English version 去汉语版本 Русская версия Deutsche Version

Download software tagged by ardamax trojan

The most popular program: Quick Slide Show 2.00
Download Quick Slide Show 2.00
more info
We recommend: My Free Antivirus 2.2
Download My Free Antivirus 2.2
more info
Bluesea Adware Spies RAT Blocker 1.3.78 by Adware Spies RAT Blocker
2008-10-26
Bluesea Adware Spies RAT Blocker is a spyware remover and provides real-time anti-spyware protection against spyware, adware, Trojan horses, keyloggers, spyware cookies, adbots, spybots, browser hijackers, and phishing attacks.
Digital Trojans BHOs Popups Cleaner 1.4.13 by Trojans BHOs Popups Cleaner
2008-10-28
Digital Trojans BHOs Popups Cleaner includes HIPS and anti trojan/virus/worm.
Bluesea AntiSpyware Adware Rootkit Trojans 1.3.67 by AntiSpyware Adware Rootkit Trojans
2008-10-29
Bluesea AntiSpyware Adware Rootkit Trojans's features include: High-speed file scan engine capable of detecting modified trojans; Memory scanning for detecting any modified variant of a particular build of a trojan; Registry scanning.
Bluesea Block Worm Unwanted Toolbars Zombie 1.4.23 by Block Worm Unwanted Toolbars Zombie
2008-10-29
Bluesea Block Worm Unwanted Toolbars Zombie's features include: High-speed file scan engine capable of detecting modified trojans; Memory scanning for detecting any modified variant of a particular build of a trojan; Registry scanning.
Bluesea Binder Spyware Spoofers Eliminator 1.3.67 by Binder Spyware Spoofers Eliminator
2008-10-29
Bluesea Binder Spyware Spoofers Eliminator provides the best anti-spyware protection against spyware, adware, trojan horses, auto dialers, keyloggers, spyware cookies, adbots, spybots, rootkits, browser hijackers, phishing attacks and other malware.
Professional Anti-virus Web Bug Viking Keyloggers 1.3.78 by Anti-virus Web Bug Viking Keyloggers
2008-10-29
Professional Anti-virus Web Bug Viking Keyloggers - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
Professional BHOs Keylogger Popups Sweeper 1.3.64 by BHOs Keylogger Popups Sweeper
2008-10-29
Professional BHOs Keylogger Popups Sweeper - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
Registry - Total Commander Plugin 2.6 by Process Explorer, Winpatrol, Glary Utilities
2008-11-17
System registry editor for Total Commander- Browse through system registry - Remote registry connection - Create new value - double click " -Add Value- " - Use F7, if first symbol is \, then new _value_ will be created. Use \\ for values like \value.
Services - Total Commander Plugin 2.4 by Vista processes, manage startup, Windows services
2008-11-18
System registry editor for Total Commander- Browse through system registry - Remote registry connection - Create new value - double click " -Add Value- " - Use F7, if first symbol is \, then new _value_ will be created. Use \\ for values like \value.
0.017