The Internet Browser has taken the latest Chromium technology and beefed it up in the one way necessary to make it the optimum Browser to use on today's malware-plagued Internet. The Comodo companies are innovative and prolific developers of online security and trust assurance solutions. Including a greater level of privacy than Chromium technology offers. – A Chromium technology-based Web Browser that offers you all of Chrome's features PLUS the unparalleled level of security and privacy you only get from Comodo. This is exactly why Comodo, the world's leading online security and trust assurance innovator has stepped forward with Comodo Dragon. Comodo Dragon 64 bit is your must-have online privacy keeper with all essential features in a light yet powerful web browser. The Internet has grown, and of course, the sophistication of millions of hackers, scammers, phishers, and thieves has grown too. Importing data during the installation of Comodo IceDragon may not work in some cases.Comodo Dragon Internet Browser provides privacy enhancements at lightning speed. Importing data from Comodo Dragon is not possible yet. issue with internal updater when UAC is on Changed 'Inactive' tabs background color for better visibility 'Enable Comodo Secure DNS in IceDragon only' feature IceDragon combines these features with a sleek interface, providing a seamless browsing experience. Realizing the importance of social interactions through various social networks, the social media feature has been integrated in Comod IceDragon allowing users to share links on several social networks. The Site inspector functionality has been extended to allow users to scan a link in Site Inspector from the context menu. In this first release we have included the basic security features such as Comodo Secure DNS (only on wide-system) and Site Inspector. In an attempt to meet the different requirements of users we're happy to announce the release of the new Comodo IceDragon browser! The browser is built on the Mozilla browser core and combines the basic functionalities of the original code with the Comodo security features. As the number of internet threats increases, users are faced with choosing a browser which fits both their security needs and meets their particular browsing necessities.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |