Spotflux for Mac 2.9.6
Spotflux harnesses the power of the cloud to conduct millions of real-time checks for invasive tracking, advertisements, malware, and other undesirable artifacts that pose a threat to your identity or your data. Spotflux is an early stage venture-backed ...
- Audio & Multimedia
- Business
- Communications
- Desktop
- Development
- Education
- Games
- Graphics
- Home & Hobby
- Network & Internet
- Screen Savers
- Security & Privacy
- Servers
- System Utilities
- Web Development
- FoneLab Data Retriever
- Informachine File Manager
- Migrate Access Database to...
- Disk Media Recovery Software
- Pocket PC Device Forensic Tool
- HTMeLd
- ChequeSystem Cheque...
- Flash Card Recovery Software
- Aiseesoft FoneLab iPhone...
- SSuite Office Premium HD+
- AnyMP4 Blu-ray Creator
- FAT Volume Data Recovery
- Restore Deleted Mac Files
- UltraFileSearch Std Portable
- MSMassEmailSenderPro
- ADRC Data Recovery Tools
- avast! Antivirus
- Revo Uninstaller
- Java Runtime Environment
- AVG Anti-Virus Free Edition
- GOM Media Player
- RegSeeker
- IrfanView
- CPU-Z
- Malwarebytes Anti-Malware
- Spybot Search & Destroy
- Skype
- µTorrent
- Ai File Extension Editor
- Remove Drm From Pdf Files
- Download Word Templates For...
- Assault Cube Sounds
- Download Song As Zip File
- Rankquest Watchseo
- Free Becker Cpa
- Creative Smiley Faces Text
- Portable Photo Editor Free...
- Screen Capture Master
- Bat Merge
- Daz Iso Compressor
- Destroy Recycle Bin Windows
- Decode Firefox Cache File
- Link Directory Script
Detect Threat Download
-
1Freeware
-
2Security Task Manager 2.1.9.0
Security Task Manager is one of a number of systems designed to help PC users manage their processes more effectively. Processes and programs can slow down a PC, causing it to appear sluggish. If your computer is running too many programs at once you ...$29.00
Buy -
3Detect Duplicate Files 3.8
How to Detect Duplicate Files? Detect duplicates with the Software, Recommended by Microsoft(R) as the best program to delete duplicate files. With it you can detect duplicate files of any type: - Detect duplicate Photos, pictures, images and graphics ...$39.95 -
4SDL Threat Modeling Tool 3.1
As part of the design phase of the SDL, threat modeling allows software architects to identify and mitigate potential security issues early, when they are relatively easy and cost-effective to resolve. Therefore, it helps reduce the total cost of development.Freeware -
5Messenger Detect 1.00
Messenger Detect can detect and record all MSN chats in your Local network automatically. It can work secretly without need to install any client software on the target computers. It is safe-use because accessing and setting are all password protected.$59.95 -
6USB Threat Defender 1.0
USB Threat Defender is the ultimate USB Anti-Virus solution, its unique Proactive and Definition scan Technology combined together unleashes a new security stronghold level.USB Threat Defender is not just another autorun.inf virus remover, it takes more ...$39.95
Buy -
7Mobile Threat Net 1.3
The mobile storm tracker of choice for chasers and emergency responders, Mobile Threat Net delivers high-resolution radar display, patented storm tracking and GPS compatibility with a user-friendly interface. Only WxWorx delivers the accuracy of patented ...$299.00 -
8ThreatModeler 1.0
ThreatModeler™ will allow companies to build threat models in less than an hour without any knowledge of security. Its Intelligent Threat Engine (ITE), identifies the threat to your application, classifies them based on risk so that the mitigation ...$4,999.00 -
9NetWitness Investigator 9.7
NetWitness Investigator is the award-winning interactive threat analysis application of the NetWitness enterprise network monitoring platform. Investigator provides security operations staff, auditors, and fraud and forensics investigators the power ... -
10Trend Micro OfficeScan 10.6
Get the industry’s strongest data and threat protection – a collection of vital technology – built into a single endpoint agent, which can be deployed and managed together, from a single console. Consolidating your endpoints ... -
11Threat Killer 1.7
