|
||||||
|
||
|
Home > Viruses software |
Related keywords: trojans viruses |
|
|
451. | ProBot SE 2.3.0 (nethunter.cc) | ||
what a keylogger could be ? SE is an advanced version of it's ProBot predcessor. SE (Special or Stealth Edition) is a totally invisible program and is packed with all of ProBot features as well. ProBot SE remains undetected even under the most prying eye. Unlike similar tools, ProBot SE makes it very easy to browse through activity logs. Its Control Panel organizes the data into | |||
Updated: 9, 2005 | Rating: 48 | Author: Andrei Birjukov | Size: 2236 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
452. | Protector Plus for Exchange 7.2.F02 (protectorplus.com) | ||
Plus for Exchange is an anti-virus software designed for Microsoft Exchange server. Protector Plus scans all the emails received by the mail server and it blocks all the infected emails. Protector Plus ensures that the network will be free of viruses that spread through email. Protector Plus detects emails infected by all types of viruses, trojans and worms before | |||
Updated: 9, 2005 | Rating: 0 | Author: Kartheek S | Size: 2949 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
453. | QuoTracker 2.4 (quotestudio.com) | ||
QuoTracker is a tool which facilitates the monitoring and tracking of your investment in global stock markets and US/Can. mutual funds. It collects and connects information (chart, quote, news, profile etc.) from different free Internet services, puts everything onto an easy-to-glance Explorer-like interface | |||
Updated: 9, 2005 | Rating: 0 | Author: Ming Liu | Size: 6149 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
454. | R-Drive Image 3.0 (drive-image.com) | ||
the original disks, on any other partitions or even on a hard drive's free space on the fly. To restore system and other locked partitions R-Drive Image is switched to the pseudo-graphic mode directly from Windows or bootable version created by the utility is launched from CD disc or diskettes. Using | |||
Updated: 9, 2005 | Rating: 1207 | Size: 11366 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
455. | R-Studio Data Recovery Software 2.0 (data-recovery-software.net) | ||
unerase and file recovery after FDISK, MBR destruction, FAT damaged, virus infection. Creates drive image for further data recovery. Dynamic disk support. Damaged RAID (Volume and Stripe sets) reconstruction. Recovering encrypted files, compressed files and alternative data streams. File or disk content can be viewed and edited in the hexadecimal editor, which supports NTFS file | |||
Updated: 9, 2005 | Rating: 1360 | Size: 2099 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
456. | Love You Not 1.10 (pcshareware.com) | ||
any request to execute all scripting file types used in email virus attacks. These include: Visual Basic scripts (.VBS, .VBE, .VB), Javascript (.JS, .JSE), Scrap objects (.SHS, .SHB), HTML application files (.HTA) and other potentially dangerous file types. Love You Not! also will increase the default Internet security zone setting used by Windows from "Internet" zone to | |||
Updated: 9, 2005 | Rating: 0 | Author: Philip Kapusta | Size: 870 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
457. | MailUtils 1.01 (homepage.ntlworld.com) | ||
Five utilities for administrators of MSmail postoffices* are provided in one program: "User List > Text File" generates a list of all local users giving details of their mailbag number, MMF file size and the number of e-mails waiting for them. "Mailbag > Text File" identifies the owner of any mailbag and | |||
Updated: 9, 2005 | Rating: 173 | Author: Brian Taylor | Size: 621 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
458. | MaxMonkey 2.24 (homepage.ntlworld.com) | ||
Window visibility manager: View hidden or stealth programs or viruses that maybe running without your knowledge or consent. Detect applications that are hidden and still running but no longer in use. Windows state manager: MaxMonkey is a windows maximizer, minimizer, restorer and closer. With one easy left-click, double-click or middle-mouse-button click, MaxMonkey can | |||
Updated: 9, 2005 | Rating: 0 | Author: monkey job | Size: 350 kb | Shareware Go to category: System Utilities > Shell Tools Similar programs | |||
459. | Memory Defragmenter 1.1 (abexo.com) | ||
Memory Defragmenter is a software to free up wasted RAM. What is memory (RAM) fragmentation? Windows programs use RAM (Random Access Memory) for their operations, however sometimes they fail to release the RAM after use. This means that parts of your RAM is occupied holding useless data and your computer | |||
Updated: 9, 2005 | Rating: 0 | Author: Abexo Marketing | Size: 619 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
460. | Microangelo 5.56 (impactsoftware.com) | ||
Microangelo, the “Grand-daddy” of icon software, provides a total solution for Windows software developers, graphic designers and home users. Voted “Best Graphics Program” three years running at the 2000, 2001, and 2002 Shareware Industry Awards, this award winning toolset offers performance and value that | |||
