about suspicious shareware downloads


Search results for «about suspicious»:

Program Sleuth 2.0.6 Program Sleuth 2.0.6
… . You only need to buy it once! Program Sleuth features Highlight only suspicious programs Easily identify running programs on your computer Stop unwanted programs from running No subscriptions Requirements Microsoft .NET Framework 1.1… 

Trustix AntiVirus 2005 2.2 Trustix AntiVirus 2005 2.2
… ding IT security provider, Trustix AntiVirus 2005 leverages multiple security technologies (including on demand & on access scanning, heuristics and process monitoring) to immediately start cleaning or quarantining suspicious files from your hard… 

Networx 6.2.5 Networx 6.2.5
…  logged to a file, so that you can always view statistics about your daily, weekly and monthly bandwidth usage and dialup duration. The reports can be exported to a variety of formats, such as HTML, MS Word and Excel, for further analysis.… 

Anti Trojan Elite 5.5.1 Anti Trojan Elite 5.5.1
… e. Internet Explorer and registry repair utility. Updating online supported, and auto check updates when ATE starts. Real-time registry monitor utility. Limitations Nag screen… 

XRAY 1.1 XRAY 1.1
… n spot some 0day exploits since it doesnt only look for specific patterns but also suspicious data that is contained in most exploit codes. You want to be really secure? Then you need an IDS! Only a Firewall wont help much against attacks.… 

ZSKSoft Synchronizer 2.2 ZSKSoft Synchronizer 2.2
…  The unavoidable blunders (could not deliver the message, unable to read the disk, etc.) do not cause errors; they only have ZSync try a bit harder and take the necessary steps to ensure your work result's safety. Limitations 30 day trial… 

PC Security Explorer 2 PC Security Explorer 2
… ential security risk. You can scan your hard discs here looking for security threats. Internet Security section provides seven applications. You are able to check current Internet connections, set up blocking incoming connections and get all info about suspicious IP address. Now you can also chec… 

Ashampoo AntiSpyWare 1.60 Ashampoo AntiSpyWare 1.60
…  detection through emulation Generic binder detection Automatic Clean Engine Quarantine for suspicious files Realtime monitoring of the entire system Memory Scan detects active threats Automatic online-update Limitations 30 day trial… 

TaskPatrol Pro 2.0 TaskPatrol Pro 2.0
… idely today, since they can add new features to the Internet Explorer; however it is also the fact that more and more malicious software is taking advantage of this. Browser Guardian will protect your Internet Explorer from these unwanted plugins kno… 

XP Advanced Keylogger 3.89 XP Advanced Keylogger 3.89
…  XP Advanced Keylogger causes no suspicious slowdowns and takes very few system resources. all this is happening in full stealth mode so the person you are monitoring will never be aware of it. Requirements CPU:133MHZ RAM:32M DISKSPACE:5M… 


Related: about suspicious  suspicious  suspicious programs