Site hosted by Angelfire.com: Build your free website today!

Home   

 

 

Highflow02 Network 

               Essentials

 The ONLY recommended  pc tracks remover is linked from the bottom of the page. Robin Hood Software is worth a visit click at the bottom of the page,

it's worth a visit.

     The preferred programs are in bold font

 

 

  Kerio Personal Firewall 
Description: Kerio Personal Firewall (KPF) is a software agent that builds a barrier between your personal computer and the Internet. KPF is designed to protect your PC against attacks from both the Internet, and other computers in the local network. KPF controls all data flow in both directions – from the Internet to your computer and vice versa, and it can block all attempted communication allowing only what you choose to permit. Kerio Personal Firewall protects against information theft, modification or destruction, Trojan horse applications, spyware, unauthorized access from within the local network, denial of service attacks to applications or services. Available FREE for home use.
Version: 2.1.4 Filesize: 2.05 MB
Added on: 25-Mar-2002 Downloads: 4074 Rating: 8 (6 Votes)
HomePage | Rate Resource | Report Broken Link | Details

 Sygate Personal Firewall PRO 
Description: Sygate Personal Firewall PRO has redefined the personal firewall market with a multi-layered shield of network, content, application, and operating system security. Sygate Personal Firewall PRO protects your system from intrusions designed to exploit vulnerabilities in Internet and Intranet communication. It is the ultimate desktop security solution trusted by professionals and relied upon by millions of users.
Version: 5.0 Filesize: 4.84 MB
Added on: 07-Mar-2002 Downloads: 2044 Rating: 9 (10 Votes)
HomePage | Rate Resource | Report Broken Link | Details | Comments (2)

 

  Zone Alarm (free 3.7.193.0 ) 
Description: ZoneAlarm Free is the award-winning personal firewall that automatically blocks known and unknown Internet threats, barricading your PC against hackers and data thieves. It's easy to install and use. Why risk it? Get protected.
Version: v3.7.193.0 Filesize: 2.67 MB
Added on: 11-Mar-2002 Downloads: 3603 Rating: 8 (6 Votes)
HomePage | Rate Resource | Report Broken Link | Details

  Zone Alarm 2.6.362 Free 
Description: ZoneAlarm is designed to protect your DSL or cable-connected PC from hackers. This program includes four interlocking security services: a firewall, an Application Control, an Internet Lock, and Zones. The firewall controls the door to your computer and allows only traffic that you understand and initiate. The Application Control allows you to decide which applications can and cannot use the Internet. The Internet Lock blocks Internet traffic while your computer is unattended or while you are not using the Internet, and it can be activated automatically with your computer's screensaver or after a set period of inactivity. Zones monitor all activity on your computer and alert you when a new application attempts to access the Internet. ZoneAlarm 2.6 features a new tutorial, improved color-coded Alerts with ratings and advice, as well as enhanced online help. ZoneAlarm 2.6 also has "hardened" security at the operating system level to safeguard users from the latest forms of Internet sabotage and includes improved intrusion blocking. Version 2.6.357 features improved advice for every alert, support for Windows XP, improved stability, bug fixes related to Windows NT and SP6A, blocking for uncommon IP protocols, and more. This download is free for individuals and nonprofit organizations.
Version: 2.6.362 Filesize: 2.80 MB
Added on: 26-Sep-2002 Downloads: 2311
HomePage | Rate Resource | Report Broken Link | Details

 


Anti virus
there's  only one that has a 100% trojan / virus

Catch rate AND does NOT parasitically bog down your pc with excessive memory consumption ( slow it up )

 

 AVG Anti-Virus  Popular
Description: AVG Professional Single Edition provides comprehensive antivirus protection for personal computers. The unique combination of detection methods (heuristic analysis, generic detection, scanning and integrity checking) ensures that your computer receives the maximum protection possible on multiple levels (Resident Shield, Email Scanner plugins, Personal Email Scanner, On-Demand and other tests, etc.).
Version: 7.0 Filesize: 6.25 MB
Added on: 30-Dec-2003 Downloads: 6543 Rating: 9 (14 Votes)
HomePage | Rate Resource | Report Broken Link | Details

