|
||||||
|
||
|
Home > Viruses software |
Related keywords: trojans viruses |
|
|
451. | Geek Superhero 1.3 (geeksuperhero.com) | ||
reject the change. This catches many of the modifications made by a virus, trojan or worm; protecting your computer from harm. (A "Computer Setting Firewall" is an excellent description.) It includes other features to help you protect your computer from hackers and worms by disabling rarely used Windows services, it helps you protect your privacy by blocking popup advertising | |||
Updated: 9, 2005 | Rating: 16 | Author: Michael Burford | Size: 2548 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
452. | GetDataBack for FAT 2.31 (runtime.org) | ||
scenario is - GetDataBack will recover your data if the hard drive's partition table, boot record, FAT or root directory are lost or damaged, data was lost due to a virus attack, the drive was formatted, fdisk has been run, a power failure has caused a system crash, files were lost due to a | |||
Updated: 9, 2005 | Rating: 1267 | Author: Ragnhild Fesel | Size: 2811 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
453. | GetDataBack for NTFS 2.31 (runtime.org) | ||
scenario is - GetDataBack will recover your data if the hard drive's partition table, boot record, MTF or root directory are lost or damaged, data was lost due to a virus attack, the drive was formatted, fdisk has been run, a power failure has caused a system crash, files were lost due to a | |||
Updated: 9, 2005 | Rating: 1729 | Author: Ragnhild Fesel | Size: 2789 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
454. | GoodBye Spy 4.01 (tekeffect.com) | ||
Advanced spyware removal and real time monitoring utility. GoodBye Spy is a multi-adware removal program, which supports the removal of spyware, adware, Brotherware, and more. It scans your registry, memory, and drives, then allows you to remove these unwanted files from your system. To offer greater | |||
Updated: 9, 2005 | Rating: 0 | Author: TekEffect | Size: 608 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
455. | Hara-Kiri 2.02 (cyteg.com) | ||
"Hara-Kiri" (ex "Dontouch") is a radical way to keep your confidential data away from unauthorized access by "self-destructing" The files that you specify. How it works: While Windows is starting up it checks to see if you are pressing a combination of certain keys. If those keys are not being pressed | |||
Updated: 9, 2005 | Rating: 0 | Author: Viktor Korokhin | Size: 601 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
456. | HS SoBigRemover 1.2 (haysoft.com) | ||
software must be used to detect large number of SoBig viruses in an email account and delete them remotely without the need of downloading any of them to your machine. SoBig virus is large sized email so it uses network traffic when receiving to your machine. This software can be an | |||
Updated: 9, 2005 | Rating: 0 | Author: Cenker Sisman | Size: 576 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
457. | Iconic Tray 1.21 (iconictray.com) | ||
tray is easy: simply right-click (or middle-click) on the window's "Minimize" button. Anytime you want to view the minimized windows, just open the Iconic Tray icon to see a menu list - click on a window in the list and it's back on screen again. It really is that easy. Of course, if you had chosen to minimize to the system tray, just restore your window as you would any other | |||
Updated: 9, 2005 | Rating: 0 | Author: Dmitry Nikitin | Size: 47 kb | Shareware Go to category: Desktop > Other Similar programs | |||
458. | Identity Knight 1.3 (fspro.net) | ||
on secure technologies, we tend to neglect basic precautions. Let's look at Internet Explorer, the most popular web browser on the Net. On the one hand, starting with version 5, it offers a convenient AutoComplete feature, allowing you to enter your credentials once and let the program do the rest. On the other hand, though, Internet Explorer stores this information in an unprotected | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
459. | IntraMail 2003.01.20 (dplanet.ch) | ||
Secure exchange of messages in a local network Intranet (Windows 95, 98, Me, NT, 2000, XP). The mail (or Email) can be written or read from any PC easily. Every mail-account can be protected by a password. The personal messages are always strongly encrypted (with 3 adaptive codes). These short mails are Every mail-account can be protected by a password. Personal messages are strongly encrypted | |||
Updated: 9, 2005 | Rating: 42 | Author: Jean-Maurice Tellenbach | Size: 2918 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
460. | KeyIt! 2.0 (keyit.com) | ||
programs, and surf the web with just keystrokes. But that's not all. You can also download additional modules from our website which cater to specific tasks. For exmple, with our InternetStuff module, you have instant access to ten search engines, an encyclopedia, dictionary, thesaurus, auction search, or a stock quote, all simply by typing 'wwww'. With our | |||
