icon

Search Results for "firewall with Trojan protection"

Please type in the keywords that best describe the software you are searching for.

Only search for freeware (Fewer results)

These categories may be related to what you're looking for:

Filter results:

Identity Cloaker screenshot

icon Identity Cloaker

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 66

Identity Cloaker is an Internet Privacy and Anonymity Protection Service that enables you to hide your real IP address through a network of private anonymous proxy servers located in different countries. For additional ... more Category: Misc. Security Tools

Ghostpress screenshot

icon Ghostpress

  • Our Rating: stars
  • User Rating: 5 (1)
  • Popularity: 33

Ghostpress is an anti-keylogger application that prevents third party programs from capturing your keystrokes as you type. Instead of scrambling the key presses Ghostpress completely hides any key... more Category:

Copy Protect screenshot

icon Copy Protect

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 77

Copy Protect allows you to protect files on CDs, DVDs, USB drives and other portable media from illegal copying and distribution. The program converts your files into standalone, executable media applications that can ... more Category: File and Folder Protection

Malware Defender screenshot

icon Malware Defender

  • Our Rating: stars
  • User Rating: 4 (1)
  • Popularity: 33

Malware Defender is a hands-on HIPS (Host Intrusion Prevention System) for advanced users. It enables you to create rules that can help you protect your computer from malware, Trojans, spyware and other threats. The pro... more Category: Misc. Security Tools

DeviceLock screenshot

icon DeviceLock

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 66

DeviceLock gives network administrators control over which users can access what removable devices on a local computer. Once DeviceLock is installed, administrators can control access to USB driv... more Category: PC Access Control

Startup Organizer screenshot

icon Startup Organizer

  • Our Rating: stars
  • User Rating: 3 (1)
  • Popularity: 55

Startup Organizer is a program that was developed to provide quick access to all of the programs that are automatically started when you turn on or logon to your computer. The program allows you to... more Category: Startup Managers

TCPEye screenshot

icon TCPEye

  • Our Rating: stars
  • User Rating: 5 (2)
  • Popularity: 22

TCPEye is a network and Internet connection monitoring tool that shows you which applications are currently using your network connection, the server they are communicating with and the country where the server is locat... more Category: Network Monitoring

StartEd Lite screenshot

icon StartEd Lite

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 11

StartEd Lite enables you to view, edit and disable entries from your Windows startup configuration. Once you open the program, it will show a list of all current startup entries, along with their ... more Category: Startup Managers

Norton Power Eraser screenshot

icon Norton Power Eraser

  • Our Rating: stars
  • User Rating: 1 (1)
  • Popularity: 66

Norton Power Eraser is a standalone tool that claims to find and eliminate malware items that are difficult to remove or often overlooked by other spyware scanners. The program uses aggressive methods and is intended as... more Category: Malware Removal

BackUp Maker screenshot

icon BackUp Maker

  • Our Rating: stars
  • User Rating: 4 (1)
  • Popularity: 88

BackUp Maker is a personal backup tool that can create backups in ZIP format. It can optionally backup the files directly to a CD-RW or DVD drive, a local folder, or a remote FTP server. The progr... more Category: Backup Software

Filter results:

Result pages: 1 2 3 4 5 6 7 8 9 10 »» Next


Need more search power? Search our site with Google! See results for firewall with Trojan protection