Thanks. I mean that their phrase about HIPS in freemium "System Protection module is monitoring less actions than in SpyShelter Premium and SpyShelter Firewall." is a bit vague though. Though I'll ask this question in the "SpyShelter 10" thread. Sorry for off topic.
That's why you should check it out, then you will see which features are disabled. I can't help you with it because I'm using SS Firewall.
Me, too. I find her videos and posts very informative - she has the gift of being able to explain something very technical simply and succinctly. If you export the config file from the first installation it's too easy.
I tried ReHips 2.2.0 RC2 the other day. Even though it is an RC it is a limited version. IE was set to default. first thing RiHips did when I clicked on IE was open Edge in a sandbox and not let me go anywhere. I just had set to default install. The main site doesn't have the install. you have to register at their forum and request the download link. Anyway maybe we should start a thread on Rihips?
Just a heads-up: Most configs suggest starting unknown files under "Virtulised/Restricted" or "Untrusted" The problem with this is that the executable is started with low rights and limited processes, but still runs and can do potential damage that may not rollback. The likelyhood is low but higher than if you never ran it to begin with. And another problem exists. Very few progs will run properly in a restricted or untrusted environment eg Chrome won't run under any restrictions even "partially limited". Not only do I not suggest testing on a live box for my previous reason, but it would doubtfully run to begin with. So what's the point other than more risk. I see no reason to ever run auto-virtualised when dealing with unknown applications and the logical solution is to hard "BLOCK" unknown applications. Anyhow, here's the help page for autosandbox config https://help.comodo.com/topic-72-1-623-7763-Configuring-Rules-for-Auto-Sandbox.html
Eager to learn! I have just tried to install Kardo's Crystal Security. If I click to install I get a green borderded windows pop-up saying windows installer can't run. If I right-click and run in sandbox CS installs sandboxed. How do I tell Comodo I trust this and install normally? EDIT: I disabled the auto-sandbox to install. Like any product it takes time to play and learn.
The only problem with that is that you no longer have access your PC; on paranoid mode there are too many popup with svchost.exe wanting to create temporary files/directory and without specific allow rules I cannot login on Windows 10.
How does one lock comodo firewall down with just the sandbox enabled? I have it installed on a pc where other family members will be using it so I want it quiet but powerful. it's been awhile since I played with it, so my memory fails me. I have never really used comodo much since v5.10.
I've got a newbie question. I just installed Comodo firewall on Win 10 64 bit system. It's set up according to cruelsister1's recommendation. On this system opening Firefox, or SeaMonkey in the sandbox takes forever if I click on 'open browser in sandbox.' My question, with auto sandbox enabled, is running the browser in sandbox needed?
For me, I don't sandbox my browser unless I'm doing online banking. Besides that, auto sandbox should suffice.
cruelsister, according to your configuration video you set everything to be virtualized by the CIS sandbox. However, doing so causes apps that have already been able to run to be virtualized. How can I make it so that apps I want to run become known and are not virtualized because CIS seems them as unknown?
Thanks for the suggestion. I ran it and accepted setting that needed to be however that doesn't recognize all .exe's
Open comodo firewall go into filerating under firewall settings and manually trust the files you no are safe and everything should work smoothly from there onward.
I see people recommending your setup here in multiple threads. I'm excited to try it out, but having some trouble finding it sadly. I'm especially interested in your recommendation in using Comodo Firewall with sandbox, no HIPS or AV. Would you be so kind as to share a link to your setup? Thanks!
want to crash windows 10: Enable HIPS, select 'Paranoid Mode' from drop-down. after enabling it I could not open my computer (to view disk drives) or any icon on my computer, my PC just froze. after rebooting and selecting Internet Security under Configuration, rebooting, then selecting 'Safe Mode' for HIPS, everything was back to normal again. I got comodo from this link: https://www.comodo.com/home/internet-security/firewall.php#tab-faq Replaced comodo with Zone Alarm from this link: http://www.zonealarm.com/software/free-firewall/# (click 'Free Download', then click 'No thanks, just the free firewall'). Zone Alarm will disable windows 10 firewall, but works well with windows defender of windows 10. If I seem a bit biased, please note that I used Bitdefender Internet Security in 2010 & 2013, Kaspersky Internet Security in 2009, 2014, Webroot, Avira, Panda (Bitdefender & Kaspersky being the best of the lot - not free though). If anyone thinks I did something wrong with configuration or installation, please notify). For Internet Security Suites, http://www.toptenreviews.com/software/security/best-internet-security-suites-software/. For best spyware, http://www.toptenreviews.com/software/security/best-antispyware-software/ . You can't install Comodo Free Firewall and expect it to be equal to Comodo Internet Security Pro 8 (reminds me of the saying - you get what you pay for).
Hi, on Comodo Firewall (free version, 8.4), select General Tasks, Scan, wait for scan to complete (may take a while), where it displays SHOW (All Files), click the drop-down and select 'Unrecognized Files', on the right of each file displayed you will notice 'NO Action', select drop-down and choose 'Trust' if the file is by a trusted vendor like Microsoft or Intel, etc. To find out if the file is Trustworthy, right-click the file name and select 'Jump to Folder', right-click the highlighted file and select Properties, click Digital Signatures tab, select the first entry and click Details button, click View Certificate button, click Details tab, scroll down to Subject and you will be notified if it's Microsoft, Intel etc (this is valid certificate), if valid certificate then select 'Trust' from drop-down and click on 'Apply Selected Actions' button to save, click Close button to exist. You can repeat procedure until SHOW ('Unrecognized Files') shows no files.