COMODO Internet Security (CIS) to provide features special security even without the two "big" Kis BIS and are also not available. CIS does not slow the computer software the same function, only 3MB of RAM when running at the time.
During the installation, CIS will ask you to provide your email address and boot the machine to complete. Here are the components of the CIS:
1. Summary
Lists general information about the status of the CIS:
- System Status: current status of the entire system, if there's a red circle, you should quickly check the function of CIS is not active and must activate it immediately.
- Virus Defense: shows information about the database as well as the virus scan time. Click Enable to set the calendar options to update the data file will not be scanned if the volume that is ...
- Network Defense: firewall control connections to the outside (Outbound) and connections to external servers (Inbound). Default firewall level to Safe Mode, you can edit by clicking on the Safe Mode to change to another level.
- Traffic: list of processes are accessing the Internet and accounts for how much the bandwidth. Click on the corresponding process to check the traffic it has to download.
2. Antivirus
- Run a Scan: allows you to scan virus, Trojan, Malware in the entire hard disk.
- Quarantined Items: these processes are suspect virus will temporarily isolated here. You can restore (Restore) the process that sure is not a virus.
- View Antivirus Events: scanning process in real time, if the virus detected CIS will automatically kill or isolate it while a report on this event and save, you can check easily .
3. Firewall
- View Firewall Events: the same, besides CIS also give you more computer IP address in any unauthorized access to your computer.
- Define a New Trusted Application: to create a list of software you really sure is not a virus (but for some reason the CIS doubt it is a virus and block it).
- Define a New Blocked Application: Same as above.
- My Ports Set: This is a small utility to reset the modem port (for example open port) as you. If not free of the port, you should not use to this section.
4. Defense +
- My Protected Files: with this function you can set the file or folder of your status is secure, ensuring that no virus infection is to take to remove.
- My Pending Files: in the background running, CIS will check the file and put the suspect on the list "to moderate this. You need to check this file, if safety can select Remove, if found not to process how they choose Submit, CIS will send this file to the server to check and information to update Recent.
- My Trusted Software Vendor: create a list of software manufacturers believe in the database of the CIS, after this when you install software led the CIS will not make the questions require confirmation. Click "Add", select the path to the file or install file running in the process.
- My Protected Registry Keys: put the important courses or group courses (Start up, Internet Explorer, Important Key) in protected safety, to avoid viruses change this course.
Không có nhận xét nào:
Đăng nhận xét