When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Process Explorer - Wikipedia

    en.wikipedia.org/wiki/Process_Explorer

    Process Explorer is a freeware task manager and system monitor for Microsoft Windows created by SysInternals, which has been acquired by Microsoft and re-branded as Windows Sysinternals. It provides the functionality of Windows Task Manager along with a rich set of features for collecting information about processes running on the user's system ...

  3. ProcDump - Wikipedia

    en.wikipedia.org/wiki/ProcDump

    ProcDump is a command-line application used for monitoring an application for CPU spikes and creating crash dumps during a spike. [2] [3] The crash dumps can then be used by an administrator or software developer to determine the cause of the spike.

  4. Process Lasso - Wikipedia

    en.wikipedia.org/wiki/Process_Lasso

    Process Lasso is Windows process automation and optimization software developed by Jeremy Collake of Bitsum Technologies. It features a graphical user interface that allows for automating various process-related tasks, and several novel algorithms to control how processes are run.

  5. AOL Shield Pro Browser | Free Download | AOL Products

    www.aol.com/products/browsers/shield-pro

    Download free today! Protect yourself against online threats with the AOL Shield Pro Browser Enhanced safety features help keep you protected from hackers, malware and scam websites.

  6. Process Monitor - Wikipedia

    en.wikipedia.org/wiki/Process_Monitor

    Process Monitor is a tool from Windows Sysinternals, part of the Microsoft TechNet website. The tool monitors and displays in real-time all file system activity on a Microsoft Windows or Unix-like operating system. It combines two older tools, FileMon and RegMon and is used in system administration, computer forensics, and application debugging.

  7. Armitage (computing) - Wikipedia

    en.wikipedia.org/wiki/Armitage_(computing)

    Armitage is a graphical cyber attack management tool for the Metasploit Project that visualizes targets and recommends exploits. It is a free and open source network security tool notable for its contributions to red team collaboration allowing for: shared sessions, data, and communication through a single Metasploit instance. [1]

  8. Regin (malware) - Wikipedia

    en.wikipedia.org/wiki/Regin_(malware)

    Regin (also known as Prax or QWERTY) is a sophisticated malware and hacking toolkit used by United States' National Security Agency (NSA) and its British counterpart, the Government Communications Headquarters (GCHQ). [1] [2] [3] It was first publicly revealed by Kaspersky Lab, Symantec, and The Intercept in November 2014.

  9. Software cracking - Wikipedia

    en.wikipedia.org/wiki/Software_cracking

    After discovering the software used to protect the application, another tool may be used to remove the copy protection from the software on the CD or DVD. This may enable another program such as Alcohol 120% , CloneDVD , Game Jackal , or Daemon Tools to copy the protected software to a user's hard disk.