Jump to content
IObit Forum
Top Free Driver Updater Tools Best 25 PC Optimization Software Best 22 Antimalware Best 22 Uninstaller Software IObit Coupons & Discount Offers PC Optimizer Mac Boost Advice IObit Coupons A Good Utility Program From IObit IObit Promo Codes IObit Coupon Codes IObit Coupons and Deals FAQs Driver Booster Pro Review

Anti virus & registry cleaner am I right?


emttaff

Recommended Posts

  • Replies 167
  • Created
  • Last Reply

emttaff- That would be great. There's no rush, but I am interested in seeing the Task Manager screenshot so we can know where you stand with your Vista computer. You may want to do a "save report" for the task manager processes list as solbjerg suggested as that would be essential information to have especially as a valuable starting point reference!

 

~Maxx~

 

PS- My Grandparents were Welsh...

Link to comment
Share on other sites

emttaff- Now here's the Good News! When it comes to computer security it used to be back in the day that one had to learn the complicated art of Firewall Configuration for protection but these days in 2009 the Comodo Firewall Pro and Defense+ HIPS that you have installed and configured offer you state of the art 21st Century protection without the kinds of complicated procedures that were once required of users.

 

Please see the attachments as proof of how excellent Comodo protection is with default settings in the most recent Matousec tested 100% protection score and perfect 340/340 score that Comodo has on the rigerous 34 part Leak Test which are my computer's first Leak Test results even before the Defense+ optimizations that I showed you. And my honest opinion is that the Avast Antivirus that you are now running is better than the Comodo Antivirus which leaves you in excellent shape security wise and in the next post I will show you how to use the very easy to configure Comodo Firewall Pro Stealth Ports Wizard that will make your computer invisible on the internet without a seemingly endless array of very complicated modifications.

 

~Maxx~

Link to comment
Share on other sites

Sandboxie (you must configuring it properly)

Comodo (Firewall & D+)

Avira (Free replacment)Thats ALL you need.

 

vman- If I were an author writing a book you would have just skipped ahead and read from the 'big reveal' that I was saving for the last page! For now I am trying to do first things first and help emttaff get his Comodo Firewall Pro configured properly before we discuss virtualization technology which depends on having a stealthed and leak proof Firewall.

 

~Maxx~

Link to comment
Share on other sites

Stealthing a port effectively makes it invisible to a port scan. This differs from simply ‘closing’ a port as NO response is given to any connection attempts (‘closed’ ports respond with a ‘closed’ reply- revealing to the hacker that there is actually a PC in existence.) This provides an extremely high level of security to your PC. If a hacker or automated scanner cannot 'see' your computers ports then they will presume it is offline and move on to other targets. You will still be able to connect to Internet and transfer information as usual but remain invisible to outside threats.

 

emttaff- To very simply stealth your Comodo Firewall Pro go to the Comodo GUI> Firewall> Common Tasks> Stealth Ports Wizard

 

On the first screen select...

 

1)Define a new trusted network stealth my ports to EVERYONE else

 

Click on next and select...

 

2)I would like to trust an existing My Network Zone

 

Choose the network that you access the internet on from the drop down menu. You can find the network that you are using and its corresponding numerical designation in the My Network Zones section on the Common tasks page. Just click Finish and your Comodo Firewall Pro will be stealthed and invisible to outside threats.

 

~Maxx~

Link to comment
Share on other sites

I find that configuring an application like comodo for someone else is quite hard to do, as I, personally usually end up doing some paranoid setup.

 

But hey, go for it.

 

 

I dont read the end. I skip reading entirely, hop on sparknotes.

Link to comment
Share on other sites

Bump - added information to my post -Cheers solbjerg

Hi Maxx

It might be an idea for IObit to add a "save report" for the task manager processes list, as a possibility in additional tools?

Cheers

solbjerg

p.s. by the way one has the possibility to create a macro in Word that will generate a list of the tasks and then one copies that list and insert it in ones post.

Try this macro:

Sub xxx()

For Each t In Tasks

Selection.TypeText t.Name & vbCr

Next

End Sub

(mostly for use in Word)

 

There is a command in command prompt using tasklist, but it does not work in XP Home. >tasklist > "%userprofile%\desktop\t.txt" that will generate a file on your desktop to copy the content from and insert in your forum post or simply attach the file to the post.

