Comodo Internet Security User Guide

Total Page:16

File Type:pdf, Size:1020Kb

Comodo Internet Security User Guide Comodo IceDragon Software Version 49.0 User Guide Guide Version 49.0.011617 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Comodo IceDragon - User Guide Table of Contents 1. Comodo IceDragon – Introduction..........................................................................................................................4 2. System Requirements..............................................................................................................................................6 3. Downloading And Installing Comodo IceDragon..................................................................................................6 4. The Basics...............................................................................................................................................................11 4.1.Starting Comodo IceDragon..............................................................................................................................11 4.2.Setting IceDragon as your Default Browser......................................................................................................12 4.3.Setting up Your Homepage...............................................................................................................................13 4.4.Searching the Internet.......................................................................................................................................16 4.5.Changing Search Options ................................................................................................................................19 4.6.Customizing the Toolbar and the Menu.............................................................................................................27 4.7.Re-opening Recently and Most Visited Websites.............................................................................................30 4.8.Viewing Browsing History..................................................................................................................................31 4.9.Setting Fonts, Languages and Encoding..........................................................................................................34 4.10.Configuring IceDragon Updates......................................................................................................................38 4.11.Portable Version..............................................................................................................................................40 4.12.Uninstalling IceDragon....................................................................................................................................40 5. Tabbed Browsing....................................................................................................................................................44 5.1.Using Tabs........................................................................................................................................................44 5.2.Customizing Your 'New Tab' Page....................................................................................................................45 5.3.Tab Settings......................................................................................................................................................49 6. Bookmarks.............................................................................................................................................................53 6.1.Creating Bookmarks..........................................................................................................................................53 6.2.Finding and Editing Bookmarks........................................................................................................................54 6.3.Managing Bookmarks.......................................................................................................................................58 6.4.Bookmarks – Importing, Exporting and Backing up..........................................................................................61 7. Privacy And Security.............................................................................................................................................64 7.1.Private Browsing...............................................................................................................................................65 7.2.Deleting Browsing History and Configuring History Settings............................................................................67 7.3.Allowing/Blocking Pop-up Windows..................................................................................................................73 7.4.Managing Cookies............................................................................................................................................75 7.5.Blocking Websites from Tracking your Browsing Activities...............................................................................79 7.6.Configuring Suggestions while Entering Website Address...............................................................................80 7.7.Managing Cache...............................................................................................................................................82 7.8.Managing Automatic Installations of Add-ons and Blocking Insecure Add-ons................................................85 7.9.Managing Passwords........................................................................................................................................87 7.10.Configuring Advanced Settings.......................................................................................................................93 7.11.SSL Certificates and Secure Connections....................................................................................................101 7.12.Managing SSL Certificates and HTTPS Security..........................................................................................103 7.13.Force Secure Connections............................................................................................................................117 8. Downloads............................................................................................................................................................119 8.1.Downloading a File..........................................................................................................................................119 Comodo IceDragon User Guide | © 2017 Comodo Security Solutions Inc. | All rights reserved 2 Comodo IceDragon - User Guide 8.2.Changing Download Location.........................................................................................................................122 8.3.Viewing Download History..............................................................................................................................122 8.4.Clearing Download History..............................................................................................................................124 9.Introduction to Add-ons........................................................................................................................................128 9.1. Installing