enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Comodo System Utilities - Wikipedia

    en.wikipedia.org/wiki/Comodo_System_Utilities

    In July 2012 snapfiles.com gave Comodo System Utilities 4.5 of 5 stars. [4] Downloadcrew.com gave Comodo System Utilities 4.5 of 5 stars. They said "System Utilities is a great suite of utilities that gives great results at no cost." [9] On January 5, 2010 CNET gave Comodo System Utilities its highest rating "Spectacular", 5 of 5 stars. They ...

  3. Comparison of disk cloning software - Wikipedia

    en.wikipedia.org/wiki/Comparison_of_disk_cloning...

    Disk Cloning Software Disk cloning capabilities of various software. Name Operating system User Interface Cloning features Operation model License; Windows Linux MacOS Live OS CLI GUI Sector by sector [a] File based [b] Hot transfer [c] Standalone Client–server; Acronis Cyber Protect Home Office [1] [d] Yes No Yes: Yes (64 MB) No Yes Yes

  4. Comodo Internet Security - Wikipedia

    en.wikipedia.org/wiki/Comodo_Internet_Security

    The GeekBuddy service fixes any problem, security or otherwise, using remote assistance. A Virus-Free Guarantee reimburses you for damage if malware gets past Comodo; you can also get reimbursed for expenses related to identity theft. Add a GeekBuddy-powered tuneup tool and an unusually powerful backup utility and you've got a winner." [26]

  5. Image for Windows (disk imaging) - Wikipedia

    en.wikipedia.org/wiki/Image_for_Windows_(disk...

    The point-in-time technology used by Image for Windows consists of using a special driver, named PHYLock, that effectively redirects data being overwritten by Windows to a holding cache. Since Microsoft's introduction of the Volume Shadow Copy Service (vssvc.exe), this technology concept is now generally available to any Windows based backup ...

  6. List of backup software - Wikipedia

    en.wikipedia.org/wiki/List_of_backup_software

    This is a list of notable backup software that performs data backups. Archivers, transfer protocols, and version control systems are often used for backups but only software focused on backup is listed here. See Comparison of backup software for features.

  7. Ghost (disk utility) - Wikipedia

    en.wikipedia.org/wiki/Ghost_(disk_utility)

    GHOST could clone a disk or partition to another disk or partition or to an image file. GHOST allows for writing a clone or image to a second disk in the same machine, another machine linked by a parallel or network cable, a network drive, or to a tape drive. 3.1 uses 286 with XMS and could still run on OS/2. [7]

  8. Xcitium - Wikipedia

    en.wikipedia.org/wiki/Comodo_Backup

    Comodo revoked all of the bogus certificates shortly after the breach was discovered. Comodo also stated that it was actively looking into ways to improve the security of its affiliates. [33] In an update on 31 March 2011, Comodo stated that it detected and thwarted an intrusion into a reseller user account on 26 March 2011.

  9. Comodo IceDragon - Wikipedia

    en.wikipedia.org/wiki/Comodo_IceDragon

    SiteInspector: Comodo's SiteInspector malware detection system is integrated into IceDragon. SiteInspector's link scanning feature checks whether a web page is malicious. [4] [5] SecureDNS service: IceDragon offers Comodo's Secure DNS Service to users as an alternative to using their Internet Service Provider. This is intended to produce faster ...