Tuesday, 11 March 2014

COMODO FIREWALLS


Firewall Functions
Like Windows Firewall (and almost every third-party firewall), Comodo had no hassle putt all of my test system's ports in concealment mode. None of my port scans or different Web-based attacks could even detect the test system. Many firewalls, together with Outpost Firewall pro eight, go a step additional, actively detective work and blocking port scan attacks.

The flip side of non-public firewall protection is what we have a tendency to decision program management. The firewall keeps track of what types of net and network access programs request and allows solely applicable communication. In its default Safe Mode, Comodo automatically configures permission for trusted programs. Once an unknown program attempts a connection, it asks the user whether or not to allow or block the connection.

Like Outpost, Comodo gives the user a alternative beyond simply permitting or blocking the program. Predefined rule sets build it straightforward to set up a program for the type of access applicable to, for example, an online browser, or an email shopper. Different presets relate to the type of access allowed. For example, it is simple to set up a program to allow traditional outward access however block it from receiving incoming connections.

Many trendy malware attacks slip into victim systems by exploiting unpatched vulnerabilities within the software, the browser, or essential applications. Check Comodo's exploit protection I attacked the test system victimization thirty exploits generated by the Core IMPACT penetration tool. Like Zone Alarm Free Firewall 2012, Comodo did not actively block any of those at the network level and conjointly did not block their makes an attempt to drop files on the take a look at system. Solely the actual fact that the take a look at system was totally patched prevented it from being compromised. Norton, against this, detected each exploit at the network level and known most by name

Especially sensible for Techies

             For a free product, Comodo Firewall (2013) packs plenty of options. Naturally it protects your system from outside attack and manages access permissions for native programs. It additionally offers Secure DNS to dam DNS-based attacks, sandboxing for safe surfboarding, and a behavior obstruction system that protects essential system areas.

                 However, one reason to put in a standalone free firewall is that you are building your own best-of-breed suite. In this state of affairs, Comodo's additional options could get within the manner. And victimization the advanced options could also be too confusing for non-technical users.
If you are affected with the bonus options and might see yourself victimization them, by all means that select Comodo. Otherwise, stick to PC Mag's Editors' alternative Zone Alarm Free Firewall 2012.

PROS

*New, friendlier interface.
 *Handy desktop gadget.
 *Stealth’s all ports against attack.
 *Behavior Blocker protects sensitive system areas.
 *Sandbox feature permits browsing and computing, while not risk.
 *Secure DNS prevents DNS-based attacks.
 *Includes hardened browser.

CONS

*Didn't totally handle leak tests.
*No exploit protection.
*Firewall yielded to direct attacks.
*Secure DNS ineffective against phishing URLs.




No comments:

Post a Comment