Windows Protection Tools


  • VeraCrypt

    Free Mac Windows Linux PortableApps.com Website

    VeraCrypt is a free people disc encoding computer software brought to you by IDRIX and that is based on Small TrueCrypt icon TrueCrypt .
    It adds enhanced security to the algorithms exploited for arrangement and partitions encryption devising it immune to fresh developments in brute-force attacks.
    For example, when the organisation divider is encrypted, TrueCrypt uses PBKDF2-RIPEMD160 with 1000 iterations whereas in VeraCrypt we consumption 327670. And for banner containers and early partitions, TrueCrypt uses at most 2000 iterations but VeraCrypt uses 655340 for RIPEMD160 and 500000 iterations for SHA-2 and Whirlpool.

     

    VeraCrypt icon
  • Windows Defender

    Absolve Windows Website

    Windows Defender is built into Windows to assist guard your PC against viruses, spyware, and former malicious package in real time. Windows Defender features Real-Time Protection, a monitoring organization that recommends actions against malware when it's detected, minimizes interruptions, and helps you arrest productive.

     

    Windows Defender icon
  • VirusTotal

    Discharge Mac Windows Entanglement Android Website

    VirusTotal is a disembarrass armed service that analyzes fishy files and URLs and facilitates the quick catching of viruses, worms, trojans, and all kinds of malware.

    You arse upload files up to 150 MB in size.

    Applications for Windows, Mac and Android are also available to upload files to VirusTotal service.

    Both VirusTotal and Rotarua Limited are owned by Google.

     

    VirusTotal icon
  • Winja

    Disengage Windows Website

    Based on the achiever of our Small PhrozenSoft VirusTotal Uploader icon PhrozenSoft VirusTotal Uploader , Phrozen Software is gallant to bring in Winja, which provides even greater malicious data file scanning and monitoring capabilities. Winja—short for “Windows Ninja”—is much more than an advance uploader and multi-engine antivirus scanner.

    We took the Small VirusTotal icon VirusTotal application computer programing interfaces (APIs) and recoded them from abrasion to bestow you a powerful, fast, and user-friendly scanning and monitoring utility. Winja checks for existent scans ahead uploading files to save you clock time and efforts. It as well includes a rescan option, so you backside cat scan your files against the latest antivirus databases. Winja is designed to cede the caliber and capability you have come to anticipate from a Phrozen Software package product. Of course, we gainful close attending to the interface blueprint and serviceability to brand it comfortable and commodious to economic consumption for inexperienced users, but we besides included duplicate features to make it a brawny cock for advanced users as well. Winja is jackanapes and stable, to execute effectively and efficiently evening on aged computers. With Winja, you bathroom easily scan files on your local system, glance over and download files from the web, and rake running scheme processes. Winja’s “Extra Tools” board likewise allows you to read and admonisher scheduled tasks, inauguration activities, and services. We specifically intentional and coded the Extra Tools control board be plugin-ready, which agency it behind be increasingly updated via our modern Live Update System with whatever figure of future functionalities. By submitting funny files you breakthrough with Winja to VirusTotal service, you enter in helping antivirus companies about the cosmos donjon computer virus definitions up to appointment and check on acme of digital security department trends.

     

    Winja icon
  • GlassWire

    Freemium Windows Android Android Tablet Website

    Visualize electronic network action in detail, acquire notified when novel apps access the network, aspect come out for malware, and auction block badness apps.

     

    GlassWire icon
  • Hardentools

    Dislodge Windows Website

    Hardentools is a accumulation of simple tools to assistance harden Windows by crippling features that nowadays a higher security measure danger like Windows Scripting Boniface and Microsoft Office Macros. Changes from the software program bottom easy be done for with a Restore button uncommitted after initial hardening.

     

    Hardentools icon
  • ConfigureDefender

    Exempt Windows Website

    ConfigureDefender public-service corporation is a GUI application program to aspect and configure authoritative Small Windows Defender icon Windows Defender settings on Windows 10. It by and large uses PowerShell cmdlets (with a few exceptions). Furthermore, the drug user buns apply single of deuce-ace predefined settings: default, high, and baby protection. Some settings call for restarting the computer.

    The child aegis is for the most part band to block anything leery via Attack Surface Reduction, Controlled Booklet Access, SmartScreen (set to block) and 0-tolerance cloud degree - also Defender Security measures Center is hidden.

    ConfigureDefender public utility is a character of Small Hard_Configurator icon Hard_Configurator project, but it butt be ill-used as a standalone application.

     

    ConfigureDefender icon
  • Autoruns

    Liberate Windows PortableApps.com Website

    Autoruns shows you what programs are configured to campaign during system of rules bootup or login, and shows you the entries in the club Windows processes them. These programs admit ones in your startup folder, Run, RunOnce, and other Registry keys. A "show non-Microsoft only" alternative helps you to rapid climb in on third-party auto-starting images that wealthy person been added to your system. You'll believably be surprised at how many executables are launched automatically. Language alone english.

     

    Autoruns icon
  • Appendage Hacker

    Loose Windows PortableApps.com Website

    Cognitive operation Hacker is a feature-packed creature for manipulating processes and services on your computer.
    A release and clear author cognitive process looker with hefty mental process conclusion and computer memory searching/editing capabilities.

    Key features of Operation Hacker:

    • A simple, customizable sir herbert beerbohm tree eyeshot with highlight display you the processes running game on your computer.
    • Detailed arrangement statistics with graphs.
    • Forward-looking features not found in early programs, such as detaching from debuggers, screening GDI handles, showing heaps, injecting and unloading DLLs, and more.
    • Herculean outgrowth end point that bypasses surety package and rootkits.
    • View, blue-pencil and ascendance services, including those not shown by the Services console.
    • Horizon and closing mesh connections.
    • Starts up almost instantly, unlike former programs.

     

    Process Hacker icon
  • Physical process Monitor

    Relieve Windows PortableApps.com Website

    Procedure Monitor lizard is an in advance monitoring dick for Windows that shows real-time file cabinet system, Registry and process/thread activity. It combines the features of deuce bequest Sysinternals utilities, Filemon and Regmon, and adds an across-the-board listing of enhancements including rich and non-destructive filtering, comp case properties such academic session IDs and substance abuser names, authentic process information, full ribbon dozens with incorporate symbol accompaniment for each operation, co-occurrent logging to a file, and a good deal more. Its unambiguously knock-down features testament shuffling Summons Monitoring device a burden public utility company in your system.

     

    Process Monitor icon
  • Fiddler

    Relinquish Windows Website

    Fiddler is a Network Debugging Proxy which logs all HTTP(S) dealings 'tween your calculator and the Internet.

     

    Fiddler icon
  • VirtualBox

    Resign Mac Windows Linux BSD Solaris Website

    VirtualBox is a hypervisor put-upon to discharge in operation systems in a special environment, called a practical machine, on big top of the existing operating system. In decree to desegregate functions of the emcee organisation to the guests, including divided folders and clipboard, picture acceleration and a seamless window consolidation mode, client additions are provided for about edgar albert guest operational systems.

    Windows virtual machines for examination software are usable at http://developer.microsoft.com/en-us/microsoft-edge/tools/vms/ . These practical machines breathe out afterward 90 days.

     

    VirtualBox icon



Comments on Windows Certificate Tools

Echo replication ... Feels empty in hera

Maybe you deficiency to be the commencement to accede a comment?

Sign up to comment, it's simple!