Comodo Launches Free Memory Firewall

Posted on
Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone

<strong>Jersey City, N.J. &mdash; Jan. 16</strong><br />In its continuing commitment to keep PCs safe from malware, Comodo, a leading security company, announced an important new security solution to prevent buffer overflow attacks from damaging users computers. Buffer overflow attacks are often used by ID-stealing thieves to deliberately cause the buffer overflow to crash a computer, creating the opportunity for the hacker to run malicious code and even gain control of the entire operating system. Comodo Memory Firewall is a free prevention tool that prevents most (90 percent or better) buffer overflow attacks.<br /><br />Buffer overflow attacks are difficult to detect because these attacks can be launched just by visiting a site. To attack a computer, a malicious program or script deliberately sends more data to its memory buffer than the buffer can handle leaving the system vulnerable to malware that can reformat the hard drive, steal sensitive user information or install programs that transform the machine into a Zombie PC. Since Comodo Memory Firewall detects most buffer overflow attack attempts such as attacks on STACK memory, HEAP memory, ret2libc attacks and of corrupted/bad SEH Chains, Comodo Memory Firewall protects against data theft, computer crashes and system damage by preventing most types of buffer overflow attacks.<br /><br />Working in tandem with Comodo Memory Firewall is Comodo Firewall Pro, an acclaimed firewall highly rated by PC Magazine and CNET. Together, these two free solutions deliver a preventative model for desktop security that prevents malware from ever gaining access to a system in the first place.<br /><br />”At Comodo, we have changed the model of how users&#39; PCs are protected”, Melih Abdulhayoglu, CEO and chief security architect of Comodo, said. “Today, we deliver prevention-based security by only granting access to applications that we know to be trusted. This model is unique and mitigates threats because we are not trying to identify malware per se, as it is constantly changing. Rather, we built technology to enable the system to know what can be trusted. This avoids potentially damaging applications from ever being in a position to harm computers. That&#39;s how PC can remain free from malware, and we are ones to deliver this level of technological innovation for free.” <br />

Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone
cmadmin

ABOUT THE AUTHOR

Posted in Archive|

Comment:

Leave a comment

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>