- Mar 11, 2017
- 132
Yes, thanks for understanding. Yes, that was my intention. My videos are no meant to use for marketing purposes as I also demo my own favorite AV that it has its own weaknesses. So to show to any user from the same product category of users to be aware, take precautions..or lets go to our vendor that we demand improvement. We paid thousands of dollars and we demand improvement and capable of protecting from modern and advanced malware. Stick with COMODO AV, those are at least better than Windows Defender. Just at this moment, to mitigate this, disable macro and ActiveX content in MS Documents while waiting for COMODO to do something about the detections on MS Word with DDE. This is also generally applies to all other AV that is not capable of detecting this payload. Those who do not believe that this is real, it is up to you. Like me i prefer to test my own AV myself, but people saw my videos and asked me to try theirs...honestly I do not know the best settings for their AV bcoz my time is limited and I do not like to spend my time configuring and testing other AVs. Some suggested me to configure this and that, but that is after I posted my videos. It was time consuming to find loopholes with trial and errors, once found I will record and upload it to youtube. So i do not have the intention to redo my videos. Whatever special and custom settings, was supposed to notify me before i start my video demo.Not in a position to take your word for it, and I don't know the specifics of Comodo's bounty policy. I know one thing, if it is real as you indicate, they should listen to you and pay you well for the information. You have certainly I am sure gotten the attention here of some individuals who are interested in Comodo products. I don't mean me, but there are some individuals who have invested a large amount of energy explaining the program and why it is "unbreachable". Lots have listened too.
I use Comodo, and in spite of the video, I will continue to do so. However, please find a way to at least attempt to reach Comodo with your findings. I'm sure a number of us here would be ready to support your effort any way possible. For sure, if there was ever a reason to step up with a big bug bounty at Comodo, this seems like the one to me, assuming everything is as you say.
Seriously, you seem like the kind of person they SHOULD be hiring...again all things as you say. Curious if you have a very short description of what could be done following the success shown in the video. You say full control->so this is absolute control of the system?
Last edited: