App Review Comodo's killer.

It is advised to take all reviews with a grain of salt. In extreme cases some reviews use dramatization for entertainment purposes.
Content created by
@Andy Ful

vitao

Level 4
Mar 12, 2024
181
In your video, you showed, that for a few-day-old malware samples, the difference can be small. But, that is how the reduced set of signatures is selected. It probably does not contain less than few-hour-old and more than few-month-old malware.
well, if 500 malwares are just "a few"...

anyway, with these 500 malwares cis manual scan detected exacly the same malwares by using its full signature database and the lite database. this proves that there is no difference between the full or the lite signature databases.

maybe another lie from comodo? or just another bug? i dont know. what i know is that there is no point using the full database. this will just use more hd space for no gains...

you said that the difference can be small but youre wrong. there is no difference.
 

Andy Ful

From Hard_Configurator Tools
Thread author
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,816
anyway, with these 500 malwares cis manual scan detected exacly the same malwares by using its full signature database and the lite database. this proves that there is no difference between the full or the lite signature databases.

Your test strongly suggests that older samples are mainly not reused in the attacks (I believe that this is true).
If you want to see the difference you must test one-year-old samples or few-hours-old samples. :)
A few days-old samples are useless for that.
 
Last edited:

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top