Updated: 9, 2005 | Rating: 1418 | Author: Len Gray | Size: 2900 kb | Shareware Go to category: Graphic Apps > Icon Tools Similar programs | |||
461. | Biz Mail 1.00 (axolot.se) | ||
has e-mail as a part of your daily work. Here are some of Biz Mail's features: * Receive mail from POP3, IMAP or Hotmail accounts. * Full support for formatted (Html) mails. You can view, send receive and reply on formatted mails. * Biz Mail uses standard EML files for storing mails. Each mail is | |||
Updated: 9, 2005 | Rating: 0 | Author: Lars Arvidsson | Size: 4924 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
462. | Search Favorites 1.5 (searchfavorites.com) | ||
modules needed for your installation are downloaded. Everything is virus checked and digitally signed and checked on download. The installation uses Microsoft's Windows Installer Version 2, as included with Windows XP, and we upgrade your version of Windows Installer as needed using the | |||
Updated: 9, 2005 | Rating: 0 | Author: William Hite | Size: 76 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
463. | SiteMonNak 2004 V1.0.0 (nakware.com) | ||
SiteMonNak can monitor and report on the status of a variety of items that affect the accessibility of web sites including https web sites, items like DNS, Ping and HTTP response. What items you have monitored is very flexible. When a problem is detected you can be informed in a variety of different ways | |||
Updated: 9, 2005 | Rating: 0 | Author: Andy Erceg | Size: 1380 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
464. | Fantastic ASCII Art: Picture Paradise 1.2 (absolutist.com) | ||
This is more than a super modern digital screensaver for those who are fed up with everything standart and trite. If you want something original and unhackneyed - it is especially for you. Dozens of various images pass in front of your eyes, changing as the patterns in kaleidoskope. All scopes of the | |||
Updated: 9, 2005 | Rating: 42 | Author: Absolutist Team | Size: 1577 kb | Shareware Go to category: Desktop > Similar programs | |||
465. | AllnSync 3.5.2 (rlegsoftware.com) | ||
a very fast and easy to use Directory / File synchronizer. It's main function is to synchronize critical files in a selected directory and it's sub-directories on two different drives which can be on the same computer, or different computers over a network. It is ideal for keeping | |||
Updated: 9, 2005 | Rating: 0 | Author: Ray Giovagnoli | Size: 1554 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
466. | fitW (fine tuning of Windows) 4.0.0.4000 (mtsv.fromru.com) | ||
Automatic determination of version of system. Depending on system's version, occurs the disabling of unnecessary parameters. The program has a anti-virus protection, which is blocking a starting of program. Optimizer of network connection with Internet. Recommended variants of the network's tuning. Processes Manager. Program is simple in using. For the simplicity, all | |||
Updated: 9, 2005 | Rating: 0 | Author: MTsv DN | Size: 193 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
467. | Lock Folder XP 3.4 (everstrike.com) | ||
also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder XP works - all you have to do is to drag file or folder you want to lock to Lock Folder XP window, and the rest is done automatically. Now your data is protected, hidden and can not be accessed without entering your personal password. It is critical to have effective | |||
Updated: 9, 2005 | Rating: 126 | Author: Richard Davids | Size: 1243 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
468. | My Firewall Plus 5.0 (webroot.com) | ||
your data. Today hackers and web snoops are using more sophisticated viruses, cookies, Trojan Horses and other malicious software tools to gain access to your PC. Once they gain access, they put unsafe applications on it that are designed to expose your data from the inside. My Firewall Plus protects | |||
Updated: 9, 2005 | Rating: 0 | Author: Steve Thomas | Size: 6006 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
469. | Child Control 2005 7.153 (salfeld.com) | ||
The most optimal parental control for all Windows-PCs (incl. XP). Set time limits for the PC and/or the Internet and block/filter unwanted Internet contents. Limit access to internal Windows components and personal folders. A protocol informs you at any time as to what happened on your computer and when | |||
Updated: 9, 2005 | Rating: 16 | Author: Dierk Salfeld | Size: 3703 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
470. | NetMailBot 5.0.1 (exclamationsoft.com) | ||
NetMailBot is the most powerful command line email client for sending and receiving email on the market today. It runs from a DOS command prompt, which allows it to be easily called from other applications. In fact, many of our customers run NetMailBot from existing applications to send email notices | |||
Updated: 9, 2005 | Rating: 0 | Author: ExclamationSoft Corporation | Size: 3028 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
