Running only the firewall but I also have Proxomitron. I have noticed that despite not having D+ active, I receive alerts from time to time that xxxx is trying to connect to the internet using loopback (D+ is learning). Normally one would have to activate this in D+ settings as far as I could determine. It would be good news if this is the same as disenabling (unticking) the 'Skip loopback TCP' option in the old Comodo v. 2.4, or does v.3 with only the firewall activated display the same well documented vulnerability as the old Sygate firewal ? If so I will have to revert to Comodo 2.4. Confused ...
Yep, unfortunately it's vulnerable just like Sygate. I've just switched Anti-Viruses from KAV 7 to Avira to get round it as KAV/NOD32/Avast etc? use a proxy and so render Comodo less effective. With KAV 7 on my PC it wouldn't pass the GRC leak test even with D+ enabled. Now with Avira Antivir Premium it sails through even with D+ turned off as Avira doesn't use proxy loopback web filtering.
No,no, I don't want D+ activated at all. From what Bluenile says it indeed appears that, due to no 'Skip loopback' disabling option in the v.3 firewall the old v.2.4 provides more security. Strange though that depite having D+ inactive I still get alerts as described
Some parts of Defense+ are active even if it's deactivated (DNS, Loopback, File monitoring for files with firewall rules). I think the level setting still applies for these "Activities".
Yes, the same engines are used as far as I know, so what you say makes sense. So do I not have to go back to v.2.4 to ensure that my proxy loopback connections are monitored properly ?
All fixed with the latest version thanks to the extra option to enable loopback requests. Good news for Proxomitron users indeed ! Thanks to Comodo.