Processed through Paypal
No account required.
Donate Bitcoin to this wallet:
Donate Ethereum to this wallet:
Donate Litecoin to this wallet:
| Acronis Ransomware Protection v22.214.171.1241
Acronis Ransomware Protection v126.96.36.1991 Free, battle-tested defense against ransomware. Blocks attacks Stop both known and never-before-seen ransomware Recovers files Access local cache to restore damaged data easily Backup to the Cloud Update your files automatically every 15 minutes 5 GB Cloud Free Put your most important files out of harmís way Ransomware attacks someone every 10 seconds. Donít be a victim. Our free tool delivers proven, powerful protection from ransomware like Petya, WannaCry and Osiris, and itís completely compatible with all leading anti-malware solutions. Constantly guards against bad behavior Ransomware viruses canít infect your system on Acronisí watch. Our technology monitors your system in real-time, distinguishing normal activities from suspicious ones like unauthorized encryption. By recognizing bad behavior, it spots ransomware whether the strain is known or not. Immediately stops ransomware attacks If a process is caught trying to encrypt your files or inject malicious code into your system, Acronis stops it before any damage is done. Youíre instantly notified that something suspicious was found. Then you can either block the activity or allow it to continue. Easily restores any affected files After blocking the ransomware attack, Acronis Active Protection will help you restore any files that might have been altered or infected. Our tool searches for the latest file versions and can recover clean copies from your cache, temporary files, or backup. Automatically secure files in the cloud With 5 GB of free cloud storage, youíll not only protect your data during a ransomware attack, but also from disk failures, disasters and accidental deletions. Plus, cloud backups let you access your files from anywhere on any internet-enabled device. Thatís extra protection with added convenience. Click here to visit the author's website.
|1,788||Nov 13, 2019
Acronis International GmbH.
| Bitdefender Anti-Ransomware 188.8.131.52
Bitdefender Anti-Ransomware 184.108.40.206 Bitdefender anti-malware researchers have released a new vaccine tool which can protect against known and possible future versions of the CTB-Locker, Locky and TeslaCrypt crypto ransomware families by exploiting flaws in their spreading methods. ďThe new tool is an outgrowth of the Cryptowall vaccine program, in a way.Ē Chief Security Strategist Catalin Cosoi explained. ďWe had been looking at ways to prevent this ransomware from encrypting files even on computers that were not protected by Bitdefender antivirus and we realized we could extend the idea.Ē A study conducted by Bitdefender in November 2015 on 3,009 Internet users from the US, France, Germany, Denmark, the UK and Romania offers a victimís perspective on data loss through crypto-ransomware: 50% of users canít accurately identify ransomware as a type of threat that prevents or limits access to computer data. Half of victims are willing to pay up to $500 to recover encrypted data. Personal documents rank first among user priorities. UK consumers would pay most to retrieve files US users are the main target for ransomware.
|2,748||Nov 13, 2019
| Kaspersky CapperKiller 220.127.116.11
Kaspersky CapperKiller 18.104.22.168 The CapperKiller utility is designed for treating the aftermaths of a Trojan-Banker.Win32.Capper infection. 1. Signs of infection The given piece of malware changes proxy settings in the following browsers (if installed on the host): Internet Explorer, Mozilla Firefox, Opera, Google Chrome (uses Internet Explorer settings). It adds a special URL to the Use automatic configuration script option in the Internet connection settings. A reboot may be required after the treatment. The CapperKiller utility performs the following: Detects and fixes proxy settings in all browsers. Detects and deletes malicious exec files.
|2,382||Nov 13, 2019
| RansomNoteCleaner v0.9.4.1
RansomNoteCleaner v0.9.4.1 RansomNoteCleaner (beta) is a program I have created to help remove pesky ransom notes left behind by known ransomware variants. This program is powered by my service ID Ransomware, and thus is always updated with definitions on the latest known ransomwares and their ransom notes. This also allows it to be flexible in detecting the ransom notes, as it uses the exact same data ID Ransomware uses for identifying variants. When RansomNoteCleaner is first launched, it will contact the website, and pull down the latest information on known ransom notes; this is the only network activity done with the program, and no information about your system is uploaded or stored at all. If you have a network issue with reaching the website, the "Refresh Network" button is available to try again. Clicking the "Select Ransomware(s)" button allows for selecting the exact variant(s) to clean ransom notes from. This is recommended if you have already identified the ransomware, as it will take much less time to search for the notes. Once the ransomware variant(s) have been confirmed, you may press the "Search for Ransom Notes" button to select a directory (or whole drive), and start the search for known ransom notes. Once the scan has completed, the "Clean!" button will be available. A final window will display all found ransom notes before continuing with deletion. I highly recommend double-checking the file list before confirming the deletion. I am not responsible for loss of data if you confirm this step. A full log of deleted ransom notes will be saved to a file "RansomNoteCleaner.log" in the same directory RansomNoteCleaner is run from. Please note that this program does not decrypt data. It is simply a tool for removing the pesky ransom notes that are littered on the system after a ransomware attack. Please also ...
|1,579||Nov 13, 2019
| WannaSmile 0.1
WannaSmile 0.1 WannaCry Ransomware is spreading like wild fire. It uses vulnerability in Microsoft's SMB ( which is turned on by default ). On 13th may 2017 , security researcher going with the handle @malwaretech and Darien Huss found a 'kill-switch' which paused the ransomware. Basically the ransomware opens a unregistered domain and if fail to open then the system is infected. So @malwaretech registered the domain which stopped the ransomware. Soon Cyber criminals around the world DDOSed it to take it down so that the ransomware can continue affecting. Also the 'kill-switch' won't work if : System is not connected to internet If the 'kill-switch' domain is down If it is blocked by the isp or firewall The solution WannaSmile is a simple program which can solve the problem It can do the following : It will disable SMB in your system ( which is enabled by default ) ( OnlineFix ) It will edit your host file and add google's IP to the 'kill-switch' ( which means even if the site goes down you wont be affected ) ( OfflineFix ) It will create a lightweight local web server and add localhost to 'Kill-switch' Tip Use the OnlineFix if you are always connected to the internet Use the OfflineFix if you are not connected to the internet. How to run You directly run the .exe file and it will do the magic. ( Right-click on file and Run as Administrator ).
|1,604||Nov 13, 2019
|Showing rows 1 to 5 of 5||Showing Page 1 of 1||1|
Copyright (c) 2019