471. | NetWorx 3.2 (softperfect.com) | ||
NetWorx is a simple, yet powerful tool that helps you objectively evaluate your bandwidth situation. You can use it to collect bandwidth usage data and measure the speed of your Internet or any other network connection. NetWorx can help you identify possible sources of network problems, ensure that you don't | |||
Updated: 9, 2005 | Rating: 16 | Author: Andrey Kotov | Size: 982 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
472. | NT Perfect Companion 4.0.06 (easydesksoftware.com) | ||
that will help you maintain the integrity of your Registry. It's especially useful for PCs that have lots of software installed and uninstalled, as it cleans up the garbage left by many uninstallers. Registry scans are thorough and revolve around finding and removing invalid keys, and making sure that .dll and .ocx files are properly registered. An undo file is created that allows | |||
Updated: 9, 2005 | Rating: 0 | Author: Guy Young | Size: 3226 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
473. | XP System Sentry 2.2.05 (easydesksoftware.com) | ||
Check, detects files that are corrupt or possibly infected by a virus. - A utility for expanding compressed files, allows the user to install Windows installation files. - Quick Scan, finds and corrects file version conflicts that can cause your system to often lock up. It finds system files that have been added or deleted. - System Version Checker finds and fixes incorrect | |||
Updated: 9, 2005 | Rating: 39 | Author: Guy Young | Size: 3722 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
474. | Geek Superhero 1.3 (geeksuperhero.com) | ||
reject the change. This catches many of the modifications made by a virus, trojan or worm; protecting your computer from harm. (A "Computer Setting Firewall" is an excellent description.) It includes other features to help you protect your computer from hackers and worms by disabling rarely used Windows services, it helps you protect your privacy by blocking popup advertising | |||
Updated: 9, 2005 | Rating: 16 | Author: Michael Burford | Size: 2548 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
475. | GetDataBack for FAT 2.31 (runtime.org) | ||
scenario is - GetDataBack will recover your data if the hard drive's partition table, boot record, FAT or root directory are lost or damaged, data was lost due to a virus attack, the drive was formatted, fdisk has been run, a power failure has caused a system crash, files were lost due to a | |||
Updated: 9, 2005 | Rating: 1267 | Author: Ragnhild Fesel | Size: 2811 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
476. | GetDataBack for NTFS 2.31 (runtime.org) | ||
scenario is - GetDataBack will recover your data if the hard drive's partition table, boot record, MTF or root directory are lost or damaged, data was lost due to a virus attack, the drive was formatted, fdisk has been run, a power failure has caused a system crash, files were lost due to a | |||
Updated: 9, 2005 | Rating: 1729 | Author: Ragnhild Fesel | Size: 2789 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
477. | GoodBye Spy 4.01 (tekeffect.com) | ||
Advanced spyware removal and real time monitoring utility. GoodBye Spy is a multi-adware removal program, which supports the removal of spyware, adware, Brotherware, and more. It scans your registry, memory, and drives, then allows you to remove these unwanted files from your system. To offer greater | |||
Updated: 9, 2005 | Rating: 0 | Author: TekEffect | Size: 608 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
478. | Hara-Kiri 2.02 (cyteg.com) | ||
"Hara-Kiri" (ex "Dontouch") is a radical way to keep your confidential data away from unauthorized access by "self-destructing" The files that you specify. How it works: While Windows is starting up it checks to see if you are pressing a combination of certain keys. If those keys are not being pressed | |||
Updated: 9, 2005 | Rating: 0 | Author: Viktor Korokhin | Size: 601 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
479. | Iconic Tray 1.21 (iconictray.com) | ||
tray is easy: simply right-click (or middle-click) on the window's "Minimize" button. Anytime you want to view the minimized windows, just open the Iconic Tray icon to see a menu list - click on a window in the list and it's back on screen again. It really is that easy. Of course, if you had chosen to minimize to the system tray, just restore your window as you would any other | |||
Updated: 9, 2005 | Rating: 0 | Author: Dmitry Nikitin | Size: 47 kb | Shareware Go to category: Desktop > Other Similar programs | |||
480. | Identity Knight 1.3 (fspro.net) | ||
on secure technologies, we tend to neglect basic precautions. Let's look at Internet Explorer, the most popular web browser on the Net. On the one hand, starting with version 5, it offers a convenient AutoComplete feature, allowing you to enter your credentials once and let the program do the rest. On the other hand, though, Internet Explorer stores this information in an unprotected | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
