Comodo IceDragon

Last updated
Comodo IceDragon (Browser)
Developer(s) Comodo Group
Stable release
65.0.2.15 [1]   OOjs UI icon edit-ltr-progressive.svg / 19 June 2019
Preview release
65.0.2.15 [2]   OOjs UI icon edit-ltr-progressive.svg / 22 May 2019
Engine Quantum
Operating system Microsoft Windows
Platform IA-32, x86-64
Type Web browser
License MPL 2.0
Website www.comodo.com/home/browsers-toolbars/browser.php

Comodo IceDragon is a discontinued Firefox-based open source web browser from the Comodo Group for Microsoft Windows.

Contents

Features

See also

Related Research Articles

The Web Proxy Auto-Discovery (WPAD) Protocol is a method used by clients to locate the URL of a configuration file using DHCP and/or DNS discovery methods. Once detection and download of the configuration file is complete, it can be executed to determine the proxy for a specified URL.

This is a comparison of both historical and current web browsers based on developer, engine, platform(s), releases, license, and cost.

Comodo Security Solutions, Inc., is a cybersecurity company headquartered in Bloomfield, New Jersey. Under the brand Sectigo, the company acts as a web Certificate authority (CA) and issues SSL/TLS certificates.

In computer security, a drive-by download is the unintended download of software, typically malicious software. The term "drive-by download" usually refers to a download which was authorized by a user without understanding what is being downloaded, such as in the case of a Trojan horse. In other cases, the term may simply refer to a download which occurs without a user's knowledge. Common types of files distributed in drive-by download attacks include computer viruses, spyware, or crimeware.

<span class="mw-page-title-main">Mozilla Application Suite</span> Discontinued Internet suite

The Mozilla Application Suite is a discontinued cross-platform integrated Internet suite. Its development was initiated by Netscape Communications Corporation, before their acquisition by AOL. It was based on the source code of Netscape Communicator. The development was spearheaded by the Mozilla Organization from 1998 to 2003, and by the Mozilla Foundation from 2003 to 2006.

The following tables compare general and technical information for a number of HTML editors.

Browser hijacking is a form of unwanted software that modifies a web browser's settings without a user's permission, to inject unwanted advertising into the user's browser. A browser hijacker may replace the existing home page, error page, or search engine with its own. These are generally used to force hits to a particular website, increasing its advertising revenue.

NoScript is a free and open-source extension for Firefox- and Chromium-based web browsers, written and maintained by Giorgio Maone, a software developer and member of the Mozilla Security Group.

<span class="mw-page-title-main">GNU IceCat</span> Firefox derivative containing only free software

GNU IceCat, formerly known as GNU IceWeasel, is a completely free version of the Mozilla Firefox web browser distributed by the GNU Project. It is compatible with Linux, Windows, Android and macOS.

<span class="mw-page-title-main">VirusTotal</span> Cybersecurity website owned by Chronicle

VirusTotal is a website created by the Spanish security company Hispasec Sistemas. Launched in June 2004, it was acquired by Google in September 2012. The company's ownership switched in January 2018 to Chronicle, a subsidiary of Google.

<span class="mw-page-title-main">SRWare Iron</span> Chromium-based web browser developed by SRWare

SRWare Iron is a Chromium-based web browser developed by the German company SRWare. It primarily aims to eliminate usage tracking and other privacy-compromising functionality that the Google Chrome browser includes. Iron ships with certain Chromium privacy options switched on by default, it provides some additional features that distinguish it from Google Chrome.

<span class="mw-page-title-main">BrowserChoice.eu</span> Website created by Microsoft in March 2010

BrowserChoice.eu was a website created by Microsoft in March 2010 following a decision in the European Union Microsoft competition case. The case involved legal proceedings by the European Union against Microsoft and found that, by including Internet Explorer with their market-dominant Windows operating system, Microsoft had used this dominance to create a similar market position in the web browser market. The BrowserChoice.eu website was created to allow users that had not made, or were unaware of, a choice to try other browsers, and thus comply with the European Commission's ruling.

<span class="mw-page-title-main">Peppermint OS</span> Linux computer operating system

Peppermint OS is a Linux distribution based on Debian and Devuan Stable, and formerly based on Ubuntu. It uses the Xfce desktop environment. It aims to provide a familiar environment for newcomers to Linux, which requires relatively low hardware resources to run.

<span class="mw-page-title-main">Comodo Dragon</span> Web browser based on the Chromium web browser

Comodo Dragon is a freeware web browser. It is based on Chromium and is produced by Comodo Group. Sporting a similar interface to Google Chrome, Dragon does not implement Chrome's user tracking and some other potentially privacy-compromising features, replacing them with its own user tracking implementations, and provides additional security measures, such as indicating the authenticity and relative strength of a website's Secure Sockets Layer (SSL) certificate.

Cross-site request forgery, also known as one-click attack or session riding and abbreviated as CSRF or XSRF, is a type of malicious exploit of a website or web application where unauthorized commands are submitted from a user that the web application trusts. There are many ways in which a malicious website can transmit such commands; specially-crafted image tags, hidden forms, and JavaScript fetch or XMLHttpRequests, for example, can all work without the user's interaction or even knowledge. Unlike cross-site scripting (XSS), which exploits the trust a user has for a particular site, CSRF exploits the trust that a site has in a user's browser. In a CSRF attack, an innocent end user is tricked by an attacker into submitting a web request that they did not intend. This may cause actions to be performed on the website that can include inadvertent client or server data leakage, change of session state, or manipulation of an end user's account.

Firefox was created by Dave Hyatt and Blake Ross as an experimental branch of the Mozilla browser, first released as Firefox 1.0 on November 9, 2004. Starting with version 5.0, a rapid release cycle was put into effect, resulting in a new major version release every six weeks. This was gradually accelerated further in late 2019, so that new major releases occur on four-week cycles starting in 2020.

Browser security is the application of Internet security to web browsers in order to protect networked data and computer systems from breaches of privacy or malware. Security exploits of browsers often use JavaScript, sometimes with cross-site scripting (XSS) with a secondary payload using Adobe Flash. Security exploits can also take advantage of vulnerabilities that are commonly exploited in all browsers.

Comodo Mobile Security (CMS) is a mobile application provided free by the Comodo Group that protects Android devices against viruses, worms and scripts. It also features SMS and call blocking, a software and process manager, data and apps backup and data traffic monitor. The anti-theft feature allows users to recover lost or stolen devices.

<span class="mw-page-title-main">PirateBrowser</span> Tor Browser-based circumvention tool prepared by The Pirate Bay

PirateBrowser is a web browser by The Pirate Bay used to circumvent Internet censorship.

References

  1. https://forums.comodo.com/news-announcements-feedback-ndash-cid/comodo-icedragon-v650215-is-now-available-for-download-t124515.0.html.{{cite web}}: Missing or empty |title= (help)
  2. https://forums.comodo.com/news-announcements-feedback-ndash-cid/comodo-icedragon-v650215-rc-is-now-available-for-testing-t124338.0.html.{{cite web}}: Missing or empty |title= (help)
  3. Thornton, Bob (23 July 2012). "Comodo IceDragon 48.0.0.2". PC Advisor.co.uk. Retrieved 25 February 2013.
  4. 1 2 "Comodo IceDragon Browser: Review and Download". thewindowsclub.com. 22 July 2012. Retrieved 25 February 2013.
  5. 1 2 "Comodo IceDragon 48.0.0.2". Downloadcrew.com. 31 January 2013. Retrieved 25 February 2013.