  AVG GRISOFT.COM VERSION 7.0 TRIAL VERSION  Popular
Description: NEW FOR GRISOFT.COM ; A TRIAL VERSION OF THEIR BIG VERSION 7.0 ANTI-VIRUS SOFTWARE. thirty day free trial version.
Version: v.7.0 temp Filesize: 11 bytes
Added on: 27-May-2004 Downloads: 10563
HomePage | Rate Resource | Report Broken Link |
Details

 

Anti-Trojan Tools

 

  1-TrojanHunter v3.85  Popular
Description: TrojanHunter searches for and removes trojans from your system. You have the ability to add custom trojan definitions and detection rules. If you are downloading files from the Internet, you need TrojanHunter! Features: High-speed file scan engine capable of detecting modified trojans Memory scanning for detecting any modified variant of a particular build of a trojan Registry scanning for detecting traces of trojans in the registry Inifile scanning for detecting traces of trojans in configuration files Port scanning for detecting open trojan ports The Advanced Trojan Analyzer, an exclusive feature of TrojanHunter, is able to find whole classes of trojans using advanced scanning techniques TrojanHunter Guard for resident memory scanning - detect any trojans if they manage to start up LiveUpdate utility for effortless ruleset updating via the Internet Add custom trojan definitions and detection rules Process list giving details about every running process on the system, including the path to the actual executable file Accurate removal of all detected trojans - even if they are running or if the trojan has injected itself into another process Built-in netstat viewer Extensive help files Free technical support via e-mail Recommended for w9x and ME What's new in TrojanHunter 3.85? --------------------------------- - Fixed "Automatically remove trojans" setting not being saved - Fixed "Unable to delete temporary file" errors - Fixed access violation when right-clicking guard icon on 9x while guard still loading - Fixed problem in unpacking engine on Win9x/WinMe - Fixed rare problem on Windows versions with old Richedit component causing "Line insertion error" on scanning
Version: v3.82 Filesize: 5.39 MB
Added on: 08-May-2002 Downloads: 66478 Rating: 8 (15 Votes)
HomePage | Rate Resource | Report Broken Link | Details

  Active Ports  Popular
Description: Active Ports - easy to use tool for Windows NT/2000/XP that enables you to monitor all open TCP/IP and UDP ports on the local computer. Active Ports maps ports to the owning application so you can watch which process has opened which port. It also displays a local and remote IP address for each connection and allows you to terminate the owning process. Active Ports can help you to detect trojans and other malicious programs
Version: 1.2 Filesize: 450 bytes
Added on: 09-Mar-2002 Downloads: 9792
HomePage | Rate Resource | Report Broken Link | Details

  BOClean  Popular
Description: Hundreds of thousands of "hackers" and information seekers are lurking on the internet, just waiting to get a trojan horse installed on your PC, access it and find what's on your system. BOClean is your best defense against them. No wading through dozens of false alarms only to discover that you're unable to remove a trojan that's deeply seated in your registry, while realizing your system's contents have already been accessed.
Version: 4.1 Filesize: 0 bytes
Added on: 13-Mar-2002 Downloads: 14906
HomePage | Rate Resource | Report Broken Link | Details

  ewido security suite  Popular
Description: XP - Win2000 (only)
ewido networks international Removes Trojans, keyloggers and other spyware
Over 39.000 effective signatures
Worldwide unique and efficient protection system
Discovers modified and hidden threats
Overview of all runnig processes and connections
Erases unneeded data irrecoverably
Get more information about our solution..

The awarded and worldwide used tool for securing your own operating system from espionage is now fully integrated into the ewido security suite. Download now for free! Why do I need a Trojan-scanner? There are only reports about dangerous viruses and worms in the media! Are Trojans really a serious threat to me? I have installed both a virus scanner and a firewall.
That should keep me secure... Learn the truth now!


Version: 1.0 Filesize: 1.61 MB
Added on: 17-May-2004 Downloads: 5798 Rating: 9 (4 Votes)
HomePage | Rate Resource | Report Broken Link | Details

  PCLogger - detects unauthorised PC changes 
Description: A simple program that sits in the background, monitors and logs important PC activities and changes. This should be an ideal companion to your Anti-virus program. It does not use any virus definition file.
Version: 2.8 Filesize: 48.82 Kb
Added on: 06-Jun-2004 Downloads: 974
HomePage | Rate Resource | Report Broken Link | Details

  Peper Removal Tool  Popular
Description: Tool for removal of the Peper Trojan a/k/a SandBoxer
Version: Filesize: 800.00 Kb
Added on: 13-Feb-2004 Downloads: 11003 Rating: 10 (7 Votes)
Rate Resource | Report Broken Link | Details | Comments (1)

