icon

Search Results for "detect malicious computer activity"

Please type in the keywords that best describe the software you are searching for.

Only search for freeware (Fewer results)

These categories may be related to what you're looking for:

Filter results:

Steel Network Inventory screenshot

icon Steel Network Inventory

  • Our Rating: stars
  • User Rating: 4 (3)
  • Popularity: 44

Steel Inventory is a network inventory auditing program, that allows you to keep track of software and hardware changes across your network. After an initial scan, you can generate a snapshot that includes the current h... more Category: Network Administration

ExeWatch screenshot

icon ExeWatch

  • Our Rating: stars
  • User Rating: 5 (1)
  • Popularity: 11

ExeWatch is a small program that runs in the system tray and alerts you whenever a new executable (.exe, .com, .jar, .bat) is added to your hard drive(s). When a new executable is detected, the pr... more Category: System Monitoring

Slitheris Network Discovery screenshot

icon Slitheris Network Discovery

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 66

Slitheris Network Discovery is an advanced network scanner capable of scanning 100 network devices in about 5 minutes! Most IP scanners detect the basics like the MAC Address, but leave the OS field empty and usually d... more Category: Network Scanner

Syncthing screenshot

icon Syncthing

  • Our Rating: stars
  • User Rating: 4 (1)
  • Popularity: 99

Syncthing is and open and decentralized sync and cloud service that lets you share and synchronize files with other computers and provides you with full control over how your data is shared and who can access it. ... more Category: File Synchronization

TCPConnectProblemView screenshot

icon TCPConnectProblemView

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 11

TCPConnectProblemView is a tool for Windows that monitors the TCP connections on your system and displays an alert when a software tries to initiate a TCP connection and there is no response from the server.... more Category: Network Monitoring

Windows CleanUp! screenshot

icon Windows CleanUp!

  • Our Rating: stars
  • User Rating: 5 (4)
  • Popularity: 22

Windows CleanUp! is an easy to use privacy cleaner that can remove traces of your Internet activity as well as delete a variety of junk files that accumulate over time and litter your hard drive. It offers 4 levels ... more Category: Internet Tracks Cleanup

DUN Manager screenshot

icon DUN Manager

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 66

DUN Manager is designed to simplify and enhance Dial Up Networking and Remote Access Services. It offers single click connection start-up and hang-up, a flashing icon while online, automatic disconnection options to avo... more Category: Misc. Internet Tools

Atrise Golden Section screenshot

icon Atrise Golden Section

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 44

Golden Section is an adjustable, transparent design grid for web, graphic, logo and interface designs. It allows you to control and correct the sizes and proportions in a design project using the Golden Section ratio.... more Category: Misc. Imaging Tools

Rainmeter screenshot

icon Rainmeter

  • Our Rating: stars
  • User Rating: 4 (3)
  • Popularity: 66

Rainmeter is a fully customizable desktop customization platform that allows you to monitor vital system information including memory usage, disk usage and utilization, network traffic, uptime and many other details. Yo... more Category: System Information

Total Privacy screenshot

icon Total Privacy

  • Our Rating: stars
  • User Rating: 5 (1)
  • Popularity: 55

Total Privacy allows you to clean up all the tracks of your Internet and system activities, including browser cache, cookies, web forms data, recent documents history, application history, temporary files, recycle bin a... more Category: Internet Tracks Cleanup

Filter results:

Result pages: 1 2 3 4 5 6 7 8 9 10


Need more search power? Search our site with Google! See results for detect malicious computer activity