Freeware Listing: Threat

PC Tools Threat Removal Tool is a handy and reliable utility designed to scan your computer for threats and remove them.

This Threat Removal Tool is designed to fight malicious code that has been known to prevent PC Tools' antivirus software from being installed. It performs a quick system scan in order to identify and neutralize the most common malware families that block, prevent, or terminate PC Tools' security software installers.

To ensure that the malware is completely eliminated, PC Tools Threat Removal Tool deletes the infected files and the registry values added by malware.

  • Platform: WinOther

Forefront Threat Management Gateway 2010 allows employees to safely and productively use the Internet without worrying about malware and other threats. It provides multiple protection capabilities including URL filtering*, antimalware inspection*, intrusion prevention, application- and network-layer firewall, and HTTP/HTTPS inspection that are integrated into a unified, easy to manage gateway, reducing the cost and complexity of Web security. Forefront Threat Management Gateway 2010 is available for download in both Standard Edition and Enterprise Edition..

  • Platform: WinServer

Triple Threat Mahjong Solitaire is 3x as hard as traditional Mahjong Solitaire. Triple Threat Mahjong Solitaire has 3 pyramids of Mahjong Tiles to break down for you to beat the game. Eliminate mahjong tiles by clicking on matching pairs. You can also match any season tile with any season tile, and any flower mahjong tiles with other flower mahjong tiles. Enjoy the beautiful artwork and fabulous craftsmanship of Triple Threat Mahjong Solitaire from the comfort of your home, or at work. It's great for anyone in need of some serious down-time, and if you feel like being competitive with yourself, try to beat your own high score!.

  • Platform: Mac OS X, Palm OS, Win2000, Win7 x32, Win7 x64, Windows CE, Windows Mobile, Windows Server, Windows Vista, WinOther, WinVista, WinVista x64

Threat Killer is a fully-scriptable malware remover able to remove persistent files, kernel drivers installed by rootkits, registry keys and values, terminate processes (even if critical), delete an entire folder (also using recursive) and much more by executing custom scripts. Features Backup Files Folders and Registry Easily Remove Trojan Traces with Custom Scripts Fully Scriptable Malware Remover Engine Multilingual Support.

  • Platform: WinOther

The Microsoft SDL Threat Modeling Tool allows for early and structured analysis and proactive mitigation and tracking of potential security issues. The SDL Threat Modeling Tool helps engineers analyze the security of their systems to find and address design issues early in the software lifecycle. The SDL Threat Modeling Tool version 3.1.6 Beta supports Visio 2010. Additional improvements in this version include UI improvements and bug fixes from the previous 3.1 release. Threat models creates by version 3.1. are compatible with version 3.1.6, but backwards compatibility (version 3.1.6 to version 3.

  • Publisher: Microsoft
  • Date: 04-05-2012
  • Size: 3686 KB
  • Platform: WinOther

A Lightweight P2P Threat Analysis Bus.

  • Platform: WinOther

Threat of attack game is new real time strategy written in C#. It's have 3D engine written in WPF.

  • Platform: WinOther

Threat of Chaos aims to create a plug-in based simulator of real miniature games via an Internet connection. It also provides Sunlight, a list editor, and Moonlight, a map editor.
Threat of Chaos License - GNU General Public License (GPL).

  • Platform: WinOther

Network Threat Simulation Tool (NTST) will be able to effectively simulate any network security threat including worms, Trojans, spywares, & exploits. It will help in testing the effectiveness of network security devices like IDS/IPS/Firewall.
Deep - Network Threat Simulation Tool License - GNU General Public License (GPL).

  • Publisher: Ntst
  • Date:
  • Platform: WinOther

The Forefront TMG software development kit includes headers, libraries, tools, samples and documentation to enable developers and system administrators to deploy, configure, customize, and extend their Forefront TMG environment. Note that documentation of some COM elements is incomplete.

You can take the Forefront Threat Management Gateway SDK for a test drive to see what it's all about!

.

  • Platform: Windows Server

Max Secure Spyware Detector is a complete solution for individuals, professionals and home users.

The software is specially designed to scan, detect, delete and recover spyware with an option of quick and full scan.

If you are having difficulty with Spyware threat definitions Live Update, you can download the separate package and add to installation folder. for Windows2K, XP, 2003, Vista, XPX64, Vista64, 7, 7x64

.

  • Platform: Win2000, Win7 x64, Windows 7, WinOther, WinServer, WinVista, WinVista x64

ESET Gateway Security is a professional antivirus solution designed to fully protect Microsoft ISA and Forefront Threat Management Servers.

ESET Gateway Security features complex security rules and in-depth server scanners in order to provide the ultimate level of protection.



.

  • Publisher: Eset
  • Date:
  • Platform: Windows Server, WinServer

Microsoft Threat Analysis & Modeling tool allows non-security subject matter experts to enter already known information including business requirements and application architecture which is then used to produce a feature-rich threat model. Along with automatically identifying threats, the tool can produce valuable security artifacts such as:

- Data access control matrix
- Component access control matrix
- Subject-object matrix
- Data Flow
- Call Flow
- Trust Flow
- Attack Surface
- Focused reports

Instructions :

1. Download the file by clicking on the "Download" button.

  • Platform: Windows 7, WinOther, WinVista

The Spyware cleanup template automatically removes the Spyware/Grayware threat form the customer's system..

  • Platform: Win2000, WinOther

The Spyware cleanup template automatically removes the Spyware/Grayware threat form the customer's system..

  • Platform: Win2000, WinOther

This Solution Accelerator provides you with a method to develop IT infrastructure threat modeling processes for your environment and prioritize your IT infrastructure security investments. The guide describes and considers the existing Microsoft Security Development Lifecycle (SDL) threat modeling process and uses it to establish a threat modeling process for IT infrastructure.