  Tauscan  Popular
Description: Tauscan is a powerful Trojan Horse detection and removal engine capable of catching every known type of backdoor that can threaten your system. It works unobtrusively in the background to prevent attack and uses minimal system resources. Its user-friendly interface, innovative features such as drag & drop scan, right-click scan and a Setup Wizard were designed to enable novice users to configure the application and to use it effectively without the need of any computer skills (Trialware)
Version: 1.6 Filesize: 1.43 MB
Added on: 10-Mar-2002 Downloads: 11145 Rating: 5 (4 Votes)
HomePage | Rate Resource | Report Broken Link | Details

  TDS3  Popular
Description: Welcome to the home of DiamondCS TDS-3! Rated by professionals as the world's most advanced and comprehensive anti-trojan system, TDS-3 is the result of over half a decade of concentrated anti-trojan pioneering research and development. With a laboratory spearheaded by internationally respected anti-trojan specialist Wayne Langlois, DiamondCS Australia continue to develop powerful new ground-breaking trojan detection techniques, most exclusive to TDS-3 giving trojans nowhere to hide and TDS-3 an enormous technological advantage. Backed up with an arsenal of over sixty support programs, a built-in programming language, email support answered by specialists and a private discussion forum for licensed users, TDS-3 stands in a class of its own at the pinnacle of anti-trojan defence.
Version: v3.2.0 Filesize: 6.68 MB
Added on: 13-Mar-2002 Downloads: 5147
HomePage | Rate Resource | Report Broken Link |
Details

  The Cleaner  Popular
Description: Features include: Easy to use interface Huge database (over 3800 entries) Constantly updated Fastest scanning engine (~2 million trojans/sec) Inspects ZIP, RAR, ARJ, ACE and CAB archives Finds stealth trojans using our exclusive FileSpect(TM) technology TCActive! stops trojans before they can activate Interactive trojan database browser Install and uninstall No conflicts with any programs Operating systems supported: Windows95 Windows98 WindowsME WindowsNT4 Workstation WindowsNT4 Server Windows2000 Pro Windows2000 Server WindowsXP Home WindowsXP Pro
Version: v4.1 Filesize: 1.79 MB
Added on: 13-Mar-2002 Downloads: 13164 Rating: 9 (2 Votes)
HomePage | Rate Resource | Report Broken Link | Details

  Trojan Simulator 
Description: For years you have been able to test your virus scanner with the harmless "Eicar" test file. Using the just released "Trojan Simulator" you can now test your trojan scanner in the same manner, using a harmless demonstration trojan. This is a risk-free way to see how your security software behaves in a real-world situation.
Version: 1 Filesize: 0 bytes
Added on: 02-Jan-2003 Downloads: 4150
HomePage | Rate Resource | Report Broken Link | Details

 


              System  Integrity programs

 

  1st Security Agent 
Description: Secure your PC with 1st Security Agent. It offers an administrative support for controlling which users are allowed to access your PC and the level of access each user may have. You can restrict access to Control Panel applets, disable Start Menu items, hide local and network drives, disable DOS, boot keys, Registry editing, taskbar, task manager, and network access, hide desktop icons, password-protect Windows and restrict users to running specific applications only. Secure Internet Explorer, disable individual menu items, prevent others from editing Favorites, disable individual tabs in the Internet Options dialog, as well as specific settings from each tab. It also offers a flexible and complete password protection.
Version: 4.7 Filesize: 0 bytes
Added on: 27-Dec-2002 Downloads: 1000
HomePage | Rate Resource | Report Broken Link | Details

  Access Administrator 
Description: Protect your computer and restrict access to Internet with Security Administrator. This password-protected security utility enables you to impose a variety of access restrictions to protect your privacy and stop others from tampering with your PC. You can deny access to each individual component of several Control Panel applets, including Display, Network, Passwords, Printers, System and Internet Options. You can disable your boot keys, context menus, DOS windows, Registry editing, Internet and Network access. Hide your desktop icons, individual drives, Start menu items, or even the entire taskbar. You can also apply password protection to Windows and restrict users to running specific applications only, Control Internet Usage, view statistics of computer use by your kids or employees. Security restrictions can be applied universally or to specific computer users. You'll find the program interface very easy to negotiate.
Version: 9.2 Filesize: 0 bytes
Added on: 27-Dec-2002 Downloads: 820
HomePage | Rate Resource | Report Broken Link | Details

  AIDE 
Description: AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire. It does the same things as the semi-free Tripwire and more.