 

A good solution if you are using xp home could be to try Process Explorer

Another good one by Mark Russinovich that can replace taskmanager and from which it is easy to save the tasklist.

It is called Process Explorer

And can be found here on Sysinternals - www.sysinternals.com

Cheers again :-)

solbjerg

 

Bump - added information to my post -Cheers solbjerg

Hi Maxx

It might be an idea for IObit to add a "save report" for the task manager processes list, as a possibility in additional tools?

Cheers

solbjerg

p.s. by the way one has the possibility to create a macro in Word that will generate a list of the tasks and then one copies that list and insert it in ones post.

Try this macro:

Sub xxx()

For Each t In Tasks

Selection.TypeText t.Name & vbCr

Next

End Sub

(mostly for use in Word)

 

There is a command in command prompt using tasklist, but it does not work in XP Home. >tasklist > "%userprofile%\desktop\t.txt" that will generate a file on your desktop to copy the content from and insert in your forum post or simply attach the file to the post.

 

A good solution if you are using xp home could be to try Process Explorer

Another good one by Mark Russinovich that can replace taskmanager and from which it is easy to save the tasklist.

It is called Process Explorer

And can be found here on Sysinternals - www.sysinternals.com

Link to comment
Share on other sites

vman- I began my teaching career in 1967 in a remedial math class mostly filled with jocks who needed to pass a test in order to play in the next game. I learned that if you break the subject down into its most basic elements that it can not only be easily understood but after the epiphanal lightbulb of inspiration lights above their head they need no more help in problem solving even with those who had once given up on the subject because they finally 'get it'!

 

What I am trying to do here is to give emttaff just a very basic outline of Comodo computer security which I also know as the most basic and often recommended setup from the many 100's of hours I have spent reading expert advise on the Comodo Forum and since CIS scored the only 100% score on the most recent Matousec Proactive Security Challenge and did it in default mode I think it is safe to let emttaff make his own decisions on how to tweak it from there.

 

~Maxx~

Link to comment
Share on other sites

Stealthing a port effectively makes it invisible to a port scan. This differs from simply ‘closing’ a port as NO response is given to any connection attempts (‘closed’ ports respond with a ‘closed’ reply- revealing to the hacker that there is actually a PC in existence.)

 

Steve Gibson hosts the ShieldsUp! online port scanner utility on his website to check if your ports are truly stealthed.

Link to comment
Share on other sites

garybear- Although it looks like the first 533 ports somehow got cut off of the Shields Up! results that you posted nevertheless your firewall passed the TruStealth Analysis Test and the first 1056 ports on your computer are stealthed or invisible to attempts made to get information about your computer...

 

Your computer sends and receives data to other computers and to the Internet through an interface called a 'port'. There are over 65,000 numbered ports on every computer - with certain ports being traditionally reserved for certain services. For example, your machine almost definitely connects to Internet using port 80 and port 443. Your e-mail application connects to your mail server through port 25. A 'port scanning' attack consists of sending a message to each of your computer ports, one at a time. This information gathering technique is used by hackers to find out which ports are open and which ports are being used by services on your machine. With this knowledge, a hacker can determine which attacks are likely to work if used against your machine.

 

Stealthing a port effectively makes it invisible to a port scan. This differs from simply ‘closing’ a port as NO response is given to any connection attempts (‘closed’ ports respond with a ‘closed’ reply- revealing to the hacker that there is actually a PC in existence.) This provides an extremely high level of security to your PC. If a hacker or automated scanner cannot 'see' your computers ports then they will presume it is offline and move on to other targets.

 

~Maxx~

Link to comment
Share on other sites

Just a small caveat with that.

If you are using a wifi router then ShieldsUP is only testing your router not your NetBook/NoteBook :wink:

 

All the best, woz of oz

 

 

correct if you want a true test ,you need to disable the router.(turn it into a pure MODEM) or use one..the test shown ,using a router are not correct .

and the pc may be leaky...you tested the router -not the system..than its still seen by the out side if this was the case..not saying it is..saying i could be--

a router self protects the system deputing,or giving false reading.depending on its make and,build ..it allows any udp in and out or port forwarding . again depend how it configured.and by who set it..in other words what type of fire wall it has configured in the unit.

