Friday, May 28, 2010

How To Completely Remove Comodo Firewall?



Comodo Firewall is really a wonderful program to help the endless battle between the data of good quality data and easy evil viruses. I've been using and was very happy with it, but a few days ago, I met many difficulties in removing this firewall to a previous version so I could upgrade to the latest version.

Comodo is a firewall more difficult to remove from a computer. Usually passes through the Add / Remove Programs can not eliminate. You will find the traces that remain in the registry and the real firewall is still recognized by Windows Security Center, not to mention an Internet connection. To get rid of them, you can follow these instructions:

Method 1 (take this in Windows XP as an example)

1. Close all unnecessary programs
2. Temporarily disable the Internet connection
3. Delete the folders and files below, if they still exist. Most users will have C: \ Program Files as default if the location is on another drive, open it.

C: \ Documents and Settings \ All Users \ Application Data Comodo \
C: \ Documents and Settings \ All Users \ Desktop \ COMODO

Firewall Pro
C: \ Documents and Settings \% username% \ Application Data \ Comodo
C: \ Program Files \ [Comodo Firewall folder] Pro
C: \ boot.ini.comodofirewall (this file may not exist).
C: \ WINDOWS \ system32 \ drivers cmdGuard.sys \
C: \ WINDOWS \ system32 \ drivers cmdhlp.sys \
C: \ Windows \ system32 \ drivers inspect.sys \
C: \ WINDOWS \ system32 \ guard32.dll

1. Go to Start - (right click) My Computer - Properties - System Properties - Hardware - Device Manager - View - Show hidden devices - Non-Plug and Play, and then delete all existing entries as below

Comodo Application Engine
Comodo Firewall Pro Helper Driver
Comodo Network Engine.

1. Remove the following registry keys.

HKEY_CURRENT_USER \ Software \ ComodoGroup \ PPC
HKEY_LOCAL_MACHINE \ SOFTWARE \ ComodoGroup \ CDI \ 1
HKEY_LOCAL_MACHINE \ SYSTEM \ ControlSet001 \ cmdAgent Services \
HKEY_LOCAL_MACHINE \ SYSTEM \ ControlSet001 \ Services \ cmdGuard
KEY_LOCAL_MACHINE \ SYSTEM \ ControlSet001 \ cmdHlp Services \
HKEY_LOCAL_MACHINE SYSTEM \ ControlSet001 \ Services \ Inspect
HKEY_LOCAL_MACHINE \ SYSTEM \ ControlSet002 \ Services \ cmdAgent
HKEY_LOCAL_MACHINE \ SYSTEM \ ControlSet002 \ Services \ cmdGuard
KEY_LOCAL_MACHINE \ SYSTEM \ ControlSet002 \ Services \ cmdHlp

