Mamutu monitors in realtime all active programs for dangerous behavior and blocks malicious activities. It recognizes new and unknown Trojans, Backdoors, Keyloggers, Worms, Viruses, Spyware, Adware and Rootkits (Zero-Day attacks), without the need of daily signature updates. Mamutu gives you full control over internal system activities. It's the perfect security enhancement. Mamutu recognizes and reports the following types of behavior: Backdoor related behavior; Spyware related behavior; HiJacker related behavior; Worm related behavior; Dialer related behavior; Keylogger related behavior; Trojan Downloader related behavior; Injection of code into other programs; Manipulation of programs (patching); Invisible installations of software; Invisible Rootkit processes; Installation of services and drivers; Creation of Autostart entries; Manipulation of the Hosts file; Changes of the browser settings; Installation of debuggers on the system. It's small but very powerful. Mamutu saves resources and does not slow down the PC. Stay protected - it is easier than you think. Regardless of whether you are a computer expert or a beginner, you will quickly come to grips with Mamutu. You do not have to be a specialist to free yourself from Malware. Bonus feature: Application protection. You can use the application rules to protect specific programs from third-party manipulation. For example, this feature is used to prevent Mamutu from being terminated by Malware in order to disable the protection. You can also make use of this feature. You can protect your Browser and other important programs from being illegally terminated.
Platform Windows XP
Operating Systems Windows XP,Windows NT/2000/2003/SBS2003,Windows Vista,Windows 7
Date added 16 Jun 2008
Last Updated 3 Mar 2011
Tags mamutu, hips, behavior blocker, behavior, behaviour blocker, behaviour, monitoring, malware, trojan, backdoor, worm, dialer, spyware, adware, stopper, blocker, behavior analysis, actions, malicious, r