Trend Micro RUBotted 2.0.0.1030 Beta |
Company:
Trend Micro
|
Date Added: July 02, 2012 | Visits: 537 |
|
||||||||||
RUBotted monitors your computer for potential infection and suspicious activities associated with bots. Bots are malicious files that enable cybercriminals to secretly take control of your computer. Upon discovering a potential infection, RUBotted will identify and clean them with HouseCall.
|
License: Freeware |
Utilities
-
PagingMon 0.1
PagingMon project is a Paging Activity Monitor. PagingMon project provides useful tools based on windows platform to monitor the page activity of the remote computer system in real time through UDP packages. To use it, user needs configure the... |
5 MB | |
Education
-
KidLogger Pro 5. 6. 2011
Free and open-source keystroke logger, computer monitor, web activity monitor, screen capturer, voice recorder. This is a new generation key-logger and PC monitoring software that allows to easily monitor few Computers using our new web site log... |
860 KB | |
Education
-
KidLogger for Mac OS X 1.1
KidLogger - free monitoring application for Mac: keystroke logger, user activity monitor, web history monitor and screen capture. This is a new generation key-logger and user monitoring software that allows to easily monitor few Windows and Mac... |
1.1 MB | |
Modules
-
ThreeWP Activity Monitor 2.1
Network plugin to display sitewide blog activity. Displays user logins, new comments and new posts as links.Since this plugin allows you to monitor all activity sitewide, it will be very easy to quickly locate spam blogs and their... |
143.36 KB | |
Utilities
-
MacFace 1. 3. 2001
MacFace is an activity monitor that shows CPU and RAM utilization via a cute, generally anime-style face in your Dock. It goes a step farther than just showing current CPU load by indicating low-memory (heavy paging) circumstances by having the... |
276.48 KB | |
Virus Removers
-
Trend Micro HouseCall 64bit 7.1
HouseCall is Trend Micro's highly popular and capable on-demand scanner for identifying and removing viruses, Trojans, worms, unwanted browser plugins, and other malware. HouseCall 7 features an intuitive interface and the ability to perform fast... |
2.1 MB | |
Security Tools
-
Trend Micro HouseCall 7.1
HouseCall is Trend Micro's highly popular and capable on-demand scanner for identifying and removing viruses, Trojans, worms, unwanted browser plugins, and other malware. HouseCall 7 features an intuitive interface and the ability to perform... |
1.8 MB | |
Virus Removers
-
Trend Micro HijackThis 2.0.5 Beta / 2.
Trend Micro HijackThis is a free utility that generates an in depth report of registry and file settings from your computer. HijackThis makes no separation between safe and unsafe settings in its scan results giving you the ability to selectively... |
||
Automation Tools
-
AllOff 5.8
AllOff is a computer activity and shutdown utility which monitors mouse, keyboard and download activity plus CPU load and starts shutdown if there has been no activity for the set times. It also supports fixed activation and shutdown initiation... |
606.72 KB | |
Security Tools
-
Verity 1.00
Verity is a professional application designed to monitor your child's activity on the PC. Verity allows you to track and monitor what your kids are doing on the computer and online in an easy, non invasive way. After a quick setup, Verity will... |
Windows Software
-
iTop Screen Recorder 4.5.0.1385
iTop Screen Recorder is an all-in-one screen recorder, video editor, and screenshot tool. It helps capture anything on your PC screen to be a high-quality video file or screenshot, as well as edit the recorded videos and local videos to make them... |
144.59 MB | |
Windows Software
-
Sync2 Cloud 2.10
Synchronizing Outlook between multiple sources now made easy with Sync2 Cloud, powerful Microsoft Outlook synchronization software. Sync Outlook Calendar, Contacts and Tasks between multiple sources. Share Outlook Calendar with others without... |
28.29 MB | |
Windows Software
-
WDZ Hash Generator 1.0
A simple program that can generate hashes such as md5, sha1, sha2 and many others. Hash function - a function assigning any short number to any large number, always having a fixed size, non-specific, quasi-random value, so-called irreversible... |
2.27 MB | |
Windows Software
-
WriterHelper 1
WriterHelper consist of WordNet Dictionary, WordNet Thesaurus, Plagairism Checker, Encryption using TripleDES, DES, and AES. WriterHelper helps you to search for dictionary, thesurus using WordNet Dictionary, Encrypt Text using AES, DES,... |
223 KB | |
Windows Software
-
Tiny Security Suite 1
Tiny Security Suite is a software that consists of encryption, shredding, VPN, folder hiding, Firewall, and Tor Browser. Tiny Security Suite has: - File Encryption (AES and Triple DES) - Text Encryption (AES and Triple DES) - Shredder -... |
227 KB | |
Security Tools
-
Privacy Eraser Portable 6.6.3
Privacy Eraser is an all-in-one privacy suite that protects your privacy by cleaning up all your Internet history tracks and past computer activities. It supports popular web browsers such as Internet Explorer, Microsoft Edge, Mozilla Firefox,... |
9.2 MB | |
Security Tools
-
WinGPG 1.0.1.1
WinGPG developed by Scand Ltd. is a tray-based classical Windows application and a classic GPGv2 distribution (we use the cryptography from the official site without making any modifications). It supports the following operations:... |
9.39 MB | |
Security Tools
-
USB Lockit 1.0
USB Lockit - Password Lock USB Drive. Protects the USB drive with your photos, audios, videos and other files from prying eyes on Android & Windows. Once the drive is locked, nobody can access your files. All in 3 Easy Steps: 1. To lock... |
11 KB | |
Security Tools
-
Overwrite Program 1.4
Overwrite Program is a program that overwrites empty space on disk, data and metadata. The operating systems and programs automatically write and delete data on disk, for example text editors may save copies of the document for recovery and... |
407 KB | |
Security Tools
-
Security Camera Viewer 5.2
If you have one or more IP cameras, then you also need software that is able to receive and display a video stream from these devices. Most likely you will also want to monitor access to the rooms in automatic mode. A modern security system should... |
29.53 MB |