Add-ons...........................................................................................................................................130 9.1.1.Downloading and Installing Add-ons......................................................................................................130 9.1.2.Installing Add-ons from Local Storage....................................................................................................132 9.1.3.Configuring Updates to Add-ons............................................................................................................133 9.2.Managing Extensions......................................................................................................................................133 9.3.Customizing the Appearance of IceDragon....................................................................................................134 9.4.Managing Plugins............................................................................................................................................136 9.5.Managing Languages......................................................................................................................................137 9.6.Managing Services..........................................................................................................................................138 10. Tools and Other Features..................................................................................................................................141 10.1.Customizing Applications for Opening Different File Types..........................................................................142 10.2.Searching within Page Content.....................................................................................................................145 10.3.Form Autofill..................................................................................................................................................147 10.4.Keyboard and Mouse Shortcuts ...................................................................................................................149 10.5.Managing IceDragon in Safe
Recommended publications
  • Russia Technology Internet Local Dominance Strengthens
    12 December 2018 | 1:51AM MSK Russia Technology: Internet Local dominance strengthens; competition among ecosystems intensifies It’s been a year since we published Russia’s internet champions positioned to Vyacheslav Degtyarev +7(495)645-4010 | keep US giants at bay. We revisit our thesis, highlighting that the domestic internet [email protected] OOO Goldman Sachs Bank incumbents are successfully defending their home turf from international competition. We have seen only modest incremental efforts from global players, with some recognizing the importance of local expertise (Alibaba’s agreement to transfer control in AliExpress Russia to local partners) or conceding to domestic market leaders (Uber merged its Russian operations with Yandex.Taxi, citing Yandex’s strong technology and brand advantage). The two domestic market leaders, Yandex and Mail.ru, have solidified their dominant positions in search and social networks, respectively, and are leveraging these core businesses to exploit new sources of growth across their ecosystems (e.g. advertising, taxi, food tech, music). While their ever-expanding competitive overlap is worrying, we note this is not unique for global tech and is still relatively limited in scale. We expect the local dominance trend to continue and see significant untapped opportunities in e-commerce, messengers, local services, cloud and fintech. We re-iterate our Buy ratings on Yandex (on CEEMEA FL) and Mail.ru, and view them as the key beneficiaries of internet sector growth in Russia. We believe the market
    [Show full text]
  • Comparative Analysis of Yandex and Google Search Engines
    Anna Paananen Comparative Analysis of Yandex and Google Search Engines Helsinki Metropolia University of Applied Sciences Master’s Degree Information Technology Master’s Thesis 26 May 2012 PREFACE Working in NetBooster Finland as an International Project Manager specialized in Russian market I’ve been asked many times about differences between the search engines Yandex and Google. This Master’s Thesis is the outcome of my professional experience in the Search Engine Optimisation field in Russia and Finland. I would like to thank all the people from NetBooster Finland and Helsinki Metropolia University of Applied Sciences who has helped me in the development of the study. Special thanks to my instructors Timo-Pekka Jäntti and Ville Jääskeläinen for all the support, both in technical and non-technical matters. I would like to thank also my collegues from NetBooster Finland for their help and support while writing the thesis. Last but not least I would like to thank my mother Tamara Kapitonova, who always has been my prior motivator for the education, and of course to my lovely husband Jukka Paananen for his inconditional support and patience. Helsinki, May 26, 2012 Anna Paananen Author(s) Anna Paananen Title Comparative Analysis of Google and Yandex Search Engines Number of Pages 51 pages + 1 appendix Date 26 May 2012 Degree Master’s Degree Degree Programme Degree Programme in Information Technology Specialisation option Instructor Timo-Pekka Jäntti, Supervisor This thesis presents a comparative analysis of algorithms and information retrieval performance of two search engines: Yandex and Google in the Russian language. Comparing two search engines is usually done with user satisfaction studies and market share measures in addition to the basic comparison measures.
    [Show full text]
  • Final Study Report on CEF Automated Translation Value Proposition in the Context of the European LT Market/Ecosystem
    Final study report on CEF Automated Translation value proposition in the context of the European LT market/ecosystem FINAL REPORT A study prepared for the European Commission DG Communications Networks, Content & Technology by: Digital Single Market CEF AT value proposition in the context of the European LT market/ecosystem Final Study Report This study was carried out for the European Commission by Luc MEERTENS 2 Khalid CHOUKRI Stefania AGUZZI Andrejs VASILJEVS Internal identification Contract number: 2017/S 108-216374 SMART number: 2016/0103 DISCLAIMER By the European Commission, Directorate-General of Communications Networks, Content & Technology. The information and views set out in this publication are those of the author(s) and do not necessarily reflect the official opinion of the Commission. The Commission does not guarantee the accuracy of the data included in this study. Neither the Commission nor any person acting on the Commission’s behalf may be held responsible for the use which may be made of the information contained therein. ISBN 978-92-76-00783-8 doi: 10.2759/142151 © European Union, 2019. All rights reserved. Certain parts are licensed under conditions to the EU. Reproduction is authorised provided the source is acknowledged. 2 CEF AT value proposition in the context of the European LT market/ecosystem Final Study Report CONTENTS Table of figures ................................................................................................................................................ 7 List of tables ..................................................................................................................................................
