Google
 
Web www.FreewareBox.com
 Advertisements

Freeware search result for 'removal'Pages : 1 2 3 4 5 . . . 16

Resort by : Name - Release date - Added date - Points - Rating - DownloadsCurrent sorting : Rating

Optimo - System Security SuiteVer.: 1.1

categ.: >

...ete solution for protecting the Mac Devices from outside virus attacks. As a complete pack...us attacks. As a complete package solution for virus removal Optimo is the most trusted antivirus which you can rely upon. The efficiency of analyzi...trusted antivirus which you can rely upon. The efficiency of analyzing the issues and restoring the overall functioning of the system stands it unique and ahead of other antivirus programs. Optimo ensures highest level of sy... Optimo ensures highest level of system protection from Worms, Virus, Trojans, Dialers, Spyware, and Rootkits. Whether cyber-crooks are trying to invade your device or a malware / virus is trying to infect your important files and data, Optimo takes all the responsibility of providing you safe and secure computing environment.Why Optimo : If you are seeking hassle free computing experience in a virus free enviro...

Download size: 145408 kBytes

avast! 4 Home Edition DownloadVer.: 4.7

categ.: >

No icon available

...uto updates and can also be set to do a Bootscan virus removal if you have an infection al...al if you have an infection already All you have to do is download and register and it will send you a Nuber in your email and you paste it in th...er and it will send you a Nuber in your email and you paste it in the program at startup and your good for a year Getting a new Req number is free again yearly A must try......

Download size: 11 kBytes

XXCOPYVer.: 2.92.6

categ.: >

... compatible with XCOPY in the invocation syntax, yet, adds many innovative features to be...many innovative features to be a very serious utility for anyone who feels comfortable in managing files in command line mode (DOS Box). XXCOPY h...ortable in managing files in command line mode (DOS Box). XXCOPY has grown to be not just a file copy program but also file removal, search and list utility. Its short-name preserving capability makes it ideal to clone ...apability makes it ideal to clone a system disk which can be made bootable. XXCOPY runs under Windows 95/98/ME/NT/2K/XP and comes with a 16-bit version XXCOPY16 which allows copying files in DOS environment using short name only (to be later expanded to long name). You may also use it for synchronizing systems. In short, it is an industrial strength utility for system administrators....

Download size: 230 kBytes

PC Protect Your PCVer.: 1.0

categ.: >

..., adware, popups and spam with our Free PC Protect. This is an Anti Virus / Spyware remove...an Anti Virus / Spyware remover / Adware removal / Pop Up Blocker and Spam Filter that runs as a screensaver application in the background. You will...r that runs as a screensaver application in the background. You will not notice PC Protect doing it`s work by stopping viruses, spyware, adware, popus and spam. This screensaver application is Powered by www.FreeSpamFilter.nl...is Powered by www.FreeSpamFilter.nl - Specialized in Anti Virus / Spyware remover / Adware removal / Pop Up Blocker and Spam Filters. For more information please visit their website at www.FreeSpamFilter.nl . Protect Your PC !...

Download size: 1059 kBytes

HijackRemoteVer.: 1.0

categ.: >

...essionals. HijackRemote is a social networking solution to spyware. It brings together use...pyware. It brings together users who need their PCs cleaned of spyware with a network of spyware professionals, skilled with using the most effectiv...twork of spyware professionals, skilled with using the most effective malware removal tool, HijackThis. Spyware is cleaned by real people without them connecting to your PC. Simply download the HijackRemote software. Fill i...d the HijackRemote software. Fill in your name and a brief description of the problem you are having. HijackRemote will generate a spyware report, allow you to review it, and post it to the HijackRemote network. HijackRemote will sit quietly until a response is ready. Spyware professionals will review the report, mark any harmful items for removal, and add comments. The spyware treatment is downloaded back t...

