Showing 171-180 from 239
...Website Categories Appendix 1 CCS How To... Tutorials Enable / Disable AV, Firewall, Auto-Containment and VirusScope Easily Set up the Firewall For Maximum Security and Usability Block Internet Access while Allowing Local Area Network (LAN) Access Set up HIPS for maximum security and usability Create Rules to Auto-Contain Applications Run an Instant Antivirus Scan on Selected Items Create...
http://help.comodo.com/topic-399-1-904-11727-Introduction-to-Comodo-Client-Security.html...Block any Downloads of a Specific File Type This page explains how to configure CCS to prohibit downloads of specific types of file. Example scenarios: Some malicious websites try to push malware in .exe file format. These files, known as executables, can run commands on your computer. If the .exe is malicious then these commands could install a virus...
http://help.comodo.com/topic-467-1-1050-16715-Block-any-Downloads-of-a-Specific-File-Type.html...Block any Downloads of a Specific File Type This page explains how to configure XCS to prohibit downloads of specific types of file. Example scenarios: Some malicious websites try to push malware in .exe file format. These files, known as executables, can run commands on your computer. If the .exe is malicious then these commands could install a virus...
http://help.comodo.com/topic-463-1-1033-15885-Block-Any-Downloads-of-a-Specific-File-Type.html...Block any Downloads of a Specific File Type This page explains how to configure CIS to prohibit downloads of specific types of file. Example scenarios: Some malicious websites try to push malware in .exe file format. These files, known as executables, can run commands on your computer. If the .exe is malicious then these commands could install a virus...
http://help.comodo.com/topic-72-1-766-9096-Block-Any-Downloads-of-a-Specific-File-Type.html...Block any Downloads of a Specific File Type This page explains how to configure CCS to prohibit downloads of specific types of file. Example scenarios: Some malicious websites try to push malware in .exe file format. These files, known as executables, can run commands on your computer. If the .exe is malicious then these commands could install a virus...
http://help.comodo.com/topic-399-1-904-11806-Block-Any-Downloads-of-a-Specific-File-Type.html...applied to network zones. This interface also allows you to block network zones. The Portsets area contains groups of important / regularly used port numbers that can be easily selected as part of a global or application rule. The Website Filtering area allows you to create website filtering rules which let you determine which sites certain users can or cannot access. ...
http://help.comodo.com/topic-72-1-522-6273-Advanced-Firewall-Settings.html...applied to network zones. This interface also allows you to block network zones. The Portsets area contains groups of important / regularly used port numbers that can be easily selected as part of a global or application rule. The Website Filtering area allows you to create website filtering rules which let you determine which sites certain users can or cannot access. ...
http://help.comodo.com/topic-399-1-790-10299-Advanced-Firewall-Settings.html...Website Filtering . Click the links below to jump to more details on each section: The Firewall Settings area allows you to configure the security of your computer and the frequency of alerts that are generated. The Application Rules area allows users to view, manage and define the network and Internet access rights of applications on your system. The Global Rules area allows users view, manage and define overall network policy that applies to your computer and is independent of application rules. Both application rules and global rules are consulted when the firewall is determining whether or not to allow...
http://help.comodo.com/topic-72-1-623-7621-Advanced-Firewall-Settings.html...blocks man-in-the-middle attacks attempts by verifying certificates against Comodo's trusted root certificate list. This functionality is especially important if you are accessing sensitive websites while on a public Wi-Fi such as those found in an cafe, park or airport. What is a man-in-the-middle attack? Man-in-the-middle attacks occur when an attacker...
http://help.comodo.com/topic-394-1-767-10964-Comodo-Internet-Security-Essentials.html...connection (recommended) or to continue. CISE blocks man-in-the-middle attacks attempts by verifying certificates against Comodo's trusted root certificate list. This functionality is especially important if you are accessing sensitive websites while on a public Wi-Fi such as those found in an cafe, park or airport. Please note, Internet Explorer is currently the only supported browser. ...
http://help.comodo.com/topic-72-1-766-12430-What-is-Comodo-Internet-Security-Essentials.html