Akshay Gandhi’s Freewares – Antivirus/Security

ANTIVIRUS/SECURITY/ANTISPYWARES-ADWARES

Androsa FileProtector


Androsa FileProtector is a professional and freeware file encryption software that protects any type of file encrypting completely the content with the most advanced systems of cryptography. Androsa FileProtector allows to put to the sure sensitive file or personal file that do not have to be used/viewed from people not authorized that they have logging to the pc and/or to the files.

Version 1.3 may include unspecified updates, enhancements, or bug fixes.

Requirements:Microsoft .Net Framework 2.0

License:Free

http://www.download.com/Androsa-File…ml?tag=lst-0-4

==============================================================

AntiVir Personal 7.06.00.270H+BEDV – 16.96MB (Freeware)

The AntiVir Personal Edition offers the effective protection against computer viruses for the individual and private use on a single PC-workstation. In order to make possible an easy operation, the AntiVir Personal Edition is developed to the essential points.

You’ll be amazed how thoroughly AntiVir protects:

* detects and removes more than 150,000 viruses
* always among the winners of comparison test featured in computer journals
* the resident Virus Guard serves to monitor file movements automatically, e.g. downloading of data from the internet
* scanning and repair of macro viruses
* protection against previously unknown macro viruses
* safeguard against cost generating dial-up program
* protection against trojaner, worms, backdoors, jokes and other harmful programs
* easy operation
* Internet-Update Wizard for easy updating
* Protection against previously unknown boot record viruses and master boot record viruses


Approximately 16.96MB

==========================================================

Cyberhawk

Cyberhawk is a next-gen security software; simply put, it’s threat protection made easy for everyone, even novices! It provides protection against viruses, spyware, trojans, intruders, and other threats to PC security. Cyberhawk does the work of antivirus, anti-spyware, and firewall programs. It is designed to work alongside any current security programs you may already have installed, so you don’t need to uninstall your previous antivirus, anti-spyware, firewall, or other security program before installing Cyberhawk.

Download Here

======================================== =======================

Microsoft Malicious Software Removal Tool 1.29

Microsoft Malicious Software Removal Tool checks your computer for infection by specific, prevalent malicious software (including Blaster, Sasser, and Mydoom) and helps to remove the infection if it is found.
This tool will help to remove specific, prevalent malicious software from infected systems. Because computers can appear to function normally when infected, Microsoft advises you to run this tool even if your computer seems to be fine. In addition to using this tool, you should use an up-to-date antivirus product to help protect your computer from other malicious software.

Download Here
SIZE: 6.79MB

======================================== =======================

Norton Removal Tool is a program that can remove some Norton software from your computer. Norton Removal Tool runs on Windows 2000/XP/Vista. Norton Removal Tool should be used only if you have tried to uninstall the Norton program using Windows Add/Remove Programs and that did not work.

Will Norton Removal Tool work for you?
Norton Removal Tool will remove these–and only these–Norton programs:

* Norton AntiSpam 2004/2005
* Norton AntiVirus 2003 through 2008
* Ghost 10.0 and 12.0
* Norton GoBack 3.1 through 4.2
* Norton Internet Security 2003 through 2008
* Norton Password Manager
* Norton Personal Firewall 2003 through 2006
* Norton SystemWorks 2003 through 2008
* Norton Confidential Online 2007
* Norton Internet Security 2007 Add-on Pack 1.0 and 2.0
* Norton Save and Restore 1.0 and 2.0
* Norton 360 1.0 through 1.3

link: click

===========================================================

Spybot – Search & Destroy

Spybot – Search & Destroy can detect and remove a multitude of adware files and modules from your computer. Spybot also can clean program and Web-usage tracks from your system, which is especially useful if you share your computer. Modules chosen for removal can be sent directly to the included file shredder, ensuring complete elimination from your system. For advanced users, it allows you to fix Registry inconsistencies related to adware and to malicious program installations. The handy online-update feature ensures that Spybot always has the most current and complete listings of adware, dialers, and other uninvited system residents.

