|
More tags: mamutu, hips, ids, behavior, blocker, behaviour, monitoring, malware, virus, trojan, backdoor, worm, dialer, spyware, adware, stopper, blocker, analysis, malicious, removal, hijacker, keylogger, rootkit, autoruns, autostarts, injector, manipulation,
|
Category : |
Utilities - Security |
|
|
|
Platform : |
WinXP, Windows2003, Windows Vista Ultimate, Windows Tablet PC Edition 2005, Windows Media Center Edition 2005, Windows Vista Starter, Windows Vista Home Basic, Windows Vista Home Premium, Windows Vista Business, Windows Vista Enterprise |
|
|
Price : |
USD 27 |
|
|
Developer: |
|
|
|
Rating : |
|
|
|
License : |
Shareware |
|
|
Limitations: |
30 Days |
|
|
Date : |
2010-06-11 |
|
|
Size : |
3.53 MB |
|
|
Software In :
Utilities
Security
mamutu, hips, ids, behavior, blocker, behaviour, monitoring, malware, virus, trojan, backdoor, worm, dialer, spyware, adware, stopper, blocker, analysis, malicious, removal, hijacker, keylogger, rootkit, autoruns, autostarts, injector, manipulation,
|
Mamutu monitors in realtime all active programs for dangerous behavior and blocks malicious activities. It recognizes new and unknown Trojans, Backdoors, Keyloggers, Worms, Viruses, Spyware, Adware and Rootkits (Zero-Day attacks), without the need of daily signature updates. Mamutu gives you full control over internal system activities. It's the perfect security enhancement. Mamutu recognizes and reports the following types of behavior: Backdoor related behavior; Spyware related behavior; HiJacker related behavior; Worm related behavior; Dialer related behavior; Keylogger related behavior; Trojan Downloader related behavior; Injection of code into other programs; Manipulation of programs (patching); Invisible installations of software; Invisible Rootkit processes; Installation of services and drivers; Creation of Autostart entries; Manipulation of the Hosts file; Changes of the browser settings; Installation of debuggers on the system. It's small but very powerful. Mamutu saves resources and does not slow down the PC. Stay protected - it is easier than you think. Regardless of whether you are a computer expert or a beginner, you will quickly come to grips with Mamutu. You do not have to be a specialist to free yourself from Malware. Bonus feature: Application protection. You can use the application rules to protect specific programs from third-party manipulation. For example, this feature is used to prevent Mamutu from being terminated by Malware in order to disable the protection. You can also make use of this feature. You can protect your Browser and other important programs from being illegally terminated.
Mitcham Primary School Kingswood - SkoolbagBarracuda Hair StudioClinton Body ShopSantosLB4R표창원이 알고 싶다 (팟캐스트)مقولات محمود درويش على صورFreeNewsBus DrivingHalloween Reward Theme WeatherSYSCOHADA Pro
|
|
Also See
1)
SmartLogon Personal Edition
Hardware and software complex used to monitor and control access to information resources based on two-factor authentication. The system supports hardware tools for access control and information prot...
License:Shareware USD 49.95
Size:12.07 MB
2)
Private Tracker Pro
Private Tracker Pro is a mobile tracking tool that runs on Windows Mobile-based PDAs and Smartphones. Private Tracker Pro tracks the user's current location and logs the locations that the user has vi...
License:Shareware USD 39.99
Size:0.63 MB
3)
Accent OFFICE Password Recovery
An effective solution to the problem of lost passwords for Microsoft Office documents. It finds passwords for all MS Office versions (from Office 95 to Office 2010). It works up to 60 times faster if ...
License:Shareware USD 60
Size:1.97 MB
accent office, password recovery, recover lost, forgotten password, brute force, masked brute force, dictionary based, recovering passwords, advanced, transforming, removed, password recovery, protecting worksheet,
4)
Folder Vault
Folder Vault lock, hide, securely encrypt and protect files and folders in the blink of an eye. With one master password FolderVault will protect your files, folders and even entire drives from being ...
License:Shareware USD 9.95
Size:2.70 MB
5)
Internet Access Controller
Internet Access Controller is a leading software tool for controlling, blocking web sites and restricting internet & network access. Internet Access Controller can restrict internet access at specifie...
