Freeware Listing: Threat
- PC Tools Threat Removal Tool
- License: Shareware

PC Tools Threat Removal Tool is a handy and reliable utility designed to scan your computer for threats and remove them.
This Threat Removal Tool is designed to fight malicious code that has been known to prevent PC Tools' antivirus software from being installed. It performs a quick system scan in order to identify and neutralize the most common malware families that block, prevent, or terminate PC Tools' security software installers.
To ensure that the malware is completely eliminated, PC Tools Threat Removal Tool deletes the infected files and the registry values added by malware.
- Publisher: PC Tools
- Date:
- Platform: WinOther
- Forefront Threat Management Gateway (TMG) 2010
- License: Freeware

Forefront Threat Management Gateway 2010 allows employees to safely and productively use the Internet without worrying about malware and other threats. It provides multiple protection capabilities including URL filtering*, antimalware inspection*, intrusion prevention, application- and network-layer firewall, and HTTP/HTTPS inspection that are integrated into a unified, easy to manage gateway, reducing the cost and complexity of Web security. Forefront Threat Management Gateway 2010 is available for download in both Standard Edition and Enterprise Edition..
- Publisher: microsoft.com
- Date:
- Size: 1153433 KB
- Platform: WinServer
- Triple Threat Mahjong Solitaire
- License: Freeware

Triple Threat Mahjong Solitaire is 3x as hard as traditional Mahjong Solitaire. Triple Threat Mahjong Solitaire has 3 pyramids of Mahjong Tiles to break down for you to beat the game. Eliminate mahjong tiles by clicking on matching pairs. You can also match any season tile with any season tile, and any flower mahjong tiles with other flower mahjong tiles. Enjoy the beautiful artwork and fabulous craftsmanship of Triple Threat Mahjong Solitaire from the comfort of your home, or at work. It's great for anyone in need of some serious down-time, and if you feel like being competitive with yourself, try to beat your own high score!.
- Publisher: Online Mahjong
- Date: 24-10-2011
- Size: 2518 KB
- Platform: Mac OS X, Palm OS, Win2000, Win7 x32, Win7 x64, Windows CE, Windows Mobile, Windows Server, Windows Vista, WinOther, WinVista, WinVista x64
- Threat Killer
- License: Freeware

Threat Killer is a fully-scriptable malware remover able to remove persistent files, kernel drivers installed by rootkits, registry keys and values, terminate processes (even if critical), delete an entire folder (also using recursive) and much more by executing custom scripts. Features Backup Files Folders and Registry Easily Remove Trojan Traces with Custom Scripts Fully Scriptable Malware Remover Engine Multilingual Support.
- Publisher: NoVirusThanks.org Software
- Date: 01-06-2012
- Size: 809 KB
- Platform: WinOther
- SDL Threat Modeling Tool
- License: Freeware

The Microsoft SDL Threat Modeling Tool allows for early and structured analysis and proactive mitigation and tracking of potential security issues. The SDL Threat Modeling Tool helps engineers analyze the security of their systems to find and address design issues early in the software lifecycle. The SDL Threat Modeling Tool version 3.1.6 Beta supports Visio 2010. Additional improvements in this version include UI improvements and bug fixes from the previous 3.1 release. Threat models creates by version 3.1. are compatible with version 3.1.6, but backwards compatibility (version 3.1.6 to version 3.
- Publisher: Microsoft
- Date: 04-05-2012
- Size: 3686 KB
- Platform: WinOther
- PeerTAB: P2P Threat Analysis Bus
- License: Freeware

A Lightweight P2P Threat Analysis Bus.
- Publisher: peertab.sourceforge.net
- Date: 25-07-2012
- Size: 7705 KB
- Platform: WinOther
- Threat of attack game
- License: Freeware

Threat of attack game is new real time strategy written in C#. It's have 3D engine written in WPF.
- Publisher: toagame.sourceforge.net
- Date: 07-06-2012
- Size: 4396 KB
- Platform: WinOther
- Threat of Chaos
- License: Freeware

Threat of Chaos aims to create a plug-in based simulator of real miniature games via an Internet connection. It also provides Sunlight, a list editor, and Moonlight, a map editor.
Threat of Chaos License - GNU General Public License (GPL).
- Publisher: Threatofchaos
- Date:
- Platform: WinOther
- Deep - Network Threat Simulation Tool
- License: Freeware

Network Threat Simulation Tool (NTST) will be able to effectively simulate any network security threat including worms, Trojans, spywares, & exploits. It will help in testing the effectiveness of network security devices like IDS/IPS/Firewall.
Deep - Network Threat Simulation Tool License - GNU General Public License (GPL).
- Publisher: Ntst
- Date:
- Platform: WinOther
- Forefront Threat Management Gateway SDK
- License: Shareware

The Forefront TMG software development kit includes headers, libraries, tools, samples and documentation to enable developers and system administrators to deploy, configure, customize, and extend their Forefront TMG environment. Note that documentation of some COM elements is incomplete.
You can take the Forefront Threat Management Gateway SDK for a test drive to see what it's all about!
.
- Publisher: Microsoft
- Date:
- Platform: Windows Server
- Max Secure Spyware Detector Threat Definitions
- License: Shareware

