Network Security

The Importance of Prevention in Network Security

The adage ‘Prevention is better than cure’ holds true for all aspects of life and human activity. Thus, prevention is of great importance as regards network security as well. We do have the know-how today to set things right, as…

Yahoo breach

Cybercrime on a Colossal Scale

Surely there are very few in the US, or among Internet-connected citizens elsewhere, who are not aware of the massive security breach suffered by Yahoo in 2013, but only recently acknowledged by the company. And it is really not as…

Comodo ONE

Comodo One. Understanding monitors in ITSM

Comodo One. Understanding monitors in ITSM What is ‘Monitoring’ in ITSM profiles How to configure ‘Monitors’ in profiles How to check monitoring logs How to monitor CPU/RAM/Network performance in devices How to Monitor Processes in devices How to Monitor Events…

Comodo ONE

Comodo One. Understanding Procedures

Comodo One. Understanding Procedures How to create and run script procedure in devices How to schedule the procedure using profiles How to create and run script procedure in devices Comodo python procedures are available in ‘Predefined Procedures’ Folder. Additionally, ITSM…

Best Endpoint Protection Software

How To Choose Best Endpoint Protection Software for Business

Endpoint security is of prime importance today; we see lots of endpoint devices getting connected to enterprise networks, thereby increasing the chances of hacks and data breaches. Thus, it’s important that enterprises choose the best endpoint protection software for the…

zero day exploits

Mozilla, Tor Release Patches to Block Active Zero Day Exploits

Mozilla and Tor recently released patches for the Firefox browser as well as the Firefox-based Tor browser aiming to block a recent attack. This attack exploited a Firefox animation remote code execution flaw to unmask users of the Tor anonymity…

Comodo ONE

Comodo One. Configuring alerts in ITSM

Comodo One. Configuring alerts in ITSM How to configure alerts How to create an automated alert ticket in Service desk using ‘Monitoring’ How to configure auto-remediation (fix) procedure if alert triggered from any monitor How to configure alerts You can…

android security

Comodo Threat Research Labs Warns Android Users of “Tordow v2.0” outbreak

In late November 2016, Comodo Threat Research Labs discovered samples of the Android malware “Tordow v2.0” affecting clients in Russia. Tordow is the first mobile banking Trojan for the Android operating system that seeks to gain root privileges on infected…

Comodo ONE

Comodo One. Takeover remote endpoints using ITSM

ITSM’s ‘Takeover’ feature allows administrators to remotely access and control Windows devices to solve issues, install third party software and perform system maintenance. To take over a device: Open ITSM then click ‘Devices’ > ‘Device List’ and select your target…

Comodo ONE

Comodo One. The Ins and Outs of Patch Management using Comodo ITSM

How to check patch status and deploy selected patches to devices How to deploy patches from the ‘Patch Management’ interface How to add a patching schedule to a profile (including best practices) How to manually run a patch procedure on…

Page 1 of 5612345...102030...Last »