CATEGORIES TOP DOWNLOADS NEW DOWNLOADS Related Downloads Trending Downloads

Distributed Testing 1.6.1

Software ID: 97860

Distributed Testing 1.6.1 Description

Malware is growing to become more and more randomized, and one of the consequences of this is a growing risk of false positives in any anti-malware product. Just testing on more and more laboratory machines never covers the whole live situation out there though, so we thought about a different, more community-like, approach: we've decided to implement a distributed computing concept to back up our internal testing.

You may know existing distributed computing projects: Seti@home for example uses the power of a huge community to look for extra-terrestrial live, Folding@home uses a huge community as well to possibly find more understanding about diseases like cancer. Spybot-S&D Distributed Testing (SDDT) isn't helping you to make phone calls to Alpha Centauri, nor does it cure diseases, but then, it's also not really taking that much processing time away as if you would use them. It uses the same community power though: the results of the scans of many real live machines, maybe including yours, will help us make safer and even faster updates available!





POPULAR DOWNLOADS IN THIS SECTION
Mar Password Generator
EasyHideIP.com Hide IP and Anonymously
ManageEngine ADSelfService Plus
Phone Calls Filter
FTP Password
checksum
Advanced Lotus Password Recovery
Advanced Office XP Password Recovery Pro
Atomic PST Password Recovery
Atomic PST Password Recovery allows you recovering lost passwords to personal folders in MS Outlook. The program is universal and does not depend on the version of Outlook. It will take less than a minute to recover passwords.
Download Now!
Excel Recovery
Excel Recovery is a guaranteed password recovery tool for Excel. Guaranteed Recovery recovers a document within a reasonable time frame regardless of the password.
Download Now!
Network Password Recovery Wizard
This program can easily recover the following types of Windows network passwords: dialup, vpn, domain and Internet connections, Passport and wireless network accounts, asterisk passwords, remote desktop, CardSpace PINs, mail, ftp, news accounts, etc.
Download Now!
ShadowSecurityScanner
Shadow Security Scanner (network vulnerability scanner) has earned the name of the fastest ?
Download Now!
N-Stalker Web Application Security Scanner
N-Stalker Web Application Security Scanner 2006 Free edition is state-of-art Web Application security assessment tool. Incorporates 35,000 web attack signature database, crawls website and search for backup files and XSS injection.
Download Now!
LCP
Password auditing and recovery tool for Windows NT/2000/XP/2003. Accounts information import. Passwords recovering by dictionary attack, brute force attack, hybrid of dictionary and brute force attacks. Brute force session distribution. Hashes...
Download Now!
Visual Zip Password Recovery Processor
This is an advanced ZIP password recovery utility. It features an easy GUI and a number of exclusive attacks to beat ZIP passwords. It is a real ZIP password cracker.
Download Now!
Cypherix LE Encryption Software
Encrypt any file or folder on any Windows PC. Any Media, any type of data. Cypherix LE Free Encryption Software. Password protect any file or folder with strong Encryption. Send secure e-mail. Protects data on USB Drives, CDs and HDDs. Freeware.
Download Now!
Advanced EFS Data Recovery
A program to recover/decrypt files encrypted on NTFS (EFS) partitions created in Windows 2000 and Windows XP. Files are being decrypted even in a case when the system is not bootable and so you cannot log on, and/or some encryption keys have been...
Download Now!
Windows Key
Gain access into any Windows Vista/XP/2000 system if the login password is lost.
Download Now!
FileMaker Key
FileMaker Key instantly recovers passwords for FileMaker databases (.fp3 - .fp8). All versions up to FileMaker 8.5 are supported.
Download Now!
Free Hide Folder
Free Hide Folder is a free computer security software to hide your private folders. Others will not know where your personal files exist. Free Hide Folder is protected by a password that you can change or remove at any time.
Download Now!
Size: 849.9 KB | License: Freeware | Category: Security and Encryption
AlterEgo Modern Windows versions allow you to set up multiple users with differentiated rights, ranging from administrators to regular users. Modern Windows versions allow you to set up multiple users with differentiated rights, ranging from administrators to regular users. For various reasons, ranging from default installation settings over the requirements of carelessly written...

OS: Windows
Software Terms: Adware, Spyware, Hijacker, Browser Hijacker, Trojan, Bho, Alexa, Aureate, Bargain Buddy, Comet Cursors
Size: 1.2 MB | License: Freeware | Category: Security and Encryption
Browser Cache Information BrowserCI (stands for Browser Cache Info) is a demonstration of which data in which browsers Spybot-S&D is able to read, clean and/or purge.

OS: Windows
Software Terms: Adware, Spyware, Hijacker, Browser Hijacker, Trojan, Bho, Alexa, Aureate, Bargain Buddy, Comet Cursors
Size: 1.1 MB | License: Freeware | Category: Security and Encryption
Boot CD Creator Some malware can best be removed if the infected system, including the malware itself, is not active during the cleaning. Some malware can best be removed if the infected system, including the malware itself, is not active during the cleaning. To use another system, one needs either a second full installation, or a operating system bootable from CD. There are...

OS: Windows
Software Terms: Adware, Spyware, Hijacker, Browser Hijacker, Trojan, Bho, Alexa, Aureate, Bargain Buddy, Comet Cursors
Size: 952.3 KB | License: Freeware | Category: Security and Encryption
Chrome Anonymizer Anonymizes the client ID stored in Chromes config by replacing it with a generic ID. Anonymizes the client ID stored in Chromes config by replacing it with a generic ID. Just a quick demontration when Chrome came out, meanwhile there are more complex tools out, and, the better solution, anonymized recompiles of the Chromium source...

OS: Windows
Software Terms: Adware, Spyware, Hijacker, Browser Hijacker, Trojan, Bho, Alexa, Aureate, Bargain Buddy, Comet Cursors
Size: 1.0 MB | License: Freeware | Category: Security and Encryption
ProcAlyzer Next to the standard process list known from other tools, including our RunAlyzer, this one allows you to peek into the live memory of running processes, dump them to your harddisk, or even manipulate them in memory, changing the behaviour of running applications. This can come in handy for example when fighting rootkits to change filters to unhide items. That functionality is not recommended for users who do not understand the underlying...

OS: Windows
Software Terms: Adware, Spyware, Hijacker, Browser Hijacker, Trojan, Bho, Alexa, Aureate, Bargain Buddy, Comet Cursors