icon

Search Results for "detect malicious computer activity"

Please type in the keywords that best describe the software you are searching for.

Only search for freeware (Fewer results)

These categories may be related to what you're looking for:

Filter results:

tcpTrigger screenshot

icon tcpTrigger

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 22

tcpTrigger is a Windows service intended to notify you of incoming network connections. You can specify which network activity to monitor, and the actions to take when a connection is detected. ... more Category: Network Monitoring

Power Spy screenshot

icon Power Spy

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 66

Power Spy is a computer surveillance software that enables you to automatically log and record activities on your PC. The program can capture keystrokes and desktop screenshots, log visited websites, Skype chats (text),... more Category: Computer Surveillance

Network Activity Indicator screenshot

icon Network Activity Indicator

  • Our Rating: stars
  • User Rating: 5 (2)
  • Popularity: 55

Network Activity Indicator brings back the system tray network activity indicator found in previous versions of Windows. Unlike the standard Windows 7 network icon, Network Activity Indicator flashes whenever there is i... more Category: Misc. Networking Tools

IPNeighborsView screenshot

icon IPNeighborsView

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 22

IPNeighborsView displays the IP neighbor table of your local computer. For every IP neighbor entry, the following information is displayed: IP Address, MAC Address, MAC Address Company, State, State Time, Local Adapter ... more Category: Network Information

WorkTime Personal Free screenshot

icon WorkTime Personal Free

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 11

WorkTime Personal Free helps you monitor how much time you spend on different computer activities, including Internet, Social Sites, Games and general computer use. Once you start monitoring, th... more Category: Computer Surveillance

Free Download Manager screenshot

icon Free Download Manager

  • Our Rating: stars
  • User Rating: 5 (30)
  • Popularity: 99

Free Download Manager is a powerful download manager with tons of features that help you organize, schedule and speed-up your Internet file downloads. You can choose between 3 different speed modes, either use maximum b... more Category: Download Management

Zemana AntiLogger screenshot

icon Zemana AntiLogger

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 66

Zemana AntiLogger protects your system from keyloggers and other malware with the intent to steal your personal information. Rather than relying on signature updates to recognize known malware, the program uses proacti... more Category: Misc. Security Tools

ScreenWings screenshot

icon ScreenWings

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 44

ScreenWings is a simple one-button application that prevents any software from capturing your screen. Just like keyloggers, malicious screen capture software can be used to spy on your desktop ac... more Category: Misc. Security Tools

Webcam On-Off screenshot

icon Webcam On-Off

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 55

Webcam On-Off is an easy to use tool that lets you disable your webcam when it is not in use. If you are concerned about your privacy and are worried about malicious programs using your webcam to spy on you, this progra... more Category: Web Cam Tools

Dariks Boot and Nuke (DBAN) screenshot

icon Dariks Boot and Nuke (DBAN)

  • Our Rating: stars
  • User Rating: 5 (14)
  • Popularity: 33

Dariks Boot and Nuke (DBAN) runs from a bootable CD or DVD disk, and securely deletes (wipes) the entire content of the hard disks of most computers. DBAN will automatically and completely delete t... more Category: Digital File Shredders

Filter results:

Result pages: 1 2 3 4 5 6 7 8 9 10 »» Next


Need more search power? Search our site with Google! See results for detect malicious computer activity