suspicious files free software


Search results for tag «suspicious files»:

Trustix AntiVirus 2005 2.2 Trustix AntiVirus 2005 2.2
… scanning, heuristics and process monitoring) to immediately start cleaning or quarantining suspicious files from your hard… 

Program Sleuth 2.0.6 Program Sleuth 2.0.6
… . You only need to buy it once! Program Sleuth features Highlight only suspicious programs Easily identify running programs on your computer Stop unwanted programs from running No subscriptions Requirements Microsoft .NET Framework 1.1… 

AIAB 1.1.0 AIAB 1.1.0
…  characteristics and lists any programs it finds suspicious. AIAB has options to try and disable malware it finds. AIAB features Checks connections and processes. Scans for start ups. Customizable start up scan options. Disable start ups.… 

Anti Trojan Elite 5.5.1 Anti Trojan Elite 5.5.1
… e. Internet Explorer and registry repair utility. Updating online supported, and auto check updates when ATE starts. Real-time registry monitor utility. Limitations Nag screen… 

Comodo AntiVirus 2.0.11.43 Beta Comodo AntiVirus 2.0.11.43 Beta
… ed by one of the world’s leading IT security providers, Comodo AntiVirus leverages multiple technologies (including on demand & on access scanning, email scanning, process monitoring and worm blocking) to immediately start cleaning or quarantining suspicious files from your hard drives, shared dis… 

iKnow Process Scanner 1.0.1 iKnow Process Scanner 1.0.1
… t install any new software recently, there is a high probability that you've got some sort of spyware running. And you will be able to detect it in just a second. The process database is updated daily and the program is absolutely free for use!… 

ZSKSoft Synchronizer 2.2 ZSKSoft Synchronizer 2.2
…  The unavoidable blunders (could not deliver the message, unable to read the disk, etc.) do not cause errors; they only have ZSync try a bit harder and take the necessary steps to ensure your work result's safety. Limitations 30 day trial… 

Networx 6.2.5 Networx 6.2.5
…  logged to a file, so that you can always view statistics about your daily, weekly and monthly bandwidth usage and dialup duration. The reports can be exported to a variety of formats, such as HTML, MS Word and Excel, for further analysis.… 

XRAY 1.1 XRAY 1.1
… n spot some 0day exploits since it doesnt only look for specific patterns but also suspicious data that is contained in most exploit codes. You want to be really secure? Then you need an IDS! Only a Firewall wont help much against attacks.… 

PC Security Explorer 2 PC Security Explorer 2
… p by scanning unused desktop icons, private cookies and temporary files Local Network - find out who and why accesses your data in local network Password Reminder - get your other program's forgotten password unhashed Limitations 30 days trial.… 


Related: