Firewall Functions
Like Windows
Firewall (and almost every third-party firewall), Comodo had no hassle putt all
of my test system's ports in concealment mode. None of my port scans or
different Web-based attacks could even detect the test system. Many firewalls,
together with Outpost Firewall pro eight, go a step additional, actively
detective work and blocking port scan attacks.
The flip
side of non-public firewall protection is what we have a tendency to decision
program management. The firewall keeps track of what types of net and network
access programs request and allows solely applicable communication. In its
default Safe Mode, Comodo automatically configures permission for trusted
programs. Once an unknown program attempts a connection, it asks the user
whether or not to allow or block the connection.
Like
Outpost, Comodo gives the user a alternative beyond simply permitting or
blocking the program. Predefined rule sets build it straightforward to set up a
program for the type of access applicable to, for example, an online browser,
or an email shopper. Different presets relate to the type of access allowed. For
example, it is simple to set up a program to allow traditional outward access
however block it from receiving incoming connections.
Many trendy malware attacks slip into victim systems by exploiting unpatched
vulnerabilities within the software, the browser, or essential applications. Check Comodo's exploit protection I attacked the test system victimization thirty exploits generated by the Core IMPACT penetration tool. Like Zone Alarm
Free Firewall 2012, Comodo did not actively block any of those at the network level and conjointly did not block their makes an attempt to drop files on the take a look at system. Solely the actual fact that the take a look at system was totally patched prevented it from being compromised. Norton, against this, detected each exploit at the network level and known most by name
Especially sensible for Techies
For a free
product, Comodo Firewall (2013) packs plenty of options. Naturally it protects your system from outside attack and
manages access permissions for native programs. It additionally offers Secure DNS to dam DNS-based attacks, sandboxing for safe surfboarding, and a behavior obstruction system that protects essential system areas.
However, one reason to put in a standalone free firewall is that you are building your own best-of-breed suite. In this state of affairs, Comodo's additional options could get within the manner. And victimization the advanced options could also be too confusing for non-technical users.
If you are affected with the bonus options and might see yourself victimization them, by all means that select Comodo. Otherwise, stick to PC Mag's Editors' alternative Zone Alarm Free Firewall 2012.
However, one reason to put in a standalone free firewall is that you are building your own best-of-breed suite. In this state of affairs, Comodo's additional options could get within the manner. And victimization the advanced options could also be too confusing for non-technical users.
If you are affected with the bonus options and might see yourself victimization them, by all means that select Comodo. Otherwise, stick to PC Mag's Editors' alternative Zone Alarm Free Firewall 2012.
PROS
*New, friendlier interface.
*Handy desktop gadget.
*Stealth’s all ports against attack.
*Behavior Blocker protects sensitive system
areas.
*Sandbox feature permits browsing and computing, while not risk.
*Secure DNS prevents DNS-based attacks.
*Includes hardened browser.
CONS
*Didn't totally handle leak tests.
*No exploit protection.
*Firewall yielded to direct
attacks.
*Secure DNS ineffective
against phishing URLs.
No comments:
Post a Comment