![]() Check the Default Security Setting for this Secure Message Format.Ensure S/MIME is selected on the Secure Message Format box.Enter a name for your security setting into the Security Settings Name box.In dialog box that appears select Security tab.Please refer to the Comodo Dragon online help guide at for more details on using the browser.Assigning your Certificate to your email account: You can start the browser in two ways:Ĭlick Start > All Programs > Comodo > Dragon > Comodo Dragon:ĭouble Click on the Comodo Dragon Desktop icon created during the installation:Ĭomodo Dragon's intuitive multi-tabbed interface enables easy and fast access to sophisticated features of the browser. Prevents all Browser download tracking to ensure your privacyĬomodo Dragon is installed in your computer along with Comodo Internet Security 2012. Has Domain Validation technology that identifies and segregates superior SSL certificates from inferior ones Has privacy enhancements that surpass those in Chromium's technology Very easy to switch from your Browser to the Dragon Incognito Mode Stops Cookies, Improves Privacy ![]() Comodo Dragon gives you the complete compliment of features offered by Chromium with superior security and privacy. To help make your Internet browsing experience even safer, Comodo Dragon is installed in your computer as a part of Comodo Internet Security 2012. Windows 7 / Vista - Manually Enabling Or Disabling Comodo Secure DNS ServiceĬomodo Dragon is a fast and versatile Internet Browser based on Chromium and infused with Comodo's unparalleled level of security.Windows XP - Manually Enabling Or Disabling Comodo Secure DNS Service.Router - Manually Enabling Or Disabling Comodo Secure DNS Service.Suppressing CIS Alerts Temporarily While Playing Games.Switch Off Automatic Antivirus And Software Updates.Switching Between Complete CIS Suite And Individual Components (just AV Or FW).Disabling Defense+ And Sandboxing For Specific Files Selectively.Blocking Any Downloads Of A Specific File Type.Enabling File Sharing Applications Like BitTorrent And Emule.Submitting Quarantined Items To Comodo For Analysis.Restoring Incorrectly Quarantined Item(s).Running An Untrusted Program Inside Sandbox.Creating An Antivirus Scanning Schedule. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |