HellasVagabond
New Member
- Joined
- Jan 19, 2007
- Messages
- 3,376 (0.54/day)
- Location
- Athens , GREECE
System Name | SECONDARY RIG / PRIMARY RIG / THIRD RIG |
---|---|
Processor | i920@3.6GHz / i920@4GHz / AMD Phenom II 955 |
Motherboard | Gigabyte EX58-UD4P / Gigabyte EX58-UD7 / ASRock 890GX3 |
Cooling | CoolIT Domino ALC / Thermalright Silver Arrow / Thermalright VenomousX |
Memory | 12GB DDR3 @ 1800MHZ / 6GB DDR3 @ 2250MHZ / 4GB DDR3 @ 1600MHZ |
Video Card(s) | XFX ATI RADEON 5970 / GAINWARD NVIDIA GTX 580 / 2xGEFORCE GTX295 |
Storage | 1550GB / 6TB SAS - SSD / 160GB SSD |
Display(s) | NEC 26WUXi2 / NEC 3090WQXi / SONY 55A2000 (1080P 55inch) |
Case | COOLER MASTER HAF 932 / COOLER MASTER ATCS 840 / ANTEC DARKFLEET DF85 |
Audio Device(s) | Soundblaster X-Fi Xtreme Music / SoundBlaster X-Fi Fatal1ty Pro / Realtek Onboard |
Power Supply | CWT 1200W / Enermax Revolution 85+ 1250W / Ikonik Vulcan 1200W |
Software | Windows 7 x64 / Windows 7 x64 / Windows 7 x64 |
Internet trojan horse programs, spyware, keyloggers, rootkits, pseudorootkits, hijackers, adware, annoyware, email relays, spam proxies, spam relays, scam downloads and email/spam robots ("bots") are perhaps the greatest security threat to individuals and institutional networks in existence. By installing malware (short for MALicious softWARE) on a machine, computer crackers can go anywhere, see and do anything they want with your computer, including banking records and your most intimate and personal documents. In addition to wreaking havoc with your machine and pillaging your personal property, some malware, specifically trojan horse servers, can even record your personal conversations if you have a microphone connected to your computer. Malware can invade your system without you ever knowing it and are designed to elude firewalls by using ports which are not blocked by network "firewall" security software or proxy servers. Many of them disable the most frequently used antivirus and software firewalls.
Features:
Destroys malware and removes registry entries
Does not require a reboot to remove all traces
Disconnects the threat without disconnecting you
Generates optional report and safe copy of evidence
Automatically sweeps and detects INSTANTLY in the background
Configurable "Stealth mode" completely hides BOClean from users
Update automatically from a network file share
Protects itself from malware tampering or shutdown
FREE daily malware database updates from our web site
Update file can be shared/pushed on a server for easy maintenance
Optional rollback of update to an earlier version
Full spectrum malware coverage and protection
What's New:
A buffer overflow vulnerability has been discovered by our QA team in Comodo in ALL existing versions of BOClean which can possibly be exploited. Therefore we have brought out this version. Please upgrade your copies to this one if you have not already done so.
Its free and rather nice thats why im posting it. Enjoy people
Download