Showing 41-50 from 101
...Internet Security to raise pop-up alerts in every event of a possible buffer overflow attack. You can allow or deny the requested activity raised by the process under execution depending on the reliability of the software and it's vendor. Click here for more details on the alerts. Comodo recommends users leave this setting enabled (Default = Enabled). To exclude some of the file types from being monitored under Detect Shellcode injections. 1. Click on the 'Exclusions' button. 2. Click 'Add' to include file groups or processes to the Exclusions list. Click here for an outline...
http://help.comodo.com/topic-72-1-284-3037-Execution-Control-Settings.html...Remove'. Next time you execute this application it will run outside of the sandbox . (presuming it is not then detected as malicious or automatically sandboxed as per the sandboxing process ) To remove invalid entries (programs/files that are not present or uninstalled from your computer) automatically, click 'Purge'. Comodo Internet Security User Guide | © 2012 Comodo Security Solutions Inc. | All rights reserved...
http://help.comodo.com/topic-72-1-284-3029-Always-Sandbox.html...COMODO - Internet Security configuration. Right-click 'PasswordEnabled' key and select 'Modify' In the 'Edit DWORD Value dialog box, change the 'Value data' from 1 to 0 Click 'OK' Right-click 'PasswordHash' and select 'Delete' Restart the system for the changes to take effect Now you should be able to access all settings, uninstall CIS and set a new password. Note...
http://help.comodo.com/topic-72-1-284-3063-How-to-Reset-Forgotten-Password-(Advanced).html...Internet Security. The CIS software itself is identical for all customers regardless of the package type. All versions include all security features, technologies and updates. The difference between the package types is additional services such as TrustConnect, Cloud Backup and the Comodo Guarantee. Activation of additional services is carried out after the base installation is complete. Please ensure you have first uninstalled...
http://help.comodo.com/topic-72-1-772-9552-CIS-Installation.html... Install Comodo Client Security You can use the Endpoint Manager (EM) interface to deploy Comodo Client Security (CCS) to your endpoints. You can purchase EM as stand-alone application or as a part of the Comodo Dragon/C1 platforms. Dragon / C1 Dragon - Sign up for Dragon at https://platform.comodo.com/signup Comodo One - Customers who already purchased Advanced Endpoint Protection (AEP...
http://help.comodo.com/topic-399-1-904-11744-Install-Comodo-Client-Security.html...uninstalled any other antivirus products, including Comodo CIS/CES. Failure to remove other AV products could lead to conflicts which cause CCAV to function incorrectly. We advise users consult their vendor documentation for help to remove specific programs. However, the following steps should help most Windows users: Click the Windows 'Start' button Select 'Control Panel' > 'Programs and Features' ( Win 10 , Win 8, Win 7, Vista), or 'Control Panel' > 'Add or Remove Programs' (XP) Select your current antivirus program(s) from the list Click 'Remove/Uninstall' Repeat the process until all required programs have been removed Installation Download and install Comodo...
http://help.comodo.com/topic-394-1-767-9216-Installation.html...Secure Web Gateway Click 'Administration' > 'Traffic Forwarding' > 'SWG Agent Configuration' Comodo SWG can protect roaming users who are outside a fixed network. This is especially useful for users on the move like field sales teams. It is also useful for remote workers who access the internet from outside your network. You must install the roaming agent on a device to connect it to SWG protection. This is because the device will use dynamic IP addresses. Once installed, any policies defined for 'Roaming users' will be applied to the device. If none are defined then the default 'Global...
http://help.comodo.com/topic-436-1-842-10959-Connect-your-Roaming-Devices-to-Comodo-Secure-Web-Gateway.html...GeekBuddy is included with CIS Pro, Complete and CIS Premium. The GeekBuddy section of this guide is broken down into the following sections: Overview of the Services Launching the Client and Using the Service Accepting Remote Desktop Requests Registration Activation of Service Uninstalling Comodo GeekBuddy Comodo Internet Security User Guide | © 2012 Comodo Security Solutions Inc. | All rights reserved ...
http://help.comodo.com/topic-72-1-284-2947-Comodo-GeekBuddy.html...Files list Select the entry and click 'Remove' button. The file is only removed from the list and not deleted from your system. To remove invalid entries (programs / files that are not present or uninstalled from your computer) automatically Select the entry and click 'Purge' button. Comodo Internet Security User Guide | © 2012 Comodo Security Solutions Inc. | All rights reserved...
http://help.comodo.com/topic-72-1-284-2976-Trusted-Files.html...Security Indicators Adobe Flash Player Storage Settings Cloud Print Settings Troubleshooting Errors and Crashes in Comodo Dragon Display Problems in Comodo Dragon Report a Bug Uninstalling Comodo Dragon The Basics This section of the guide explains how to launch, configure and use Comodo Dragon to its full potential. Learn More Start Comodo Dragon Web Browser View Browsing History Configure Pop-ups See All Tabbed Browsing How to use and customize tabs when browsing the internet...
http://help.comodo.com/topic-120-1-279-2524-Comodo-Dragon-Web-Browser---Introduction.html