Reach customers who are looking for a proactive way to protect their computer from threats, even before they are known to the public, without relying on reactive software like virus scanners. Online database of threats and whitelist Searches your computer for vulnerable locations that can be exploited by malware authors Free research of any unrecognized items that are found during a scan Outputs a Hijack This! format log file for posting or analysis by experts Detection and deletion of over 20 different hijack exploits Creates a system restore point before making any changes to your system If you have our Anti-Spyware software installed, using the same company name, there will be an additional button visible to launch the spyware program (and vice versa). Requires version 4.1+ of the spyware program This software will help your customers to protect their computer against common attempts that malicious programs use to hijack a computer. It looks in places where malicious programs commonly attempt to gain control of your computer and reports what it finds. Many of the items found will be legitimate, but any malicious items will also be found. The scan log can then be posted online for experts to examine. This software also provides a database of known software that will help your customers to determine exactly what is running on their computer, and easy ways to search for more information if necessary. In the event that your customers find a malicious item and need to remove it they can do so in just a few simple clicks.
Platform Windows 95/98/ME
Operating Systems Windows 95/98/ME,Windows NT/2000,Windows XP,Windows Vista,Windows 7
Date added 15 Nov 2011
Last Updated 1 Dec 2011
Tags antivirus , trialware antivirus , anti-spyware , backup , anti-virus , antispyware , System Maintenance , System Utilities , Security & Privacy , Security , scanner , scan , protect software , scan so