    [Show full text]
  • A Survey of Collaborative Web Search Through Collaboration Among Search Engine Users to More Relevant Results
    A Survey of Collaborative Web Search Through Collaboration among Search Engine Users to More Relevant Results Pavel Surynek Faculty of Mathematics and Physics, Charles University in Prague, Malostranské náměstí 25, Prague, Czech Republic Keywords: Collaborative Web Search, Social Search, Search Engine, Search Results, Collaborative Filtering, Recommender Systems, System Integration. Abstract: A survey on collaborative aspects of web search is presented in this paper. Current state in full-text web search engines with regards on users collaboration is given. The position of the paper is that it is becoming increasingly important to learn from other users searches in a collaborative way in order to provide more relevant results and increase benefit from web search sessions. Recommender systems represent a rich source of concepts that could be employed to enable collaboration in web search. A discussion of techniques used in recommender systems is followed by a suggestion of integration web search with recommender sys- tems. An initial experience with web search powering small academic site is reported finally. 1 INTRODUCTION AND assumption that a series of queries characterize the effort of what the user want to find better than the MOTIVATION single query. The typical search engine however does not help in this effort – users are put into isola- Web search is an area of the information technology tion typically which precludes any cooperation and industry where artificial intelligence and particularly recommendation from other users based on past knowledge engineering techniques can be applied queries. To be honest, for instance the Bing search with potentially significant impacts. Currently users engine (more correctly the decision engine) uses face a still increasing amount of data of many kinds certain technology that provide search results based that can be accessed through web (textual data, mul- on user’s search history and geographical location.
    [Show full text]
  • Efficient Marketing Communications Towards Russian Customers. Case: Grande Orchidée Fashion Center
    Saimaa University of Applied Sciences Faculty of Business Administration, Lappeenranta Degree Programme in International Business Specialisation in International Business Bachelor's Thesis 2014 Ekaterina Evtikhevich Efficient Marketing Communications towards Russian Customers. Case: Grande Orchidée Fashion Center Bachelor's Thesis 2014 ABSTRACT Ekaterina Evtikhevich Efficient Marketing Communications towards Russian Customers. Case: Grande Orchidée Fashion Center, 47 pages, 2 appendices Saimaa University of Applied Sciences Faculty of Business Administration, Lappeenranta Degree Programme in International Business Specialisation in International Business Bachelor’s Thesis 2014 Instructor: Principal Lecturer Minna Ikävalko, Saimaa University of Applied Sciences The objective of this thesis was to research what are the most efficient market- ing communications of Grande Orchidée Fashion Center towards Russian customers. The focus was kept on individual customers who come regularly to do shopping in Lappeenranta. The theory part of this research work includes an examination of conventional theories of marketing communication tools and analysis of modern marketing in Russia. The empirical part was implemented by studying the current marketing com- munications of the company. The data collection methods included a semi structured interview with the CEO's assistant at the company and a customer survey. The outcomes showed the most efficient communication channels that can be utilized and that can positively contribute to the company's marketing
    [Show full text]
  • Analysis Report Blackenergy
    Analysis Report iTrust-Analysis-001 May 2016 BlackEnergy - Malware for Cyber-Physical Attacks About iTrust iTrust is a multidisciplinary research centre located in the Singapore University of Technology and Design (SUTD), established collaboratively by SUTD and the Ministry of Defence, Singapore (MINDEF). The focus of iTrust is on cyber security, spanning across three research areas: a. Cyber Physical System (CPS); b. Enterprise Networking / Security; and c. Internet of Things (IoT). iTrust researchers focus on the development of advanced tools and methodologies to ensure security and safety of current and future cyber physical systems and Internet of Things (IoT) systems. Systems of interest include large infrastructure of national importance such as power grid, water treatment, and oil refineries as well as cyber-devices such as smart watches, pacemakers, defibrillators, insulin pumps, and VNS implants. Cyber physical systems is one of the many areas we are working on. The focus of the proposed research is to improve our understanding of cyber threats to CPSs and to develop and experiment with strategies to mitigate such threats. Our approach is based on well understood technical foundations borrowed from the interdisciplinary fields of control theory, artificial intelligence, game theory, networking, and software engineering. The techniques propose will be evaluated against, and demonstrated in our Secure Water Treatment (SWaT) Testbed, Water Distribution System (WADI) testbed, and Electric Power and Intelligent Control (EPIC) testbed. Similarly, shielded room laboratory for IoT research. iTrust researchers are drawn from across SUTD and with a strong collaboration with Massachusetts Institute of Technology (MIT), enrich the depth, breadth, and quality of research.
