Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
Video Reviews - Security and Privacy
Grandmother sent me an Email
Message
<blockquote data-quote="cruelsister" data-source="post: 594965" data-attributes="member: 7463"><p>Hi Guys! I'm glad you liked the video as I was uncertain how it would be received. Too many security videos are too dammed serious!</p><p></p><p>To answer some of the questions-</p><p></p><p>1). Aside from the protection aspect, the elegance of the coding is important to me. For although my computer(s) are quite fast, the same is not true for everyone else. So if I have to decide on two identical products, I would choose (and highlight in my videos) the one that will run on the biggest POS machine imaginable. CF will do this, CCAV will not. Also why would I want to use a product that highlights an AV which is inferior to most others; compounding this with the fact that CCAV does not have an Outbound firewall is the reason that I don't even want to speak of it anymore. It's just does not compare overall with the protection afforded by Comodo Firewall.</p><p></p><p>2). As to the default protection- I will only us CF at the settings that I demonstrated in my Setup video. I personally would never ever use Comodo at default. And as the setup will take about 30 seconds, it really isn't a great burden on anyone to do.</p><p></p><p>3). Yash- Notice I NEVER use CIS. CIS has the local AV scanner which is essentially worthless. And the bypass I coded really had nothing to do with the sandbox. It took advantage of the lower security level to fool the system into thinking that the file did not need to be sandboxed. I will not get into any specifics but the method is kinda-sorta similar to the way UAC at Max can by bypassed. But with CF at the proactive level I can't use that or any other trick- if I could I personally would Never use Comodo at all.</p><p></p><p>4). Morphius- God, you are good! So far, although I understand and appreciate what Comodo is trying to do about detecting future fileless malware of currently unknown mechanisms, right now it is just leading to misunderstanding by the regular user ("what are all these damn bat files!!!"). The methodology currently is still immature and eventually (hopefully) will become more specific, but right now CF will cover any fileless threats currently extent without it. As to other products doing the same job- traditional based security solutions wouldn't have a chance against these if they are true zero-days. It would be like a knife through soft butter.</p></blockquote><p></p>
[QUOTE="cruelsister, post: 594965, member: 7463"] Hi Guys! I'm glad you liked the video as I was uncertain how it would be received. Too many security videos are too dammed serious! To answer some of the questions- 1). Aside from the protection aspect, the elegance of the coding is important to me. For although my computer(s) are quite fast, the same is not true for everyone else. So if I have to decide on two identical products, I would choose (and highlight in my videos) the one that will run on the biggest POS machine imaginable. CF will do this, CCAV will not. Also why would I want to use a product that highlights an AV which is inferior to most others; compounding this with the fact that CCAV does not have an Outbound firewall is the reason that I don't even want to speak of it anymore. It's just does not compare overall with the protection afforded by Comodo Firewall. 2). As to the default protection- I will only us CF at the settings that I demonstrated in my Setup video. I personally would never ever use Comodo at default. And as the setup will take about 30 seconds, it really isn't a great burden on anyone to do. 3). Yash- Notice I NEVER use CIS. CIS has the local AV scanner which is essentially worthless. And the bypass I coded really had nothing to do with the sandbox. It took advantage of the lower security level to fool the system into thinking that the file did not need to be sandboxed. I will not get into any specifics but the method is kinda-sorta similar to the way UAC at Max can by bypassed. But with CF at the proactive level I can't use that or any other trick- if I could I personally would Never use Comodo at all. 4). Morphius- God, you are good! So far, although I understand and appreciate what Comodo is trying to do about detecting future fileless malware of currently unknown mechanisms, right now it is just leading to misunderstanding by the regular user ("what are all these damn bat files!!!"). The methodology currently is still immature and eventually (hopefully) will become more specific, but right now CF will cover any fileless threats currently extent without it. As to other products doing the same job- traditional based security solutions wouldn't have a chance against these if they are true zero-days. It would be like a knife through soft butter. [/QUOTE]
Insert quotes…
Verification
Post reply
Top