Fast anti-malware module plus web control. Improved System and Application Guard keeps OS and applications protected, and the program activity tracker lets you review system modifications in real time. Enhanced proactive protection module blocks zero-day threats, and ID Block prevents confidential information like bank account numbers, logons and passwords from leaving your PC over IM, email or the web. The lightweight, highly-effective scanning engine combines anti-virus and anti-spyware capabilities to detect, disinfect and remove malicious programs automatically. The on-access monitor is constantly on guard against malicious programs attempting to activate on your PC. The on-demand scanner inoculates dormant threats in specified locations, and the mail scanner checks incoming/outgoing email. The attachment filter disinfects corrupted attachments and USB drives are scanned for potential malware threats. The Host Protection module protects against new and unknown malware. By preemptively blocking inappropriate program activity that might indicate an attack, Outpost prevents the high-level security breach techniques employed by rootkits. The constantly-updated URL blacklist automatically protects you as you explore the Web, steering you away from sites that may be infected with drive-by downloads or phishing attacks. Web Control also safeguards you against inadvertent disclosure of personal information, keeping your identity private. Outpost Anti-Virus cannot be deactivated by targeted attacks, a common way to disable active security protection. Defense functions are protected against tampering and termination by sandboxing critical components and ensuring continuous protection. No matter what you do on an Outpost-protected computer, it will always feel like the brand new because the program uses so few system resources. The SmartScan optimization greatly boosts subsequent scan speed and overall system responsiveness.
avast! Home is a free antivirus, anti-spyware and anti-rootkit solution for non-commercial home use. It scans for all forms of malware. avast! antivirus has obtained VB100% award, AV-Comparatives, ICSA Labs and many more. avast! scans: On Demand - with Skinnable Simple Interface, during Boot Time and On Access. It protects E-mail, HTTP, NNTP, ICQ, mIRC, Kazaa etc. True low bandwidth incremental updates.
Spyware Process Detector detects all processes running on the computer, including hidden ones and displays their color-coded threat rating based on the intelligent analysis of all hidden properties. The program is able to detect a process that contains and executes alien code of another process. Users will see the detailed information about any selected process and detect all hidden threats, including spyware, malware, keyloggers and Trojans.
Antivirus solution tailored for the needs of the file server. It is designed to use the capacity of the server and to work simultaneously with multiple files. Protects the key element of the network, where the most valuable corporate data is usually stored. FEATURES: Immediate detection of viruses and spyware: · Every time a file is opened, a scan for viruses occurs. If malware is found within the file, the antivirus will not allow it to be opened, and therefore further spreading is prevented. The infected file is repaired, renamed or destroyed, according to the software settings. High data throughput: · When loading files in multiple threads, the program scans all of them simultaneously. This means activity of the file server is not slowed even though it is often used by all the employees, and safety and efficiency are still maintained. Heuristic analysis: · Harmful codes can be detected using an updated database of virus samples. However, our software can also detect viruses that have just been discovered on the internet, and therefore have not yet been included in the database. It analyzes the program code, and according to suspicious symptoms or the code’s structure, malware can be identified. Software self-defense against attacks: · Antivirus system files are protected against attempts by a foreign application to change them. Such a change may be attempted by malware trying to disguise its presence on the computer, and may even try disabling the antivirus from service.
Mini Key Log monitors and records the activities of all users on a computer unnoticed. The monitoring captures not only the most common activities like keystrokes and visited websites, but also screenshots and many more. Mini Key Log is specially designed to monitor a computer quickly and easily.
Recovery for Word fixes corrupted Microsoft Word document files (.DOC). With Microsoft Word 2010 support, a great new user interface and numerous improvements to the recovery engine, the latest Recovery for Word is a most advanced document data recovery program available. Supports all modern file versions, including Word 2010/2003/XP/2000/97/95/6.0 documents. Recovers text and formatting. Recovers password-protected files (if password is known).
During reinstalling Windows on your PC, you inevitably end up losing your installed third party software and perhaps their license keys too. Before you reinstall Windows, it is essential that you note down the license keys for all the installed software in Windows. If you want to find and save the license keys of installed software, then you can use the free SterJo Key Finder.
FastAccess recognizes and tracks your face continuously to securely & automatically enter website passwords and dramatically reduce logging in with a password. With the help of FastAccess Pro you'll also be able to easily enforce parental controls and provide full-time security for your data when you step away.
Acronis Backup and Recovery 10 Online - a fast, secure and cost-efficient offsite data protection service from the leader in local and online disaster recovery. This subscription service, when used in conjunction with Acronis Backup & Recovery 10, offers the benefits of a dedicated remote datacenter providing backup & recovery redundancy without the high price tag.
SUPERAntiSpyware is the most thorough scanner on the market. Our Multi-Dimensional Scanning and Process Interrogation Technology will detect spyware other products miss! Easily remove over 1,000,000 threats! Repair broken Internet Connections, Desktops, Registry Editing and more with our unique Repair System. Dedicated Threat Research Team scours the web for new threats and provides daily definition updates.
Hard Drive Recovery program offers users to efficiently undelete entire lost important files and folders from hard disk drive or removable storage media devices and saved in diverse file formats including as txt, html, xls, pdf, pps, doc, gif, jpeg, png, exif, wmf, emf, jpg, bmp, tiff, riff, mp3, mp4, mpeg, 3gp, mpg, exe, zip and other similar extensions. Data restoring utility enable you to regain data even lost by using shit + delete keys.
Iperius Backup is one of the best free backup software, also released in commercial editions for those who need advanced backup features for their companies. The freeware version of Iperius Backup allows you to backup to any mass storage device, such as NAS, external USB hard drives, RDX drives, and networked computers. It has comprehensive scheduling and e-mail sending functions. It supports zip compression with no size limit, incremental backup, network authentication and the execution of external scripts and programs.
Kaspersky anti-virus protects you from the Phishing and Malware sites that you wouldn't otherwise know were attempting to steal from you. At the same time, the Kaspersky Security Network allows your computer to report when it discovers a threat that hasn't been seen before. All 250 million Kaspersky users benefit from our combined knowledge! Kaspersky features include: Protects from viruses, Trojans, worms, spyware, adware Scans files, email, and internet traffic Protects Instant Messengers Protects From Unknown Threats Analyzes and closes Internet Explorer vulnerabilities Disables links to malware sites / phishing sites Global Threat Monitoring (Kaspersky Security Network) Blocks all types of keyloggers Automatic Database Updates Free Technical Support Note: This is a 30-day commercial trial.