Tuesday, November 19, 2013

COMODO Internet Security 6.3.301250.2972

COMODO Internet Security 6.3.301250.2972


COMODO Internet Security 6.3.301250.2972

Comodo Internet Security - a suite of programs for comprehensive protection for your computer, for many years, is popular among many users.Includes: COMODO Antivirus, COMODO Firewall and COMODO Defense +. Once you have downloaded this software package cwer.ws, you will be able to reliably protect your computer from all sorts of threats.

Perfectly balanced program complex for security on the web. The complex includes all the necessary tools for a quiet surf the Internet, to combat viruses, Trojans, adware-modules, etc.
Comodo Firewall and Comodo Antivirus can be installed separately, as independent of each other program, using the same installation file.

Features of Comodo Internet Security:
  • Monitor and scanner files
  • Email Scanner
  • Monitor processes, etc.
  • Automatic disinfection and quarantine
  • Working with different types of media and types of memory
  • Easy to use graphical user interface
  • Well thought-out settings
  • and more


OS: Windows 7 / Vista / XP SP2 / Windows 8.
Changes in version 6.3.301250.2972:
  • 0xc0000018 BSOD error randomly occurring during clean boot on Windows 8.1 x64

Download a set of programs COMODO Internet Security 6.3.301250.2972 (197,81 MB)



Monday, October 28, 2013

ClamWin Free Antivirus 0.98

ClamWin Free Antivirus 0.98


ClamWin Antivirus
ClamWin Antivirus - free antivirus, which is confined to catching various viruses, spyware, and other malicious applications. Please note that ClamWin does not scan files automatically, for filtering, you must manually start the program. A modified version of the popular antivirus ClamWin, specially designed for launch from a variety of portable storage devices. Simply indispensable to provide additional security of your PC.
ClamWin Antivirus
Features:
  • Scheduler scheduled scan
  • Automatic updating of antivirus databases. ClamAV team regularly updates virus databases immediately after the appearance of new viruses and their variants
  • Virus scanner
  • Integration in the context menu of Windows (Microsoft Windows Explorer)
  • Plug-in for Microsoft Outlook

ClamWin Antivirus
ClamWin Free Antivirus does not include antivirucnogo monitor to check the files "on the fly", so you have to manually scan a file in order to detect the virus. Plug-in for Microsoft Outlook, however, remove the infected file from the incoming e-mail messages automatically. There is also a plug-in for Mozilla Firefox, which can use ClamWin Free Antivirus to check the downloaded files for viruses (currently only supported version for Firefox).
OS: Windows 8/7 / Vista / XP / Me / 2000/98 and Windows Server 2012, 2008 and 2003.
Changes in version 0.98:
  • New virus signature targets enable detection of PDF, Flash, and Java class files.
  • New filetypes supported in the scanner include ISO9660, Flash and 7-zip self-extracting archives.
  • Performance and memory management improvements.

Download ClamWin Free Antivirus 0.98 (80,58 MB)



Thursday, October 17, 2013

Spybot - Search & Destroy 2.2.21 Final

Spybot - Search & Destroy 2.2.21 Final




Spybot - Search & Destroy - a utility for finding and removing spyware (spyware), commercials (adware), software, data thieves (hijackers) and other malicious software. Spybot - Search & Destroy scans your hard drive and registry of the operating system, finding there spyware and malicious keys. The application database is constantly updated by developers like updating anti-virus programs. The interface is simple and easy: the buttons and menu control - at least, to work with the program is easy. Before checking for the presence of spyware in it we suggest you make a copy of the registry. The program will also be rolled back, so you can always return the keys and files that have been deleted. Despite his gratuity, Spybot - Search & Destroy is one of the recognized leaders in their category.
Key features:
  • Scan your computer.
  • Recover deleted components in the event of a problem.
  • Immunization with the system by making changes to your browser (supports Internet Explorer, Firefox, Flock, K-Meleon and Opera), and the file hosts.
  • Automatic updates via the Internet.
  • Secure deletion of files.
  • Resident components: SDHelper - to protect against malicious ActiveX-components and TeaTimer - for the protection of critical operating system settings.
  • Viewing information about installed in the ActiveX-components, BHO, startup programs, sockets LSP indicating the degree of danger.
  • Browser browser start page and set them in the search engines.
  • Protection of the hosts file and settings Internet Explorer.
  • View the file hosts.
  • Function failure of mailings.
  • The list of processes running on the system with the ability to complete them.
  • Correction of errors in the registry.

