English version 去汉语版本 Русская версия Deutsche Version

Download software tagged by free anti trojan horses worm exploit

The most popular program: Quick Slide Show 2.00
Download Quick Slide Show 2.00
more info
We recommend: ChristmasStory AntiSpy Web Bug Virus Joke 1.3.94
Download ChristmasStory AntiSpy Web Bug Virus Joke 1.3.94
more info
Digital Trojans BHOs Popups Cleaner 1.4.13 by Trojans BHOs Popups Cleaner
2008-10-28
Digital Trojans BHOs Popups Cleaner includes HIPS and anti trojan/virus/worm.
Desktop Armor 1.3 by Headlight Software, Inc.
2005-10-25
Desktop Armor watches your computer for changes, notifying you when something is altered to confirm you want to keep or reject it. This catches many of the changes made by a virus, trojan or worm; protecting your computer from harm. And much more.
Geek Superhero 1.3 by Headlight Software, Inc.
2005-10-25
Geek Superhero watches your computer for changes, notifying you when something is altered to confirm you want to keep or reject it. This catches many of the changes made by a virus, trojan or worm; protecting your computer from harm. And much more.
Geek Superhero 1.3 by Headlight Software Inc.
2006-10-25
Geek Superhero watches your computer for changes, notifying you when something is altered to confirm you want to keep or reject it. This catches many of the changes made by a virus, trojan or worm; protecting your computer from harm. And much more.
Swift Tracking Cookie Exploit Binder Stopper 1.3.64 by Tracking Cookie Exploit Binder Stopper
2008-07-21
Swift Tracking Cookie Exploit Binder Stopper's features include: High-speed file scan engine capable of detecting modified trojans; Memory scanning for detecting any modified variant of a particular build of a trojan; Registry scanning.
Ever Spy Adload Exploit Blocker 1.3.62 by Spy Adload Exploit Blocker
2008-07-23
Ever Spy Adload Exploit Blocker's features include: High-speed file scan engine capable of detecting modified trojans; Memory scanning for detecting any modified variant of a particular build of a trojan; Registry scanning.
Ever Remove Zombie Trojans Exploit 1.3.73 by Remove Zombie Trojans Exploit
2008-07-23
Ever Remove Zombie Trojans Exploit's features include: High-speed file scan engine capable of detecting modified trojans; Memory scanning for detecting any modified variant of a particular build of a trojan; Registry scanning.
Digital AntiAdware BHOs Web Bug Exploit 1.3.62 by AntiAdware BHOs Web Bug Exploit
2008-07-25
Digital AntiAdware BHOs Web Bug Exploit - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
Bliss Keylogger Exploit Popups Agent 1.3.67 by Keylogger Exploit Popups Agent
2008-07-25
Bliss Keylogger Exploit Popups Agent - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
0.032