Your download link is at the very bottom of the page... always.

Processed through Paypal
No account required.

Donate Bitcoin to this wallet:
Donate Ethereum to this wallet:
Donate Litecoin to this wallet:

Buying our over-priced stuff helps us keep things running. Peruse here.

Join our Facebook groupFollow us on TwitterFollow us on InstagramOur RSS Feed

 Home » Freeware Downloads » Searching Files   
Search Results
  File Name Rating Downloads
Last Update/Developer
ShadowGuard v1.0.0.0
ShadowGuard v1.0.0.0 ShadowGuard is designed to detect when malware or ransomware is attempting to delete File Shadow Copies and take action. Typically ransomware will attempt to delete Shadow Copies of your files prior to encrypting, so you canít restore them, but ShadowGuard can step in at this stage to stop it completely. Upon detection ShadowGuard will: Prevent the command from execution (Preserving your Shadow Copies) Terminate the application that initiated the command (This would be the potential ransomware.) ShadowGuard works by attaching itself as a debugger to certain processes, filtering out destructive commands before the process is even created. ShadowGuard can currently attach to: vssadmin.exe wmic.exe powershell.exe ShadowGuard also maintains an allowed programs list which will prevent those programs from being terminated by ShadowGuard. This is extremely useful for some backup applications which may use vssadmin.exe in order to manage volume shadow copies. Compatibility: Windows 10. Although officially unsupported, it will work on older versions of Windows back to Windows XP. How to use it: 1. Download/Install/Run the program. 2. Put a check in the box for each file you wish to guard to enable that feature. Remove the check to disable. 3. Close the program, it does not need to be running to operate. License: ShadowGuard is free for all personal and commercial usage. See included EULA for more details. Click here to visit the author's website.
5/5 138 Feb 17, 2021
Showing rows 1 to 1 of 1 Showing Page 1 of 1  1 

Copyright (c) 2021

Tweets by @GeekOnTheLoose