    [Show full text]
  • Accelerating Development Using the Web: Empowering Poor and Marginalized Populations George Sadowsky, Ed
    Accelerating Development Using the Web: Empowering Poor and Marginalized Populations George Sadowsky, ed. George Sadowsky Najeeb Al-Shorbaji Richard Duncombe Torbjörn Fredriksson Alan Greenberg Nancy Hafkin Michael Jensen Shalini Kala Barbara J. Mack Nnenna Nwakanma Daniel Pimienta Tim Unwin Cynthia Waddell Raul Zambrano Cover image: Paul Butler http://paulbutler.org/archives/visualizing-facebook-friends/ Creative Commons License Attribution-ShareAlike 3.0 This work, with the exception of Chapter 7 (Health), is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/3.0/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA. Chapter 7 (Health) © World Health Organization [2012]. All rights reserved. The World Health Organization has granted the Publisher permission for the reproduction of this chapter. Accelerating Development Using the Web | Foreword from the Rockefeller Foundation i Foreword from the Rockefeller Foundation For almost 100 years, the Rockefeller Foundation has been at the forefront of new ideas and innovations related to emerging areas of technology. In its early years, the Foundation advanced new technologies to eradicate hookworm and develop a vaccine for yellow fever, creating a lasting legacy of strengthening the application of new technologies to improve the lives of the world’s poor and vulnerable. By the middle of the 20th century, this approach led the Foundation to the pre-cursor to the modern day comput- er. At the dawn of the digital era in 1956, the Foundation helped launch the field of artificial intelligence through its support for the work of John McCarthy, the computing visionary who coined the term.
    [Show full text]
  • Giant List of Web Browsers
    Giant List of Web Browsers The majority of the world uses a default or big tech browsers but there are many alternatives out there which may be a better choice. Take a look through our list & see if there is something you like the look of. All links open in new windows. Caveat emptor old friend & happy surfing. 1. 32bit https://www.electrasoft.com/32bw.htm 2. 360 Security https://browser.360.cn/se/en.html 3. Avant http://www.avantbrowser.com 4. Avast/SafeZone https://www.avast.com/en-us/secure-browser 5. Basilisk https://www.basilisk-browser.org 6. Bento https://bentobrowser.com 7. Bitty http://www.bitty.com 8. Blisk https://blisk.io 9. Brave https://brave.com 10. BriskBard https://www.briskbard.com 11. Chrome https://www.google.com/chrome 12. Chromium https://www.chromium.org/Home 13. Citrio http://citrio.com 14. Cliqz https://cliqz.com 15. C?c C?c https://coccoc.com 16. Comodo IceDragon https://www.comodo.com/home/browsers-toolbars/icedragon-browser.php 17. Comodo Dragon https://www.comodo.com/home/browsers-toolbars/browser.php 18. Coowon http://coowon.com 19. Crusta https://sourceforge.net/projects/crustabrowser 20. Dillo https://www.dillo.org 21. Dolphin http://dolphin.com 22. Dooble https://textbrowser.github.io/dooble 23. Edge https://www.microsoft.com/en-us/windows/microsoft-edge 24. ELinks http://elinks.or.cz 25. Epic https://www.epicbrowser.com 26. Epiphany https://projects-old.gnome.org/epiphany 27. Falkon https://www.falkon.org 28. Firefox https://www.mozilla.org/en-US/firefox/new 29.
