Search Results

Showing 71-80 from 91

Running Browsers Inside The Virtual Kiosk (in Comodo Internet Security)

... Running Browsers Inside the Virtual Kiosk   This page explains you on how to run your browser inside the Virtual Kiosk, especially when you plan to visit bank websites, perform online banking and online shopping. Furthermore, the Virtual Keyboard allows you to securely enter user-names, credit card numbers and passwords without fear of key-logging software recording your physical...

http://help.comodo.com/topic-72-1-451-5142-Running-Browsers-Inside-the-Virtual-Kiosk.html
Run Browsers Inside The Virtual Desktop (in Comodo Internet Security)

... Run Browsers Inside the Virtual Desktop   The Virtual Desktop provides an extremely secure environment for Internet related activities because it isolates your browser from the rest of your computer. Just by visiting them, malicious websites can install viruses malware, rootkits and spyware onto your computer that can allow hackers to steal confidential information. Surfing the 'net inside the virtual...

http://help.comodo.com/topic-72-1-522-6354-Run-Browsers-Inside-the-Virtual-Desktop.html
Run Browsers Inside The Virtual Desktop (in Comodo Internet Security)

... Run Browsers Inside the Virtual Desktop   The Virtual Desktop provides an extremely secure environment for Internet related activities because it isolates your browser from the rest of your computer. Just by visiting them, malicious websites can install viruses malware, rootkits and spyware onto your computer that can allow hackers to steal confidential information. Surfing the 'net inside the virtual...

http://help.comodo.com/topic-72-1-623-7661-Run-Browsers-Inside-the-Virtual-Desktop.html
Running Browsers Inside The Virtual Desktop (in Comodo Internet Security)

... Running Browsers Inside the Virtual Desktop The Virtual Desktop provides an extremely secure environment for Internet related activities because it isolates your browser from the rest of your computer. Just by visiting them, malicious websites can install viruses malware, rootkits and spyware onto your computer that can allow hackers to steal confidential information. Surfing the 'net from inside the virtual...

http://help.comodo.com/topic-72-1-623-7713-Running-Browsers-Inside-the-Virtual-Desktop.html
Run Browsers In The Virtual Desktop (in Comodo Internet Security)

... Run Browsers In the Virtual Desktop The 'Virtual Desktop' provides an extremely secure environment for internet related activities because it isolates your browser from the rest of your computer. Just by visiting them, malicious websites can install malware onto your computer that can allow hackers to steal confidential information. Surfing the internet from inside the virtual desktop removes this threat...

http://help.comodo.com/topic-72-1-766-9092-Run-Browsers-In-the-Virtual-Desktop.html
Run Browsers Inside The Virtual Desktop (in Comodo Internet Security)

... Run Browsers Inside the Virtual Desktop Click 'Tasks' > 'Containment Tasks' > 'Run Virtual Desktop' The virtual desktop provides an extremely secure environment for internet related activities because it isolates your browser from the rest of your computer. Just by visiting them, malicious websites can install viruses malware, rootkits and spyware on your computer. Surfing from the virtual desktop removes...

http://help.comodo.com/topic-72-1-766-9128-Run-Browsers-Inside-the-Virtual-Desktop.html
System Status (in Comodo Dome Firewall)

...shared memory, ( /dev/shm/ ). Mounted on The mount point of the partition. Size The total size of the partition. Used Used space in the disk Free Free Space in the disk Percentage The usage of the disk space in percentage The used space in partitions that store the data and the logs grow over time. It is recommended to ensure that...

http://help.comodo.com/topic-451-1-936-12778-System-Status.html
CertSentry (in Comodo Dragon Web Browser)

...Sharing the data gathered by CertSentry with other CA's and major browser providers will, we hope, provide organizations like the Certificate Authority/Browser (CA/B) forum with the information they need to implement a viable, long term strategy regarding certificate revocation checks. Key functionality and features: Once installed, CertSentry will become the default SSL certificate revocation provider for Windows. The host application loads censentry.dll into its process space...

http://help.comodo.com/topic-120-1-279-4652-CertSentry-.html
API Keys (in Comodo One MSP)

...shared by a group of clients by entering the '%' symbol at the end. For example, 10.10.0.% will cover all clients in the subnet 10.10.0.0/24. Can Create Tickets (XML/JSONE/EMAIL): If enabled, clients can create and submit tickets using XML/JSONE scripts. Can Execute Cron: If enabled, Service Desk allows external schedulers to run (Linux crontab) for various tasks. The external scheduler can only be set by system administrators at the time of Service Desk installation. Admin Notes: Add any additional informational about the key. For example, you could use this space...

http://help.comodo.com/topic-289-1-625-7870-API-Keys.html
API Keys (in Xcitium Platform)

...shared by a group of clients by entering the '%' symbol at the end. For example, 10.10.0.% will cover all clients in the subnet 10.10.0.0/24. Can Create Tickets (XML/JSONE/EMAIL): If enabled, clients can create and submit tickets using XML/JSONE scripts. Can Execute Cron: If enabled, Service Desk allows external schedulers to run (Linux crontab) for various tasks. The external scheduler can only be set by system administrators at the time of Service Desk installation. Admin Notes: Add any additional informational about the key. For example, you could use this space...

http://help.comodo.com/topic-457-1-990-14507-API-Keys.html
Pages 8 of 10 « Prev     Next »   Jump to page