HKEY_LOCAL_MACHINE SYSTEM \ ControlSet002 \ Services \ Inspect
KEY_LOCAL_MACHINE \ SYSTEM \ ControlSet003 \ Services \ cmdAgent
HKEY_LOCAL_MACHINE \ SYSTEM \ ControlSet003 \ Services \ cmdGuard
HKEY_LOCAL_MACHINE \ SYSTEM \ ControlSet003 \ Services \ cmdHlp
HKEY_LOCAL_MACHINE SYSTEM \ ControlSet003 \ Services \ Inspect
HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Services \ cmdAgent
HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Services \ cmdGuard
HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Services \ cmdHlp
HKEY_LOCAL_MACHINE SYSTEM \ CurrentControlSet \ Services \ Inspect
HKEY_LOCAL_MACHINE \ SYSTEM \ Software \ Comodo \ Firewall Pro
HKEY_USERS \ S-1-5-21-1202660629-746137067-2145843811-1003 \ Software ComodoGroup \ PPC
HKEY_LOCAL_MACHINE SYSTEM \ ControlSet001 \ Enum \ Root \ LEGACY_CMDAGENT
HKEY_LOCAL_MACHINE SYSTEM \ ControlSet001 \ Enum \ Root \ LEGACY_CMDGUARD
HKEY_LOCAL_MACHINE SYSTEM \ ControlSet001 \ Enum \ Root \ LEGACY_CMDHLP
HKEY_LOCAL_MACHINE SYSTEM \ ControlSet001 \ \ \ Enum Root LEGACY_INSPECT
HKEY_LOCAL_MACHINE SYSTEM \ ControlSet002 \ Enum \ Root \ LEGACY_CMDAGENT
HKEY_LOCAL_MACHINE SYSTEM \ ControlSet002 \ Enum Root \ LEGACY_CMDGUARD
HKEY_LOCAL_MACHINE SYSTEM \ ControlSet002 \ Enum \ Root \ LEGACY_CMDHLP
HKEY_LOCAL_MACHINE SYSTEM \ ControlSet002 \ Enum Root LEGACY_INSPECT
HKEY_LOCAL_MACHINE SYSTEM \ ControlSet003 \ Enum \ Root \ LEGACY_CMDAGENT
HKEY_LOCAL_MACHINE SYSTEM \ ControlSet003 \ Enum Root \ LEGACY_CMDGUARD
HKEY_LOCAL_MACHINE SYSTEM \ ControlSet003 \ Enum \ Root \ LEGACY_CMDHLP
HKEY_LOCAL_MACHINE SYSTEM \ ControlSet003 \ Enum Root LEGACY_INSPECT
HKEY_LOCAL_MACHINE SYSTEM \ CurrentControlSet \ Enum root HKEY_LOCAL_MACHINE \ LEGACY_CMDAGENT \ SYSTEM \ CurrentControlSet \ Enum Root \ LEGACY_CMDGUARD HKEY_LOCAL_MACHINE SYSTEM \ CurrentControlSet \ Enum \ LEGACY_CMDHLP \ Root
HKEY_LOCAL_MACHINE SYSTEM \ CurrentControlSet \ \ Enum Root LEGACY_INSPECT
HKEY_CURRENT_USER \ Software \ Local AppWizard-generated

Applications \ CFP_Setup_3.0.14.276_XP_Vista_x32
HKEY_CURRENT_USER \ Software \ Local AppWizard-generated

Applications \ CFP_Setup_3.0.14.276_XP_Vista_x64

HKEY_CURRENT_USER \ Software \ Local AppWizard-Generated Applications \ CFPLog
HKEY_CURRENT_USER \ Software \ Local AppWizard-generated

Applications \ CPFFileSubmission
HKEY_LOCAL_MACHINE \ SYSTEM \ Software \ Comodo \ Firewall Pro

6. Finally, restart the computer.

Warning: These instructions can modify the Windows registry, and if the transaction is not corrected, may cause serious errors. So if you are unsure of your skill to do it, and if you are a novice with little computer knowledge, it is better to find a good removal tool to help you.

Method 2 Remove Comodo Firewall automatically in seconds

In addition to completely remove the programs, including those that can not be removed from Windows Add / Remove applet, a removal tool far below outstanding features:

uninstall registry entries completely empty or corrupted.
Forcibly removing damaged or hidden agendas.
It is much easier and faster to use than Windows (Add / Remove) application functionality

If you restore the log files.

In fact, there is a removal tool that can help you completely remove Comodo Firewall successfully and ensure that the files all the elements in the now defunct record and are automatically deleted connected with a few clicks. In addition to this software, you can completely remove other programs like Authentium, Norton, Trend Micro Antivirus, Internet Explorer or Microsoft Office and similar programs.

Source from Articlesbase

Monday, May 24, 2010

Firewalls - Hardware Versus Software



The system provides the barrier between the outside world and the computer is the firewall. The firewall examines all traffic sent and the team gets to your computer. Only open the door if the traffic is permitted on a list of traffic sources and destinations. This vital system is almost a necessity for all computer systems in order to protect them from viruses, worms, Trojans and other threats. The question is: if the option to choose a hardware firewall or a software option?

To make better, it helps to talk about what a firewall. A firewall is a computing device whose sole purpose is to monitor and filter traffic. Internet communication is a process, not unlike a major highway system. When you enter an address in your browser, the computer sends a signal along a network path (numbered port number) to another computer (described by an IP address). The port number can be between 1 and 65535, while the IP address is four numbers each between 0 and 255. The firewall can see the IP address and port for each application, and is based on a set of firewall rules to allow or block the application. At least there are a number of traffic in both directions, creating a record traffic for later review.

The difference between a firewall hardware and software, where the firewall and works with the mechanism. A hardware firewall is a separate computing device that sits between your computer and the outside world. When the computer sends a request and the responses to the outside world, the firewall will examine and register the application before going through the firewall. A security software sits on your computer protected examine all applications in the software. They work to protect your computer against threats entering their infection by computer and send data to the outside world.