The IT Infrastructure Threat Modeling Guide provides an easy-to-understand method that enables you to develop threat models that can help prioritize investments in IT infrastructure security.

This Solution Accelerator consists of a release notes document Release Notes.

  • Platform: WinOther, WinServer, WinVista

Threat of attack game is new real time strategy written in C#. It has a great 3D engine written in WPF..

  • Publisher: mateuszj
  • Date:
  • Size: 4392 KB
  • Platform: WinOther, WinVista

"Combat Kings Threat Tango

Your squadron is nick-named the Combat Kings because you are the best at what you do.

You are the newest breed of soldiers from the CIA's paramilitary wing of go-to commandos.

Chasing the terrorists, baddest criminals, and a odd foreign army or two, you'll run, jump and shoot your way to VICTORY. •Brand-new technology allows us to make this fun, running and jumping iPhone game.

•Charge ahead against the enemy, shooting your way past them…
•Engage at the highest levels of your field "

.

  • Platform: Android 2.x, Android 3.x, Android 4.4, Android 4.x

Take the first step to learning how to secure your network with Juniper Threat Watch. Explore weekly and monthly cyber threat trends, view daily attack types, and discover attacker behavior around the world. This app provides a vision into the world of cyber threats and intelligence gathering through the Juniper Networks Spotlight Secure platform.

With Juniper Threat Watcher you can:

• View cyber attack trends by week, month or calendar year
• Monitor worldwide threat levels
• View attack types and definitions
• Discover real cyber attacker profiles and how and where they attack from
• Access ever-expanding glossary of cyber attack terms
• Learn from security intelligence thought leaders
• Learn how Juniper’s firewalls and Spotlight Secure platform can secure your network

About Spotlight...

  • Platform: Android 4.x

Active Threat Alert (ATA) provides schools and other large organizations with a supplementary notification alert that is generated and received by subscribed users of the ATA application in regards to those directly affected by an active threat situation..

  • Platform: Android 4.x

Threat: Freeware | All

New Reviews


CloneCD

Despite huge growth in technology and tremendous increase in use of flash drives, use of CDs and DVDs hasn’t disappeared yet. Conventional 700MB CDs are still in use, largely due to the fact that they are extremely cheap. In addition of being ...


WinLock

WinLock is a program that helps users lock down and limit access to certain functions of a Windows PC. Applications such as WinLock are crucial in environments where public access is allowed to PC’s, such as libraries or internet cafes, as ...


Intergalactic War

Inter galactic war is another free ware two dimensional shooter game, falling into the ever prevalent genre of top down shooters. As the title suggests, in inter galactic war you play as a space ship fighting enemy space ships as you fight your way ...


Angry Birds

Angry birds is one of the most successful games of all time, despite the fact that it has been free from the very beginning. Angry birds is a experimental physics game, with the objective being to fling all of your birds into the structures occupied ...


Flower Power

Flower power is a freeware puzzle game which is very similar in gameplay style and nature to the classic arcade game bejeweled, taking all the basic concept, idea and gameplay from bejeweled, and adding its own twist in the form of the art style of ...


Vehicles 2

Vehicles 2 is a great example of innovation in a game, from the very beginning cut scene (which explains the general back story to the game in a very light, humorous way) to the gameplay style, it has a lot of influence from other games in the ...


Joomla

Nowadays, most people use Joomla, Wordpress or Drupal to make their websites. Creating websites by the use of CMSs is an easy yet effective way as one does not require to code heavily. We’ll be talking about Joomla, a powerful Content ...


Fraps

Fraps is a video capture utility specifically designed for the recording of other pieces of software, specifically tailoured to those which use direct X and open GL. This means the main use of fraps is for recording games which run on the windows ...


Typing Invaders - Free Typing Game

Typing invaders is a free ware typing game, which (in short) essentially takes the concept from the game space invaders, and applies it to a fun typing improving game. It does this by taking all the core gameplay elements of space invaders, and then ...



New Downloads

Visual SEO Studio

A desktop SEO Audit Tool, a
Visual approach to make SEO
tasks quick and easy. Crawl,
Spot on-site issues at a
glance, ...

PlusX Excel Add-In

PlusX Excel Add-In Create
Waterfall ( Bridge ) , Gantt (
Project ) , QIGS , Mirror ,
BubbleX and Double Donut
Charts. ...

Freo Messenger

Freo Messenger is a multi
protocol instant messenger
that works with Windows whose
support includes AIM, ICQ,
IRC, MSN ...

Pidro Challenge

The Pidro card game - a game
of daring and skill. You and
your computer partner play
against two computer
opponents.

Free Desktop Widget Toolbox

Download a multi widget
toolbox. Use an elegant and
clean display with one-click
access. Use widgets, including
Countdown ...

Sherly

Turn your public clouds into
private and unlimited. Add
control and conversations to
your shared files. Welcome to
a ...

Norton Security with Backup

Norton Security beta provides
easy, comprehensive security
no matter how you connect.
Test our latest version
against the ...

eMule Turbo Accelerator

eMule Turbo Accelerator is a
new add-on for eMule file
sharing program

Biometric Handpunch Manager
Personal

Biometric Handpunch Manager
allows you to manage all of
your Handpunch devices in
seconds.



Related Searches

Threat Che Bomb
Threat Pro Bomb
Threat Bomb
Bomb Threat
Threat Born
USB Threat Defender
Sophos Threat
Sophos Threat Detection
Ms Forefront Threat Management System
Usb Threat Defendre
Threat Creator
Bomb Threat Free Sound Effect