help.comodo.com

Website:http://help.comodo.com
Upvotes received0
Downvotes received0
Karma:0 (upvotes-downvotes)



0 earned Badges

No badges were found



Definitions (11)

1

0 Thumbs up   0 Thumbs down

adware


Adware is software which displays advertising content that is unwanted by users and is often installed without their explicit consent as part of another piece of software. Examples of Adware behavior [..]
Source: help.comodo.com

2

0 Thumbs up   0 Thumbs down

antivirus scan


An audit performed by an antivirus application in order to detect malware and viruses in the file system and/or memory of a computer.   Back to index   ARP
Source: help.comodo.com

3

0 Thumbs up   0 Thumbs down

behavior analysis


An activity performed by CIS to determine whether an unknown application in the sandbox is malicious or not. Unknown files are analyzed by Comodo Cloud Scanners and Comodo's Instant Malware Analy [..]
Source: help.comodo.com

4

0 Thumbs up   0 Thumbs down

computer network


A computer network is a connection between computers through a cable or some type of wireless connection. It enables users to share information and devices between computers and other users within the [..]
Source: help.comodo.com

5

0 Thumbs up   0 Thumbs down

false positive


  When an antivirus scan is run and the scanner reports that some programs are infected with malware which may not be the actual case and the files are safe. This kind of false alert is called 'F [..]
Source: help.comodo.com

6

0 Thumbs up   0 Thumbs down

network zone


A Network Zone can consist of an individual machine (including a single home computer connected to Internet) or a network of thousands of machines to which access can be granted or denied. The creatio [..]
Source: help.comodo.com

7

0 Thumbs up   0 Thumbs down

q


Quarantined Files
Source: help.comodo.com

8

0 Thumbs up   0 Thumbs down

spyware


Spyware is a program that performs certain actions without the consent of the user such as displaying advertisements, collecting personal and sensitive information and changing the configuration of th [..]
Source: help.comodo.com

9

0 Thumbs up   0 Thumbs down

stealth port


Port Stealthing is a security technique whereby ports on an Internet connected PC are hidden so that they provide no response to a remote port scan.   A computer sends and receives data to other compu [..]
Source: help.comodo.com

10

0 Thumbs up   0 Thumbs down

trusted files


In Comodo Internet Security, a trusted file is one that is considered safe and is allowed to run on a user's computer. This type of file can also be referred to as a 'safe' file or a &# [..]
Source: help.comodo.com


To view all 11 definitions, please sign in.