481. | IntraMail 2003.01.20 (dplanet.ch) | ||
Secure exchange of messages in a local network Intranet (Windows 95, 98, Me, NT, 2000, XP). The mail (or Email) can be written or read from any PC easily. Every mail-account can be protected by a password. The personal messages are always strongly encrypted (with 3 adaptive codes). These short mails are Every mail-account can be protected by a password. Personal messages are strongly encrypted | |||
Updated: 9, 2005 | Rating: 42 | Author: Jean-Maurice Tellenbach | Size: 2918 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
482. | KeyIt! 2.0 (keyit.com) | ||
programs, and surf the web with just keystrokes. But that's not all. You can also download additional modules from our website which cater to specific tasks. For exmple, with our InternetStuff module, you have instant access to ten search engines, an encyclopedia, dictionary, thesaurus, auction search, or a stock quote, all simply by typing 'wwww'. With our | |||
Updated: 9, 2005 | Rating: 0 | Author: Kevin O'Donnell | Size: 2574 kb | Shareware Go to category: System Utilities > Clipboard Tools Similar programs | |||
483. | KeyText 2.25 (mjmsoft.com) | ||
Multi-purpose text and automation utility. KeyText stores pieces of text, ready to be typed or pasted into any application by a simple hotkey press or menu selection. "Right-click anywhere" feature makes form-filling easier than ever. Include commands to run programs, click buttons, change windows, visit | |||
Updated: 9, 2005 | Rating: 145 | Author: MJMSoft Design | Size: 623 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
484. | LAN Find 3.1 (ihsoftware.net) | ||
Find software installs in network archives! - Find all temporary or virus generated files and delete them! - Search your local computer for the same things! Fast file search on network or your computer! LAN Find is a powerful search engine for your LAN or computer. Find any files (e.g. mp3, avi) | |||
Updated: 9, 2005 | Rating: 1263 | Author: Dmitry Veshkovich | Size: 927 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
485. | LetUknow 2.03 (mhsoftware.co.uk) | ||
LetUknow provides a "peace of mind" method of monitoring your LAN and resources. You can specify numerous jobs and tests in advance on a "set and forget" basis, which LetUknow then runs at regular intervals - you choose how often. If a test fails, the appropriate individuals are notified immediately, resources. You can specify numerous jobs and tests in advance on a "set and forget" basis, which LetUknow then runs at regular intervals | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Mace | Size: 2101 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
486. | DVD Ripper Copy Pro Pro (ChineseEnglishTranslation.org) | ||
Ripper Copy Pro is the easiest way to copy DVD's. With DVD Ripper Copy Pro You Can: Copy DVD's to CDR and watch them on your DVD player. Copy DVD's to your computer and watch them on your computer.Make instant backups of your DVD's. Never worry about scratching or loosing your DVD's again! DVD Ripper Copy Pro is the easiest way to copy | |||
Updated: 9, 2005 | Rating: 16 | Author: Anderson Trueman | Size: 1000 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
487. | Email Audit 3.2 (km-vision.com) | ||
Compliments Outlook Rules implementations. Moves suspect mails (Virus mails etc) to suspect mails folder Generate regular Audit Reports. KMsoft can also take Advanced Mail solutions projects such as Enterprise Mail Track, Enterprise mail archival,Mail to EDI conversion,EMS,Web based Email Response | |||
Updated: 9, 2005 | Rating: 0 | Author: Shama Hegde | Size: 8172 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
488. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
E.M. searches for and alerts prohibited Internet use. It's advanced architecture is designed especially for large companies, universities, libraries and ISPs, yet its methods and feature set are configured for non-technical deployment and utilization. Employee Monitoring overcomes the 5 Main Obstacles of Employee Internet Monitoring (EIM) corporate deployment: 1) High | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
489. | EscapeClose Pro 1.9 (sanapesoft.com) | ||
EscapeClose Pro is a tiny utility, allowing you to close or minimize the active window by pressing the Esc button. And now you can hide active window. Thus you can see it neither in the TaskBar nor in the Task Manager list (Ctrl+Alt+Del) nor in the list opening by pressing Alt+Tab. Or, to work more carefully | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Moshkov | Size: 319 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
490. | EtherScout 1.10 (globalpatrol.net) | ||
EtherScout is an Internet traffic monitoring utility that sits in your network and records and analyzes traffic patterns of Internet usage. Reports can be generated in real time, showing detailed information on what users are doing, or trends of surfing behavior on your network. After collecting this | |||