There are other free replacements available so why build a new one? All the other replacements do not achieve the level of Tripwire. And I wanted a program that would exceed the limitations of

 

 

                                  Anti-spyware

 

 

  Ad-aware 6.0 build 181  Popular
Description: Publisher's Description With its ability to scan your RAM, Registry, hard drives, and external storage devices for known data mining, advertising, and tracking components, Ad-aware can easily rid your system of these tracking components, allowing you to maintain a higher degree of privacy while you surf the Web. The redesigned user interface improvements include more flexibility and control. This includes user-defined file sizes, which speeds up the scanning process by excluding files that it recognizes as clean. Other advanced features include automatic quarantine and Recycle Bin storage of removed components, an all-new viewer for backup archives that allows you to quickly and easily review components that have been removed and stored for future restoration, and an integrated reference file updater that can automatically search for new reference files when Ad-aware is started. The latest version includes improved Browser Hijacker detection, HOSTS file scanning, smart scan mode which improves speed and has been optimized to detect content at the root, and much more. Be aware that some ad-supported programs, such as GoZilla Free, will no longer function if you remove their ad modules. Note: This version of Ad-aware detects the CNET Download Manager, powered by the Kontiki Delivery Network, as adware. To avoid uninstalling the CNET Download Manager, please exclude any Kontiki files currently recognized by Ad-aware.
Version: vs6.0 (181 Filesize: 0 bytes
Added on: 03-Aug-2003 Downloads: 59987 Rating: 10 (22 Votes)
HomePage | Rate Resource | Report Broken Link | Details | Comments (2)

  AdShield 3.0.8.0 New last 3 days
Description: AdShield is a banner ad blocker that improves browser performance and usability by suppressing the download and display of ad images, pages, and pop-ups. Even if you have a fast connection to the Internet, you'll benefit from improved browser window and browser cache utilization. Download a copy today!
Version: 3.0.8.0 Filesize: 2.09 MB
Added on: 02-Aug-2004 Downloads: 108
HomePage | Rate Resource | Report Broken Link | Details
 

  BHODemon  Popular
Description: Try BHODemon - it's Free! Think of BHODemon as a guardian for your Internet browser: it protects you from unknown Browser Helper Objects (BHOs), by letting you enable/disable them individually. BHODemon is free, runs in the "tray" area, and works on Windows 95 or later operating systems (in other words, Windows 95, Windows 98, Windows 98SE, Windows ME, Windows NT4, Windows 2000, and Windows XP). What is a Browser Helper Object? A Browser Helper Object, or BHO, is just a small program that runs automatically every time you start your Internet browser. Usually, a BHO is installed on your system by another software program. For example, Go!Zilla, the downloading utility, installs a BHO created by Radiate (formerly Aureate Media); this BHO tracks which advertisements you see as you surf the Web. The natural question is, what do BHOs do? The technical answer is "anything", but generally, it will have something to do with helping you browse the Internet. Of course, some BHOs are what is called "ad-ware" or "spyware": they do things like monitor the websites you visit and report this data back to their creators. Although many people are extremely concerned about them because of the privacy issue, BHOs are not necessarily bad things, and most of them are well-intentioned and beneficial. For example, the P3P ("Platform for Privacy Preferences") program spearheaded by the W3C (World Wide Web Consortium) and major vendors, including Microsoft, AT&T, and IBM, will be delivered as a BHO. Some BHOs, however, are placed secretly on your system, and there is certainly no technical reason why they could not be programmed to send information about your system (or your web surfing habits) over the Internet without your knowledge. Also, there is no restriction on what a BHO can do your system; it can do anything any other program can do: read or write (or delete) anything on your system. Usually, software is installed on your system explicitly by you; when you do so, you are, in effect, saying that you trust the vendor. BHOs, however, have a history of being installed without the users knowledge (fine print notwithstanding) Given that (a) BHOs can do absolutely anything to your system, and (b) they are often installed without your knowledge, there is a distinct potential for abuse by vendors. The problem is, until now you had no way of knowing which BHOs are on your machine, who put them there, and what they do. This is what BHODemon does - it lets you easily manage your BHOs, and tells you what each BHO on your system is doing.
Version: v1.0 Filesize: 128.00 Kb
Added on: 19-Apr-2004 Downloads: 13218
HomePage | Rate Resource | Report Broken Link | Details

