No-Code mobile game development.The power to design, build, and publish 3D & 2D mobile games without coding.DOWNLOAD FREE
Best Bitcoin Paying Sites Daily updated List for ONLY BEST Paying Sites to get Free Bitcoin





Ваш персональный PAYEER® кошелек! Совершайте платежи по всему миру.PAYEER поддерживает более 200 стран.


MICROPAYMENT WALLET AND EARNINGS PLATFORM Receive instant cryptocurrency payments from thousands of websites and withdraw it to your personal wallet for a very low fee.
№1 I-GAMING PLATFORM WITH BTC DIVIDENDS 1000+ Games BetFury Staking APR 350% Free BTC every 20 min IN-HOUSE GAMES PLAY AND WIN In-house games have a unique designs, exciting rules, interesting features and some of them the ability to hit the Jackpot. Total Jackpots 3.84848639 BTC

четверг, 27 декабря 2012 г.

COMODO Cleaning Essentials 2.5.242177.201 Final

COMODO Cleaning Essentials (CCE) - набор инструментов для очистки зараженных компьютеров и обеспечения их безопасности. Основным инструментом CCE является мощный сканер вирусов, шпионского ПО, руткитов и т.п., применяющий метод эвристического анализа.

Comodo Cleaning Essentials (CCE) is a set of computer security tools designed to help users identify and remove malware and unsafe processes from infected computers.



COMODO Cleaning Essentials 2.5.242177.201 Final

Features

  • Instantly identify and stop every untrusted process running on an endpoint with a single click
  • Powerful antivirus scanner capable ofremoving malware, rootkits, hidden files and malicious registry keys hidden deep within a system
  • Forensic level stats and graphs allow internal processes and resource usage to be analyzed with unrivaled granularity
  • Integration with Comodo cloud scanners provides real-time safetyverdicts for unknown processes
  • Perfect for ensuring network endpoints are totally clean of threats
  • Can be configured to replace Windows Task Manager in the Windows shell
  • No installation required – can run direct from USB or user desktop via RDP







Comodo Cleaning Essentials (CCE) is a set of powerful security tools designed to help users identify and remove malware and unsafe processes from Windows computers. Designed as a portable application, the software requires no installation and can be run directly from removable media such as a USB key.
CCE consists of two core technologies:
  • KillSwitch - an advanced system monitoring tool that allows users to identify, monitor and stop potentially unsafe processes that are running on endpoint systems. Uniquely for a product of its type, KillSwitch leverages Comodo's huge whitelist database to isolate untrusted processes with an extremely high degree of accuracy – improving IT operational efficiency by reducing false positives and cutting the amount of time spent troubleshooting an endpoint machine.
  • Malware scanner – fully featured malware scanner capable of unearthing and removing viruses, rootkits, hidden files and malicious registry keys hidden deep within a system. The scanner is highly configurable, uses the latest heuristic techniques to detect previously unknown viruses, features first-class malware removal capabilities and is capable of detecting hidden drivers and services loaded during system start-up.
CCE is another indispensable security tool from Comodo that offers unique functionality to users of any experience levels.
All users will benefit from the ability to quickly scan and remove viruses with a VB100 rated scanning engine. Advanced users such as system admins will enjoy the high levels of visibility and control that KillSwitch provides over processes and services.
CCE Features
  • Classifies the threat level of all objects and processes currently loaded into memory and highlights those that are not trusted
  • Allows the admin to terminate, delete or suspend every untrusted item with a single click.
  • On-demand malware scanner quickly finds viruses, rootkits and hidden services
  • Extremely efficient malware removal routines thoroughly disinfect virus stricken endpoints
  • Detailed statistics and graphs allow admins to analyze and fine tune system activity to almost infinite levels of detail
  • Leverages Comodo's huge whitelist database to accurately identify the trust status of every running process with minimal false positives
  • Integration with Comodo cloud scanning technology delivers instant behavioral analysis of unknown processes
  • Powerful system tools provide control over even the most obscure system settings
  • Simple interface for admins to manage trusted vendors list
  • Comprehensive event logs provide detailed overview of system activity on endpoint machines
  • Quick repair feature allows fast restoration of important Windows settings
  • Can replace the standard Windows Task Manager if required
  • Another indispensable addition to admin's security toolkit to complement software such as Comodo Internet Security
  • Lightweight – requires no installation and can be run right from a USB stick
  • Fast, free and easy to use
What does KillSwitch offer me that I don't already have?KillSwitch can show ALL running processes and objects in real time– exposing even those that were invisible or deeply hidden away. This core functionality has been seamlessly integrated with Comodo's huge whitelist of known executables to create a unique product that accurately classifies the threat level of running processes with the absolute minimum of false positives.