Updated: 9, 2005 | Rating: 0 | Author: Kevin O'Donnell | Size: 2574 kb | Shareware Go to category: System Utilities > Clipboard Tools Similar programs | |||
461. | KeyText 2.25 (mjmsoft.com) | ||
Multi-purpose text and automation utility. KeyText stores pieces of text, ready to be typed or pasted into any application by a simple hotkey press or menu selection. "Right-click anywhere" feature makes form-filling easier than ever. Include commands to run programs, click buttons, change windows, visit | |||
Updated: 9, 2005 | Rating: 145 | Author: MJMSoft Design | Size: 623 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
462. | LetUknow 2.03 (mhsoftware.co.uk) | ||
LetUknow provides a "peace of mind" method of monitoring your LAN and resources. You can specify numerous jobs and tests in advance on a "set and forget" basis, which LetUknow then runs at regular intervals - you choose how often. If a test fails, the appropriate individuals are notified immediately, resources. You can specify numerous jobs and tests in advance on a "set and forget" basis, which LetUknow then runs at regular intervals | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Mace | Size: 2101 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
463. | Lock Folder 5.0 (realclicks.com) | ||
files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder works - all you have to do is to drag file or folder you want to lock to Lock Folder window, and the rest is done automatically. Now your data is protected, hidden and can not be accessed without entering your personal password. It is critical to have effective | |||
Updated: 9, 2005 | Rating: 146 | Author: Leo van Opstal | Size: 1400 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
464. | DVD Ripper Copy Pro Pro (ChineseEnglishTranslation.org) | ||
Ripper Copy Pro is the easiest way to copy DVD's. With DVD Ripper Copy Pro You Can: Copy DVD's to CDR and watch them on your DVD player. Copy DVD's to your computer and watch them on your computer.Make instant backups of your DVD's. Never worry about scratching or loosing your DVD's again! DVD Ripper Copy Pro is the easiest way to copy | |||
Updated: 9, 2005 | Rating: 16 | Author: Anderson Trueman | Size: 1000 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
465. | EscapeClose Pro 1.9 (sanapesoft.com) | ||
EscapeClose Pro is a tiny utility, allowing you to close or minimize the active window by pressing the Esc button. And now you can hide active window. Thus you can see it neither in the TaskBar nor in the Task Manager list (Ctrl+Alt+Del) nor in the list opening by pressing Alt+Tab. Or, to work more carefully | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Moshkov | Size: 319 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
466. | F-Secure Internet Security 2003 2003 (f-secure.com) | ||
now a highly advanced service against viruses and break-in attempts when you are connected to the Internet! F-Secure Internet Security 2003 includes an award winning antivirus software and an easy-to-use personal firewall product that protects your system against break-in attempts when you are connected to the Internet. Especially for home users and small offices without | |||
Updated: 9, 2005 | Rating: 45 | Author: F-Secure Corporation | Size: 6416 kb | Commercial Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
467. | Field Filler 1.00 (yildun.com) | ||
Field Filler is a HTML Form and clipboard tool software which can open and save various Field Filler text databases. With a Field Filler you can easily copy and paste from the clipboard your most used text and also you can fill an HTML Form fields with just a one click on the button. To copy text onto | |||
Updated: 9, 2005 | Rating: 0 | Author: Samir Alicehajic | Size: 738 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
468. | FileMap by BB 4.0.4 (dogkennels.net) | ||
Don't become complacent with Internet security. There could be times when your firewall is out-smarted allowing files to be secretly installed to hard disk through no fault of your own. For other reasons, files in the windows and system directories will mysteriously grow over time. If you had a record of | |||
Updated: 9, 2005 | Rating: 30 | Author: Bernie Madigan | Size: 144 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
469. | FileSpy 3.0 (ic.net) | ||
who are using a specific file. It also allows viewing of the user's rights to the file/directory, how the file was opened, the user's network address, and the date and time the user logged in to the network. With FileSpy you can also send messages to selected network users and if you have | |||
Updated: 9, 2005 | Rating: 0 | Author: Frank Kusluski | Size: 2014 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
470. | FileSpy Pro 2.0 (ic.net) | ||
With FileSpy Pro you can also send messages to users, clear user's connections, unlock locked files, get extended file information, and run queries against the log database to discover important details about file usage. FileSpy Pro is a powerful file monitoring utility for Novell file servers | |||
