surely you would get more engagement there
I already posted about the downloads folder.
Did you insert the DVD with the malware folder in the DVD drive (to have it in the drive ready for the test) before the CIS installation?
It would be helpful if you could tell me about the two files the malware encrypted on the desktop.
YouTube doesn't really appreciate tests and the AI detects it as hacking the channels that stay usually have a network or don't have the same visibility as my channel (and I made a post when I had my YouTube channel removed... and Odysee I'm free to do what I want on it, and I like that )@Shadowra how come you don't use YouTube? Surely you would get more engagement there
Ok, I just want to know how you copied the malware package.Why are you talking about DVDs?
The malware package is a RAR archive that is copied after the installation of Comodo and after the URL test and the fake crack test.
The 2 files on the desktop, you have an .ini of my desktop configuration and the .txt that contains the malicious URLs.
Ok, I just want to know how you copied the malware package.
from the host machine?
from a location on the VM you were testing CIS on?
from a disk or USB, and were they inserted or attached before the CIS installation?
The default is having that ticked which is why @cruelsister unticks it in her configuration Cruelsister ConfigDoes anyone know what the defaults are for this setting?
Thanks but do can you post a picture of the folders allowed access to?The default is having that ticked which is why @cruelsister unticks it in her configuration Cruelsister Config
Thanks but do can you post a picture of the folders allowed access to?