 

---------------------------------------------------------------------------

Stealthiness-(stealthing) a port effectively makes it invisible to a port scan. This differs from simply ‘closing’ a port as NO response is given to any connection attempts (‘closed’ ports respond with a ‘closed’ reply- revealing to the hacker that there is actually a PC in existence.) This provides an extremely high level of security to your PC. If a hacker or automated scanner cannot 'see' your computers ports then they will presume it is offline and move on to other targets.

--------------------------------------------------------------------------

yes this is the basis of a system.and a top way to be-and gives one 90%

of a safe system ..there are other things to be yet fixed.for added protection as max already stated--and you are on the way of doing this

 

ok one last say here forget the knockers who set upon a post saying thy have nothing to hide NONSENSE.or i do not worry about this or that.as we have nothing to HIDE..

that to me is negative , childish attitude, even bordering on the crazy. or the lazy types that comment on the same,or make stupid comments like only criminals,do this or people who hide,or do things to break the laws..or post if you are worried .try this comments.----------------------------

i always answer that is your dizziness, i do not know who you are and trust nothing.and put this in your pipe and smoke it..mind your own self better.

.

posting of comments like this, is very silly when i read them,and i wonder why thy do? this is the NET not your local street -we are talking about.unknowns here.the better i am hidden the better it is .and will do anything to improve this.after all who system is it any how .yours,or my ones we are talking about..i think you did the correct thing ASKED..and now feael better for it..

 

 

itsmejjj

Link to comment
Share on other sites

Hi friends, no disrespect,but???

 

Hi friends. I do not wish to be disrespectful. I read every post like it was the gospel. I love learning new things even though this old mind has a hard time retaining every thing and understanding it. My stealth test used the words perfect and very nice. Is there a better rating, like wonderful and very very very nice?? I know that someone is watching every thing we do on our PC's and I sure don't like that. If there is a way that you can stop it, that would be great. My theory may be stupid and dumb like jjj says if you don't care about this. I do care or I would not have posted hear.I'm not real sharp some times but I can guarantee this much if the government wants to know what your doing on the net, they damn sure will find out. Also if you think you can out smart them ,I have a lot of bridges I need to sell. If you get to cute with your stealthing you could draw more attention to your self than you want. If I'm protected from hackers, that's good enough for me and I will read your posts and try my best to follow your advice the best I can. If you don't want anyone to know what your doing on the net, you need to throw your PC in the lake and then you will be perfectly stealthed. I know jjj is going to raise hell with me and I will listen to every word and try to do what he says but I'm not to worried at this moment. Thank you for your vast knowledge my friends,---garyPS don't go wobbly on me JJJ I respect you very much my friend. I will continue to read this thread and try to learn all I can.

Link to comment
Share on other sites

If I'm protected from hackers, that's good enough for me and I will read your posts and try my best to follow your advice the best I can. If you don't want anyone to know what your doing on the net, you need to throw your PC in the lake and then you will be perfectly stealthed. I know jjj is going to raise hell with me and I will listen to every word and try to do what he says but I'm not to worried at this moment.

 

garybear- And an experienced user like you with a great computer security system in place and a whole series of perfectly good Macrium Reflect Image Backups to restore to shouldn't have to be made to feel worried. Just think what these paranoid ranting scare tactics do to an inexperienced newcomer to the IObit Forums like emttaff who hasn't posted back here for days and even if he does just look at what a horrible mess he has to step back into now! Its really a shame that we have to continue to put up with these kinds of ongoing fits of anger and flaming accusatory outbursts that do nothing more than wreak discord and fear.

 

What ever happened to the friendly, inviting and helpful environment that I first experienced when I joined the IObit Forums just less than a year ago? Can we somehow do a Forum Restore back to that era my friend?

 

~Maxx~

Link to comment
Share on other sites

Hi Maxx

I think it is still here, - look how overwhelmed emttaff was by offerings of help and suggestions.

He is probably out there now helping all his friends :-)

 

But our forum became a little flustered by all the naggers, - some were really obnoxious, but we got the worst weeded out I hope.

I am afraid though that the aftermath will be felt for some time.

 

To All

Therefore I hope everyone will react positively and cordially and civilly here in the forum, - for me that would be a balm on my spirit.

