|
||||||
|
||
|
Home > Trojan software |
Related keywords: anti trojan, Trojan Horses, trojan scanner, trojan horse, Trojan Horse, delete trojan, anti trojan horse, trojan remover, trojan scan, trojan clear |
|
|
101. | RegBlock Spy Blocker 1.01 (regblock.com) | ||
RegBlock protects your computer against the installation spy software software before they can do their dirty work. With the single click of a button RegBlock users can select from a wide variety of software to block from every being installed. No longer will you have to worry that your child has accidentally | |||
Updated: 8, 2004 | Rating: 0 | Author: Jan Hertsens | Commercial Go to category: Security & Privacy > Other Similar programs | |||
102. | FolderSafe 2.1 (occultsoft.com) | ||
others. - Anyone who wants to protected his files/information from trojan or hackers. - Anyone who like to make more security for their sesitive folders/files. FolderSafe is a software tool that lets you hide or restrict access to non-virtual files and folders of your choice, manage your net shares. If you want to improve security of some sensitive folders/files, FolderSafe can | |||
Updated: 8, 2004 | Rating: 120 | Author: Ken Li | Size: 3066 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
103. | PC Activity Monitor Lite (PC Acme Lite) 7.2 (keyloggers.com) | ||
PC Activity Monitor Lite (PC Acme Lite) is designed for monitoring user's PC activity. PC Acme Lite works under Windows 2000/XP operating systems. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background, transparent for | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2774 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
104. | PC Activity Monitor Standard (PC Acme Standard) 7.2 (keyloggers.com) | ||
PC Activity Monitor Standard (PC Acme Standard) is designed for monitoring user's PC activity. PC Acme Standard works under Windows 2000/XP operating systems. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2915 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
105. | PestPatrol 3.0 (safersite.com) | ||
security may not even be visible to your current security tools. Trojan horses, hacker tools, and spyware can all sneak on to your network, bypassing existing security measures, and lurk silently until something - or someone - sets them off. And when that happens, you could lose passwords, customer data, intellectual property - even your web site or, if you telecommute and connect to | |||
Updated: 8, 2004 | Rating: 0 | Size: 3109 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Trojan software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|