anti-spyware freeware


SpywareGuard – added 10/29/2005

SpywareGuard provides a real-time protection solution against spyware that is a great addition to SpywareBlaster’s protection method. SpywareGuard now also features Download Protection and Browser Hijacking Protection!


PC Audit – added 8/3/2002

pcAudit is a security evaluation program, a tool used to demonstrate the need for application control at the level of individual modules. It shows how the lack of this control could allow a “hacker” to bypass a conventional firewall unnoticed. Even “hi-jack” many popular personal firewall programs and use these very programs to send data back to a “hacker”. This program was developed to simulate an attack by a “hacker,” and to determine the status of security on a personal computer. pcAudit will try to send data from the computer to be audited, to Internet Security Alliance’s server.


Script Sentry – added 4/28/2002

Windows Scripting Host (WSH) is a double-edged sword. On one hand it can be used to make some very useful scripts to automate common Windows functions (for example, the Spell Checker script from PC911). On the other hand, it can be very easy for a malicious user to make a virus using WSH. Script Sentry allows safe scripts to run on your system while alerting you if a script might harm your system.


WinPatrol – added 4/9/2005


WinPatrol a spyware remover uses a heuristic approach to detecting attacks and violations of your computing environment. Detect & neutralize spyware, detect & neutralize viral infections, detect HOSTS file changes, detect & neutralize adware and more!


a-squared – added 4/8/2005


a-squared (a²) is a complementary product to antivirus software and desktop firewalls on MS Windows computers. It aids these types of security software in detecting Trojans, Dialers, Worms and Spyware.


RootkitRevealer – added 3/20/2005


RootkitRevealer is an advanced patent-pending root kit detection utility. It runs on Windows NT 4 and higher and its output lists Registry and file system API discrepancies that may indicate the presence of a user-mode or kernel-mode rootkit.

Pages: 1 2 3 4 5 6 7