Thank you

Cheers

solbjerg

 

 

garybear- And an experienced user like you with a great computer security system in place and a whole series of perfectly good Macrium Reflect Image Backups to restore to shouldn't have to be made to feel worried. Just think what these paranoid ranting scare tactics do to an inexperienced newcomer to the IObit Forums like emttaff who hasn't posted back here for days and even if he does just look at what a horrible mess he has to step back into now! Its really a shame that we have to continue to put up with these kinds of ongoing fits of anger and flaming accusatory outbursts that do nothing more than wreak discord and fear.

 

What ever happened to the friendly, inviting and helpful environment that I first experienced when I joined the IObit Forums just less than a year ago? Can we somehow do a Forum Restore back to that era my friend?

 

~Maxx~

Link to comment
Share on other sites

now please this has nothing to do with fear mongering--privacy can come in many forms ,and decrees.from the simple to extrema.i may sound hard ,but its not to be read as so..its up to people to set systems as to how thy feel comfy with it -we are different -as to caring or just not worried..

i am talking ,privacy.not hiding for the wrong reasons..there is a difference .if i was i fear ,i would do as gary stated .but i would burn my systems...

 

 

first of all let me say this ,snooping is a big bigness,information gathering,and sell to smelly bidders,who seek info, next yes i agree with what you say--

we could post or even argu about who may want to hunt down who

and yes if someone is after little old me ,than it well be very difficult and costly to them.plus needing lots of man power.by then i would of noticed,and refreshed my links,and thy would have to restart-look no one would need to be as i am....i am a stickler for defense and hide-but not over cooked..the point is this you are all,traced to you home town ,and your service provider.if not using a proxy IP ,that's it ..and So what..i do not like this idea,,,,,,,that all i say on that.we could now debate this proxy logs or that logs.sure thy may ,but now thy ,the master of that proxy has a lot to do,as thy,or them do not know who i am,or even that i use them with the half million that use them..so if like i always say why would i draw attention..i do not do any thing to give reason to.even if i were surfing say porn..again your normal links..stay away from political,,religion,and crime..but the kiddo hankers.or even the expert hacker got no hope.not that i see ,yes its been tried,and i have been hit a few times.non were successful.at one sitting i was hit over 300 times in a row.so making me shut down..to get away from this,as the attempted hits were not stopping..that can happen.

 

I'm not real sharp ,trust this nether am i.but we both are smart enough to try .

so its all in the trial and error-one very simple way is this -you heard me say this many times-use a free extra fire wall -there must be no port NON green,now gary i near bet you are fine as you got the rating you have-so here is what i suggest -install a program call IP BLOCKER--free-then download the lists made by them .you will see what is and is not blocked--

this list is use by dedicated people who are anti snoopers,thy hate there privacy threatened.

 

now as for win fire wall well .i would be adding a other one.

a small free type or at least a ip blocking program .now i am talking a free type.no need for a 70 meg fire wall.forget the fancy adverts about the big ones or leak this or that--we want a simple fire wall.

iif you got one port not green you got a big hole..

ok now we talk one like commode .why did i tell our friend to install this

 

its made for the new user,,,that's why ?the deflated install is a titop way to be,.ready made.

itsmejjj

Link to comment
Share on other sites

Hi emttaff

 

hi guys how do i access the ports on my vista OS so i can snip a copy to place on here please?

 

Hi friend. I don't remember for sure who recommended this program to me. I'm thinking sunny staines. I find it very useful for finding what's on your PC. Its freeware. http://www.cpuid.com/ PS. I'm running XP3 and got in to trouble before for posting here but also System Information works for me.

Link to comment
Share on other sites

hi guys how do i access the ports on my vista OS so i can snip a copy to place on here please?

 

Everything you need to tweak the Ports is contained in the Comodo Firewall Pro. In the Comodo GUI to Firewall> Advanced> Network Security Policy and there you can edit the Ports to your heart's content.

 

http://i468.photobucket.com/albums/rr44/Maxxwire_Photos/Album%202/4269BotchedIntrusionAttempts.jpg

 

The most recent Matousec Proactive Security Challenge rates Comodo #1 with a 100% score and as we can see from this screenshot the Comodo Firewall Pro has blocked 4269 Intrusion Attempts over 16 hours without a single instance of anyone or any computer being able to successfully snoop or invade the privacy of the computer and this is at default Application and Global Rule settings!

 

~Maxx~

Link to comment
Share on other sites

Archived

This topic is now archived and is closed to further replies.


×
×
  • Create New...