Kaspersky CapperKiller 1.0.6.0

Published by jon 0

Kaspersky CapperKiller is a handy and reliable utility designed to detect and remove Trojan-Banker.Win32.Capper infections from your computer.

Avast! Free Edition 7.0.1474 Final

Published by Tim Tibbetts 0

Avast! Free Antivirus is perfect for people who send e-mails and surf popular websites. avast! is a package of applications that aim to protect your computer from a possible virus infection or other malware threat.

Avast! Professional Edition 7.0.1474 Final

Published by Tim Tibbetts 0

All-inclusive, comprehensive protection: avast! Professional Edition includes anti-spyware protection, certified by the West Coast Labs Checkmark process, to protect against the latest spyware threats and anti-rootkit detection based on the best-in class GMER technology, built into the scan engine.

Kaspersky XoristDecryptor 2.2.104.0

Published by Tim Tibbetts 0

Malware of the family Trojan-Ransom.Win32.Xorist makes computers uncontrollable or blocks its normal performance. After taking the data as a “hostage” (blocking it), a ransom is demanded from the user.

McAfee Stinger 10.2.0.849

Published by Tim Tibbetts 0

Stinger is a stand-alone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but rather a tool to assist administrators and users when dealing with an infected system.

Kaspersky TDSSKiller 2.8.14.0

Published by Tim Tibbetts 0

Kaspersky Lab has developed the TDSSKiller utility that allows removing rootkits. A rootkit for Windows systems is a program that penetrates into the system and intercepts the system functions (Windows API).

McAfee Stinger 10.2.0.845

Published by Tim Tibbetts 0

Stinger is a stand-alone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but rather a tool to assist administrators and users when dealing with an infected system.

Avira Free Antivirus 2013 13.0.0.2735

Published by Tim Tibbetts 0

Avira AntiVir Personal FREE Antivirus was developed to be a reliable free antivirus solution, that constantly and rapidly scans your computer for malicious programs such as viruses, Trojans, backdoor programs, hoaxes, worms, dialers etc.

RogueKiller 8.2.1

Published by Tim Tibbetts 0

RogueKiller is a tool written in C, which scans the processes running, and kill those who are malicious. Author developed this tool after seeing that some rogues blocked the execution of disinfection programs.

McAfee Stinger 10.2.0.843

Published by Tim Tibbetts 0

Stinger is a stand-alone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but rather a tool to assist administrators and users when dealing with an infected system.

Kaspersky CapperKiller 1.0.6

Published by Tim Tibbetts 0

Kaspersky CapperKiller is a handy and reliable utility designed to detect and remove Trojan-Banker.Win32.Capper infections from your computer.

Kaspersky XoristDecryptor 2.2.103.0

Published by Tim Tibbetts 0

Malware of the family Trojan-Ransom.Win32.Xorist makes computers uncontrollable or blocks its normal performance. After taking the data as a “hostage” (blocking it), a ransom is demanded from the user.

Kaspersky RectorDecryptor 2.5.4.0

Published by Tim Tibbetts 0

Kaspersky Lab specialists have developed a special utility for decrypting the data encrypted by Trojan-Ransom.Win32.Rector, commonly used for computers that have been "taken hostage".

CSF 5.67 released

Published by Alien 0

Another update for ConfigServer Firewall has been released

CSF 5.66 released

Published by Alien 0

ConfigServer has released a new version of their CSF firewall

Kaspersky RectorDecryptor 2.5.2.0

Published by Tim Tibbetts 0

Kaspersky Lab specialists have developed a special utility for decrypting the data encrypted by Trojan-Ransom.Win32.Rector, commonly used for computers that have been "taken hostage".

Kaspersky XoristDecryptor 2.2.102.0

Published by Tim Tibbetts 0

Malware of the family Trojan-Ransom.Win32.Xorist makes computers uncontrollable or blocks its normal performance. After taking the data as a “hostage” (blocking it), a ransom is demanded from the user.