Hi everyone,
Since I first started using antivirus software, Comodo has always been my preferred choice because it doesn’t just rely on a signature-based database but also on auto-containment. In other words, if an application isn’t recognized, it gets isolated.
Has anyone actually managed to bypass cruelsister1’s configuration with any form of malware? I personally believe that 100% security is an illusion, but this setup:
Proactive Mode + Auto-Containment (Restricted) seems practically unbreakable to me.
On several forums I also see both supporters and critics of this configuration. What I don’t fully understand is: why don’t the major antivirus companies implement this type of approach, while it seems to be very popular among many users?
What do you all think about this?
Since I first started using antivirus software, Comodo has always been my preferred choice because it doesn’t just rely on a signature-based database but also on auto-containment. In other words, if an application isn’t recognized, it gets isolated.
Has anyone actually managed to bypass cruelsister1’s configuration with any form of malware? I personally believe that 100% security is an illusion, but this setup:
Proactive Mode + Auto-Containment (Restricted) seems practically unbreakable to me.
On several forums I also see both supporters and critics of this configuration. What I don’t fully understand is: why don’t the major antivirus companies implement this type of approach, while it seems to be very popular among many users?
What do you all think about this?


