- Jul 1, 2017
- 317
No, because I use Emsisoft AM.
Generally speaking my opinion would be that yes it is helpful. In a situation like a browser exploit then the payload will be trapped within the sandbox environment (this does not mean that can be exploited too though) and on the other side, programs isolated under the sandbox can be protected from exploitation by executing code running outside of the sandbox environment (even though the host would be compromised at a point like this, it is still a side of the story).@Opcode: a question, would Sandboxie be helpful
What would be most effective for the user that knows nothing about security is not to use Windows, but instead use Chromebook instead. The typical Windows user doesn't need Windows, but would much better served by Chromebook - and not use Android Apps - but "users want to use stuff" and they will just mess that option up all by themselves too.
So the thing is even if the source of the fileless infection is the internet, it will try to damage your system by utilizing vulnerable processes such as powershell or cmd.exe.Yes, of course, you can add certain Windows vulnerabilities to Comodo. But. The source of infection would be Internet, whether Facebook Youtube or email. Or simply browsing. But if it does, virtually the malware will not get to your system, (I say). Thanks for the answer, friend.
It's not so simple that these processes are unneeded. Here are a few examples:
Wscript: Comodo runs a vbs script at installation and uninstallation.
The certificate used by my ISP filtering service is installed by vbs script.
Powershell: Dropbox desktop runs a powershell script at installation.
Mshta: HP printer software uses this process when you want to check your fax history. Teamviewer free version uses mshta when you close it, although I would be happier if it didn't work, because all it does is show their advert.
Cmd.exe: This is used for all sorts of purposes.
You are right when it comes to Dropbox installer, and a bunch of other things. No damage done if the script doesn't run.@shmu26 - you're one of those guys that doesn't like anything legitimate blocked because you think it is breaking Windows or programs in some unknown, hidden way - and that is unfortunate because a block does not cause damage.
Just because it is legitimate does not mean that it is necessary.
You are right when it comes to Dropbox installer, and a bunch of other things. No damage done if the script doesn't run.
But Comodo uninstaller leaves behind junk if you don't let it run its script. And HP software simply won't let you see your fax history at all, unless you allow mshta .
Let just say that some uninstallers are worse than the installers/program thenselves.If you send a lot of faxes and check your fax history a lot, then you allow mshta.exe permanently.
You should only allow wscript.exe as needed. COMODO still leaves behind a ton of junk - whether you allow that script to run or not. It just leaves less junk when the script runs.
The problem I see is most users probably wouldn't have blocked the outbound connection (unless it was automated) because they'd have assumed the connection was legitimately related to CCleaner itself.1). If you used CF and hate Outbound connections by applications, the Firewall on Custom Mode would have alerted you to the request.
These sort of attacks will usually always surpass your protection. The key is that it was from reputable trusted and signed software.The problem I see is most users probably wouldn't have blocked the outbound connection (unless it was automated) because they'd have assumed the connection was legitimately related to CCleaner itself.
Of course, they not only exceed their protection, but also the user. For example,. If I download the CCleaner and my antivirus warns me, I can think of it as a false positive. And if I don't hear it, I'm infected. But that is not the case with MT users.These sort of attacks will usually always surpass your protection. The key is that it was from reputable trusted and signed software.
The problem I see is most users probably wouldn't have blocked the outbound connection (unless it was automated) because they'd have assumed the connection was legitimately related to CCleaner itself.