|
||||||
|
||
|
Home > Trojan software |
Related keywords: anti trojan, Trojan Horses, trojan scanner, trojan horse, Trojan Horse, delete trojan, anti trojan horse, trojan remover, trojan scan, trojan clear |
|
|
1. | Anti-BO 1.5b (swiftp.com) | ||
device which sits in your system tray awaiting hack attempts from Trojan programs like Back Orifice and Netbus. The program works my making your system look vulnerable to those who scan the internet for infected machines, and logs attempts of entry with your attackers IP address & date/time info, and | |||
Updated: 3, 2005 | Rating: 95 | Author: Ben Hynes | Size: 1100 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
2. | Easy Spyware and Adware Killer 1.1 (easyspywarekiller.com) | ||
spy software, spyware and adware detector. The software goes after Trojan horses, adware, key loggers, dialers, spy cookies, and system-monitoring tools. Easy Spyware and Adware Killer is an award-winning spy software, spyware and adware detector. The software goes after Trojan horses, adware, key loggers, dialers, spy cookies, and system-monitoring | |||
Updated: 9, 2005 | Rating: 169 | Author: Christian Champion | Size: 294 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
3. | Protector Plus for Windows XP/2000 7.2.H03 (protectorplus.com) | ||
Protector Plus is an anti-virus software designed for Windows NT/2000/XP. Protector Plus detects all types of viruses, trojans, worms and spyware before they enter the computer and removes the virus. Protector Plus ensures that the computer is virus free. Protector Plus is packed with many useful features | |||
Updated: 2, 2006 | Rating: 42 | Author: Bob Watson | Size: 5959 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
4. | DriveCrypt 3.03a (drivecrypt.com) | ||
that prevent passwords from being sniffed by Hackers or Trojan horses such as Back Orifice, SubSeven DRIVECRYPT makes Dictionary or Brute Force attacks against encrypted volumes much harder than any of the actual competitor products. DriveCrypt is the most powerful, flexible and fast cryptographic program available on the market today, bringing 1344 Bit Military Strength | |||
Updated: 9, 2005 | Rating: 0 | Author: Wilfried Hafner | Size: 3222 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
5. | PC Activity Monitor (PC Acme) 6.4 (softsecurity.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. It is a | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 976 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
6. | PC Activity Monitor Net (PC Acme Net) 6.4.1 (keyloggers.com) | ||
PC Activity Monitor Netâ„¢ is ultimately invisible and undetectable easy-to-use surveillance software for both networked and personal PCs. It is professional keylogger software that captures all users' activity on the PC. All data collected through the monitoring are saved to an encrypted log file. The log | |||
Updated: 3, 2006 | Rating: 0 | Author: Raytown Corporation LLC | Size: 980 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
7. | PC Activity Monitor Pro (PC Acme Pro) 6.4.1 (softsecurity.com) | ||
PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. All data collected by the monitoring are saved to encrypted log file. The log file | |||
Updated: 3, 2006 | Rating: 157 | Author: Raytown Corporation | Size: 1192 kb | Shareware Go to category: Security & Privacy > Covert Surveillance Similar programs | |||
8. | Advanced Administrative Tools 5.92 (glocksoft.com) | ||
Today there is no program, either anti virus nor anti trojan, that can detect unknown trojan horses. To secure your network, you may need to lock down applications that aren't required by any function you currently use. To do this effectively, you have to know what ports are available and what application is utilizing them. AATools Network Monitor displays the | |||
Updated: 2, 2006 | Rating: 173 | Author: Alex Markov | Size: 3087 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
9. | AlertWall Personal Firewall 2.6.0 (alertwall.com) | ||
information from the Internet (SpyWare). AlertWall tells you if Trojan Horse Programs are attempting to act as a server (possibly receiving instructions or sending important data to a hacker). AlertWall blocks Hackers that try to access your computer from the Internet or network. AlertWall Learns how you use your computer. When new threats are encountered, AlertWall asks you whether | |||
Updated: 9, 2005 | Rating: 79 | Author: A1Tech Inc. | Size: 3250 kb | Shareware Go to category: Servers > Other Server Applications Similar programs | |||
10. | Vanquish Personal Anti Spam (vqME.com) 3.0 (vanquish.com) | ||
and identity-theft. Don’t rely on spam filters. Block spam and trojan threats before they reach your computer. A complete suite of anti-spam software technologies in one. E-mail security features, including SurfMatch and SmartSubject automatically adapt to your e-mail habits. vqME AntiSpam works with all common e-mail clients such as Outlook, Outlook Express, Eudora, IncrediMail | |||
Updated: 9, 2005 | Rating: 0 | Author: Michael Morgovsky | Size: 1593 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
|
Home > Trojan software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|