 


 

 HiJackThis  Popular
Description: *UpDated* 08-01-04 by Merijn himself HiJackThis! from Merijn.org (zipped) This file is stored here on site..... HijackThis, a general homepage hijackers detector and remover. Initially based on the article Hijacked!, but expanded with almost a dozen other checks against hijacker tricks. It is continually updated to detect and remove new hijacks. It does not target specific programs/URLs, just the methods used by hijackers to force you onto their sites. As a result, false positives are imminent and unless you are sure what you're doing, you should always consult with knowledgable folks (e.g. the forums) before deleting anything. Alternate Dnld from MajorGeeks
Version: 1.98.1 Filesize: 176.60 Kb
Added on: 12-Feb-2004 Downloads: 140600 Rating: 9 (20 Votes)
Rate Resource | Report Broken Link | Details

  IP Ticker - detects IP activities 
Description: A tiny application to be used to investigate suspicious IP activities. Only for W2k and XP
Version: v1.5 Filesize: 22.04 Kb
Added on: 06-Jun-2004 Downloads: 2449
HomePage | Rate Resource | Report Broken Link | Details

  Kazaa BeGone  Popular
Description: A Kazaa uninstaller which scans and removes all elements of Kazaa and bundled spyware programs. WARNING: This version currently contains a bug that can cause your internet connection to be broken. An update is being worked on. If you still want to use Kazaa Begone, download LSPFix to fix your Internet connection (download it before you run Kazaa Begone, of course). Compatibility: Windows (All) (NOTE: If you get an error about MSVBVM60.DLL missing, get the Visual Basic 6 Runtime libraries from Microsoft here .)
Version: Filesize: 480.00 Kb
Added on: 13-Feb-2004 Downloads: 7627
HomePage | Rate Resource | Report Broken Link | Details

SpyBot Search & Destroy v1.3  Popular
Description: SpyBot-S&D searches your hard drive for so-called spy- or adbots; little modules that are responsible for the ads many programs display. But many of these modules also transmit information about your surfing behaviour and more to the net. If SpyBot-S&D finds such modules, it can remove them - or replace them with empty dummies in case their host software won't run with its bot removed. In most cases, the host still runs fine after removing the bot. For a list of 'supported' bots see the feature lists below. The Spybot-S&D interface is so easy, that updates just require replacing a file of about 80k in size. Those updates are distributed by my software mailinglist, at the authors page and are also available from inside the programs update section. Another feature of Spybot S&D is the removal of usage tracks, which makes it more complicated for unknown spybots to transmit useful data. The list of last visited websites, opened files, started programs, cookies, all that and more can be cleaned. Supported are the three major browsers Internet Explorer, Netscape Communicator and Opera. Last but not least Spybot-S&D contains some routines to find and correct invalid entries into the registry. Editor's Note: The Resident shield in version 1.3 has an issue allowing certain cookies (Specifically Double Click)when set to notify. If page loading becomes a problem, right click the icon in the Systray, select “Resident IE” and either uncheck “Use Resident in IE sessions” or check "Block all bad pages silently".

Released v1.3Final 05.12.2004
Version: 1.3 Filesize: 4.14 MB
Added on: 17-Jun-2002 Downloads: 22081 Rating: 10 (24 Votes)
HomePage | Rate Resource | Report Broken Link | Details | Comments (3)

  Spyware Blaster  Popular
Description: SpywareBlaster 3.1 Spyware, adware, browser hijackers, and dialers are some of the fastest-growing threats on the Internet today. By simply browsing to a web page, you could find your computer to be the brand-new host of one of these unwanted fiends!
The most important step you can take is to secure your system. And SpywareBlaster is the most powerful protection program available.
Prevent the installation of ActiveX-based spyware, adware, browser hijackers, dialers, and other potentially unwanted pests.
Block spyware/tracking cookies in Internet Explorer and Mozilla/Firefox.
Restrict the actions of potentially dangerous sites in Internet Explorer.
SpywareBlaster can help keep your system spyware-free and secure, without interfering with the "good side" of the web.
And unlike other programs, SpywareBlaster does not have to remain running in the background.
SpywareBlaster is freeware for personal and educational use. Click on the Home Page Link t view the Getting Started
w/Spyware Blaster Manual. Download from Java
Version: v3.1 Filesize: 2.09 MB
Added on: 26-Jun-2003 Downloads: 18269 Rating: 10 (8 Votes)
HomePage | Rate Resource | Report Broken Link | Details | Comments (2)
 

