|
|
| |
| Main » 2010 » March » 29
Radmin (Remote Administrator) is the world famous, award winning secure remote control software and remote access software which enables you to work on a remote computer in real time as if you were using its own keyboard and mouse. Radmin is fast and secure remote control and remote access software that enables you to work on a remote computer as if you were sitting right in front of it and access it from multiple places. Radmin includes full support for Windows Vista (32-bit and 64-bit), file transfer, multi-user text and voice chats, Windows security, Kerberos authentication, 256-bit AES encryption for all data streams, telnet access, multiple monitors support and unique DirectScreenTransfer™ technology. Radmin utilizes the ever-present TCP/IP protocol - the most widespread protocol used in LANs, WANs and the Internet. This means you can access your remote computer from anywhere in the wo
...
Read more »
|
Pointstone Total Privacy is a safe and easy-to-use to use privacy protection tool that stops all those pesky snoopers such as Cookies, history, index.dat, competitors (and even your boss!) from finding the trail of your computer use that modern internet browsers and many other programs leave behind. All this can be accomplished with a single click on the mouse, or even automatically! With Total Privacy you get total confidence and peace of mind for secure computer use by completely and permanently removing all traces and history of your recent activity. What's more, Total Privacy also helps improve and optimize your computer's performance. By deleting all those unnecessary temporary files, install/uninstall records and by cleaning your internet browser cache, Total Privacy will keep your computer functioning as smoothly and as quickly as it should. • Extensive Areas
...
Read more »
|
ZoneAlarm protects your sensitive personal and financial data from hacker attacks. It keeps your private information safe from the outside world, and can even track the source of intrusion attempts and map their whereabouts instantly, without exposing your identity or location. For iron-clad firewall protection, choose ZoneAlarm. Network and Program Firewall Delivers proactive firewall protection with multiple layers of security that stop inbound, outbound, and program attacks while remaining completely invisible to hackers. * Guards the network perimeter from inbound and outbound threats with the world's #1 firewall * Prevents spyware and other malicious programs from sending your personal information across the Internet * Full stealth mode to keep you concealed from anyone on the Internet * Protects your programs from malw
...
Read more »
|
Ad-Aware 8 is the latest version of Lavasoft’s industry leading anti-spyware solutions. Ad-Aware 2009 allows you to combat the growing threats and latest advancements of malicious spyware and malware. Building on 10 years of advanced malware detection, Ad-Aware Anniversary Edition provides comprehensive malware protection without loading down your system’s resources, bringing you the core competence you need to stay safe online. With behavior-based threat detection and integrated real-time monitoring, Ad-Aware Anniversary Edition focuses on core consumer security needs. Instead of adding layers of bells and whistles - thereby slowing your computer and scans down - we have decided to focus on what really matters. Anniversary Edition provides advanced threat protection, and is significantly lighter and faster than our previous versions. Ad-Aware 2009 protects you from spyware th
...
Read more »
|
Kaspersky Boot Rescue Disk - Kaspersky Lab's newest development, which allows you to completely kill any viruses, including even the most dangerous, with which it is impossible to get to boot Windows. Extras: The program is an iso-image of a multiboot disk. To work with him, you need to burn an ISO image to CD disc, then insert a disc in the CD-ROM, and boot from it. A unique feature of this tool is that it allows for booting from BIOS, even going into the system shell Windows. In fact, this almighty tool to combat viruses. Having him there, you can save a bad computer, and all the valuable information on it. Save the image to a CD using popular programs such as Nero, Alcohol, CloneCD, etc. Do not burn the disc at high speed, because you may have trouble reading. The optimum speed - 8h. Expose in the BIOS to boot from CD-ROM. Enter the BIOS setup screen can be strarte comput
...
Read more »
|
Anti Trojan Elite(ATE) is a malware remover, it can detect and clean malware in disk or memory.Anti Trojan Elite provide a real-time malware firewall for user, once a trojan or keylogger would been loaded, the ATE can detect, block and then clean it in time before it starts. The ATE can detect more than 22000 trojans, worms and keyloggers currently, and the number of malware ATE could clean is growing up very quickly, we collect world-wide malwares, user can using our auto live update feature to get the power to clean these new malwares in time. Anti Trojan Elite has some useful utilities especially. The network utility can been used to disconnect suspicious TCP connections; The process utility can been used to kill suspicious processes even the process has the system priviage, even it has the ability to unload suspicious modules in all processes; The registry repair utility can been use
...
Read more »
|
Stinger is a stand-alone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but rather a tool to assist administrators and users when dealing with an infected system. Stinger utilizes next generation scan engine technology, including process scanning, digitally signed DAT files, and scan performance optimizations. New releases of Stinger contain all families, and associated families, of threats that have achieved a Medium of higher Risk Asssessment. This Stinger is only updated upon the discovery of a new Medium or higher threat. This version of Stinger includes specific detection and repair for W32/Polip only. At this time, because of the nature of the infection algorithm, repair of files infected with W32/Polip may not return the files to their pristine, pre-infected state, and can cause problems with self-checking appli
...
Read more »
| |
|
|
|
| |
|
Statistics |
|
Total online: 1 Guests: 1 Users: 0 | |
|
|