cruelsister
Level 43
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Forum Veteran
It is not "manipulative." You're the only one, and perhaps one or two other people here at MT, that say such nonsense.As usual, another manipulative video.
And yet you and others criticize Comodo because "it needs to be tweaked."As explained so many times, Windows default settings are focused on “usability” of the average user. But Windows is extremely customizable, and can become a “blocker”. In this sense, any advanced user who wants to, can easily manually create customizations in Windows, both to specifically prevent changes in the firewall, as well as to create IN/OUT rules in the firewall.
It is not hypothetical. There are in-the-wild malware that do the very same thing to Windows. Leading security practitioners have been critical of Microsoft not implementing tamper protection for Windows Firewall for decades. They would not advocate for such increased protection of Windows Firewall if they did not observe in daily practice the very same thing that @cruelsister shows in the video.This video not only is a conceptual mistake, but it is also a manipulation which tries to present hypothetical security flaws in Windows, when in fact Windows allows these hypothetical security "holes/breaches" to be closed. The video purposely confuses “security” with “usability”, omitting the fact that Windows default focuses on “usability”.
That's not an accurate group of statements at all. If "Blockers" - as you call them - keep a system clean, then that is all that matters. It makes no difference if that is achieved using buggy Comodo or the latest & greatest "modern [security] software." All that matters is the end result - a clean system - and not the bugs and other perceived "security flaws" of Comodo.Blockers are from the stone age, they emerged 20 years ago when there were no modern technologies like the ones that exist today to detect and remove viruses/malware. Blockers today are totally inefficient/ineffective, both because the final decision to “allow” or “block” stuff always depends 100% on the user. And considering that today there are many free, modern software, with excellent technologies to detect/remove viruses/malware... it does not make any sense for the average user to use a blocker or blocking settings.
No, not at all. FirewallHardening will indeed add a bunch of Rules for various things (probably one of the best would be a block on PowerShell Outbound requests). However, as in the video, if WF is disabled FIRST it does not matter what rules are in place (oh, and WFH does not include a rule for this malware).What about FirewallHardening tool from Andy ??? Does it make things better ?
Not only that it is not hypothetical, but it is barely an inconvenience to code malware in this way. (God did I LOVE your post...).It is not hypothetical. There are in-the-wild malware that do the very same thing to Windows. Leading security practitioners have been critical of Microsoft not implementing tamper protection for Windows Firewall for decades
Hardening Windows is a completely different thing than protecting Windows Firewall against tampering or being disabled.You can hardening Windows almost in every way you want, including the firewall.
bazang said:
It is not hypothetical. There are in-the-wild malware that do the very same thing to Windows. Leading security practitioners have been critical of Microsoft not implementing tamper protection for Windows Firewall for decades
Although that could be done, it would be really bulky (and I dislike code bulk). Both the privilege elevation are done just before the BG drop using tried and true methods.does the malicious executable leverage any other process(es) such as powershell or cmd(.)exe, for example, to gain elevated privileges to disable the firewall, or does it do it all on its own
Zone Alarm has a free and Pro firewall. I have not used ZA enough to recommend. TinyWall & Comodo popup in search.As I am seeking advice(I want to continue with Microsoft Defender via Defender UI),what standalone firewall is recommended, that would resolve Cruel sisters finding? Or once you add other firewall Defender UI is compromised?
And in real life, it's possible to find thousand of cases where virus/malware hijacked all these "safe files" allowed by Comodo, and managed to have comms.
There are also many high-quality third-party solutions. It’s not just one. There are many firewalls. The market offers options, for everyone to choose what they want. Some of them are free, others are cheap.There some good firewall software out there allowing to customize rules for 100% of the files (no "safe list", total "default deny")... but Man, it demands tons and tons of work, not just a "one time job", it's a constant work. IMHO, in real life we need a balance between "security", "privacy" and "usability"... and "usability" should not be taken out of the equation. As other participants said: "Stay safe, not paranoid.". For average users, Windows Defender + Firewall default settings are part of that right equation. And for advanced users, hardening Windows or a modern third-party antivirus/malware with automatic action (no "default deny") is more than enough.
Defender with DefenderUI or Configure Defender is as good as any.I have decided to stay with Defender UI /Cyberlock ... I put Avast on ahhh (blocks sport site ), Bitdefender slowww, have backup and hope I stay safe not paranoid(Thanks Old School
There are zero click malware like those NSO and iSoon make.but that is dependent on the user, e.g clicking malicious links