Comodo antivirus review 2008




















The default behavior is to automatically install the updates, but then it pesters you to restart the system so the updates will take effect. You can read our Malwarebytes Antivirus review or our BullGuard Antivirus review to see a couple of examples. One section specifically says it collects your name and personal information, and another states that information will be used in advertising. You should probably disable this feature if you value your privacy.

You have to visit the online help files for that. There is a tiny help icon at the bottom of the interface that will take you there. Adding, editing and remove different types of scans is a simple matter of checking boxes, then turning the scan on or off.

It also lets you know when the last scan of that type took place. Firewall settings are straightforward, as well, with checkboxes and drop-down menus for setting application rules, global rules, network zones, port sets and more. The malware settings for enabling the Host Intrusion Protection System have many options that are easy to set by using the row of checkboxes. We use impartial third-party labs to evaluate the level of protection offered by antivirus software. One of them is AV-Test.

Its test results for Comodo Internet Security are interesting. Comodo Internet Security achieved a score of percent for protection against zero-day malware attacks, including web and email attacks. It also scored percent when detecting widespread malware discovered in the four weeks prior to being tested. The combined scores earned it a perfect 6 out of 6.

It took a hit in performance, though, earning a 5 out of 6 because it slowed down the PC when launching popular websites and standard software. Download and installation of applications was slower than the industry standard, too, as was file copying.

We saw a noticeable slowdown on our system when launching software or copying files to the disk. When it came to false warnings, Comodo Internet Security registered false detections of legitimate software as malware during a system scan.

We noticed that, too. When we ran a full system scan on our test machine, which took an hour and 10 minutes, it reported that GIMP, a popular image manipulation program, was a threat.

We use GIMP to crop pictures, add text to them, change their colors, etc. Another third-party lab we use is AV-Comparatives , but after looking through test results dating back to February , we found no record of Comodo Internet Security taking part in its testing.

That being the case, we decided to do hands-on testing. During the full-system scan we performed, it found EICAR files on our hard drive, which are used for malware testing.

The use of these files has been universally agreed upon by the antivirus industry as a standardized way to test the functionality of antivirus software. Once the scan was done, Comodo Internet Security required us to identify each file we wanted to add to the trusted file list. When we began live testing with EICAR files from the Anti-Malware Testing Standards Organization website we use for our in-house testing, Comodo Internet Security protected us from downloading malware, drive-by downloads, potentially unwanted applications and on the cloud.

When we tried to download compressed software that was infected, Comodo Internet Security failed 9 out of 11 tests. Comodo Internet Security allows you to add extensions, such as.

After we added those extensions to its list and tried downloading the infected compressed files again, it caught them. How Comodo Antivirus Software Works? Known malware are identified using a "blacklist" signature file and deleted or quarantined.

Known valid files are identified as safe using a "whitelist" of valid files and run safely. Intrusion Detection and Behavior Analysis Heuristics are used to identify potential threats from other files and deal with them. Any file not verified as safe will only run in a safe isolated system area called the Sandbox where it can do no harm to your files or operating system. Hackers behind SolarWinds are back targeting.. Mesa Air in Partnership with Flirtey Launches..

Unity has made its Unity Gaming Services glob.. Nokia introduces networking solution to help customers utilize private 4. Enroll for upcoming issue Enroll. January Monthly Special January Edition An option to install a full virtual desktop gives you a complete isolated environment for maximum security.

It's a welcome addition to the package, although the need to install Microsoft Silverlight to make it work seems a little, well, bizarre. Microsoft hasn't been developing Silverlight other than adding security patches since , and Google Chrome hasn't supported the technology for years. Comodo Dragon is a Chromium-based browser which comes bundled with Free Antivirus. This protects your privacy by cutting out the telemetry Chrome normally sends to Google, as well as blocking cookies, forcing HTTPS connections, looking out for dubious SSL certificates, and more.

Dragon does its job, but look out for Comodo's frequent attempts to push it on you, to get you to set it as your default browser, and as we've discussed to set Yahoo! We expect free software to include extra marketing, but that doesn't make it any less annoying. Comodo Free Antivirus regained some lost credit with its Host Intrusion Prevention System HIPS , a hugely powerful security layer which gives you vast control over what applications can do on your system.

At a minimum it alerts you to potentially dangerous actions by untrusted programs - running an executable, for instance - and allows you to decide whether each of these should be allowed. Experts can go beyond this to define custom HIPS behavior rules, although these typically require a lot of low-level knowledge. Would you know the consequences of preventing a process setting Windows event hooks, or what might happen if you block interprocess memory accesses?

How's your knowledge on COM interfaces? Still, the HIPS is turned off by default, so newbies don't need to worry, and if you do know what you're doing, there's huge scope here for improving and fine-tuning your system security. Other geek-friendly features include convenient integration with Comodo KillSwitch, a souped-up Task Manager with so many extras that it deserves a review all on its own.

As with much of Comodo Antivirus, KillSwitch isn't for newbies. But if you know what you're doing, it's hugely useful, and tramples most of the 'extras' you'll get elsewhere like the endless 'file shredders' into the ground. Comodo's Settings dialog rounds off the program with something for everyone. Beginners can choose a new theme for the interface, or disable update checking when the system is running on batteries. But more experienced types can customize how scans work, create new scan types, tweak the HIPS, and generally get involved in most of Comodo's low-level operations.

Comodo Free Antivirus isn't assessed by most of the independent testing labs, but AV-Test checks Comodo's Internet Security, and the results are interesting. The Usability element of the test counts false alarms raised by an antivirus.

Comodo Antivirus incorrectly blocked three actions of legitimate software, but the industry average is two, so that's hardly a big deal. And it didn't falsely detect any legitimate website or software as malicious, an excellent record. What's much more important is the protection you get, and we decided to check that further by matching Comodo against our own custom ransomware simulator.

As we've developed it ourselves, Comodo Free Antivirus wouldn't be able to detect it from its file signature alone, making this a more interesting test of the product. We launched the simulator, and accepted Comodo's default option to run the program partly isolated, with limited rights to our system.



0コメント

  • 1000 / 1000