|
|
| |
| Main ยป 2011 » January » 28
McAfee AVERT Stinger 10.1.0.1348 | 7.3 MB Stinger is a stand-alone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but rather a tool to assist administrators and users when dealing with an infected system. Stinger utilizes next generation scan engine technology, including process scanning, digitally signed DAT files, and scan performance optimizations. New releases of Stinger contain all families, and associated families, of threats that have achieved a Medium of higher Risk Asssessment. This Stinger is only updated upon the discovery of a new Medium or higher threat. This version of Stinger includes specific detection and repair for W32/Polip only. At this time, because of the nature of the infection algorithm, repair of files infected with W32/Polip may not return the files to their pristine, pre-infected s
...
Read more »
|
Kaspersky All versions 28 January 2011 Keys | 7 MB How to use keys: 1. Remove before old licenses 2. Activate by means of a code 3. Wait messages on a mistake 4. Below in a window to press (review) and to choose a key file 5. Press to activate Or: 1. Close your internet connection. 2. Select the trial activation. 3. It will want a key, as it can not connect to internet then, enter the key Download links : Download
|
Anti-Trojan Elite 5.3.2 | 6.6 MB Anti Trojan Elite(ATE) is a malware remover, it can detect and clean malware in disk or memory.Anti Trojan Elite provide a real-time malware firewall for user, once a trojan or keylogger would been loaded, the ATE can detect, block and then clean it in time before it starts. The ATE can detect more than 22000 trojans, worms and keyloggers currently, and the number of malware ATE could clean is growing up very quickly, we collect world-wide malwares, user can using our auto live update feature to get the power to clean these new malwares in time. Anti Trojan Elite has some useful utilities especially. The network utility can been used to disconnect suspicious TCP connections; The process utility can been used to kill suspicious processes even the process has the system priviage, even it has the ability to unload suspicious modules in all pr
...
Read more »
| |
|
|
|
| |
|
Statistics |
|
Total online: 6 Guests: 6 Users: 0 | |
|
|