OS: Windows XP SP2, Vista, 7, 8.
Changes in version 2.2.21:
While testing Windows 8.1 for Spybot + AV compatibility, we encountered changes to the Windows ® Security Center and some other security techniques that made an update to Spybot necessary.
Release 2.2 of Spybot will incorporate these modifications in order to ensure compatibility with Windows ® 8.1. All other changes are minor, which means that you will not need to upgrade from Spybot 2.1 to 2.2 unless you are planning on switching to Windows ® 8.1

Download Spybot - Search & Destroy 2.2.21 Final (38,77 MB)



Tuesday, October 15, 2013

avast! Free Antivirus 9.0.2006 Final 2014

avast! Free Antivirus 9.0.2006 Final 2014


http://www.freespywareremovalsoftware2011.com/

Avast! - antivirus software that can perfectly detect viruses on your hard disk, in his memory, boot sectors, etc. You can search for virus in the letters, embedded script blocker. Virus database is updated several times a day and can be downloaded via the Internet. Avast! has an intuitive interface that supports skins.

The main components of avast! Free Antivirus
  • Display a file system - the main component of the scanner in real time avast!. It keeps track of all files and programs on your computer
  • Screen-mail monitors all traffic programs for e-mail and scans all emails before they reach your computer, thus preventing possible damage.
  • Web-screen analyzes all your actions when visiting Web sites on the Internet and to prevent any threats before they zametit your web browser
  • Display monitors P2P download most applications, P2P (peer to peer programs), virtually all neutralizing the security risks associated with this type of program
  • Display of Internet chat intercepts all downloads of applications for instant messaging (ICQ, etc.) and checks them for viruses
  • Avast Antivirus Firewall monitors all network activity and blocks viruses that try to infect your system through the network. In addition, the screen is blocking access to known malicious Web sites
  • The screen monitors the system behavior for suspicious behavior, alert the user of any unusual activity


Operating system:
  • Windows 8 (any version, 32-bit or 64-bit)
  • Windows 7 (any version, 32-bit or 64-bit)
  • Windows Vista (all versions except Starter Edition, 32-bit or 64-bit)
  • Windows XP (with Service Pack Service Pack 2 or later) (any version, 32-bit or 64-bit)
  • Microsoft Windows 2000 Professional Service Pack 4.

Download antivirus avast! Free Antivirus 2014 9.0.2006 Final (81,32 MB)



Monday, September 3, 2012

Trojan Remover 6.8.4 Build 2610


Trojan Remover 6.8.4 Build 2610 

Trojan RemoverTrojan Remover aids in the removal of Malware – Trojan Horses, Worms, Adware, Spyware – when standard anti-virus software either fails to detect them or fails to effectively eliminate them. Standard antivirus programs are good at detecting this Malware, but not always so good at effectively removing it. Trojan Remover is designed specifically to disable/remove Malware without the user having to manually edit system files or the Registry. The program also removes the additional system modifications some Malware carries out which are ignored by standard antivirus and trojan scanners. Trojan Remover scans ALL the files loaded at boot time for Adware, Spyware, Remote Access Trojans, Internet Worms and other malware. Trojan Remover also checks to see if Windows loads Services which are hidden by Rootkit techniques and warns you if it finds any. For each identified Trojan Horse, Worm, or other malware, Trojan Remover pops up an alert screen which shows the file location and name; it offers to remove the program’s reference from the system files and allows you to rename the file to stop its activation.
Most modern Malware programs are memory-resident, which makes their de-activation more difficult. How many times have you been told to start your computer in ‘Safe’ mode, or even worse, in DOS? Trojan Remover does all this for you. When it finds Malware that is memory-resident, Trojan Remover automatically re-starts (on request) your system and completely DISABLES the Malware before Windows restarts.
Trojan Remover writes a detailed logfile every time it performs a scan. This logfile contains information on which programs load at boot-time, and what (if any) actions Trojan Remover carried out. The logfile can be viewed and printed using Notepad.
Trojan Remover is set to automatically scan for Malware every time you start your PC (you can disable this automatic scan if you wish).
Trojan Remover is designed for Windows 98/ME/2000/XP/Vista/Windows 7 – however it is not currently compatible with any 64bit versions of Windows.
Changes in  Version 6.8.4:
*Improved support for 64bit systems, including integration into the Windows Explorer context menu.
* Updated detection methods.
Size: 12.7 MB

