New Software Detects SpywareNew Software Detects Spyware
System SoftLab has announced the immediate availability of Security Process Detector 3.00
June 8, 2007
NEW YORK -- System SoftLab (www.systemsoftlab.com) has announced the immediate availability of Security Process Detector 3.00, which will expose and delete spyware, Trojans, and viruses residing on your computer. Coupled with an antivirus program, it provides an additional layer of security against new viruses, which are not known to the antivirus software.
Security Process Detector will reveal all processes running on the computer, including the hidden ones, and display a report with the threat rating based on the intelligent analysis of all hidden properties. The analysis is accurate and complete. If there is any dangerous or potentially dangerous process, the program will mark it with red, which stands for the highest rating of danger. All other "peaceful" processes are marked with green. Anything in between is marked with yellow. This color-coded rating allows you to see threats at one glance.
Besides, the color-coded rating, the program will also show other details about each process, such as its ID, parent ID, security status, EXE filename, file path, description, etc. Once there is a process marked as red or yellow, users can choose whether to delete it or mark it as safe. The list of processes can be exported to the Excel format for further analysis in other applications.
Security Process Detector is able to detect all processes even those that are transparent to Windows Task Manager and similar software. This specialty is achieved thanks to 16 methods of process detection implemented in the product. Another specialty of the program is its ability to detect a process that contains and executes an alien code of another process.
About the Author(s)
Tricks to Boost Your Threat Hunting GameNov 06, 2023
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
How to Deploy Zero Trust for Remote Workforce Security
How to Use Threat Intelligence to Mitigate Third-Party Risk
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
How Enterprises Are Managing Application Security Risks in a Heightened Threat Environment