The hardware firewall has the advantage of separating the process equipment. We will review the traffic before it reaches your computer. This extends the protection software does not have. The hardware firewall also has the advantage of own resources. The firewall can also keep intelligence, packet filtering, not only said it was coming, but where in the next fact, and its contents to some extent. The hardware firewall can protect a number of computers on the network as multiple computers can be on the team.

The defect in the hardware firewall is that it seems so difficult to outbound traffic. This can be a big problem, as some malicious programs can send data or launch attacks from your computer. On the other hand, if the teams are too many network, the firewall in real time bogged down with traffic requirements, the decrease in the whole network down.

Software firewalls on individual computers at work. The user can choose to allow specific programs to send traffic to the outside world, and the protocol for other programs. Can be configured to deny everything, but what appears on a security list, or may have to decide what you want to keep the site safe list. The big problem with filtering software that protects only the computer is on. As a result, if a number of networked computers, each will need the firewall itself, which makes it more complex to configure the network.

The question of the best way is a challenge. Each has its merits. The hardware firewall is good at blocking any malicious code and the incoming direct penetration. The firewall software is better at detecting trojans and viruses via e-mail trying to turn your computer into a zombie terminal (one that launches denial of service attacks or "spam").

The minimum protection you should do is a hardware firewall. Updates and additions to the computer and your network does not affect your network security and firewalls. To increase security, replace the hardware firewall by adding a software firewall will give you a pass near complete protection. No protection is perfect, provided there is an Internet connection, then there is the opportunity for those qualified to enter a computer. Adding a firewall to deter most attackers and automatic blocking, malicious scripts.

Source from Articlesbase

Sunday, May 23, 2010

Windows Firewall What And How Basics



What is a firewall?
Firewall is a software or hardware that helps users find and keep away all malware from your PC. Firewall software is the most effective way to help protect your PC. It is also important to activate the firewall before connecting to the Internet.

Need Firewall
-
the actual computing environment has become very unreceptive. Therefore, it has become very important to obtain comprehensive protection for computer security in another way hackers can access your PC and your important data. Apart from hackers, the computer can also get affected by viruses and other malware. Firewall is used as a preventive measure to stay away from all those harmful elements.

How does Windows Firewall work?
Windows Firewall monitors all network traffic is enabled. Firewall keeps track of all communications originating from the PC and also prevents the PC of all the required elements.

If necessary, the firewall dynamically opens ports and allows the computer to receive traffic that you have specifically requested, as a Web page for which you have clicked on the address.

Windows Firewall also allows the user to block traffic unidentified, who can reach the PC. For special applications such as networking, hosting online games, or hosting the Web server, you can select the ports you want to leave open. This allows others to make connections to the computer, but can also reduce security.

S is always recommended that a firewall product should be well aware of the basics of Windows Firewall and how to use.

However, the firewall configuration creates problems in navigating many websites, such as gambling sites, web servers or other. If you are struggling with these problems, these problems can be well treated, with the help of technical experts.

(Note - Apart from the problems of Windows Firewall management, technical experts also help support the configuration of the complete PC security system.)

Benefits

* The Windows Firewall is considered of great importance to the great houses of the company. Serve as a network environment safe and central prevent hackers stay away from computers and crucial information.
* Provides secure web browsing environment, and reduces the problems of theft of data possible. It also decreases the percentage of internal threats.
* If you want a comprehensive, Internet. You can customize the configuration of the firewall. This can help block the unwanted single IP address, but the rest would be nice operation.
* You may choose the protocols to be included in the firewall filters. You can customize some of the protocols used are: IP, HTTP, TCP, FTP, SMTP, etc.
You can * customize the firewall to allow or block any port number

How to configure Windows Firewall on your PC

* Click the Windows icon and select Control Panel
* Click System and Security.
* Click on Windows Firewall
* If a green check mark is visible, you are running Windows Firewall.

Types of firewalls
There are several types of firewalls can be configured on your PC. These are significant -

* The packet filtering - This firewall used to examine the available information in the packet header of the message.
* Gateway application layer - This firewall working in the application layer protocol and it works quite intelligent than packet filtering firewall.
* Circuit-level gateway
* Hybrid Firewall

Source from Articlebase