Enhanced by Zemanta



McAfee Stinger 10.2.0.772


McAfee Stinger 10.2.0.772

Last update: 2012-09-03, 14:15   |   Views: 22,074   |   
Rating: 1.9/5 (246 votes cast)
Report about update 
McAfee StingerMcAfee Stinger detects and removes prevalent Fake Alert malware and threats identified in the “List Viruses” section of the Stinger application. While not a replacement for full fledged antivirus software, Stinger is updated multiple times a week to include detection for newer Fake Alert variants and prevalent viruses.
Stinger is a standalone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but rather a tool to assist administrators and users when dealing with an infected system. Stinger utilizes next-generation scan engine technology, including process scanning, digitally signed .DAT files, and scan performance optimizations. It detects and removes threats identified under the “List Viruses” icon in the Stinger application.
Stinger includes detection for all known variants: 
-W32/Anig.worm, -W32/Bagle, -Exploit-DcomRpc, -Exploit-Lsass,
-IRC/Flood.ap, -IRC/Flood.bi, -IRC/Flood.cd, -PWS-Narod,
-W32/Sdbot.worm.gen, -BackDoor-JZ, -BackDoor-AQJ,
-BackDoor-CFB, -Backdoor-CEB, -Bat/Mumu.worm; -IPCScan;
-NTServiceLoader; -PWS-Sincom.dll; -W32/SQLSlammer.worm;
-W32/Bagle.bf – .bg@MM; -W32/Bagle.bl@MM; -W32/Bagle.bj – .bk@MM;
-W32/Bagle.bi – bn@MM; -W32/Bagle.dldr; -W32/Bagle.bo – bt@MM;
-W32/Bagle.cc – .dd; -W32/Blaster.worm; -W32/Bropia.worm.a – .p;
-W32/Bropia.worm.bx/by; -W32/Bropia.worm.q – .u;
-W32/Bropia.worm.q – aj; -W32/Bugbear@MM; -W32/Bugbear.j@MM;
-W32/Deborm.worm.gen; -W32/Dumaru; -W32/Dumaru.bd – bg@MM;
-W32/Elkern.cav; -W32/Fizzer.gen@MM; -W32/FunLove;
-W32/IRCBot.worm; -W32/Klez; -W32/Lirva; -W32/Lovgate;
-W32/Lovgate.aq@MM; -W32/Lovgate.ar@MM; -W32/Korgo.worm;
-W32/Korgo.worm.aa.dam; -W32/Korgo.ag – .ai; -W32/Korgo.worm.ae;
-W32/Korgo.worm.aj; -W32/Mimail; -W32/MoFei.worm; -W32/Mumu.b.worm;
-W32/Doomjuice.worm; -W32/Mydoom; -W32/Mydoom.ad – .ah@MM;
-W32/Mydoom.an@MM; -W32/Mydoom.ao – bb@MM; -W32/Mydoom.bc – bd@MM;
-W32/Mydoom.be@MM; -W32/Mydoom.bf – bi@MM; W32/Mydoom.bw@MM;
-W32/Nachi.worm; -W32/Netsky; -W32/Netsky.ag@MM; -W32/Nimda;
-W32/Nimda.u@MM;-W32/Bagle.ba – .bd@MM, -W32/Bagle.bh – bm@MM;
-W32/Netsky.ah – .ai@MM, -W32/Pate; -W32/Pate.d; -W32/Sasser.worm;
-W32/Sasser.worm.g; -W32/SirCam@MM, -W32/Sobig; -W32/Sober;
-W32/Sober.j@MM, -W32/Sober.k@MM, W32/Sober.l@MM;
-W32/Sober.m – .p@MM; W32/Sober.r@MM; -W32/Swen@MM; -W32/Yaha@MM;
-W32/Zafi; -W32/Zafi.c@MM; -W32/Zafi.d@MM; -W32/Zafi.e@MM;
-W32/Zindos.worm; – W32/Zobot.worm
Windows ME and XP utilize a restore utility that backs up selected files automatically to the C:\_Restore folder. This means that an infected file could be stored there as a backup file, and VirusScan will be unable to delete these files. You must disable the System Restore Utility to remove the infected files from the C:\_Restore folder.
Homepage – http://www.mcafee.com
Size: 9.47 MB

