Search Results

Showing 401-410 from 505

Special Features (in Comodo Internet Security)

...Scan Web pages for Malware with Web Inspector Built-in Media Downloader allows you to quickly save streaming videos Greater Stability and Less Memory Bloat Incognito Mode Stops Cookies, Improves Privacy Very easy to switch from your current browser to Chromodo   Comodo Internet Security - Extended Features Highly Configurable Security Rules Interface   Comodo Internet Security offers more control over security settings than ever before. Users can quickly set granular Internet access rights and privileges on a global or per application basis using the flexible and easy to understand GUI. This version also sees the introduction of preset security...

http://help.comodo.com/topic-72-1-623-7602-Special-Features.html
Special Features (in Comodo Internet Security)

...Scan Web pages for Malware with Web Inspector Built-in Media Downloader allows you to quickly save streaming videos Greater Stability and Less Memory Bloat Incognito Mode Stops Cookies, Improves Privacy Very easy to switch from your current browser to Dragon   Comodo Internet Security Essentials Comodo Internet Security Essentials (CISE) protects you from man-in-the-middle attacks during online banking and shopping sessions by verifying that sites you connect to are using a trusted SSL certificate. CISE runs as a background process and alerts you if a site uses a potentially malicious certificate Option to disconnect or continue...

http://help.comodo.com/topic-72-1-766-9039-Special-Features.html
HIPS Settings (in Comodo Internet Security)

...disable monitoring of an activity, entity or object using this interface it completely switches off monitoring of that activity on a global basis - effectively creating a universal ' Allow ' rule for that activity . This 'Allow' setting over-rules any Ruleset specific 'Block' or 'Ask' setting for that activity that you may have selected using the ' Access Rights ' and ' Protection Settings ' interface.       Activities To Monitor: Interprocess Memory Access - Malware programs use memory space modification to inject malicious code for numerous types of attacks, including recording your keyboard strokes; modifying the behavior of the invaded application; stealing confidential data...

http://help.comodo.com/topic-72-1-623-7731-HIPS-Settings.html
CIS Complete - Installation And Activation (in Comodo Internet Security)

...disable this option. Choosing Installation Location   Click the 'Files Locations' tab to choose the installation path. This interface allows you to set the installation folder for Comodo Internet Security . The default path is C:Program FilesCOMODOCOMODO Internet Security. If you want to install the application in a location other than the default location, click 'Browse' to choose a different location.   After customizing your installation, click the 'Back' button to return to the installation configuration screen.   Click the 'Agree and Install' button to proceed with the installation.   Step 3 - Installation progress ( Click to go back to Step...

http://help.comodo.com/topic-72-1-451-4691-CIS-Complete---Installation-and-Activation.html
Execution Control Settings (in Comodo Internet Security)

...Disabled - No execution control is applied to the executable files.   Check Boxes Treat unrecognized files as – This has five options and the unrecognized files will be run as per the option selected.     Partially Limited ( Default ) - The application is allowed to access all the Operating system files and resources like clipboard. Modification of protected files/registry keys is not allowed. Privileged operations like loading drivers or debugging other applications are also not allowed. Limited - Only selected operating system resources can be accessed by the application. The application is not allowed to execute more than 10 processes at a time...

http://help.comodo.com/topic-72-1-284-3037-Execution-Control-Settings.html
CIS Premium – Installation (in Comodo Internet Security)

...disable this option. Choosing Installation Location   Click the 'Files Locations' tab to choose the installation path.   This screen allows you to select the folder in your hard drive for installing Comodo Internet Security. The default path is C:\Program Files\COMODO\COMODO Internet Security. If you want to install the application in a location other than the default location, click 'Browse' to choose a different location.   After customizing your installation, click the 'Back' button to return to the installation configuration screen.   Once you are satisfied with your settings, click 'Agree and Install' to begin installation...

http://help.comodo.com/topic-72-1-451-4689-CIS-Premium-–-Installation.html
Firewall Settings (in Xcitium Enterprise)

... Firewall Settings The Firewall Settings area lets you configure the behavior of the XCS firewall on endpoints to which the profile is applied. You can also configure network zones, portsets and traffic filtering rules. Configure Firewall Settings and Traffic Filtering Rules Click 'Assets' > 'Configuration Templates' > 'Profiles' Open the Windows profile you want to work on Click the 'Firewall...

http://help.comodo.com/topic-463-1-1029-15675-Firewall-Settings.html
HIPS Settings (in Xcitium Enterprise)

...scanning software and intrusion-detection systems. Leave this option selected, and HIPS generates alerts when an application attempts to modify the memory space allocated to another application (Default = Enabled) Windows/WinEvent Hooks -  In the Microsoft Windows® operating system, a hook is a mechanism by which a function can intercept events before they reach an application. Example intercepted events include messages, mouse actions and keystrokes. Hooks can react to these events and, in some cases, modify or discard them. Originally developed to allow legitimate software developers to develop more powerful and useful applications, hooks have also been exploited by hackers...

http://help.comodo.com/topic-463-1-1029-15676-HIPS-Settings.html
HIPS Behaviour Settings (in Comodo Internet Security)

...disable monitoring of an activity, entity or object using this interface it completely switches off monitoring of that activity on a global basis - effectively creating a universal ' Allow ' rule for that activity . This 'Allow' setting over-rules any Ruleset specific 'Block' or 'Ask' setting for that activity that you may have selected using the ' Access Rights ' and ' Protection Settings ' interface.       Activities To Monitor: Interprocess Memory Access - Malware programs use memory space modification to inject malicious code for numerous types of attacks, including recording your keyboard strokes; modifying the behavior of the invaded application; stealing confidential data...

http://help.comodo.com/topic-72-1-451-4760-HIPS-Behaviour-Settings.html
HIPS Behavior Settings (in Comodo Internet Security)

...disable monitoring of an activity, entity or object using this interface it completely switches off monitoring of that activity on a global basis - effectively creating a universal ' Allow ' rule for that activity . This 'Allow' setting over-rules any Ruleset specific 'Block' or 'Ask' setting for that activity that you may have selected using the ' Access Rights ' and ' Protection Settings ' interface.       Activities To Monitor: Interprocess Memory Access - Malware programs use memory space modification to inject malicious code for numerous types of attacks, including recording your keyboard strokes; modifying the behavior of the invaded application; stealing confidential data...

http://help.comodo.com/topic-72-1-522-6303-HIPS-Behavior-Settings.html
Pages 41 of 51 « Prev     Next »   Jump to page