Running Processes Show the list of all running processes with their respective PID and location. The refresh of the running processes is done automatically every 3 . Startups Show the list of programs that use common registry keys to start with Windows. Drivers List Show the list of drivers with the respective file location, file publisher and the description of the driver. There is also an option “Show only unknown drivers” that shows all drivers with unknown publisher. Loaded DLLs Show the list of non-Microsoft DLLs located in suspicious folders that are loaded in your system by all running processes
TCPEye is network monitoring software that displays the list of all currently opened TCP/IP and UDP ports on your local computer. For each port in the list, information about the process that opened the port is also displayed, including the process name, full path of the process, version information of the process (product name, file description, and so on), the time that the process was created, and the user that created it. Country Name + Flag In addition, TCPEye allows you to close unwanted TCP connections, kill the process that opened the ports, and save the TCP/UDP ports information to HTML file , XML file, or to tab-delimited text file. TCPEye also automatically mark with pink color suspicious TCP/UDP ports owned by unidentified applications (Applications without version information and icons)
IP Locator is a small utility that allows you to easily find all available information about an IP address: The owner of the IP address, the country/state name, IP addresses range, contact information (address, phone, fax, and email), and more. With IP locator you can track IP address , hosts We probably use the most accurate IP address location database to determine any IP address location. Moreover you will find out the ISP. The IP address information is retrieved by sending a request to the whois server of to the whois server of ARIN. If ARIN doesn’t maintain the information about the requested IP address, a second request is sent to the whois server of RIPE, APNIC, LACNIC or AfriNIC.
WIFI Locator ismall utility that runs in the background, and monitor the activity of wireless networks around you. For each detected network it displays the following information: SSID, Last Signal Quality, Average Signal Quality, Detection Counter, MAC Address, RSSI, Channel Frequency, Channel Number, and more. WIFi Locator offers the possibility of giving the exact location system that quickly determines device location with 10 to 20 meter accuracy. To quickly and reliably arrive at accurate location results, the Core Engine collect raw data from Wi-Fi access points. Cell tower triangulation provides generalized location results with only 200 – 1000 meter accuracy Google have a database of Wifi access point locations created by driving cars around. This database, in combination with the nearby Wifi details, is used to determine your location. in this way are able to give you your location using Wi-Fi towers only without the use a real device GPS very surprising.
Malware Eraser ismall utility that runs in the background and detect and remove specific malware, trojans, worms and other malicious threats that can damage your computer. . This program is not an Antivirus and does not protect you in real time, but it can help you to detect and remove trojans, spywares installed in your computer.
Secure Wipe is small utility that runs in the background which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Most people have some data that they would rather not share with others – passwords, personal information. Perhaps you have saved some of this information on your computer where it is conveniently at your reach, but when the time comes to remove the data from your hard disk, things get a bit more complicated and maintaining your privacy is not as simple. Your first thought may be that when you ‘delete’ the file, the data is gone. Not quite, when you delete a file, the operating system does not really remove the file from the disk; it only removes the reference of the file from the file system table. The file remains on the disk until another file is created over it. Before the file is overwritten, anyone can easily retrieve it with a disk maintenance or an undelete utility. Secure Wipe is currently supported under Windows XP/Vista/7/Server2003-2008.
Cleaner Traces Eraser allows you to easily clean files and Registry entries that are automatically created by the Windows operating system during your regular computer work. With Cleaner Traces Eraser, you can clean the cookies/history/cache/passwords of Internet Explorer, the ‘Recent’ folder, the Registry entries that record the last opened files, the temporary folder of Windows, the event logs, the Recycle Bin, and more.
Browser Cleaner is privacy protection utility that helps you secure delete all traces of your online and offline activity and free up some space on your hard drive by removing thousands of unnecessary files. Browser Cleaner erase history of visited websites, clear browser temporary files and eliminate all other records of your Internet activity
StartupEye is a small utility that runs transparently and notifies you when any program registers itself to run at system startup. It prevents annoying programs from registering themselves behind your back. When you choose not to allow a program to register itself, the program’s entry becomes deleted, StartupEye works on all modern versions of Windows through XP, VISTA, 7, SERVER2003-2008.
Security AutoRun 1.0 displays the list of all applications that are loaded automatically when Windows starts up. For each application, the following information is displayed: Startup Type (Registry/Startup Comon/ user + service ), Command-Line String, Product Name, File Version, Company Name, Location in the Registry or file system, and more. It allows you to easily to delete unwanted programs that runs in your Windows startup.