pnamajck
Honorable Member
- Joined
- Aug 28, 2014
- Messages
- 433
- Thread Author
- #1
to  all  comodo(av)  gurus … [i  am  needing advice]
for matters of discussion … pls understand i am using the "free" version. also, am using windows default firewall.
have used avg (and, recently, avast) … dislike them because of nagware and other reasons.
now … i wish to discuss comodo (free version). having researched a bit here on windowsforum as well as the internet … seems to be my next logical progression. several members here swear by the product.
so … this here is my quandary …
from what i understand, comodo seeks intervention from the computer operator as to certain ports or files being authorized or being acceptable risk. how am i to determine what is acceptable and not? what is the methodology for making such decisions? could you pls illustrate a few totally different 'legitimate' real-world examples?
outlined below are a few fictitious examples i have manifested:
so, for those of you who are using comodo … can you pls site some examples of comodo's query … and, more importantly, how did you go about deciding what is acceptable or not?
ref:
				
			for matters of discussion … pls understand i am using the "free" version. also, am using windows default firewall.
have used avg (and, recently, avast) … dislike them because of nagware and other reasons.
• avg,  when  upgrading,  actually  closes  down  the  protection … causing  windows-defender  to  throw  up  an  alert (serious thanks, ms).  takes  anywhere  from  two-three  minutes  for  the  upgrade  to  finish.  during  that  window  of  time … anything  can  infiltrate  my  defense  portal.  one  of  the  things  i  liked  is  avg's  "shred"  feature.
• avast … same amount of nagware … has no shredder … does not, in my observation/recollection, close down the av during upgrade. mysterious "names and email-irls" appearing in browser form-fields … which, turns out, avast is responsible for.
notably,  both  of  the  above  products  are  part  of  the  avast  enterprise.  using  these  products  in  default  mode … just  "let it fly and do it's thing".• avast … same amount of nagware … has no shredder … does not, in my observation/recollection, close down the av during upgrade. mysterious "names and email-irls" appearing in browser form-fields … which, turns out, avast is responsible for.
now … i wish to discuss comodo (free version). having researched a bit here on windowsforum as well as the internet … seems to be my next logical progression. several members here swear by the product.
so … this here is my quandary …
from what i understand, comodo seeks intervention from the computer operator as to certain ports or files being authorized or being acceptable risk. how am i to determine what is acceptable and not? what is the methodology for making such decisions? could you pls illustrate a few totally different 'legitimate' real-world examples?
outlined below are a few fictitious examples i have manifested:
- youtube  wants  to  open  port-5088 … i  currently  have  youtube.com  open  and  the  video  is  playing  without  problems.  comodo  is  asking  if  i  wish  to  close  port-5088 … in  this  scenario,  would  it  be  advisable  for  me  to  instruct  comodo  to  close  the  port  or  keep  it  open?
 
 
- registry-entry  "Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AuthHost …" is  attempting  to  make  changes … comodo  deems  the  behavior  as  suspicious  and  wants  to  know  should  i  allow  or  disallow  the  registry  change?  it  is  a  microsoft  switch … i  have  no  idea  if  it  should  be  allowed/disallowed … if  disallowed,  i  run  the  risk  of  freezing/seizing  my  computer.
 
 
- microsoft  wants  to  open  new  port  in  firewall … comodo  asks  if  should  allow  or  disallow?  i  have  no  idea  if  i  should  allow/disallow … if  i  disallow,  i  run  the  risk  of  freezing/seizing  up  my  computer.
 
 
- "software  is  being  installed … okay  to  proceed?"  if  it  is  microsoft,  guess   i  should  allow … but  not  certain?
 
 
- comodo alerts me "a port is wanting to be opened" by a totally alien entity (multiplex-adv.com) … guess i should disallow that from happening.
so, for those of you who are using comodo … can you pls site some examples of comodo's query … and, more importantly, how did you go about deciding what is acceptable or not?
ref:
 
 
		 
 
		 
 
		 
 
		