- Apr 29, 2019
- 168
Please provide comments and solutions that are helpful to the author of this topic.
How? Like is it too paranoid and blocks everything?HIPS will drive you insane.
HIPS work on static systems... very static systems. Even updating an app could cause 50 alerts because 50 files are modified or dropped on certain modes. IIRC safe mode alerts you if things like firewall settings are changed or the HOSTS file is modified which is all you need.How? Like is it too paranoid and blocks everything?
What is IIRC? Not to used to tech lingo .-)IIRC safe mode alerts you if things like firewall settings are changed or the HOSTS file is modified which is all you need.
IIRC = If I recall correctly.What is IIRC? Not to used to tech lingo .-)
It's very safe, but ask for answers for everything and you have to know how to respond if you don't answer well, you can stop working certain applications.How? Like is it too paranoid and blocks everything?
it seems she run unknow apps into sandbox, what if a safe app is infected?The reason is simple: she enabled auto-sandbox. There's no need for overkilling it with HIPS.
If a legit signed app is infected, not anti-executable, HIPS or antivirus will save your ass.it seems she run unknow apps into sandbox, what if a safe app is infected?
She tested the malware in a virtual machine. Furthermore, she is an IT professional. She also created her own malware samples (not published) to show that most AVs have very weak protection against scriptors.it seems she run unknow apps into sandbox, what if a safe app is infected?
Many AVs may have a problem with detecting never-seen & signed malware. But usually, the signed malware which can hit home users will be detected by signatures. That is why the AV alongside CF is welcome. The user can also throw out most entries from CF Trusted Vendor LIst and keep only those entries which are required for system/software updates.If a legit signed app is infected, not anti-executable, HIPS or antivirus will save your ass.
@cruelsister is a member, but most use her recommendations for setting up and configuring Comodo Firewall.What cruel sisters?
So her amlware was able to bypass CF with her settings too?She also created her own malware samples (not published) to show that most AVs have very weak protection against scriptors.
How do I do that?The user can also throw out most entries from CF Trusted Vendor LIst.
Some samples with EV certificate could. But, this kind of malware is used in targetted attacks on organizations, not home users.So her amlware was able to bypass CF with her settings too?
It was possible some time ago:How do I do that?
ok but this is about the full Comodo, not Firewall only.It was possible some time ago so, it is probably possible now.
Look again.ok but this is about the full Comodo, not Firewall only.
Found! So new vendors not in the list will end up in Untrusted category? What if an app has no vendr or is not signed? Same result?Look again.
You have a lot of information about CF on the CIS website. The Firewall Configuration, HIPS Configuration, Containment Configuration, File Rating Configuration, and Advanced Protection Configuration are valid for CF too.Found! So new vendors not in the list will end up in Untrusted category? What if an app has no vendr or is not signed? Same result?