Showing 71-80 from 91
... Running Browsers Inside the Virtual Kiosk This page explains you on how to run your browser inside the Virtual Kiosk, especially when you plan to visit bank websites, perform online banking and online shopping. Furthermore, the Virtual Keyboard allows you to securely enter user-names, credit card numbers and passwords without fear of key-logging software recording your physical...
http://help.comodo.com/topic-72-1-451-5142-Running-Browsers-Inside-the-Virtual-Kiosk.html... Run Browsers Inside the Virtual Desktop The Virtual Desktop provides an extremely secure environment for Internet related activities because it isolates your browser from the rest of your computer. Just by visiting them, malicious websites can install viruses malware, rootkits and spyware onto your computer that can allow hackers to steal confidential information. Surfing the 'net inside the virtual...
http://help.comodo.com/topic-72-1-522-6354-Run-Browsers-Inside-the-Virtual-Desktop.html... Run Browsers Inside the Virtual Desktop The Virtual Desktop provides an extremely secure environment for Internet related activities because it isolates your browser from the rest of your computer. Just by visiting them, malicious websites can install viruses malware, rootkits and spyware onto your computer that can allow hackers to steal confidential information. Surfing the 'net inside the virtual...
http://help.comodo.com/topic-72-1-623-7661-Run-Browsers-Inside-the-Virtual-Desktop.html... Running Browsers Inside the Virtual Desktop The Virtual Desktop provides an extremely secure environment for Internet related activities because it isolates your browser from the rest of your computer. Just by visiting them, malicious websites can install viruses malware, rootkits and spyware onto your computer that can allow hackers to steal confidential information. Surfing the 'net from inside the virtual...
http://help.comodo.com/topic-72-1-623-7713-Running-Browsers-Inside-the-Virtual-Desktop.html... Run Browsers In the Virtual Desktop The 'Virtual Desktop' provides an extremely secure environment for internet related activities because it isolates your browser from the rest of your computer. Just by visiting them, malicious websites can install malware onto your computer that can allow hackers to steal confidential information. Surfing the internet from inside the virtual desktop removes this threat...
http://help.comodo.com/topic-72-1-766-9092-Run-Browsers-In-the-Virtual-Desktop.html... Run Browsers Inside the Virtual Desktop Click 'Tasks' > 'Containment Tasks' > 'Run Virtual Desktop' The virtual desktop provides an extremely secure environment for internet related activities because it isolates your browser from the rest of your computer. Just by visiting them, malicious websites can install viruses malware, rootkits and spyware on your computer. Surfing from the virtual desktop removes...
http://help.comodo.com/topic-72-1-766-9128-Run-Browsers-Inside-the-Virtual-Desktop.html...shared memory, ( /dev/shm/ ). Mounted on The mount point of the partition. Size The total size of the partition. Used Used space in the disk Free Free Space in the disk Percentage The usage of the disk space in percentage The used space in partitions that store the data and the logs grow over time. It is recommended to ensure that...
http://help.comodo.com/topic-451-1-936-12778-System-Status.html...Sharing the data gathered by CertSentry with other CA's and major browser providers will, we hope, provide organizations like the Certificate Authority/Browser (CA/B) forum with the information they need to implement a viable, long term strategy regarding certificate revocation checks. Key functionality and features: Once installed, CertSentry will become the default SSL certificate revocation provider for Windows. The host application loads censentry.dll into its process space...
http://help.comodo.com/topic-120-1-279-4652-CertSentry-.html...shared by a group of clients by entering the '%' symbol at the end. For example, 10.10.0.% will cover all clients in the subnet 10.10.0.0/24. Can Create Tickets (XML/JSONE/EMAIL): If enabled, clients can create and submit tickets using XML/JSONE scripts. Can Execute Cron: If enabled, Service Desk allows external schedulers to run (Linux crontab) for various tasks. The external scheduler can only be set by system administrators at the time of Service Desk installation. Admin Notes: Add any additional informational about the key. For example, you could use this space...
http://help.comodo.com/topic-289-1-625-7870-API-Keys.html...shared by a group of clients by entering the '%' symbol at the end. For example, 10.10.0.% will cover all clients in the subnet 10.10.0.0/24. Can Create Tickets (XML/JSONE/EMAIL): If enabled, clients can create and submit tickets using XML/JSONE scripts. Can Execute Cron: If enabled, Service Desk allows external schedulers to run (Linux crontab) for various tasks. The external scheduler can only be set by system administrators at the time of Service Desk installation. Admin Notes: Add any additional informational about the key. For example, you could use this space...
http://help.comodo.com/topic-457-1-990-14507-API-Keys.html