License:Shareware USD 14.95
Size:2.80 MB
6)
SpyBoss KeyLogger Pro
Keylogger Computer Spy & Internet Monitoring Software Program SpyBoss Pro a leading keylogger computer & Internet monitoring software tool SpyBoss Keylogger Pro records every detail of what is done on...
License:Shareware USD 24.95
Size:2.68 MB
7)
ZoneIDTrimmer
ZoneIDTrimmer helps to detect and remove an alternative data stream (Zone.Identifier) stored by Windows in files downloaded from the Internet or email attachments saved on your disk, causing a securit...
License:Freeware
Size:0.36 MB
8)
Security Task Manager
Security Task Manager is an enhanced process viewer, that provides detailed information about programs and processes running on the computer. It displays all the standard information, including file n...
License:Shareware USD 39
Size:1.63 MB
9)
Total Privacy
Total Privacy Provides the Most Advanced Information Removal Solution for Protection Against Today's Malicious Online and Offline Threats. Total Privacy is a safe and easy-to-use to use privacy protec...
License:Shareware USD 29.95
Size:3.34 MB
10)
Crypto 2000
Crypto is a small, easy to use, file encryption utility. Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an encryption key to encode and decode the f...
License:Shareware USD 19.95
Size:0.57 MB
|
1)
EZ Backup IE Basic
EZ Backup IE Basic makes it easy to backup your Internet Explorer favorites to any local, network or removable drive. The application creates a self-restoring backup archive which includes a wizard in...
License:Shareware USD 9.95
Size:2.6 MB
2)
NShred
With NShred you can eliminate confidential information and data from PC hard disks. Name, size, contents of erased file or folder can never be recovered, by any software or hardware means. Also, you m...
License:Shareware USD 25.00
Size:1.68 MB
3)
OutlookFIX Outlook PST Repair
Outlook PST repair, a PST Outlook inbox repair tool. Undelete Outlook Email files as well as other Outlook elements easily. OutlookFIX also allows the user to reduce the Outlook PST file size by split...
License:Shareware USD 159
Size:3.10 MB
outlook pst repair, outlook repair, email undelete, undelete email, undelete outlook, recover pst, outlook fix, outlookfix, outlook recovery, email, corrupt, damaged, file, outlook recovery,
4)
Better File Select
Better File Select is a shell extension for the Windows Explorer, which allows users to quickly select multiple files based on a range of criteria. The simplest selection method is through partial fil...
License:Shareware USD 9.95
Size:0.57 MB
5)
Twistpad
Twistpad is a fully featured Text Editor for Windows. Twistpad can be used as a simple notepad replacer, or an featured packed editor targeting web and software developers. Twistpad supports a full ra...
License:Shareware USD 19.95
Size:2.4 MB
6)
Partition Find and Mount
Partition Find & Mount implements a new concept of deleted or lost partition recovery. It works in the most convenient way possible — by locating and mounting partitions into the system, thus making...
License:Freeware USD 0.00
Size:1.50 MB
7)
Schedule Password
Password recovery tool, which comes in very handy if you forgot, lost, or misplaced your password for MS Schedule files. All passwords are recovered instantly. Program interface is web-like and easy t...
License:Demo USD 35
Size:0.58 MB
8)
Mail PassView
Mail PassView is a small password-recovery tool that reveals the passwords and other account details for the following email clients: Outlook Express Microsoft Outlook 2000 (POP3 and SMTP Accounts onl...
License:Freeware
Size:0.05 MB
9)
EZ Backup Excel Basic
EZ Backup Excel Basic makes it easy to backup your Microsoft Excel files to any local, network or removable drive. The application creates a self-restoring backup archive which includes a wizard inter...
License:Shareware USD 9.95
Size:3 MB
10)
UFS Explorer Batch Access
With UFS Explorer Batch Access you may: - copy files from most used file systems of different OS: UFS/UFS2 (BSD), XFS/ReiserFS/Ext2/Ext3 (Linux), HFS/HFS+/HFSx (MacOS), FAT and NTFS with system locked...
License:Shareware USD 22.95
Size:0.60 MB
|
|
More tags: mamutu, hips, ids, behavior, blocker, behaviour, monitoring, malware, virus, trojan, backdoor, worm, dialer, spyware, adware, stopper, blocker, analysis, malicious, removal, hijacker, keylogger, rootkit, autoruns, autostarts, injector, manipulation,
|
|