Updated: 9, 2005 | Rating: 0 | Author: Frank Kusluski | Size: 2322 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
471. | FlipPublisher 1.0 (flipalbum.com) | ||
FlipPublisher is an authoring tool for digital publications. With FlipPublisher, you can easily publish magazines, novels, textbooks, catalogs, brochures, portfolios, manuals, and more as a FlipBook on the Web or on CDs for viewing on a PC. FlipPublisher empowers the owners of content to become their own | |||
Updated: 9, 2005 | Rating: 88 | Author: E-Book Systems, Inc. | Size: 9239 kb | Shareware Go to category: System Utilities > Text/Document Editors Similar programs | |||
472. | FolderAccess 2.0 (lockfolder.net) | ||
files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder works - all you have to do is to drag file or folder you want to lock to Lock Folder window, and the rest is done automatically. Now your data is protected, hidden and can not be accessed without entering your personal password. It is critical to have effective | |||
Updated: 9, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 4313 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
473. | FontMap 2.41 (ccountry.net) | ||
FontMap may be used to view and print both installed and external fonts; it can display a variety of tables, individual characters, a keyboard view, font description, or whatever text you wish to enter. Individual characters can be displayed in a "full-screen" view and custom table parameters can be set to | |||
Updated: 9, 2005 | Rating: 0 | Author: Gary Dix | Size: 336 kb | Shareware Go to category: Desktop > Cursors & Fonts Similar programs | |||
474. | CopyLock 1.08 (noeld.com) | ||
which are currently in use (e.g. system files like comctl32.dll, or virus/trojan files.) Add the files to update, click Apply, restart and that's it! You can also list and edit the pending operations from the system after you ran an installer or view the processes which use the locked files | |||
Updated: 9, 2005 | Rating: 0 | Author: Noel DANJOU | Size: 121 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
475. | Crime Catcher 2.1 (crime-catcher.com) | ||
Crime Catcher is software for your webcam that allows your computer to act as a security system. The software will monitor for motion and if detected actions can take place. For a full list of features see below: Advanced motion detection; Every single pixel being monitored for change. Hide Crime | |||
Updated: 9, 2005 | Rating: 124 | Author: Edward Torkington | Size: 4373 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
476. | Custom StartUp 3.01 (gboban.com) | ||
you reject. This may be also useful in protection from some types of viruses. Custom StartUp helps you to manage which programs will be stared when Windows starts. Moreover, Custom StartUp allows you to backup and restore configurations later. Also, you can quickly apply start-up configuration and restart or shutdown your | |||
Updated: 9, 2005 | Rating: 0 | Author: Goran Boban | Size: 572 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
477. | Daily Backup 2.08 rel b (softwaremeister.com) | ||
Daily Backup quickly creates zip archives of just the changed (or created) files. Once you've set it up, you'll barely notice your safety net. Schedule your backups: as soon as you changed (or created) a file, at fixed time periods, when the screen saver is running, or on the end of the session. Note that see the generations of files; go back to a previous generation whenever you want | |||
Updated: 9, 2005 | Rating: 43 | Author: Thomas Gawehns | Size: 1319 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
478. | DataLock 1.0 (unicorntech.net) | ||
Most people store their information on their computer and expect it to be safe. But is it really safe? ...Achieve easy file - folder Security with Datalock for any file/folder, any size, any format - High ratio Data Compression achieved - Secure communication of data over internet, LAN/WAN - No need to | |||
Updated: 9, 2005 | Rating: 0 | Author: Parish Meghani | Size: 1213 kb | Demo Go to category: System Utilities > Other Similar programs | |||
479. | Delete 2.10 (eBible.org) | ||
ERASE internal command that comes with the operating system. Delete's features include: * allows multiple file specifications on the command line; * optionally deletes Hidden, System, or Read Only files; * optionally prompts for permission to delete any file; * optionally deletes files in | |||
Updated: 9, 2005 | Rating: 3222 | Author: Michael Johnson | Size: 67 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
480. | Personal Desktop Spy 2.10 (spyarsenal.com) | ||
Desktop Spy Agent is an invisible and easy-to-use PC activity monitoring tool that captures screenshots of the active application window or the entire desktop at the predefined time intervals varying from 1 second to several hours and saves the recorded images to a specified directory on the hard drive. The | |||
