Podnova Player  Windows library  Podnova home
License: All
Sort by: Relevance

Hidden processes project blackout in Title/Summary

Project Blackout

Project Blackout

Project Blackout will test your skills as gamer with fast paced action, precision shooting, and twitch response times. Project Blackout's graphics, surround sound, and camera effects will put you in the middle of the action and test your skills at a whole new level.

  • Publisher: SG Interactive, Inc
  • Last updated: June 28th, 2012
Hidden Identity Chicago Blackout

Hidden Identity Chicago Blackout

Hidden Identity Chicago Blackout is a game where you get to unravel the mystery and discover your true identity. Explore scenes from your past and find hundreds of cleverly hidden objects to piece together your lost identity. You’ll need to keep your wits to solve this riveting mystery.

  • Publisher: PopCap Games
  • Home page: www.popcap.com
  • Last updated: May 22nd, 2012
Hidden Identity Chicago with Zuma

Hidden Identity Chicago with Zuma

This is a package which contains two different games. One is Hidden Identity Chicago Blackout and the second one is the classical game Zuma. In the first one, Hidden Identity Chicago Blackout, you have to explore scenes from your past to find clues and secret notes, unraveling your forgotten self! In Zuma, you have to control the stone frog idol and to shoot the rolling balls.

  • Publisher: PopCap Games
  • Last updated: April 25th, 2011

Hidden processes project blackout in Description

Hidden Finder

Hidden Finder

Hidden Finder is a highly advanced security software which can detect and kill hidden processes and drivers. It explorers the system in kernel level and shows all running processes and drivers including hidden. The termination of hidden process immediately stops the major portion of spyware, virus and Trojan attack.

  • Publisher: Wenpoint Corporation
  • Last updated: February 14th, 2011
gmer

gmer

GMER 1.0.14.14536 is an application that detects and removes rootkits. A rootkit is a program (or combination of several programs) designed to take complete (root) control of a computer system, without authorization by the system's owners or managers. GMER monitors the processes creating, drivers and libraries loading, file functions, registry entries and TCP/IP connections

  • Publisher: GMER
  • Home page: www.gmer.net
  • Last updated: June 8th, 2017
Advanced Task Manager

Advanced Task Manager

Advanced Task Manager shows you exactly what is running on your computer, including hidden processes. It gives you lots of information and calculates a security risk rating for each process. Advanced Task Manager also tells you whether a program connects to the Internet, watches what you type, is an Internet server, is hidden, is encrypted on disk, has invisible windows, etc.

  • Publisher: Innovative Solutions
  • Last updated: June 18th, 2009
Task Terminator

Task Terminator

Task Terminator is a very simple utility that might be very interesting for many computer users. Using it you can easily terminate any process that is currently running in your system. Its main advantage is the possibility to detect different hidden processes that stay invisible for standard Windows task manager.

  • Publisher: Michael Burns
  • Last updated: February 5th, 2010
Handle Tracer

Handle Tracer

Handle Tracer has a real-time process monitor and can highlight in gray color processes that are set to critical and it can also detect hidden processes, that are commonly a symptom of a rootkit or stealth malware system infection. Handle Tracer can list handles of a selected process or from all system processes and is also able to terminate running processes.

  • Publisher: unknown
  • Last updated: January 29th, 2012

Additional Hidden processes project blackout selection

Panda Security for Desktops

Panda Security for Desktops

Panda Security for Desktops is designed for companies that want the best protection for their workstations. It protects against viruses and other known and unknown threats including spam, spyware, dangerous or time-wasting content, phishing scams, hackers and intruders.

  • Publisher: Panda Security
  • Last updated: January 16th, 2014
COMODO Cloud Scanner

COMODO Cloud Scanner

This program can detect viruses, junk files, registry errors and hidden processes that may be lurking on your computer. It harnesses all the scanning power of Comodo Internet Security and Comodo System-Cleaner and packages them inside a lightweight and sleek desktop interface.

  • Publisher: COMODO
  • Home page: www.comodo.com
  • Last updated: September 14th, 2010
ThreatExpert Memory Scanner

ThreatExpert Memory Scanner

This memory scanner from ThreatExpert looks to be really a thorough threat detecting software. It does identify anything and everything that can be a potential threat to the system. While it’s not a run-time application like an antivirus that prevents threats from downloading, it has greater capabilities than antivirus software to identify potential risks already residing in the system memory.

  • Publisher: Threat Expert Ltd.
  • Last updated: April 8th, 2008
Malware Defender

Malware Defender

Malware Defender is a comprehensive spyware removal solution that protects your computer against all types of malware like virus, worms, Trojans, spyware, adware, keyloggers andf others. It also provides many tools that allow you to detect and remove already installed malware.

  • Publisher: TorchSoft
  • Last updated: March 16th, 2012
Magic Utilities

Magic Utilities

Magic Utilities enables you to easily and safely uninstall programs, inspect and manage the programs that automatically start when your turn on or logon to your computer, lists and controls all currently running processes (system and hidden processes are also shown),quickly clean up temp files and unnecessary files on your computer, and enables you to encrypt any type of file

  • Publisher: Efreesky Software
  • Home page: www.magictweak.com
  • Last updated: September 24th, 2012
InLoox PM

InLoox PM

InLoox - project management integrated in Microsoft Outlook. The project management software InLoox operates within Outlook, simplifying and combining the organization of projects, documents, resources and budgets.

  • Publisher: InLoox GmbH
  • Home page: www.inloox.com
  • Last updated: January 29th, 2015
Magic Utilities 2011

Magic Utilities 2011

These utilities include Uninstaller Plus, StartUp Organizer,Process Killer,Disk Cleaner,File Shredder and File Protector. Magic Utilities enables you to easily and safely uninstall programs, inspect and manage the programs that automatically start when your turn on or logon to your computer,lists and controls all currently running processes (system and hidden processes are also shown).

PC Cleaner AV

PC Cleaner AV

PC Cleaner Antivirus gives you complete protection from viruses, spyware, rogue programs, trojans, adware, rootkit, dialers, worms, parasites and other potentially harmful programs. The program finds hidden processes within the system memory and removes the associated rootkit.

Magic Utilities 2006

Magic Utilities 2006

Magic Utilities is a cute program designed to make your computer clean and more stable.

  • Publisher: Efreesky Software
  • Home page: www.magictweak.com
  • Last updated: March 26th, 2008
Rootkit Unhooker

Rootkit Unhooker

Rootkit Unhooker 3.31.150.420

  • Publisher: UG North
  • Last updated: December 4th, 2009