Max Secure Spyware Detector is a complete solution for individuals, professionals and home users.
The software is specially designed to scan, detect, delete and recover spyware with an option of quick and full scan.
If you are having difficulty with Spyware threat definitions Live Update, you can download the separate package and add to installation folder. for Windows2K, XP, 2003, Vista, XPX64, Vista64, 7, 7x64
.
- Publisher: Max Secure Software
- Date:
- Platform: Win2000, Win7 x64, Windows 7, WinOther, WinServer, WinVista, WinVista x64
- ESET Gateway Security
- License: Shareware

ESET Gateway Security is a professional antivirus solution designed to fully protect Microsoft ISA and Forefront Threat Management Servers.
ESET Gateway Security features complex security rules and in-depth server scanners in order to provide the ultimate level of protection.
.
- Publisher: Eset
- Date:
- Platform: Windows Server, WinServer
- Microsoft Threat Analysis and Modeling
- License: Shareware

Microsoft Threat Analysis & Modeling tool allows non-security subject matter experts to enter already known information including business requirements and application architecture which is then used to produce a feature-rich threat model. Along with automatically identifying threats, the tool can produce valuable security artifacts such as:
- Data access control matrix
- Component access control matrix
- Subject-object matrix
- Data Flow
- Call Flow
- Trust Flow
- Attack Surface
- Focused reports
Instructions :
1. Download the file by clicking on the "Download" button.
- Publisher: Microsoft Corporation.
- Date:
- Size: 10219 KB
- Platform: Windows 7, WinOther, WinVista
- Spyware Cleanup Template Official Pattern Release
- License: Freeware

The Spyware cleanup template automatically removes the Spyware/Grayware threat form the customer's system..
- Publisher: us.trendmicro.com
- Date:
- Size: 1228 KB
- Platform: Win2000, WinOther
- Spyware Cleanup Template Controlled Pattern Release
- License: Freeware

The Spyware cleanup template automatically removes the Spyware/Grayware threat form the customer's system..
- Publisher: us.trendmicro.com
- Date:
- Size: 1228 KB
- Platform: Win2000, WinOther
- IT Infrastructure Threat Modeling Guide
- License: Freeware

This Solution Accelerator provides you with a method to develop IT infrastructure threat modeling processes for your environment and prioritize your IT infrastructure security investments. The guide describes and considers the existing Microsoft Security Development Lifecycle (SDL) threat modeling process and uses it to establish a threat modeling process for IT infrastructure.
The IT Infrastructure Threat Modeling Guide provides an easy-to-understand method that enables you to develop threat models that can help prioritize investments in IT infrastructure security.
This Solution Accelerator consists of a release notes document Release Notes.
- Publisher: Microsoft Corporation.
- Date:
- Size: 1863 KB
- Platform: WinOther, WinServer, WinVista
- Threat of Attack Game Source
- License: Shareware

Threat of attack game is new real time strategy written in C#. It has a great 3D engine written in WPF..
- Publisher: mateuszj
- Date:
- Size: 4392 KB
- Platform: WinOther, WinVista
- Combat Kings Threat Tango
- License: Freeware

"Combat Kings Threat Tango
Your squadron is nick-named the Combat Kings because you are the best at what you do.
You are the newest breed of soldiers from the CIA's paramilitary wing of go-to commandos.
Chasing the terrorists, baddest criminals, and a odd foreign army or two, you'll run, jump and shoot your way to VICTORY. •Brand-new technology allows us to make this fun, running and jumping iPhone game.
•Charge ahead against the enemy, shooting your way past them…
•Engage at the highest levels of your field "
- Publisher: Beest Free Game Adventures, LLC
- Date: 26-07-2014
- Size: 17408 KB
- Platform: Android 2.x, Android 3.x, Android 4.4, Android 4.x
- Juniper Threat Watch
- License: Freeware

Take the first step to learning how to secure your network with Juniper Threat Watch. Explore weekly and monthly cyber threat trends, view daily attack types, and discover attacker behavior around the world. This app provides a vision into the world of cyber threats and intelligence gathering through the Juniper Networks Spotlight Secure platform.
With Juniper Threat Watcher you can:
• View cyber attack trends by week, month or calendar year
• Monitor worldwide threat levels
• View attack types and definitions
• Discover real cyber attacker profiles and how and where they attack from
• Access ever-expanding glossary of cyber attack terms
• Learn from security intelligence thought leaders
• Learn how Juniper’s firewalls and Spotlight Secure platform can secure your network
About Spotlight...
- Publisher: Juniper Networks, Inc.
- Date: 04-06-2014
- Size: 11264 KB
- Platform: Android 4.x
- Active Threat Alert
- License: Freeware

Active Threat Alert (ATA) provides schools and other large organizations with a supplementary notification alert that is generated and received by subscribed users of the ATA application in regards to those directly affected by an active threat situation..
- Publisher: Active Threat Alert, LLC
- Date: 27-02-2015
- Size: 3379 KB
- Platform: Android 4.x
Threat: Freeware | All













