|
||||||
|
||
|
Home > Delete trojan software |
Related keywords: delete, trojan, delete history, Trojan, anti trojan, Delete, delete files, secure delete, Trojan Horses, delete spam |
|
|
11. | avast! Virus Cleaner 1.0.207 (avast.com) | ||
other application is started. Removing of it is not as simple as deleting it - after deleting the worm file, your operating system might not be able to start your applications (such as Explorer) any more. In order to properly remove the worm from your computer, it is often necessary to make additional fixes in your system registry, delete the links from your Startup | |||
Updated: 9, 2005 | Rating: 550 | Author: ALWIL Software | Size: 373 kb | Freeware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
12. | CopyLock 1.08 (noeld.com) | ||
is a small program that allows replacing, moving, renaming or deleting one or many files which are currently in use (e.g. system files like comctl32.dll, or virus/trojan files.) Add the files to update, click Apply, restart and that's it! You can also list and edit the pending operations from the system after you ran an installer or view the processes which use the locked | |||
Updated: 9, 2005 | Rating: 0 | Author: Noel DANJOU | Size: 121 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
13. | DiamondCS ProcessGuard 3.150 (diamondcs.com.au) | ||
simply by terminating or modifying the host process. For example, a trojan could simply terminate your personal firewall before attempting to transmit your personal details over the Internet, effectively rendering the firewall useless and leaving the user with a false sense of security. Likewise, it could modify your antivirus program by patching it in memory so that it no longer | |||
Updated: 9, 2005 | Rating: 0 | Author: DiamondCS Support | Size: 1922 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
14. | Digital Patrol 4.10.07 (fcoder.com) | ||
is an effective antivirus scanner and monitor capable of finding and deleting all known types of trojan programs, Internet worms, script viruses and other harmful programs. Digital Patrol finds 100% of all tojan programs in The Wild, i.e. that trojan programs which are really spread over | |||
Updated: 8, 2004 | Rating: 0 | Author: Andy Karimov | Size: 4552 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
15. | Geek Superhero 1.3 (geeksuperhero.com) | ||
the change. This catches many of the modifications made by a virus, trojan or worm; protecting your computer from harm. (A "Computer Setting Firewall" is an excellent description.) It includes other features to help you protect your computer from hackers and worms by disabling rarely used Windows services, it helps you protect your privacy by blocking popup advertising windows | |||
Updated: 9, 2005 | Rating: 16 | Author: Michael Burford | Size: 2548 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
16. | PC DoorGuard 4 (astonsoft.com) | ||
intrusion scanner that scans any media on your PC for backdoors and trojan horses. PDG easily removes any found trojan with a click of a button, together with any elements it may have left in registry/system files/memory. PDG also constantly monitors your system to prevent further infection | |||
Updated: 9, 2005 | Rating: 42 | Author: Maxim Afanasjev | Size: 6879 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
17. | PestPatrol 3.0 (safersite.com) | ||
security may not even be visible to your current security tools. Trojan horses, hacker tools, and spyware can all sneak on to your network, bypassing existing security measures, and lurk silently until something - or someone - sets them off. And when that happens, you could lose passwords, customer data, intellectual property - even your web site or, if you telecommute and connect to | |||
Updated: 8, 2004 | Rating: 0 | Size: 3109 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
18. | PrivacyKeyboard 7.1.1 (anti-hack.biz) | ||
in any commercial, shareware, freeware products, as well as in Trojan programs, viruses of very different operation principles. PrivacyKeyboard does not use any signature bases so it can protect even against unknown software or hardware keyloggers! Once installed PrivacyKeyboard will protect your privacy immediately and constantly. PrivacyKeyboard is the first product of its kind in | |||
Updated: 2, 2006 | Rating: 16 | Author: Raytown Corporation LLC | Size: 3238 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
19. | PrivacyKeyboard 6.1 (anti-hack.biz) | ||
in any commercial, shareware, freeware products, as well as in Trojan programs, viruses of very different operation principles. PrivacyKeyboard does not use any signature bases so it can protect even against unknown software or hardware keyloggers! Once installed PrivacyKeyboard will protect your privacy immediately and constantly. PrivacyKeyboard is the first product of its kind in | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 2909 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
20. | RegistryProt 2.0 (diamondcs.com.au) | ||
the key change, reverting back to the original key setting, or deleting the key. RegistryProt's most useful attribute is that it will detect the vast majority of trojans at the exact moment that they infect/install themselves into your system, and as such provides a new dimension in trojan and intrusion detection. RegistryProt is a free, compact, realtime registry monitor and | |||
Updated: 9, 2005 | Rating: 493 | Author: Wayne Langlois | Size: 68 kb | Freeware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
|
Home > Delete trojan software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|