Stream Armor 4.1 freeware

Stream Armor is the sophisticated tool to discover Hidden Alternate Data Streams (ADS) and clean them completely from your system. ...

Author SecurityXploded
Released 2016-08-27
Filesize 1.90 MB
Downloads 1457
OS Windows 7 x32, Windows 7 x64, WinServer, Windows Vista, Windows Vista x64, Windows XP
Installation No Install Support
Keywords StreamArmor, Stream Explorer, Stream Scanner, ADS Scanner, ADS Explorer, Hidden ADS, Hidden Streams, ADS Detector
Users' rating
(24 rating)
Stream ArmorAnti-Spam & Anti-Spy ToolsWindows 7 x32, Windows 7 x64, WinServer, Windows Vista, Windows Vista x64, Windows XP
Stream Armor - analysis tool Freeware Download Notice

Stream Armor Free Download - we do not host any Stream Armor torrent files or links of Stream Armor on rapidshare.com, depositfiles.com, megaupload.com etc. All Stream Armor download links are direct Stream Armor download from publisher site or their selected mirrors.

Stream Armor freeware - The Latest User Reviews
Stream Armor freeware - The Latest Versions History
4.1 Aug 27, 2016 Major Update Fixed the minor bug in checking OS version on Windows 10
4.0 Aug 16, 2016 Major Update Mega release to support for windows 10 version
3.0 May 12, 2014 Major Update Support for detecting Dropbox related streams. Also include GUI improvements.

Most popular Anti-Spam & Anti-Spy Tools freeware downloads

Stream Armor

4.1 freeware download

Stream Armor is the sophisticated tool to discover hidden Alternate Data Streams (ADS) and ... Stream File Type detection * Sophisticated 'Auto Threat Analysis' based on heuristic technology * 'Online Threat Verification' ...

MailWasher Free

7.15.7 freeware download

... can even be used as an effective privacy tool. Features and Benefits: Delete. unwanted e-mails ... is marked as a green color for quick analysis. Anti spam tools. Comprehensive anti spam tools ...

Spy DLL Remover

7.0 freeware download

SpyDllRemover is the specialized tool for detecting Spyware & Hidden Rootkit Dlls in ... processes using multiple Anti-Rootkit techniques. It uses Heuristic analysis and 'Online Threat Verification' for deeper analysis of ...