Updated: 9, 2005 | Rating: 0 | Author: Mikhail Kalinskiy | Size: 615 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
481. | DeviceLock Me 1.42 (protect-me.com) | ||
disk usage. It can protect network and local computers against viruses, trojans and other malicious programs often injected from removable disks. Network administrators can also use DeviceLock Me to flush a storage device's buffers. Remote control is also available. DeviceLock Millennium Edition gives network administrators control over which users can access what | |||
Updated: 9, 2005 | Rating: 16 | Author: Ashot Oganesyan | Size: 1167 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
482. | DirSpy 2.8 (ic.net) | ||
DirSpy allows you to see all those using network files within a specific directory. Other impressive features of DirSpy include extensive server/client information, volume information, volume disk space monitoring, directory information, deleted file information, the ability to salvage and purge deleted | |||
Updated: 9, 2005 | Rating: 0 | Author: Frank Kusluski | Size: 2745 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
483. | DriveScrubber 2.0a (iolo.com) | ||
before donating, reselling, recycling, or even cleaning up after virus attacks. It's fast and easy to use, and works with ANY PC, and wipes ANY drive, regardless of its | |||
Updated: 9, 2005 | Rating: 0 | Author: iolo technologies | Size: 729 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
484. | Always Right 3.0 (netopti.com) | ||
temp file). Always Right will find and delete them. So your computer's speed will become faster. And Always Right also adjust your system time with the world time. With Always Right, you can easily remove obsolete registry entries from software that you may have deleted years ago. You can sweep away those useless files that are just occupying space on your hard drive. A utility to | |||
Updated: 9, 2005 | Rating: 82 | Author: super hunter | Size: 2310 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
485. | Always Watching 1.0 (liquidmirror.com) | ||
Have you ever needed to know exactly when a file or folder changes on your system? Ever needed to monitor log file changes, watch incoming files on a server or simply wanted to monitor changes on a local hard drive or network share? Then Always Watching! is for you! Always Watching! allows you to watch | |||
Updated: 9, 2005 | Rating: 79 | Author: Mike Stevenson | Size: 1005 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
486. | AMI Font Wrangler 2.0d (mindworkshop.com) | ||
AMI Font Wrangler is the TrueType font manager that makes it easy to batch install, remove, rename, and copy fonts. You can quickly browse and weed installed and downloaded fonts, print a contact sheet, and resolve typeface name conflicts. If you install fonts in Windows, you will find that keeping track of | |||
Updated: 9, 2005 | Rating: 0 | Author: Alchemy Mindworks | Size: 1973 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
487. | AMI Ultimate Screen Clock 2.0a.05 (mindworkshop.com) | ||
Integrate a sophisticated digital or analog clock with your Windows desktop, schedule reminders and other tasks up to a century in advance, keep your system clock accurate with an Internet atomic time server and display your clock as a Windows screen saver. Among its many talents, AMI Ultimate Screen Clock | |||
Updated: 9, 2005 | Rating: 42 | Author: Alchemy Mindworks | Size: 3426 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
488. | Anti-Trojan Shield 2.1.0.14 (atshield.com) | ||
(ATS) is an advanced, highly effective blocker of Trojans, worms, viruses, backdoors, malicious ActiveX controls, and Java applets. It efficiently scans, detects, and removes malicious files, while maintaining an exceptional level of personal privacy and security. Without this tool, you definitely | |||
Updated: 9, 2005 | Rating: 280 | Author: ATShield Team | Size: 6366 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
489. | AnVir Task Manager 3.7 (anvir.com) | ||
tool that protects computer against viruses and manages running processes and startup files. 1. protect computer from been infected with viruses 2. cure infected computer 3. view full info about running processes including processor and memory usage 4. manage Windows startup files 5. access most often used applications and folders with automatically filled tray | |||
Updated: 9, 2005 | Rating: 121 | Author: Ivan Ivanov | Size: 350 kb | Shareware Go to category: System Utilities > Launchers & Task Managers Similar programs | |||
490. | AnVir Virus Destroyer 3.7 (anvir.com) | ||
tool that protects computer against viruses and manages running processes and startup files. 1. protect computer from been infected with viruses 2. cure infected computer 3. view full info about running processes including processor and memory usage 4. manage Windows startup files 5. access most often used applications and folders with automatically filled tray | |||
Updated: 9, 2005 | Rating: 82 | Author: Ivan Ivanov | Size: 350 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