 

 


  Homeland Security Threat Monitor 
Description: The Homeland Security Threat Monitor runs in your Windows system tray and displays the current color-coded terrorism threat level, as determined by the U.S. Department of Homeland Security. It features five different display icons, blinking notification upon an increased threat level, and links to additional resources. The monitor periodically ensures that the security information is current by contacting the White House Web server.

License: Free
Minimum requirements: Windows (all)
Uninstaller included?: No
Very neat little tool that uses almost NO resources......
Runs constant in the sys tray.......
Version: 1.0.3 Filesize: 96.04 Kb
Added on: 16-Mar-2004 Downloads: 2175 Rating: 3 (3 Votes)
HomePage | Rate Resource | Report Broken Link | Details |
Comments (1)

 

 Active Network Monitor 
Description: Active Network Monitor is a tool for the day-to-day monitoring of computers in the network. Active Network Monitor runs under Windows NT/2000/XP and allows Systems Administrators to gather information from all the computers (even from the Windows 9x/Me computers) in the network without installing server-side applications on these computers. Active Network Monitor provides the powerful technology of storing and comparing received data. Administrators can make "snapshots" of the systems for future comparison and notation of changes.
Version: 1.1 Filesize: 11.85 MB
Added on: 03-Oct-2002 Downloads: 2016
HomePage | Rate Resource | Report Broken Link | Details

  Active Registry Monitor 
Description: Active Registry Monitor (ARM) is an utility designed for analysing the changes made to Windows Registry - by making the "snapshots" of it and keeping them in the browsable database. You can compare any two snapshots and get the list of keys/data which are new, deleted or just changed. ARM can do comparing not only in the entire Registry, but also in any key of the Registry. It is also possible to exclude any keys of the Registry from compare results. Moreover, you can create undo/redo files (for example, to rollback the changes). To view the current state of a key, or to modify it, you can use Jump to Regedit function. Contents of any key can be exported to *.reg file.
Version: 1.28 Filesize: 1.15 MB
Added on: 03-Oct-2002 Downloads: 1475
HomePage | Rate Resource | Report Broken Link | Details

  Belarc Advisor 
Description: The Belarc Advisor builds a detailed profile of your installed software and hardware, including Microsoft Hotfixes, and displays the results in your Web browser. All of your PC profile information is kept private on your PC and is not sent to any web server. Operating Systems: Runs on Windows 95/98/Me, NT 4, Windows 2000, XP and Windows Server 2003. Browsers: Requires IE 3 or Netscape 3, and higher versions. Also runs on Opera. File size: 544 KB. License: The license associated with this product allows for free personal use only. Use on multiple PCs in a corporate, educational, military or government installation is prohibited. See the license agreement for details
Version: version 6. Filesize: 544 bytes
Added on: 01-Nov-2003 Downloads: 1279 Rating: 10 (1 Vote)
HomePage | Rate Resource | Report Broken Link | Details

  Big Fix Client 
Description: Download
After you've downloaded the small BigFix Consumer Client, a BigFix icon will reside in your system tool tray. Once in the tray, the BigFix Consumer Client will automatically gather information about the latest bugs, security alerts, and updates from Fixlet® message sites around the Internet. The BigFix Consumer Client then determines whether any of this information applies to you, and, if so, it will alert you by flashing an icon in the tray.
___________________________________________________________
Click on the Icon
When you click on the flashing tray icon, a BigFix window will open. At the top of the screen, there is a list of messages called the "Fixlet Message List," which describes problems on your computer.
___________________________________________________________
Click on Fixlet Message
When you click on a Fixlet message, you learn about the nature of the problem. The Fixlet message contains an action button, a one-click solution to the problem. Action buttons can automatically apply any fix, however complicated, including installing a new security patch or fixing an incorrect registry entry.
___________________________________________________________
The Problem is Fixed
The BigFix Consumer Client continues to watch for the next one, running in the background, and vigilantly monitoring your computer for problems and conflicts.
Version: 2.1.13.0 Filesize: 255 bytes
Added on: 08-Jun-2002 Downloads: 2377
HomePage | Rate Resource | Report Broken Link | Details

