After install Comodo Firewall Free (5.0.163652.1142 latest version), after a few hours, avast strange this firewall and begins to generate tmp files in C: \ WINDOWS \ TEMP \ avast5 \
This causes the Windows registry inflating in key:
HKLM \ SYSTEM \ Software \ COMODO \ Firewall Pro \ Configurations \ 2 \ HIPS \ Policy \ 6 \ Rules \ 1 \ Allowed \ avast5 \ …
The process of Comodo Firewall Free cfp.exe goes to 100%
I don’t think there’s any “begins to generate files after a few hours” - yes, avast! uses this folder e.g. to unpack archives, possibly to emulate suspicious executables (from inside of other archives)… and may create (and quickly remove) quite a few files there any time.
That’s what the TEMP folder is for, isn’t it…
I don’t know what you mean by “estranged”, but avast! is certainly not trying to confuse Comodo in any way - it just works with its own temporary files.
Nahh–HIPS is a big PITA in my opinion. I used it for a year and it just got annoying alerting for safe actions by safe apps. I’ve been online since 1999 without ever being infected or hacked. I just don’t think I need that level of annoyance. I don’t want sandboxing either.
Windows XP Pro SP3: Comodo used with Avast 5.0.677 free. System kept locking up. Uninstalled Comodo, installed Agnitum Outpost Firewall Pro 7.0.4 and Bingo! all the problems went away.
Avast works great with Outpost and Threatfire 4.5.0.24 (level 5 maximum sensitivity).
I was using Comodo for its sandbox feature. Sandboxie is superior so uninstalling Comodo is no loss.
I have a hunch that Comodo HIPS was the culprit but now will never know for sure.
Like any security software program as far as I can tell, it all depends on individual OS and configuration!
I tried Outpost PRO FW v.7.0.4 and had nothing but problems installing it and getting it to play nicely with other programs. Uninstalled and went back to OP FW FREE…no issues at all. I’ve also tried Comodo Free FW back when it was v.2.4 and loved it…simple,effective and compatible. As soon as Comodo moved to v.3 and higher with the added components…it just mucked up my system.
So it all depends…right
Leak tests are popular mainly because they are very easy to perform: you simply run a program, and it tells you if it passed or failed the test. However, life is not that simple, unfortunately.
The primary goal of a firewall is to keep hackers out of your system, that is, prevent inbound attacks in the first place. It’s astonishing that many firewaller “testers” only focus on outbound protection, completely ignoring the inbound part (which is absolutely vital). It’s like they assumed it worked flawlessly in case of all the products, which, unfortunately, doesn’t seem to be the case, really.
Next, outbound protection is of course also important, but so called leak tests are not everything. There’s a myriad of other things that a decent firewall should do, and which are usually not acessed by these tests. All I’m saying is that testing a firewall is a very complex task and focusing on leak tests is a gross (and inappropriate) simplification.
If you use GRC and it says a port is not stealthed, but is closed, don’t worry about it. GRC is overly paranoid sometimes and it’s creator is actually the one who invented the whole “stealthed ports” concept in the first place. A closed port is secure.