suspicious files free software
Search results for tag «suspicious files»:
Trustix AntiVirus 2005 2.2
… scanning, heuristics and process monitoring) to immediately start cleaning or quarantining suspicious files from your hard…
Program Sleuth 2.0.6
… . You only need to buy it once!
Program Sleuth features
Highlight only suspicious programs
Easily identify running programs on your computer
Stop unwanted programs from running
No subscriptions
Requirements Microsoft .NET Framework 1.1…
AIAB 1.1.0
… characteristics and lists any programs it finds suspicious.
AIAB has options to try and disable malware it finds.
AIAB features
Checks connections and processes.
Scans for start ups.
Customizable start up scan options.
Disable start ups.…
Anti Trojan Elite 5.5.1
… e.
Internet Explorer and registry repair utility.
Updating online supported, and auto check updates when ATE starts.
Real-time registry monitor utility.
Limitations
Nag screen…
Comodo AntiVirus 2.0.11.43 Beta
… ed by one of the world’s leading IT security providers, Comodo AntiVirus leverages multiple technologies (including on demand & on access scanning, email scanning, process monitoring and worm blocking) to immediately start cleaning or quarantining suspicious files from your hard drives, shared dis…
iKnow Process Scanner 1.0.1
… t install any new software recently, there is a high probability that you've got some sort of spyware running. And you will be able to detect it in just a second. The process database is updated daily and the program is absolutely free for use!…
ZSKSoft Synchronizer 2.2
…
The unavoidable blunders (could not deliver the message, unable to read the disk, etc.) do not cause errors; they only have ZSync try a bit harder and take the necessary steps to ensure your work result's safety.
Limitations
30 day trial…
Networx 6.2.5
… logged to a file, so that you can always view statistics about your daily, weekly and monthly bandwidth usage and dialup duration.
The reports can be exported to a variety of formats, such as HTML, MS Word and Excel, for further analysis.…
XRAY 1.1
… n spot some 0day exploits since it doesnt only look for specific patterns but also suspicious data that is contained in most exploit codes.
You want to be really secure? Then you need an IDS! Only a Firewall wont help much against attacks.…
PC Security Explorer 2
… p by scanning unused desktop icons, private cookies and temporary files
Local Network - find out who and why accesses your data in local network
Password Reminder - get your other program's forgotten password unhashed
Limitations
30 days trial.…
Related: