Comodo Firewall Pro

Lemon law

Lifer
Nov 6, 2005
20,984
3
0
Comodo version 2.4 was rated excellent in the latest leak tests. On line armor scored slightly higher in those same tests.( top rated in fact ) To my knowledge, comodo 3 has not been extensively tested yet because its too new. And comodo3 works with vista and on line armor does not yet have a vista version. But an online armor vista version is expected very soon.

So Lacking comprehensive leak tests, one must take things on faith. And even then the tests will likely be dated as new versions are coming rapidly from both companies.

But short answer, for vista, assume CPF3 as the probable best firewall now available for vista
based on comodo history. And now I hear they have a new 3.1 version coming out this coming Monday.

I should also note a few on lime armor users and a few CPF3 users have some problems. But most bugs, including a CPF3 vista update bug are now fixed.
 

Rottie

Diamond Member
Feb 10, 2002
4,795
2
81
annoying popups during program installation I hate it but i have to get used to it :(
 

Lemon law

Lifer
Nov 6, 2005
20,984
3
0
Rottie, those pop ups will decrease in frequency. But your timing is bad, because you will find
a new update to comodo 3.1 is now available within the past hour. Fortunately, it comes in the form of an incremental update that does not require a uninstall of the previous version.

Added at a minimum is CAV3 which is a passive malware scanning engine.

And in late breaking news, the 3.1 designation is overhyped. The new version caries a designation of 3.0.16.295
 

QuixoticOne

Golden Member
Nov 4, 2005
1,855
0
0
I've been using Comodo for Vista 64 for about 1 month (along with AVAST AV) and I've been relatively happy.

I haven't much noticed the impact of their recent minor version upgrade, but then again I haven't looked for changes in any detail either.

I turned off the Vista Firewall and MS Defender.

I've seen Comodo block a lot of incoming / outgoing traffic attempts from both unknown / 3rd party traffic and applications, as well as ask about blocking/allowing even several known/"safe" applications (vista components, IE, whatever). In this context that's a good thing that assures me it seems to be doing its job in securing the system and allowing me to be as restrictive or permissive as I like about what to allow. I'm sure that most people would just let it be pretty permissive by default and that'd be OK for them.

If anything the greatest annoyance for me about it is that when I tell it to remember to ask, block, or allow something (say by application not by port/IP) then it's not so easy to track what has been allowed / denied in some cases. So if you want to go back and look at all allowed / denied traffic / application attempts you can't totally generally do that. It's hard to describe because there are logs you can enable of allowed/blocked traffic, though it's just not quite as general as it could be about letting you choose what to log in what detail etc.

Then again it's better than anything else I've seen except for things like UNIX firewalls where you program them at a super low level and can log *anything*.