491. | AppSpy 2.2 (ic.net) | ||
With AppSpy managers can easily track the usage of particular files and applications on a Novell Netware File Server within their company. Learn which files are most frequently used during the course of a day, week, month or year! You can also send messages to and clear connections of those users using a | |||
Updated: 9, 2005 | Rating: 0 | Author: Frank Kusluski | Size: 2019 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
492. | ArchiveXpert 2.02.80 (archivexpert.com) | ||
viewer to view files within an archive, and checking archives for viruses (external program needed) - Automatic installation of most software distributed in compressed files. - Internal viewer with support for over 35 different file formats - Complete integration with Windows (extracting | |||
Updated: 9, 2005 | Rating: 197 | Author: Jose Marques | Size: 1608 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
493. | Argentum Backup 2.50 (argentuma.com) | ||
Safely protects you from accidental deletes, overwrites, and viruses. Backups are stored in Zip files and can be created both manually and automatically (on schedule). Includes a number of templates to back up Windows registry, Windows desktop, Outlook folders, e-mail messages and address book, database of your favorite messenger: ICQ, MSN, Yahoo!, and AOL. Argentum Backup is | |||
Updated: 9, 2005 | Rating: 0 | Author: Argentum Corporation | Size: 1031 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
494. | Atomic Clock Sync 2.7.0.3 (ChaosSoftware.com) | ||
current time with the greatest accuracy available and update your PC's information. It can even be set to automatically check the time once a day to keep your PC's time accurate forever. Atomic Clock Sync will connect to one of the time servers operated by the National Institute of Standards | |||
Updated: 9, 2005 | Rating: 263 | Author: Bill Tiede | Size: 628 kb | Freeware Go to category: Network & Internet > Timers & Time Synch Similar programs | |||
495. | Innovatools Audit MP3s 1.5 (whatsonmycomputer.com) | ||
illegal, obsolete, unwanted or unneeded MP3 and media files and from viruses and trojans. Prevent RIAA (Recording Industry Association of America) lawsuits against you, your family or company. Innovatools Audit MP3s allows you to easily see the MP3 and other media files you have on your computer | |||
Updated: 9, 2005 | Rating: 0 | Author: Dominic Dan | Size: 784 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
496. | AutoSecretary 4.0 (autosecretary.com) | ||
Modern business is heavily relied on automatic telephony solutions. Managing customers' calls and providing support using voice lines is one of the most important tasks every business has to accomplish. The technology today offers various solutions, however most of them are very complicated, requiring a | |||
Updated: 9, 2005 | Rating: 0 | Author: Eugene Abramov | Size: 477 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
497. | avast! 4 Professional Edition 4.6.652 (avast.com) | ||
certified antivirus software for your company. avast! scans for viruses, worms and Trojans. avast! obtained multiple VB100% awards in 2002/5 Virus Bulletin comparative reviews. avast! Professional Edition includes the following components: On Demand Scanner - with two user interfaces | |||
Updated: 9, 2005 | Rating: 280 | Author: ALWIL Software | Size: 9250 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
498. | avast! Virus Cleaner 1.0.207 (avast.com) | ||
Virus Cleaner is a free tool that will help you remove selected virus & worm infections from your computer - it doesn't replace antivirus program! When your computer gets infected by a virus or worm, the virus often schedule itself to be run automatically when you start your operating system; some of them even register themselves to be run when any other | |||
Updated: 9, 2005 | Rating: 550 | Author: ALWIL Software | Size: 373 kb | Freeware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
499. | Back2Life 2.32 (GrandUtils.com) | ||
itself? Or, what if your deleted file didn't get to the Recycle Bin? Viruses will not send anything to the Recycle Bin! Give Back2Life a chance to find and unerase those files! Back2Life is a handy undelete and data recovery utility for Windows. Looking similar to Windows Explorer, it provides | |||
Updated: 9, 2005 | Rating: 606 | Author: Alex Mokrov | Size: 253 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
500. | Backup Forever 2.6 (schulers.com) | ||
Backup Forever program makes backup copies and restores them safely at the cost of speed and disk space. When this program makes a backup, it records as much extra information as possible to recover all information recorded on the backup even if a failure destroys some file regions. There are two versions | |||
Updated: 9, 2005 | Rating: 0 | Author: Joгo Schuler | Size: 1552 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
|
Home > Viruses software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|