Defense+ Settings – In this section you can change various settings and make Proactive Protection to work according to the specific protection requirements of the computer.Ī perfectly balanced program for security on system and on web.Run this program in the Sandbox – Selective startup programs in the Sandbox. View Active Process List – View a list of processes currently running on your computer.Computer Security Policy – In this section you can configure different rules and setting of Proactive Defense.Unrecognized files – View the list of found files unidentified. As long as these files are not recognized as trusted by the user, they will be automatically isolated in the Sandbox.Trusted Files – Managing local database of safe executables user.View Defense+ Events – Viewing records events, alerts, and actions taken Proactive Protection. The whole activity of new, potentially dangerous programs will be carefully checked.Īntivirus and Firewall options are similar to previous version and self explanatory with the details given below title.īut now the most important is Proactive protection “Defense+” when configured properly, not a single application can harm your computer in any way. I want to note the scanning speed, now it took a half hour and 40 minutes. This is a local drive with 6 GB of space occupied by a set of executable files.įor a decent defense, we need to set all levels to the maximum, to create rules for all the applications you use regularly and continue to live in peace. It really has become more friendly for the inexperienced user, there is, as before, the ability to switch to Comodo DNS-server, which may help to expose the malicious domains.Īfter the installation program asks you restart, as in previous versions. After the reboot will auto-update antivirus signature database, then a complete system scan. Significantly reduced the number of alerts (popup) when activated firewall or Proactive. Depends on your setup, you can do to alerts pop up on every action of each program).Closed all previously discovered vulnerabilities associated with bypass virus pro-active protection.Fixed bugs such as crashes when scanning anti-virus files on a bad hard disk sectors, as fixed work firewall adapters Bluetooth PAN.Significant reduction in resources spent.Significant optimization of proactive protection for the operating systems on 圆4.Added subroutine COMODO ESM 2.0 Business Edition, which is used for remote administration systems.Greatly simplified the process of installing products.What’s new in COMODO Internet Security Pro 2012 Allows you to run suspicious executable files in a Sandbox.Protects against data theft, computer malfunctions and damage to the system.Proactive protection against viruses / trojans.Analyzes and filters incoming and outgoing traffic of your computer.Automatically makes your computer invisible to hackers.Repeatedly recognized as the winner of the independent contest Software this class.Automatically and daily updates of virus database.Provides continuous protection by scanning in real-time access to the system.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |