Podnova Player  Windows library  Podnova home
License: All
Sort by: Relevance

Comodo firewall truecrypt in Title/Summary

COMODO Firewall Pro

COMODO Firewall Pro

Comodo Firewall Pro introduces the next evolution in computer security: Default Deny Protection (DDP™). What is DDP? Most security programs maintain a list of known malware, and use that list to decide which applications and files shouldn't access a PC.

  • Publisher: Comodo Group
  • Home page: www.comodo.com
  • Last updated: March 28th, 2012
Comodo Firewall

Comodo Firewall

Comodo Firewall is a program that keeps you updated on all suspicious files. The program contains a prevention-based technology that stops viruses and it offers you automatic updates for the most current protection. It analyzes programs or connections and it identifies the safety level, accurately deciding if it should be allowed to run or if it represents a danger.

  • Publisher: Comodo Group, Inc.
  • Home page: www.comodo.com
  • Last updated: July 12th, 2021
COMODO Internet Security

COMODO Internet Security

Comodo Internet Security combines the award-winning Comodo Firewall and Antivirus software in one easy-to-install suite. More than 10 million PC users around the world rely on Comodo. Free.

  • Publisher: Comodo Security Solutions, Inc.
  • Home page: www.comodo.com
  • Last updated: December 29th, 2022

Comodo firewall truecrypt in Description

COMODO Memory Firewall

COMODO Memory Firewall

Free Comodo Memory Firewall protects against data theft, computer crashes and system damage by preventing buffer overflow attacks. It protects your system by detecting suspicious code executions in the stack or heap section of your computer memory

  • Publisher: Comodo Group
  • Last updated: March 3rd, 2008
COMODO Client - Security

COMODO Client - Security

Comodo Client Security (CCS) offers protection against internal and external threats through a combination of an antivirus, packet filtering firewall, and a host intrusion prevention system. Once installed on a Windows endpoint, CCS can be remotely configured and monitored from the Comodo IT and Security Manager console.

  • Publisher: COMODO Security Solutions Inc.
  • Last updated: June 28th, 2021
Verification Engine

Verification Engine

Verification Engine is a web browser security and verification add-on. Developed by Comodo, Verification Engine installs into your system and your installed web browsers. It verifies the websites that you visit and subtly tells you whether they have been verified by Comodo and deemed safe for you to visit. The application does so in a rather unorthodox fashion.

  • Publisher: Comodo Inc
  • Last updated: February 13th, 2010
Comodo Dragon Password Recovery

Comodo Dragon Password Recovery

With this program you can instantly retrieve the login and password information user accounts stored in Comodo Dragon web browser. The program allows you to recover stored passwords of Comodo Dragon, decrypt passwords directly from Comodo Dragon registry, recover password from services like (gmail, facebook, twitter, hotmail, hi5 and others) instantly when they are stored in the system.

  • Publisher: XaviWare Software Ltda.
  • Last updated: August 25th, 2022
TruPax

TruPax

TruPax generates container files from arbitrary sets of files and folders. Such files match exactly the size of the contained material and can be mounted by TrueCrypt, but also directly extracted using TruPax itself. This program also wipes files after container generation, or just as a separate action. You can invalidate any TrueCrypt container with it very quickly.

  • Publisher: CODERSLAGOON
  • Last updated: May 14th, 2014

Additional Comodo firewall truecrypt selection

Comodo Dragon Internet Browser

Comodo Dragon Internet Browser

Comodo Dragon Internet Browser is built-upon the Chromium source code. It encompasses all the functions of Chrome, along with additional tools, security features, and performance enhancements. You get a browser with integrated social media programs, DNS service, and malware scanning.

  • Publisher: Comodo Group, Inc.
  • Last updated: July 28th, 2020
TrueCrypt

TrueCrypt

TrueCrypt is a utility that enables users to encrypt a disk within a file in order to protect the information stored on that specific disk. The encryption process is a virtual one and it does not affect the functionality of the encrypted disk. You can automatically mount and dismount drives.

  • Publisher: TrueCrypt Foundation
  • Home page: www.truecrypt.org
  • Last updated: July 6th, 2020
COMODO Endpoint Security Manager

COMODO Endpoint Security Manager

Comodo's security solutions help your business realize substantial cost savings and operational efficiencies. Individually, each product delivers superior protection against its specific threat vector. When used as a coordinated solution they provide a level of total network security that is unrivaled in the industry.

  • Publisher: Comodo Group, Inc.
  • Home page: www.comodo.com
  • Last updated: September 8th, 2012
Comodo IceDragon

Comodo IceDragon

Comodo IceDragon is a Firefox-based web browser with additional privacy and performance enhancements. It also has features such as SiteInspector malware scanning, Comodo Secure DNS, and improved social media functionality. IceDragon is fully compatible with Firefox plug-ins and extensions.

  • Publisher: Comodo Security Solutions, Inc.
  • Last updated: April 12th, 2019
Microsoft Firewall Client

Microsoft Firewall Client

By means of provided features you can configure automatic discovery for Firewall client computers and set automatic settings and Web browser settings on the client computer. It give the possibility to test the availability of ISA Server and print out of Firewall client configuration settings. This enables you to create a firewall policy in the organization.

  • Publisher: Microsoft Corporation
  • Last updated: March 1st, 2008
Comodo AntiVirus

Comodo AntiVirus

This is an anti-virus program that protects your computer from viruses and spyware. This program is cloud-based, which improves the detection capabilities. It protects the essential Windows DLLs, drivers, and other executable files from being modified. HIPS Heuristics attempts to find unknown viruses, by monitoring the behavior of suspect programs.

  • Publisher: Comodo Security Solutions, Inc.
  • Home page: www.comodo.com
  • Last updated: June 16th, 2021
HandyCafe Firewall & Filtering Software

HandyCafe Firewall & Filtering Software

HandyCafe Firewall HandyCafe Firewall is free program that enables you to protect your computer against Internet threats. It provides features such as: - Ability to filter HTTPS protocol / connections - Network based monitoring and management - Ban defined file types - Manage client settings from server - Monitor download and upload speeds - Detailed logging and reporting.

  • Publisher: Ates Software
  • Home page: www.handycafe.com
  • Last updated: October 22nd, 2010
Sophos Client Firewall

Sophos Client Firewall

Sophos Client Firewall protects your entire enterprise. It blocks worms, stops hackers and prevents intrusion. Centrally managed and integrated into the single endpoint agent, it makes securing your Windows network and protecting your data simple and straightforward.

  • Publisher: Sophos Plc
  • Last updated: June 13th, 2013
COMODO Cloud Antivirus

COMODO Cloud Antivirus

Comodo Cloud Antivirus uses a powerful combination of virus monitoring, auto-sandbox and behavior analysis technologies to immediately protect your computer from all known and unknown malware. The cloud based scanner delivers up-to-the-second defense against the latest viruses and the Viruscope technology recognizes and blocks malicious behavior in unknown files.

PC Tools Firewall Plus

PC Tools Firewall Plus

PC Tools Firewall Plus is a powerful free personal firewall for Windows® that protects your computer by preventing unauthorized users from gaining access to your computer through the Internet or a network. By monitoring applications that connect to the network Firewall Plus can stop Trojans, backdoors, keyloggers and other malware from damaging your computer and stealing your private information.

  • Publisher: PC Tools
  • Last updated: May 22nd, 2011