Comodo code-signing certificates enable developers to sign Mozilla extensions
or "Add-ons" for a wide variety of different operating systems such as
Microsoft Windows, Mac OS X and Linux. Mozilla applications recognize XPIs as
"trusted" when they are signed with a Comodo Code-Signing certificate.
XPI (pronounced "Zippy") is short for "Cross Platform Install." XPI enables
Developers to create installer modules for their programs meant to enhance
Mozilla applications such as Firefox, Thunderbird, Sea Monkey and Sunbird.
Comodo Code-Signing certificates verify and authenticate the entity that has
created the XPI file, allowing end users to trust their execution. Most
browsers will not accept action commands from downloaded code unless the code
is signed by a trusted Certificate Authority.
An example of a trusted code-signing certificate, this one has been issued by
Jersey City, NJ, December 17, 2009 - The US unemployment rate is so high that
two US Senators have introduced the Employ America Act, aiming to cut back on
alien workers hired on H1-B visas. With a 10%+ jobless rate, there is a lot
of talented competition for work. If an IT executive loses a job because of a
data breach, he or she might be out of work for a long time—without
IT executives at ChoicePoint, Inc., looked like heroes when they reacted
swiftly to a potential data breach in 2005. More often, though, leaky data
pipes lead to unpleasant consequences for the exe... (more)
"On Wednesday, at the Black Hat security conference here, an independent
hacker and security researcher who goes by the name Moxie Marlinspike
announced that he would release a software tool for performing
"man-in-the-middle" attacks on seemingly secure Web sites," stripping their
SSL protection, reports Andy Greenberg at Forbes.com.
Patent-pending technology from Comodo allows attorneys and clients to
communicate at the speed of the Internet and yet to protect their privileged
communications easily. Without exchanging public keys, senders can encrypt
confidential information in transit.
Jersey City, NJ, May 05, 2009 - Attorneys sometimes need to transmit vast
amounts of sensitive data, rapidly. If they choose to do so by email, they
must consider that email, though convenient, is not secure
Press release about Comodo Secure Email for Attorneys..
More information about Comodo Secure Email.
Comodo Internet Security
“A notable newcomer to the security arena.”
by Michael J. Ross
Computer viruses, worms, Trojan horses and other forms of malware pose just
as much a threat now as they did during the 1980s, when personal computers
became widespread, and before the advent of the Web. Back then, viruses were
typically spread inadvertently from one computer to another via diskettes. In
our current era, these virtual viruses have a far more widespread and
efficient vector for dissemination: the Internet. People nowadays will send a
program or other potentially infected files to... (more)