Statistics |
---|
Total online: 2 Guests: 2 Users: 0 |
|
File Catalog
This program finds, moves, and renames files attacked by the 'I Love You' virus. Additionally, the developer recommends you delete your temporary Internet cache. |
A public service from Fresh Software to anyone concerned about the 'Back Orifice' trojan horse. AntiGen will detect, clean, and destroy the Back Orifice trojan horse from your computer, automatically. AntiGen uses a wizard interface and is very easy ... |
AntiFreeze is a life-saver utility which helps you in situations where you find your computer locked up. It is an emergency task manager utility which offers a last recourse when you find your computer in a hung state. |
This 'Personal' edition offers the comprehensive Anti-virus protections with very simple interface. The package has the simple installation procedure; moreover, it is designed to co-exist with other anti-virus products; therefore, users can utilize t... |
Check for and clean your system of viruses. |
Bliss AntiAdware Adload Trojans BHOs is a rootkit scanner that offers ability to scan for hidden files, registry entries, processes, drivers and hooked system service. It also includes the cleaning capability for hidden files and registry entries. |
Anti-VBScript is a quick hack to prevent VBScripts from executing automatically... ever. This prevents such wonderful virus as ILoveYou from ever even executing. |
Anti-Trojan Shield is an advanced, highly effective blocker of Trojans, worms, viruses, and other malicious tools. It efficiently scans, detects, and removes malicious files, while maintaining an exceptional level of personal privacy and security. |
Anti-Trojan is a fast and reliable trojan remover which detects and deletes trojan horses using a portscan, registry- and diskscan. It includes more than 9000 trojan signatures. Free online updates available. Additional feature: process-viewer plugin |
Anti-keylogger for Microsoft Windows 95/98/ME/NT/2000/XP is the FIRST product of its kind in the world that can provide every computer with strong protection against most types of unauthorized activity monitoring software, both KNOWN and UNKNOWN. |
|
|