Search Results

Showing 1041-1050 from 1132

Configure Wireless Hotspot (in Comodo Dome Firewall)

... Configure Wireless Hotspot A hotspot service provides internet connection to mobile devices. The connection is provided by WiFi from the uplink device or external interface by which the virtual appliance is connected to the internet. The hotspot interface lets you configure the captive portal service for authenticating Wi-Fi connections. The authentication can be chosen from two methods: Turkish Identification...

http://help.comodo.com/topic-451-1-936-12790-Configure-Wireless-Hotspot.html
Sandbox Tasks – Introduction (in Comodo Internet Security)

... Sandbox Tasks – Introduction Comodo Internet Security features a fully functional sandbox called the ' Virtual Kiosk '- an isolated operating environment for running unknown, untrusted and suspicious applications. Applications executed inside the sandbox/virtual kiosk will not affect other processes, programs or data on your real computer. In addition to running suspicious applications inside the sandbox on an ad-hoc basis, you...

http://help.comodo.com/topic-72-1-451-4737-Sandbox-Tasks-–-Introduction.html
Defense+ Logs (in Comodo Internet Security)

... Defense+ Logs Comodo Internet Security records a history of all actions taken by Defense+.  Defense+ 'Events' are generated and recorded for various reasons. Examples include changes in HIPS settings, when an application is auto-sandboxed by Behavior Blocker, when an application or process attempts to access restricted areas or when an action occurs that contravenes your HIPS Rulesets . The...

http://help.comodo.com/topic-72-1-451-4725-Defense+-Logs.html
System Requirements (in Comodo Internet Security)

... System Requirements To ensure optimal performance of Comodo Internet Security, please ensure that your PC complies with the minimum system requirements as stated below:     Windows 8 (Both 32-bit and 64-bit versions)   Windows 7 (Both 32-bit and 64-bit versions)   Windows Vista (Both 32-bit and 64-bit versions)   384 MB available RAM...

http://help.comodo.com/topic-72-1-451-4687-System-Requirements.html
Setting Up Defense+ For Maximum Security And Usability (in Comodo Internet Security)

... Setting up Defense+ for Maximum Security and Usability   This page explains on configuring the Host Intrusion Prevention System (HIPS) component of CIS to provide maximum security from the malicious programs that try to execute from within your system and to protect your system from data theft, computer crashes and system damage by preventing most types of buffer overflow attacks...

http://help.comodo.com/topic-72-1-284-3061-Setting-up-Defense+-for-Maximum-Security-and-Usability.html
Website Filtering Logs (in Comodo Internet Security)

... Website Filtering Logs Click 'Tasks' > 'Advanced Tasks' > 'View Logs' OR Click ‘Logs’ in advanced view of the CIS home screen Select 'Website Filtering Events' from the drop-down at upper-left Website filter logs are a record of all sites blocked (or allowed) by CIS. The logs record all attempts made by users to access blocked or allowed...

http://help.comodo.com/topic-72-1-766-9122-Website-Filtering-Logs.html
Run Browsers Inside The Virtual Desktop (in Xcitium Enterprise)

... Run Browsers inside the Virtual Desktop Click 'Tasks' > 'Containment Tasks' > 'Run Virtual Desktop' Click the 'Start Virtual Desktop Session' button. The virtual desktop provides an extremely secure environment for internet related activities because it isolates your browser from the rest of your computer. Just by visiting them, malicious websites can install malware, rootkits and spyware on your computer...

http://help.comodo.com/topic-463-1-1033-15968-Run-Browsers-inside-the-Virtual-Desktop.html
Browse The Internet And Run Untrusted Programs Inside The Sandbox (in Comodo Cloud Antivirus)

... Browse the Internet and run Untrusted Programs inside the Sandbox CCAV allows you to browse the internet and run untrusted programs inside a 100% virtual environment. Programs running inside this virtual environment are isolated from the rest of your computer and so cannot infect it. For example, if you inadvertently download malware from the internet while browsing in the virtual...

http://help.comodo.com/topic-394-1-941-12982-Browse-the-Internet-and-run-Untrusted-Programs-inside-the-Sandbox.html
File Groups (in Comodo Internet Security)

... File Groups File Groups are handy, predefined groupings of one or more file types which make it easy to add an entire class of file types to  CIS Exclusions, HIPS Rules, Auto-Sandbox and so on. CIS ships with a set of predefined File Groups and, if required users, can add new File Groups and edit existing groups. The...

http://help.comodo.com/topic-72-1-623-7761-File-Groups.html
Configuring Rules For Auto-Sandbox (in Comodo Internet Security)

... Configuring Rules for Auto-Sandbox The 'Auto-Sandbox' interface allows you to add and define rules for programs that should be run in the sandboxed environment. A sandboxed application has much less opportunity to damage your computer because it is run isolated from your operating system and your files. This allows you to safely run applications that you are not...

http://help.comodo.com/topic-72-1-623-7763-Configuring-Rules-for-Auto-Sandbox.html
Pages 105 of 114 « Prev     Next »   Jump to page