Download size: 723 kBytes

Hidden Swap ButtonsVer.: 1.1

categ.: >

...n as many points as possible. Points are added at the removal of the buttons. The buttons ...l of the buttons. The buttons are removed at making a vertical or horizontal combination of three or more buttons of the same color. In order to cre...bination of three or more buttons of the same color. In order to create a combination like that you must switch two nearby buttons of different color in one round. Besides, if you are in urgent need of doing something else, i...ent need of doing something else, instead of closing the game you can just hide it behind the limits of the screen. (The game is displayed neither in the tray nor in the taskbar). Then in your free time you can restore the game by mouse-moving at the edge of the screen and press the Ctrl key and continue playing. This game will come in handy not only at home, but also at the office where you will be able to play...

Download size: 327 kBytes

Spybot Search and DestroyVer.: 1.4

categ.: >

...or adbots; that is, little modules that are responsible for the ads many programs display....the ads many programs display. Many of these modules also transmit information, including your surfing behavior on the Internet. If it finds such mo...including your surfing behavior on the Internet. If it finds such modules, it can remove them. In most cases the host still runs fine after removing the spyware/adware. Another feature is the removal of usage tracks, which... the removal of usage tracks, which makes it more complicated for unknown spybots to transmit useful data. The list of last visited websites, opened files, started programs, cookies, all that and more can be cleaned. Supported are the three major browsers Internet Explorer, Netscape Communicator, and Opera....

Download size: 4980 kBytes

Kudaz MDIVer.: 2.2.1.2

categ.: >

...files and to serve as web-authoring editor with its rich syntax-highlighting feature: User...tax-highlighting feature: Users can create/modify/remove/add/insert text snips as many and as many times as he or she wants via Sniptxt panel. They ...s many and as many times as he or she wants via Sniptxt panel. They can be classified and categorized as a group for easy identification and re-use. Folders panel saves users a lot of task switching. Users can pre-define tem...switching. Users can pre-define templates for creating initial source code structures for programming modules or any other context. Prefix/suffix is another handy feature. Line sorting feature is for sorting lines in ascending/descending order with or without case-sensitivity. Kudaz`s filters are user-configurable too(remove/add/change order). Various start-up options(can start with a user-defined template). Key...

Download size: 1160 kBytes

CyberDefenderFREEVer.: 2.0

categ.: >

...fections other security software misses, offering protection from spyware, viruses, spam, ... from spyware, viruses, spam, phishing and Internet identity theft. CyberDefenderFREE provides rapid detection and protection against fast-moving on...rFREE provides rapid detection and protection against fast-moving online security threats while working alongside other antivirus and security software. The company?s patent-pending earlyNETWORK? is the world?s first distribu...WORK? is the world?s first distributed system for security updates which detects and immunizes PCs against new virus attacks within hours after discovery. By making your computer part of the solution, CyberDefenderFREE works while you do - with an efficient scan speed. Every PC on the CyberDefender network is on the lookout for suspicious files and reports them to the Early Alert Center? which then quickly anal...

Download size: 11264 kBytes

Exe LockdownVer.: 5.01

categ.: >

...ection against the installation of unauthorized applications. Allowing users to run truste.... Allowing users to run trusted applications, while preventing the execution of non-trusted programs. Executable Lockdown protects PC?s by locking-d...non-trusted programs. Executable Lockdown protects PC?s by locking-down your existing "trusted" applications... All new executables, introduced via any media source. (physical or removable drives, network shares, USB drives, ...rives, network shares, USB drives, Internet ftp etc. Exe lockdown acts as an executable white-list-filter. Its? small kernel mode driver, filters all executable files; regardless of its file extension ie.exe .com .dll .drv .sys .dpl etc... ENFORCE CORPORATE & EDUCATIONAL AUP`S Exe Lockdown enforces employee/student authorized user policies for desktops and laptops with its unique and comprehensive white list of ...

Download size: 515 kBytes

Find others 'removal' freeware Pages : 1 2 3 4 5 . . . 16
 Sponsored Links:
Google
 
Web www.FreewareBox.com