    [Show full text]
  • The Competitiveness Analysis of the European Language Technology Market
    Proceedings of the 12th Conference on Language Resources and Evaluation (LREC 2020), pages 3381–3389 Marseille, 11–16 May 2020 c European Language Resources Association (ELRA), licensed under CC-BY-NC The Competitiveness Analysis of the European Language Technology Market Andrejs Vasiļjevs, Inguna Skadiņa, Indra Sāmīte, Kaspars Kauliņš, Ēriks Ajausks, Jūlija Meļņika and Aivars Bērziņš Tilde Vienibas gatve 75a, Riga, Latvia {fistname.lastname}@tilde.lv Abstract This paper presents the key results of a study on the global competitiveness of the European Language Technology market for three areas – machine translation, speech technology, and cross-lingual search. EU competitiveness is analyzed in comparison to North America and Asia. The study focuses on seven dimensions (research, innovations, investments, market dominance, industry, infrastructure, and Open Data) that have been selected to characterize the language technology market. The study concludes that while Europe still has strong positions in Research and Innovation, it lags behind North America and Asia in scaling innovations and conquering market share. Keywords: competitiveness analysis, language technology market, machine translation, speech technology, cross-lingual search search technologies are covered in more detail, while only 1. Introduction the essence is included for machine translation because it has already been discussed by Vasiljevs et al. (2019b). This paper provides the key results of the competitiveness analysis of the European Language Technology (LT) market
    [Show full text]
  • Ant Download Manager (Antdm) V.2.3.2
    English Ant Download Manager (AntDM) v.2.4.0 Some of the contents in this manual may differ from the software, as software development continues. User Guide 2021 Table of Contents Overview ....................................................................................................................................................4 System Requirements .........................................................................................................................5 Installation ..................................................................................................................................................6 Uninstall .............................................................................................................................................11 Premium Link Generators (Debrids) .......................................................................................................12 Torrents ....................................................................................................................................................14 Browser Integration ..................................................................................................................................15 Google Chrome .................................................................................................................................16 Chromium Clones ........................................................................................................................17 Mozilla Firefox ....................................................................................................................................18
    [Show full text]
  • Internet Security 6.3 Software Version 6.3
    Comodo Internet Security 6.3 Software Version 6.3 User Guide Guide Version 6.3.111114 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 United States Comodo Internet Security 6.3 - User Guide Table of Contents 1.Introduction to Comodo Internet Security...............................................................................................................................6 1.1.Special Features...............................................................................................................................................................10 1.2.System Requirements.......................................................................................................................................................13 1.3.Installation.........................................................................................................................................................................13 1.3.1.CIS Premium - Installation........................................................................................................................................14 1.3.2.CIS Pro - Installation and Activation.........................................................................................................................27 1.3.3.CIS Complete - Installation and Activation...............................................................................................................39 1.3.4.Activating CIS Pro/Complete Services after Installation...........................................................................................52
    [Show full text]
  • Comodo Certificate Manager
    Comodo Certificate Manager Client Certificate End User Guide Comodo CA Limited 3rd Floor, 26 Office Village, Exchange Quay, Trafford Road, Salford, Greater Manchester M5 3EQ, United Kingdom. Comodo Certificate Manager - Client Certificate End User Guide Introduction This step by step guide will explain how to enroll for and download your client certificate. Step 1 - Enrollment and Collection of Your Client Certificate Firstly, your administrator should have sent you a provisioning email. The exact procedure to follow will depend on the type of email you have received: Enrollment Mails (2 0ptions): Invitation Mail: • Click here if your email contains an Access • Click here if your email contains a Request Code Code and a Validation Link OR • Click here if your email contains a Secret ID Invitation Email Enrollment Type Email Enrollment by Access Code • Click the URL in the email to visit the certificate enrollment page. • Copy and paste the Access code from your enrollment email. • Type your full name in the Name Field. • Type your internal corporate E-mail address in the 'E-Mail' field. • Enter your password phrase. This phrase is needed to revoke the certificate should the situation arise. • In addition to the standard fields in the enrollment form, additional custom fields such as 'Telephone No.' 'Employee Code' may also be displayed depending on how the administrator has configured it. • Read the License Agreement and check the box alongside the 'I accept terms and conditions'. Note: If you decline the agreement you will not be able to continue the enrollment process. Comodo Certificate Manager - Client Certificate End User Guide | © 2017 Comodo CA Limited | All rights reserved 2 Comodo Certificate Manager - Client Certificate End User Guide • Click the 'Submit' button.
    [Show full text]