Updated: 9, 2005 | Rating: 0 | Author: Global Patrol | Size: 1216 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
491. | FileSpy 3.0 (ic.net) | ||
who are using a specific file. It also allows viewing of the user's rights to the file/directory, how the file was opened, the user's network address, and the date and time the user logged in to the network. With FileSpy you can also send messages to selected network users and if you have | |||
Updated: 9, 2005 | Rating: 0 | Author: Frank Kusluski | Size: 2014 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
492. | FileSpy Pro 2.0 (ic.net) | ||
With FileSpy Pro you can also send messages to users, clear user's connections, unlock locked files, get extended file information, and run queries against the log database to discover important details about file usage. FileSpy Pro is a powerful file monitoring utility for Novell file servers | |||
Updated: 9, 2005 | Rating: 0 | Author: Frank Kusluski | Size: 2322 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
493. | FlipPublisher 1.0 (flipalbum.com) | ||
FlipPublisher is an authoring tool for digital publications. With FlipPublisher, you can easily publish magazines, novels, textbooks, catalogs, brochures, portfolios, manuals, and more as a FlipBook on the Web or on CDs for viewing on a PC. FlipPublisher empowers the owners of content to become their own | |||
Updated: 9, 2005 | Rating: 88 | Author: E-Book Systems, Inc. | Size: 9239 kb | Shareware Go to category: System Utilities > Text/Document Editors Similar programs | |||
494. | FontMap 2.41 (ccountry.net) | ||
FontMap may be used to view and print both installed and external fonts; it can display a variety of tables, individual characters, a keyboard view, font description, or whatever text you wish to enter. Individual characters can be displayed in a "full-screen" view and custom table parameters can be set to | |||
Updated: 9, 2005 | Rating: 0 | Author: Gary Dix | Size: 336 kb | Shareware Go to category: Desktop > Cursors & Fonts Similar programs | |||
495. | Crime Catcher 2.1 (crime-catcher.com) | ||
Crime Catcher is software for your webcam that allows your computer to act as a security system. The software will monitor for motion and if detected actions can take place. For a full list of features see below: Advanced motion detection; Every single pixel being monitored for change. Hide Crime | |||
Updated: 9, 2005 | Rating: 124 | Author: Edward Torkington | Size: 4373 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
496. | Custom StartUp 3.01 (gboban.com) | ||
you reject. This may be also useful in protection from some types of viruses. Custom StartUp helps you to manage which programs will be stared when Windows starts. Moreover, Custom StartUp allows you to backup and restore configurations later. Also, you can quickly apply start-up configuration and restart or shutdown your | |||
Updated: 9, 2005 | Rating: 0 | Author: Goran Boban | Size: 572 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
497. | Daily Backup 2.08 rel b (softwaremeister.com) | ||
Daily Backup quickly creates zip archives of just the changed (or created) files. Once you've set it up, you'll barely notice your safety net. Schedule your backups: as soon as you changed (or created) a file, at fixed time periods, when the screen saver is running, or on the end of the session. Note that see the generations of files; go back to a previous generation whenever you want | |||
Updated: 9, 2005 | Rating: 43 | Author: Thomas Gawehns | Size: 1319 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
498. | Desktop Scout 4.0 (globalpatrol.net) | ||
Desktop Scout is a powerful computer surveillance program which can be used in the home, school or office to monitor and record every detail of PC and Internet activity. The program contains several integrated tools which work together at the same time to record all programs used, keystrokes typed, web sites | |||
Updated: 9, 2005 | Rating: 56 | Author: Global Patrol | Size: 1291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
499. | Personal Desktop Spy 2.10 (spyarsenal.com) | ||
Desktop Spy Agent is an invisible and easy-to-use PC activity monitoring tool that captures screenshots of the active application window or the entire desktop at the predefined time intervals varying from 1 second to several hours and saves the recorded images to a specified directory on the hard drive. The | |||
Updated: 9, 2005 | Rating: 0 | Author: Mikhail Kalinskiy | Size: 615 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
500. | DiamondCS ProcessGuard 3.150 (diamondcs.com.au) | ||
program by patching it in memory so that it no longer detected any viruses, so even with a database update and even if it was a known trojan it would remain undetected. Rootkits are another serious threat, because once they've infected your system they can often be extremely difficult to detect (as | |||
Updated: 9, 2005 | Rating: 0 | Author: DiamondCS Support | Size: 1922 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
|
Home > Viruses software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|