|
||||||
|
||
|
Home > Trojan software |
Related keywords: anti trojan, Trojan Horses, trojan scanner, trojan horse, Trojan Horse, delete trojan, anti trojan horse, trojan remover, trojan scan, trojan clear |
|
|
51. | Npust Anti-spyware 8.0 (npust.com) | ||
Npust Anti-spyware can provide every computer with virtual protection against all types of unauthorized spyware and keystroke monitoring programs, both KNOWN and UNKNOWN. Npust Anti-spyware will find almost any spy related programs and its logged file on your system. This anti-spyware program will detect | |||
Updated: 9, 2005 | Rating: 42 | Author: GARY KUO | Size: 767 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
52. | Panda Antivirus Titanium 2.04.04 (aidsoft.com) | ||
viruses but also restores system settings damaged by the latest trojan horse technologies, and its low use of system resources. Coupled with a new best-of-breed truly automatic update system which takes advantage of your Internet connection to transparently update the virus signature files incrementally and its new innovative ease of use interface, Panda Antivirus Titanium is the | |||
Updated: 9, 2005 | Rating: 290 | Author: Gloria Menchacatorre | Size: 14828 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
53. | Password Officer DeLuxe 5.0 (compelson.com) | ||
possible encryption - AES -highly secure password generator -Trojan horse protection -dictionary attack protection -invisible keybord inputs -smart-card support Ultimate Web Engine The new Password Officer has a powerful engine with web-content scanner. It starts Internet Explorer, fills in the URL, waits until the page is loaded, fills in all fields, and finally clicks | |||
Updated: 9, 2005 | Rating: 0 | Author: COMPELSON Laboratories | Size: 934 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
54. | PC Activity Monitor Lite (PC Acme Lite) 7.2 (keyloggers.com) | ||
PC Activity Monitor Lite (PC Acme Lite) is designed for monitoring user's PC activity. PC Acme Lite works under Windows 2000/XP operating systems. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background, transparent for | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2774 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
55. | PC Activity Monitor Standard (PC Acme Standard) 7.2 (keyloggers.com) | ||
PC Activity Monitor Standard (PC Acme Standard) is designed for monitoring user's PC activity. PC Acme Standard works under Windows 2000/XP operating systems. All data collected by the monitoring are saved to the encrypted log file located on the user's machine. Monitoring program works in background | |||
Updated: 8, 2004 | Rating: 0 | Author: Raytown Corporation | Size: 2915 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
56. | PC DoorGuard 4 (astonsoft.com) | ||
intrusion scanner that scans any media on your PC for backdoors and trojan horses. PDG easily removes any found trojan with a click of a button, together with any elements it may have left in registry/system files/memory. PDG also constantly monitors your system to prevent further infection | |||
Updated: 9, 2005 | Rating: 42 | Author: Maxim Afanasjev | Size: 6879 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
57. | Personal Antispy 1.2 (blazingtools.com) | ||
Personal Antispy can provide every computer with strong protection against most types of unauthorized activity monitoring software, both known and unknown. It effectively finds and removes keyloggers, trojans and other spy software. Personal Antispy is based on wide knowledge of spy software behavior and | |||
Updated: 2, 2006 | Rating: 0 | Author: BlazingTools Software | Size: 327 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
58. | PestPatrol 3.0 (safersite.com) | ||
security may not even be visible to your current security tools. Trojan horses, hacker tools, and spyware can all sneak on to your network, bypassing existing security measures, and lurk silently until something - or someone - sets them off. And when that happens, you could lose passwords, customer data, intellectual property - even your web site or, if you telecommute and connect to | |||
Updated: 8, 2004 | Rating: 0 | Size: 3109 kb | Demo Go to category: Security & Privacy > Other Similar programs | |||
59. | PrivacyKeyboard 7.1.1 (anti-hack.biz) | ||
in any commercial, shareware, freeware products, as well as in Trojan programs, viruses of very different operation principles. PrivacyKeyboard does not use any signature bases so it can protect even against unknown software or hardware keyloggers! Once installed PrivacyKeyboard will protect your privacy immediately and constantly. PrivacyKeyboard is the first product of its kind in | |||
Updated: 2, 2006 | Rating: 16 | Author: Raytown Corporation LLC | Size: 3238 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
60. | PrivacyKeyboard 6.1 (anti-hack.biz) | ||
in any commercial, shareware, freeware products, as well as in Trojan programs, viruses of very different operation principles. PrivacyKeyboard does not use any signature bases so it can protect even against unknown software or hardware keyloggers! Once installed PrivacyKeyboard will protect your privacy immediately and constantly. PrivacyKeyboard is the first product of its kind in | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 2909 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Trojan software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|