Virtualization - Data Storage - Security

Katharine Hadow

Subscribe to Katharine Hadow: eMailAlertsEmail Alerts
Get Katharine Hadow via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Top Stories by Katharine Hadow

Comodo has announced its new Internet browser, Comodo Dragon. Like Google Chrome, Comodo Dragon is constructed on the open-source Chromium Project browser. Dragon's enhancements increase security and protect user privacy. Comodo Dragon offers a new feature for Internet users. Websites all have digital certificates attesting to their identities, but some certificates offer more security than others. If Comodo Dragon encounters a Domain-only certificate, it warns the user that the website may not be reliable. Domain-only certificates are available to any webmaster at low cost and with no verification, providing no guarantee of authentication. With Comodo Dragon, information about online exploration stays as much as possible within the user's PC. Comodo Dragon does not transmit information about a browsing session to a remote server. Such a transmission exposes informa... (more)

Comodo Code Signing Certificate Supports Mozilla Standards

Comodo code-signing certificates enable developers to sign Mozilla extensions or "Add-ons" for a wide variety of different operating systems such as Microsoft Windows, Mac OS X and Linux. Mozilla applications recognize XPIs as "trusted" when they are signed with a Comodo Code-Signing certificate. XPI (pronounced "Zippy") is short for "Cross Platform Install." XPI enables Developers to create installer modules for their programs meant to enhance Mozilla applications such as Firefox, Thunderbird, Sea Monkey and Sunbird. Comodo Code-Signing certificates verify and authenticate the ent... (more)

Comodo Certificate Status Protocol Is Timely, Accurate

A manager gives a key to an employee so the employee can drive a locked truck. The manager controls use of the key and the equipment; if the employee leaves the company, or if the employee dies, the manager is responsible to get the key back or change the locks. But when the employee is instead driving a truckload of information down the information superhighway, handing out and retrieving the key can be more complicated. Businesses protect their digital information in transit using Public Key Infrastructure. Public Key Infrastructure is based on the idea of two “keys” for each ... (more)

HP Offers Comodo Multi-Domain Certificates with Home Servers

HP makes it even easier to run a home server like a business by providing a free Comodo multi-domain digital certificate with each new MediaSmart Server. With the MediaSmart Server, home-based computer networks can support several different domains. The free multi-domain certificate reduces the administration needed to integrate the home network with home-based business needs. "One Comodo multi-domain certificate can easily support up to 30 domains," said Melih Abdulhayoglu, CEO and Chief Security Architect at Comodo. "Most home server users will not need that many domains, but wh... (more)

Comodo Says Send Email, Not Postcards Scrawled in Pencil

"If it's urgent enough to send in a business email, it's usually something you don't want others to see," said Melih Abdulhayoglu, Chief Security Architect and CEO of Comodo Group, Inc., a leading Internet security company. "Most emails are not secure messages. To a moderately skilled person, inside the organization or out, they are as easy to read or even to change, as a postcard written in pencil." Emails do not reach their recipients directly. The senders have no control over the route their emails take, from server to server, to their destinations. Anyone between the sender a... (more)