New
#61
Can't believe so many people disable UAC. There's no reason for it.
Anyway, my setup is pretty basic. NOD32 v4.0 x64 + UAC enabled + Windows Defender enabled + Windows Firewall.
Well, keep in mind that UAC is generally designed for the less savvy computer user who might be unaware of what they are doing. For many enthusiasts here, they are well aware of what they are doing and they do want to do it and not be bothered by it. Personally, I just leave it enabled as I really don't see it too much...but I could see others not wanting the disruption.
The sad part is, for those who really do "need it", they don't take the time to read or even question why something is just happening and go ahead and blindly click on ok.
oh yea but neither of us are using comodo at the moment so if it leaks it leaks:)
got 280/340,although the result is a bit faultyI ran the Comodo leak tests - I scored 270 out of the 340. How did you do?
that result is wrong cuz kaspersky gave me popup,but then again who knows4. RootkitInstallation: ChangeDrvPath Vulnerable
gets right pass outpost,even while it says that it blocked it in the log,how about you?23. Impersonation: ExplorerAsParent Vulnerable
another wrong result,cuz it gets pass outpost too.24. Impersonation: DDE Protected
lol all in all an inconclusive result,but yeah we're leaking
btw are you using the x64 version of win 7?
I'm running x64 RTM.
Quote:
4. RootkitInstallation: ChangeDrvPath Vulnerable
Got that ...
Quote:
23. Impersonation: ExplorerAsParent Vulnerable
Got that ...
Quote:
24. Impersonation: DDE Protected
Got that ...
Also got as vulnerable:
8. Filedrop
11. SetWindowHook
12. SetThreadContext
16. DupHandles
Hey, a guy's gotta take a leak every now & then .
I got 200/340, meh, just wait till Windows 7 recieves security updates after the first month of availability and RTM of MSE 1.0 then things will improve. Comodo website labels my OS as "Vista SP0 7600".
my complete list would be
4. RootkitInstallation: ChangeDrvPath Vulnerable
5. Invasion: Runner Vulnerable
8. Invasion: FileDrop Vulnerable
10. Injection: SetWinEventHook Vulnerable
11. Injection: SetWindowsHookEx Vulnerable
15. Injection: KnownDlls Vulnerable
23. Impersonation: ExplorerAsParent Vulnerable
I got a KAV popup for number 4 and most probably a popup from OP for the rest(too many popups to keep up with lol) except for 23,damn thing is oblivious to a attack of that kind :S
btw could you pls run firehole and post the results,it kinda uses the same tactic as number 23 and get right pass OP
lol word
Agree and I wonder whether I am becoming one of those...
I have an additional issue and question: I set up separate users for my kids as Standard users. Now every time they log in there are at least 3 programs (all ASUS) that require my Administrator passoword to run. Why UAC doesn't learn what programs we have once (or many times) authorized to run and then we dont' have to do that anymore (I read about viruses disguising as the actual programs. I think in that case we will just blindly click anyway).
Is there a way to avoid the issue with the startup programs?