  Disk Investigator 
Description: Disk Investigator helps you to discover all that is hidden on your computer hard disk. It can also help you to recover lost data. Display the true drive contents by bypassing the operating system and directly reading the raw drive sectors. View and search raw directories, files, clusters, and system sectors. Verify the effectiveness of file and disk wiping programs. Undelete previously deleted files. Freeware.
Version: 1.2 Filesize: 528.09 Kb
Added on: 07-Aug-2002 Downloads: 2721
HomePage | Rate Resource | Report Broken Link | Details

  Disk Investigator 
Description: Disk Investigator helps you to discover all that is hidden on your computer hard disk. It can also help you to recover lost data. Display the true drive contents by bypassing the operating system and directly reading the raw drive sectors. View and search raw directories, files, clusters, and system sectors. Verify the effectiveness of file and disk wiping programs. Undelete previously deleted files.
Version: 1.3 Filesize: 0 bytes
Added on: 03-Dec-2002 Downloads: 2131
HomePage | Rate Resource | Report Broken Link | Details

  Easy Integrity Check System 
Description: Easy integrity check system is designed primarily for system administrators for filesystem intergrity checkings. This system is easy to set up and use. Uses mcrypt/mhash libraries for encrypting the database.
Version: 2.0b Filesize: 0 bytes
Added on: 06-Mar-2003 Downloads: 1002
HomePage | Rate Resource | Report Broken Link | Details

  Nagios 
Description: Nagios is a host and service monitor designed to inform you of network problems before your clients, end-users or managers do. It has been designed to run under the Linux operating system, but works fine under most *NIX variants as well. The monitoring daemon runs intermittent checks on hosts and services you specify using external "plugins" which return status information to Nagios. When problems are encountered, the daemon can send notifications out to administrative contacts in a variety of different ways (email, instant message, SMS, etc.). Current status information, historical logs, and reports can all be accessed via a web browser.
Version: 1.0 Filesize: 0 bytes
Added on: 25-Nov-2002 Downloads: 660
HomePage | Rate Resource | Report Broken Link | Details

  NetworkActiv PIAFCTM 
Description: Dual mode packet analyzer, Mode 1 (Packet interceptor) Receive and analyze IP packets from your network or the internet. Analyze only the packets of interest to you by way of filtering; this filtering may be done by IP address, port, packet size, protocol, or sub-string searching of packet content. Also, you can search for a sub-string within the current list of packets, save the list of packets to a text file, view the contents of each packet, and more. Mode 2 (HTTP file interceptor) This mode collects packets of the HTTP protocol, analyzes the packets, constructs them into usable files, and then automatically saves these files to a user specified directory. These files may be web-pages, pictures, videos, downloads, and more. You may filter the saving of files by IP address, port, and/or file size. Notice: This is 100% freeware; No ads, banners, spyware, or nags.
Version: 1.5.2 Filesize: 304.00 Kb
Added on: 20-Dec-2003 Downloads: 823
HomePage | Rate Resource | Report Broken Link | Details

  psmon 
Description: psmon is a Perl script which can be run as a stand-alone program or a fully functional background daemon, capable of logging to syslog with customisable email notification facilities. The user defines a set of rules in an Apache-style plain text configuration file. These rules describe what processes should always be running on the system, and any limitations on concurrent instances, TTL, and maximum CPU/memory usage of processes. psmon scans the UNIX process table and, using the set of rules defined in the configuration file, will respawn any dead processes, and slay or "deal with" any aggressive or illegal processes.
Version: 1.0.0 Filesize: 0 bytes
Added on: 16-Mar-2003 Downloads: 870
HomePage | Rate Resource | Report Broken Link | Details

 

 

                 Anti virus
there's  only one that has a 100% trojan / virus

Catch rate AND does NOT parasitically bog down your pc with excessive memory consumtion ( slow it up )

 

 AVG Anti-Virus  Popular
Description: AVG Professional Single Edition provides comprehensive antivirus protection for personal computers. The unique combination of detection methods (heuristic analysis, generic detection, scanning and integrity checking) ensures that your computer receives the maximum protection possible on multiple levels (Resident Shield, Email Scanner plugins, Personal Email Scanner, On-Demand and other tests, etc.).
Version: 7.0 Filesize: 6.25 MB
Added on: 30-Dec-2003 Downloads: 6543 Rating: 9 (14 Votes)
HomePage | Rate Resource | Report Broken Link | Details

