icon

Search Results for "firewall with Trojan protection"

Please type in the keywords that best describe the software you are searching for.

Only search for freeware (Fewer results)

These categories may be related to what you're looking for:

Filter results:

Malwarebytes Anti-Exploit screenshot

icon Malwarebytes Anti-Exploit

  • Our Rating: stars
  • User Rating: 5 (2)
  • Popularity: 44

Malwarebytes Anti-Exploit aims to protect your computer from zero-day exploits targeting browser and application vulnerabilities. Unlike anti-virus tools, this program does not require daily signature updates and it des... more Category: Anti-Virus Tools

Ratool (Removable Access Tool) screenshot

icon Ratool (Removable Access Tool)

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 55

Ratool (Removable Access Tool) enables you to control USB storage devices, CD-DVD devices, Floppy device , Tape and WPD devices that are connected to your computer. You can choose to completely... more Category: PC Access Control

Jihosoft Free Eraser screenshot

icon Jihosoft Free Eraser

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 11

Jihosoft Free Eraser enables you to securely delete confidential files and folders beyond recovery. You can choose from 5 deletion algorithms including Gutmann and US DoD 5220 - high security overwrites will provide the... more Category: Digital File Shredders

Heimdal Thor Free screenshot

icon Heimdal Thor Free

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 11

Heimdal Thor Free keeps your vulnerable applications up-to-date, thereby protecting your system from potential security risks. This includes widely used applications like Java, Adobe Flash Player, Quicktime, Adobe Reade... more Category: Misc. Security Tools

EncryptedRegView screenshot

icon EncryptedRegView

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 33

EncryptedRegView scans the Registry and searches for data encrypted with DPAPI (Data Protection API). When it finds encrypted data in the Registry, it tries to decrypt it and displays the decrypted data in the report wi... more Category: Registry Tools

CamWings screenshot

icon CamWings

  • Our Rating: stars
  • User Rating: 5 (2)
  • Popularity: 44

CamWings enables you to prevent (malicious) software from using your cameras. You can enable and disable your devices without having to unplug them. You can also run CamWings with the "-Ghost" p... more Category: Web Cam Tools

LMT AntiMalware screenshot

icon LMT AntiMalware

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 33

LMT AntiMalware (formerly LMT Anti Logger) can help to prevent malicious software from stealing data from your computer. It offers real-time protection and artificial intelligence to prevent keylo... more Category: Misc. Security Tools

Vedivi screenshot

icon Vedivi

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 55

Vedivi (formerly WebPoint) is a VPN solution that enables you to access your home computer from anywhere, using a secure Internet connection. Once you have installed Vedivi on both computers (local and remote), you can ... more Category: Remote Computing

TeamViewer screenshot

icon TeamViewer

  • Our Rating: stars
  • User Rating: 5 (9)
  • Popularity: 99

TeamViewer is an easy to use solution for remote control, desktop sharing and file transfer that works behind any firewall and NAT proxy. All you need to do is run TeamViewer on both machines and e... more Category: Remote Computing

FileGateway screenshot

icon FileGateway

  • Our Rating: stars
  • User Rating: no reviews
  • Popularity: 22

FileGateway is a small server client application that you can use to upload/download files between 2 computers. Since you can use the HTTP protocol, it works in most cases even if they are limited by a proxy server or f... more Category: Misc. Server Tools

Filter results:

Result pages: 1 2 3 4 5 6 7 8 9 10 »» Next


Need more search power? Search our site with Google! See results for firewall with Trojan protection