Enhanced by Zemanta



Rising PC Doctor 6.0.5.58


Rising PC Doctor 6.0.5.58 

Rising PC DoctorRising PC Doctor, professional and smart security tool to computer users. With its seven key functions of automatic malware analysis, immunization of USB storage devices, ability  to  repair Microsoft Internet Explorer & Windows, Trojan Behavior Detector & Blocker, protection against malicious websites, Internet Explorer protection and Trojan Download blocker, Rising PC Doctor will greatly enhance your protection against malware and cyberthreats.
Trojan Behavior Detector & Blocker
Rising PC Doctor can detect the majority of Trojans and a even great number of other malware upon startup before they can execute their malicious function. This function will significantly increase your protection from cyber threats.
Trojan Download Blocker
After successful infection, many viruses automatically start to download large numbers of Trojans and other malware. The Trojan blocking technology of Rising PC Doctor ensures that even an infected computer will not download any other viruses and stop the spreading of whole families of Trojans.

Automatic Malware Analysis

AT boot, Rising PC Doctor can automatically scan for potentially unknown malware. When permitted by the user, possible malware is automatically transferred to Rising’s Automated Malware Analyzer (RsAMA) for detailed analysis. The user is informed about the result of the analysis and can quickly react to new threats for which conventional protection is not yet available. Analysis metadata collected by the community of Rising users (Rising Cloud Security) will be stored in the Rising Security Database (RsSD), providing up-to-date information about cyber security.
Main Functions:
1. Completely Redesigned Vulnerability Scan. The completely redesigned Vulnerability Scan of Rising PC Doctor can detect vulnerabilities in Microsoft Windows, its security settings and third party software from many manufacturers. With the easy to use interface, even inexperienced users can handle potential vulnerabilities in the operational system and a lot of other major software applications.
2. Strong Ability to Repair Microsoft Internet Explorer & Windows. Rising PC Doctor can fix the Internet Explorer on many computers whose homepage has been changed by malware, which are permanently displaying adware or which are plagued by many other problems. On such computers, Rising PC Doctor can help you to repair the system registry, system settings and the host file.
3. Powerful Process and Startup Management. This function gives you better control over drivers, programs loaded at boot, Active X controls and other important software influencing the operation of your computer.
4. Advanced Tools for Experienced Users. Rising PC Doctor provides additional tools for experienced computer users such as Disk Cleanup, System Startup Management, Service Management, Network Application Management, LSP Repair, File Shredder, and Special Virus Removal Tools which are designed to eliminate only a limited number of viruses.
Other Functions:
1. Spyware Scan & Removal. Rising PC Doctor can detect and completely remove many kinds of especially obnoxious spyware from your computer.
2. Strong Protection against Current Trojans. Rising PC Doctor detects and destroys millions of current Trojans designed to steal valuable user information such as online gaming or online banking accounts.
3. Privacy Protection. Rising PC Doctor protects your privacy. With Rising PC Doctor, even inexperienced users can conveniently delete potentially sensitive information such as browser and media player history or the list of last files opened under Microsoft Office.
Support System: Windows 2000/XP/2003/Vista
Size: 9.18 MB

Enhanced by Zemanta