Version 1.4 has the first native multi-installation scanner, noticeably faster than the previous version during scans, and has improved the tools and updated the interface.

Download Here
SIZE: Apprx. 5 MB

======================================== =======================

RogueRemover


Product description

RogueRemover is a utility that can remove various rogue antispyware, antivirus and hard drive cleaning utilities. Rogue applications are applications that rather than remove spyware, provide false positives, distribute malware or spyware, advertise, or provide useless uninstallers. The main point is that rogue applications are useless and eat up system resources.

RogueRemover has the ability to completely remove WinAntiSpyware/WinAntiVirus, SpyAxe, VirusBlast, VirusBursters and many more!

Simply download RogueRemover from the one of the links below, unzip the file, and run the installer. Start the program and select Scan and the program will walk you through the remaining steps.

Compatible with Windows 2000, NT, XP, Vista

Download Here
Size: 901 KB
(There is a pro ver. of it as well but it is not free)

======================================== =======================

Security Process Explorer 1.5

Security Process Explorer is an enhanced task manager, that provides advanced information about programs and processes running on the computer. It displays all the standard information, including file name, directory path, description, CPU usage etc. as well as a unique security risk rating. This rating is conclusive and relies on the expertise of the user to determine whether the process should be terminated or removed.

Security Process Explorer allows you to monitor CPU and memory usage graphs per process, view detailed processes information (with descriptions), stop and start new processes, set priorities and much more. You can easily find and remove unnecessary background processes as well as assigning more resources to demanding processes like games, realtime multimedia applications and cd writing softwares.

Features:

* Give you detailed information about each and every process
* Indicate whether a process is safe or not
* Allow you to terminate process with a single click.
* Let you block any unwanted processes or malware
* Simple and User friendly interface

Download Here
SIZE: 1.09MB


===============================================================

Spyware Terminator 1.9.2.132 Beta

PUBLISHER’S DESCRIPTION

Quote:
Free 100% Real-Time Protection is included in Spyware Terminator basic version, a vital function most other applications charge extra for. Effectively remove spyware, adware, trojans, keyloggers, home page hijackers and other malware threats even dangerous threats like WebRebates, Look2Me, BetterInternet, VX2, and CWS.

Spyware Terminator is easy to use, requires minimal PC resources and has ultra fast scanning speed.
Protect your computer with powerful real-time protection shield, advanced system scanning and safe quarantine for found spyware. Scan your computer manually or schedule full system sweeps. Perform in-depth scans of your computer´s hard drives, memory, process, registry and cookies to seek out and remove all known spyware threats.

Real-Time Protection guards your computer, privacy, and personal information from hidden threats before they can run, stopping most threats before they install, and helping to prevent any potential security breach.

Real-Time Protection’s Internet, System, and Application Guards monitor over 50 security checkpoints to verify any unknown activity. When you´re browsing the Web or downloading and installing new applications, Spyware Terminator monitors your computer and warns you when you might be installing spyware or other unwanted software.

Spyware Terminator scans your entire system using a regularly updated database of known spyware. Our experts continually analyze new threats and extend our anti-spyware database so that you can effectively protect your computer. Using automatic updates ensure continual protection of your data and privacy.

System Restoration returns your operation system to the last state of system checkpoint. This can be extremely useful if you perform an install or uninstall by mistake and you need to undo this operation. System Restoration does not cause you to lose your personal documents, email messages, browsing history, and the last specified password when you revert to an earlier state
.

Download Here
Size: ~3.3MB

======================================== =======================

Zone Alarm Free 7.0.337.0 (Ever reliable)


ZoneAlarm is an easy-to-use firewall that blocks hackers and other miscellaneous/unknown threats. – Intrusion Blocking systematically identifies hackers and blocks access attempts. – Stealth Mode automatically makes your computer invisible to anyone on the Internet. – Automatic Program Configuration provides safety and simplicity by automatically configuring programs and similarly decides whether to allow or deny internet access to individual programs. – Expert Controls give savvy users precise control over security settings. This free version is for non-commercial use only

Download Here
Size: 38.85 MB

======================================== =======================

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s