Showing 481-490 from 547
...Stateful mode; Seamless integration into the Windows operating system allows scanning specific objects 'on the fly'; Daily, automatic updates of virus definitions; Isolates suspicious files in quarantine preventing further infection; Built in scheduler allows you to run scans at a time that suits you; Simple to use - install it and forget it - Comodo AV protects you in the background. Intuitive...
http://help.comodo.com/topic-72-1-522-6222-Special-Features.html...stated below: Windows 8 / 8.1 (32-bit and 64-bit versions) Windows 7 (32-bit and 64-bit versions) Windows Vista (32-bit and 64-bit versions) 384 MB available RAM 210 MB hard disk space for both 32-bit and 64-bit versions Internet Explorer Version 5.1 or above Windows XP (32-bit and 64-bit versions...
http://help.comodo.com/topic-72-1-522-6223-System-Requirements.html...state of enabled. Advanced users wishing to gain greater insight into CIS actions and/or to have more control over security decisions may wish to disable this option. Choosing Installation Location Click the 'Files Locations' tab to choose the installation path. This screen allows you to select the folder in your hard drive for installing Comodo Internet Security. The default path...
http://help.comodo.com/topic-72-1-522-6228-CIS-Premium-–-Installation.html...state of enabled. Advanced users wishing to gain greater insight into CIS actions and/or to have more control over security decisions may wish to disable this option. Choose the Installation Location Click the 'Files Locations' tab to choose the installation path. This screen allows you to select the folder in your hard drive for installing Comodo Internet Security . The default...
http://help.comodo.com/topic-72-1-522-6229-CIS-Pro---Installation-and-Activation.html...state of enabled. Advanced users wishing to gain greater insight into CIS actions and/or to have more control over security decisions may wish to disable this option. Choosing Installation Location Click the 'Files Locations' tab to choose the installation path. This interface allows you to set the installation folder for Comodo Internet Security . The default path is C:Program FilesCOMODOCOMODO...
http://help.comodo.com/topic-72-1-522-6230-CIS-Complete---Installation-and-Activation.html...Stateful' and 'Disabled'. Refer to the section ' Real-time Scanner Setting s ' for more details. Click ' Antivirus ' at upper-left to open the 'Realtime Scanner Settings' interface. Refer to the section ' Real-time Scanner Settings ' for more details. Click the number of threats detected to open the Antivirus Log Viewer Module . Click the 'X' in the top right...
http://help.comodo.com/topic-72-1-522-6239-The-Home-Screen.html...States) ). Show messages from COMODO Message Center – If enabled, Comodo Message Center messages will periodically appear to keep you abreast of news in the Comodo world. They contain news about product updates, occasional requests for feedback, info about other Comodo products you may be interested to try and other general news. (Default = Enabled). Show notification messages - These are the CIS system...
http://help.comodo.com/topic-72-1-522-6292-Customize-User-Interface.html...Stateful', both the settings will be enabled and on choosing 'On Access', only 'Enable Realtime Scan' will be enabled. Detection Settings Run cache builder when computer is idle - CIS runs the Antivirus Cache Builder when the computer is idle, to boost the real-time scanning. If you do not want the Cache Builder to run, deselect this option...
http://help.comodo.com/topic-72-1-522-6300-Real-time-Scanner-Settings.html...state. Turn off computer if no threats are found at the end of the scan - Selecting this option turns your computer off, if no threats are found during the scan. This is useful when you are scheduling the scans to run at nights. Click OK to save the profile. Note: The schedule scan will run only if it is enabled...
http://help.comodo.com/topic-72-1-522-6350-Create-an-Antivirus-Scanning-Schedule.html...state changes and network activity will be recorded. If these behaviors are found to be malicious then the signature of the executable is automatically added to the antivirus black list. If no malicious behavior is recorded then the file is placed into 'Unrecognized Files' and will be submitted to our technicians for further checks. Note: Behavior Analysis can identify malicious...
http://help.comodo.com/topic-72-1-522-6372-Unknown-Files---The-Auto---Sandboxing-and-Scanning-Processes.html