By leveraging the whitelist database to isolate just those items that are untrusted, admins can greatly reduce the pool of potentially problematic processes they have to verify as safe or not. This route to safety through a 'process of elimination' is strengthened by the ability of CCE to check these untrusted processes in real-time using Comodo's cloud scanners. Also, once an untrusted process has been identified in memory, administrators can use the information to trace back to the source executables. With a single mouse click, all untrusted processes can be terminated or suspended. All untrusted objects can be deleted or renamed.

As a system monitoring utility, KillSwitch also grants unparalleled insight and control over services, processes, BHO's and layered service providers. It can be made to replace Window's Task Manager within a couple of clicks and offers network admins another powerful layer of protection for endpoint computers. CCE is the perfect complement to products such as Comodo Internet Security and Endpoint Security Manager.Can you tell me more about the malware scanner?The on-demand malware scanner uses the same core technology as Comodo Antivirus but does not require installation and can be run directly from removal media such as a USB stick. Awarded Virus Bulletin VB100 status, the scanning engine uses the very latest heuristic techniques to identify previously unknown, zero day threats with an very high level of efficiency. The scanner is also extremely effective at disinfecting and removing viruses once they have been identified.Who should use Comodo Cleaning Essentials?Comodo products are designed to be accessible to users of any experience level. However, the highly technical nature of the information presented by KillSwitch probably makes it more suited to system administrators, advanced users or computer science students. On the other hand, the malware scanner features a simple interface and can be used with ease by anybody.What is a portable application?Portable applications do not need to be installed and can be run directly from media such as a USB stick (just double click on 'cce.exe'.Why does CCE need 210 MB disk-space?This is to house the database of black-listed virus signatures that must be downloaded on first run. This database powers the malware scanner.
System Requirements
Supported Operating Systems
  • Windows 7 - 32 and 64 bit
  • Windows Vista - 32 and 64 bit
  • Windows XP - 32 and 64 bit
Minimum Hardware Requirements (32 bit or 64 bit version)
  • Intel Pentium II 233 MHz or equivalent
    processor
  • 128 MB RAM
  • 210 MB free disk space

Особенности CCE:
Портативный: нет необходимости установки!
Сканер руткитов и замаскированных вредоносных файлов
Возможность удаления вредоносных файлов
Уничтожитель, как расширенный инструмент мониторинга активности системы
Изменения в версии 2.5.242177.201:
NEW: Full support of Windows 8 Release Preview.
FIXED: File signature is not recognized correctly in some cases.
IMPROVED: Enhanced white list for system files.
IMPROVED: Avoid false positive by enhanced trusted file verification.
IMPROVED: CCE GUI can now be maximized.
IMPROVED: Update virus signature before restart in full scan so that scan starts immediately after system starts up.

Год выхода: 2012
Операционная система: Windows 7/Vista/XP
Разрядность: X86(32 bit) и X64(64 bit)
Язык: Русский,Английский
Лекарство: не требуется
Размер файла: 111 Мб и 155 Мб

  Для более комфортного скачивания файлов с нашего ресурса, рекомендуем установить программу Skymonk и вы больше не будете ожидать минуту перед скачивание файлов, а также скорость скачивания значительно увиличется. Просто вставьте ссылку на файл в программу Skymonk и всё.

Cкачать Download


СКАЧАТЬ 32 бит версию 


 СКАЧАТЬ 64 бит версию 


Cкачать Download

Cкачать Download

Cкачать Download

Комментариев нет:

Отправить комментарий

баннерные и тизерные сети