Threat Killer is a fully-scriptable malware remover able to remove persistent files, kernel drivers installed by rootkits, registry keys and values, terminate processes (even if critical), delete an entire folder (also using recursive) and much more ...Freeware -
12ZLOBRemoval Tool 1.0
Trojans is one of the most wide-spread threat in the internet. They can spread in lot of ways (torrents, e-mail attachments, video codecs etc.). ZLOB as well as any other trojan can harm your PC in different ways. Originally, trojans stole just your ...Freeware -
13Microsoft Threat Analysis and
This Microsoft Threat Analysis Modeling Tool will no longer be our primary tool. We are providing this tool (binaries and code) for people who have older projects where they previously used this tool and for in flight teams that started their threat ...Freeware -
14RAMMon 1.0
RAMMon is an easy-to-use Windows-based application that allows users to quickly retrieve the Serial Presence Detect (SPD) data from their RAM modules. It will allow users to identify a multitude of attributes, which include the manufacturer, the clockspeed ...$15.00 -
15Microsoft Forefront TMG Best
The Forefront Threat Management Gateway (TMG) Best Practices Analyzer (BPA) Tool is designed for administrators who want to determine the overall health of their Forefront TMG computers and to diagnose current problems. The tool scans the configuration ...Freeware -
16USB Detect and Launch 1.5
USB Detect & Launch allows you to automatically execute a script or application each time a USB storage device is plugged into your PC. Different scripts can be executed for different devices and it’s the volume label that determines ...Freeware -
17DriverEasy 3.1
Automatically detect, download, backup, restore and uninstall drivers. It’s easy to backup every driver installed in your pc and restore it whenever you want. Further more , If you determine the old and new drivers incompatible, DriverEasy ...$29.95 -
18Detect Invisible.Me 1.5
Detect Invisible.Me is a utility that can detect the real status of your contacts in Yahoo! Messenger or if they are in Hi5. This way, you can find out if someone is blocking you, or appears as offline or invisible in Messenger while actually being online ...Freeware -
19Detect Duplicates for Windows Live
Detect Duplicates for Windows Live Mail maintains an ordered mail-folder and message system by detecting duplicate messages under a variety of conditions and according to a variety of user-selectable and configurable options. This will enable you to ...Freeware -
20US Security Threat Monitor 1.0
The Homeland Security Threat Monitor is a small Windows application that runs in your system tray, showing the current terrorism threat level. It periodically checks to make sure the information is up to date by contacting the Department of Homeland ...Freeware -
21Detect-Email 1.0
Detect Email is an advanced email addresses harvester. It extracts email addresses from the Internet. You can determine any search criteria; it can be a domain name, a keyword or a searching engine. Detect Email’s powerful engine will quickly ...$85.00 -
22RAMAS Red List 3.0
RAMAS Red List implements IUCN threatened species criteria (IUCN 2001), which are rules for assigning species into categories representing different level of threat. The IUCN rules are based on information about such characteristics as number and distribution ...$495.00 -
23Excel Automatically Detect
Excel Automatically Detect Duplicates As You Type Software: Detect duplicate cells in one or more MS Excel files while typing. Excel 2000 or higher required. OS: Win98,WinME,WinXP,Windows2000,Windows2003,Windows Vista Starter,Windows Vista Home Basic,Windows ... -
24Clam Sentinel Portable 1.20
The Clam Sentinel Portable application was developed as an accessible and handy piece of software that was built to detect file system changes. Clam Sentinel will automatically scan the files that have been added or modified using the ClamWin antivirus.Freeware -
25Triple Threat Mahjong Solitaire 1.0
Triple Threat Mahjong Solitaire is 3x as hard as traditional Mahjong Solitaire. Triple Threat Mahjong Solitaire has 3 pyramids of Mahjong Tiles to break down for you to beat the game. Eliminate mahjong tiles by clicking on matching pairs. You can also ...Freeware