ITSM

Comodo One. Understanding Devices in ITSM

Comodo One. Understanding Devices in ITSM How to implement “Bulk to installation package” in devices How to install custom MSI packages How to check all…

ITSM

Comodo One. Understanding Windows Profiles in ITSM

Comodo One. Understanding Windows Profiles in ITSM How to hide/show security client and communication client tray icons in devices How to define a list of…

Configuring device

Comodo One. Configuring profiles in ITSM

Comodo One. Configuring profiles in ITSM How to make a profile as default How to reuse a default profile How to use a profile for…

service desk

Comodo One. Understanding Service Desk

Comodo One. Understanding Service Desk How to add a user in staff panel How to create and use canned responses How to create FAQs and…

malware incidents

Alan Turing, undecidable problems, and malware

In 2003, Oxford University Philosophy Professor Nick Bostrom posed the following question: what if an artificial intelligence (AI) machine were given just one task: to…

Antivirus

The Importance of Prevention in Network Security

The adage ‘Prevention is better than cure’ holds true for all aspects of life and human activity. Thus, prevention is of great importance as regards…