spacer
HomeProductsKnowledge BaseAboutContact Us
Web Protector
Web Protection Suite
Back Office Management Module
FAQ
White Papers
Articles
Company
Market Positioning
News & Events
Products
Web Protector
Web Protection Suite
Back Office Management Module

Comitari Web Protector

The Comitari Web Protector is a browser add on that protects you from identity theft, web attacks, Trojans and helps you surf saftely on web.
Download now

Type of Attack What it means Free Version Full Version
ClickJacking
spacer
Hiding a portion of a legitimate web site in a transparent or invisible layer under a mock button or link. Innocent users think they are pressing the link or button when in fact they are performing unintended actions on the other page.
For a video explaining attack press here.
Key Logger
spacer
A key logger is a malware used to steal passwords by recording the user key strokes on the keyboard.
For a video explaining attack press here.
Buffer Overflow
spacer
A buffer overflow occurs when a program or process tries to store more data in a buffer than it was intended to hold.
In buffer overflow attacks, the extra data may  contain codes designed to compromise the machine, steal a user’s files,  execute a code remotely, or disclose confidential information.
Trojan Horses
spacer
Trojan horses are a type of malware that is used to grant hackers access to your computer for stealing files and personal information, watching your screen and more.    spacer (1)
Phishing &
Pharming
spacer

Malicious impersonation of legitimate websites such as banks, PayPal etc.
in order to obtain credentials and other private information from an unsuspecting surfer.
For a video explaining attack press here.
   spacer (2)
Session riding
(CSRF)
spacer
A malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts, performing unwanted transactions.
For a video explaining attack press here.
DNS rebinding
spacer
By changing DNS configuration in local network equipment, an attacker enables further attacks such as phishing & pharming.
Cross-Site
Scripting (XSS)
spacer
Using legitimate web application vulnerabilities in order to implant malicious code in web pages, causing innocent surfers to send sensitive information back to malicious servers.
File Stealing
spacer
By using Internet Explorer’s ability to access local files, an attacker can read and send out the contents of potentially sensitive files from local computer and network shares.
Download free version
spacer Download trial

After downloading the Comitari Web Protector, you will be asked wheter you would like to get the free version, the trial version (30 days) or the full version.
To purchase more then one license, please contact us via email
at contact@comitari.com for a price quote.
Full version license is valid for one year.

(1) In the free version trojan horses are detected but not disabled.
(2) In the free version phising engine is applied only to certain public websites (Facebook, Google, PayPal, etc.).


Copyright © 2012 Comitari Technologies Ltd. All rights reserved.    |    Privacy Policy Follow Us: spacer spacer spacer

gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.