  AVG GRISOFT.COM VERSION 7.0 TRIAL VERSION  Popular
Description: NEW FOR GRISOFT.COM ; A TRIAL VERSION OF THEIR BIG VERSION 7.0 ANTI-VIRUS SOFTWARE. thirty day free trial version.
Version: v.7.0 temp Filesize: 11 bytes
Added on: 27-May-2004 Downloads: 10563
HomePage | Rate Resource | Report Broken Link |
Details

 

The ONLY reccommended  pc tracks remover

destroys in one click:

Windows SWAP file

Windows Application logs

Windows Temporary Files

Windows Recycle Bin

Windows Registry Backups

Windows Clipboard Data

Start Menu Recent Documents history

Start Menu Run history

Start Menu Find Files History

Start Menu Find Computer History

Start Menu Order Data

Start Menu Click History

Microsoft Internet Explorer temporary typed URLs, index files, cache and history

Microsoft Internet Explorer AutoComplete memory of form posts and passwords

Microsoft Internet Explorer Cookies (Selective cookie keeping for versions 5 and above)

Microsoft Internet Explorer Internet components (Selective keeping of components)

Microsoft Internet Explorer Download Folder memory

Microsoft Internet Explorer Favorites List

Microsoft Outlook Express v5+ database of (Selective keeping of mail and news groups)

Windows Media Player History

Windows Media Player PlayLists in Media Library

America OnLine Instant Messenger contacts

Netscape Navigator temporary typed URLs, files, cache and history.

Netscape Navigator Cookies (Selective cookie keeping for versions 4 and above)

Netscape Mail v4+ sent and deleted e-mails

Netscape Mail hidden files

Customizable lists of files and folders, with or without their contents

Customizable scan lists of file types in specific folders

Customizable scan lists of file types on all drives

Deleted filenames, sizes and attributes from drive directory structures

Free cluster space ("Slack") from all file tips

Magnetic remenance from underneath existing files/folders

All free unallocated space on all hard drives

Evidence of activity in many other programs, using Plug-In modules

Slack space and deleted entries in the Windows registry

Created and modified dates and times on all files and folders

Windows Registry Streams

Common Dialog load/save location history

Instant secure deletes of Windows registry data (NT4/2000/XP)

Evidence Eliminator™ provides many unique user benefits:

A top-quality, professional program

It can speed up your PC by a significant amount

A simple easy user interface

Auto-configuration of popular locations where evidence is stored

"Stealth Mode" provides invisible operations

"Safety Check" feature to protect new users

You only have to set-up the program once

Just press one button for total security every day

Secure deletion processes similar to US Government Military standards

Elimination of sensitive files and data - even if locked by the Windows operating system

Full Windows Explorer integration (right click on files and choose Evidence Eliminator™ from the pop-up menu)

Hot-Key recycle bin protection (Press CTRL-DEL to secure the Recycle Bin)

Auto-start with Windows for immediate response

Auto power-off when completed on ATX/APM powered PC's

All major functions available direct from convenient system tray icon

Interception and securing of standard Windows shutdowns and restarts (Win 95/98)

Command-line options for task schedulers

Detailed logging of all operations with option for daily logging

"Test Mode" facilitates easy diagnosis and logging of any drive irregularities

"Quick Mode" runs most functions quickly, in about a minute

Windows 2000 users supported

Windows XP users supported

Windows Millennium users supported

Secures FAT, FAT32 and NTFS drives

Numerous security and safety tests as it runs

Automatic over-ride of system screensavers

Frequent upgrades and technical support to keep up to date with the latest operating systems, browsers and technologies

We are so confident that you will want Evidence Eliminator™ protecting you and your interests we can give you this unbeatable Limited Time Special Offer! Order and download Evidence Eliminator™ software now and we will include free lifetime Technical Support and free extremely valuable lifetime Upgrades! There is no risk, you are protected by our 30 day money-back guarantee. Start to enjoy the benefits of a truly clean and faster "Like New" PC! Download today with no risk, guaranteed. This incredible Limited Time Special Offer is guaranteed for today only and may be cancelled at any time! Buy Now!