Download software tagged by delete locked file
The most popular program: Quick Slide Show 2.00
more info |
We recommend: Find and remove or delete duplicate image jpg png gif or bmp files from your system 9.0
more info |
Delete System Monitor Viking 5.8.41 by Delete System Monitor Viking
2008-02-10
Delete System Monitor Vikingscans your machine where unwanted software has a record of appearing or leaving traces. The scan locations include the your home page setting, your browser plug-in, the HOSTS file, processes, etc. Version 0.
Perpetually Delete BHOs Spy Hijackers 1.6.04 by Delete BHOs Spy Hijackers
2008-07-23
Perpetually Delete BHOs Spy Hijackers's features include: High-speed file scan engine capable of detecting modified trojans; Memory scanning for detecting any modified variant of a particular build of a trojan; Registry scanning.
Digital Delete Hijackers Spoofers Spyware 1.3.64 by Delete Hijackers Spoofers Spyware
2008-07-26
Digital Delete Hijackers Spoofers Spyware - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
Bluesea Delete Binder Password Cracker Zombie 1.3.74 by Delete Binder Password Cracker Zombie
2008-07-27
Bluesea Delete Binder Password Cracker Zombiescans your machine where unwanted software has a record of appearing or leaving traces. The scan locations include the your home page setting, your browser plug-in, the HOSTS file, processes, etc.
Ever Delete Trojan Horses RAT Web Bug 1.3.78 by Delete Trojan Horses RAT Web Bug
2008-08-05
Ever Delete Trojan Horses RAT Web Bugscans your machine where unwanted software has a record of appearing or leaving traces. The scan locations include the your home page setting, your browser plug-in, the HOSTS file, processes, etc. Version 0.
ChristmasStory Delete Viking Spies Virus 1.3.89 by Delete Viking Spies Virus
2008-08-05
ChristmasStory Delete Viking Spies Virus - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
Happiness Delete Malware Tracking Cookie Backdoor 1.3.62 by Delete Malware Tracking Cookie Backdoor
2008-08-09
Happiness Delete Malware Tracking Cookie Backdoor's features include: High-speed file scan engine capable of detecting modified trojans; Memory scanning for detecting any modified variant of a particular build of a trojan; Registry scanning.
ChristmasStory Delete Hijackers Unwanted Toolbars Worm 1.4.34 by Delete Hijackers Unwanted Toolbars Worm
2008-08-21
ChristmasStory Delete Hijackers Unwanted Toolbars Worm - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
Bluesea Delete Spyware Trojan Horses Password Cracker 1.3.77 by Delete Spyware Trojan Horses Password Cracker
2008-08-24
Bluesea Delete Spyware Trojan Horses Password Cracker software scans every inch of your file system and registry in under 2 minutes.