Autorun Eater 2.6 freeware

Autorun Eater was born due to increase of malwares using the 'autorun.inf' tactic to infect users unknowingly be it from flash drives, removable hard disks or any other removable storage device. When an infected device is infected with a malware and an 'autorun.inf' file is dropped, the shell menu is normally modified to execute the malware whenever the unsuspecting user double-clicks the infected drive. ...

Author Old McDonald’s Farm
Released 2013-10-22
Filesize 1.40 MB
Downloads 535
OS Windows XP, Windows Vista, Windows Vista x64, Windows 7, Windows 7 x64, Windows 8, Windows 8 x64, Windows 10, Windows 10 x64
Installation Instal And Uninstall
Keywords remove autorun, autorun remover, scan autorun, autorun, remove, remover
Users' rating
(18 rating)
Autorun EaterOtherWindows XP, Windows Vista, Windows Vista x64, Windows 7, Windows 7 x64, Windows 8, Windows 8 x64, Windows 10, Windows 10 x64
Autorun Eater - detection Freeware Download Notice

Autorun Eater Free Download - we do not host any Autorun Eater torrent files or links of Autorun Eater on rapidshare.com, depositfiles.com, megaupload.com etc. All Autorun Eater download links are direct Autorun Eater download from publisher site or their selected mirrors.

Autorun Eater freeware - The Latest User Reviews
Autorun Eater freeware - The Latest Versions History
2.6 Oct 22, 2013 New Release Added: ‘Malware Scan’ option to scan the infected storage device using Microsoft Security Essentials’ command line scanner (only works with version 2.1.1116.0 and above) after removing the suspicious ‘autorun.inf’ file.

Added: ‘MSE Scan Log’ option to view the Microsoft Security Essentials scan log.

Most popular Other freeware downloads

Trend Micro Virus Pattern File

December 19, 2024 freeware download

... that lurk in the cyber realm. **Unparalleled Detection and Response** The Trend Micro Virus Pattern ... against the ever-present threat of malware. Its robust detection capabilities, seamless integration, proactive threat intelligence, and user-friendly ...

Privoxy

3.0.28 freeware download

Privoxy is a non-caching web proxy with advanced filtering capabilities for enhancing privacy, modifying web page data and HTTP headers, controlling access, and removing ads and ...

Nessus

10.7.4 freeware download

... connections, you may use the same Nessus Heartbleed detection policy wizard to create a schedule for scanning ... and other vulnerabilities which may escape some traditional detection methods. By passively monitoring network traffic, PVS detects ...

Microsoft Security Essentials Definition Updates x32

July 15, 2024 freeware download

... software remains at the cutting edge of threat detection and prevention. **What It Is** Microsoft Security Essentials Definition Updates are the lifeblood of ...

Quick Heal Virus Database

23.00 (6 July 2024) freeware download

... threats. **Key Features:** 1. **Comprehensive Threat Detection:** The Quick Heal Virus Database is continuously updated ... providing top-tier cybersecurity solutions. With its comprehensive threat detection, real-time updates, advanced heuristic analysis, and cloud-based intelligence, ...

Detekt

2.0 freeware download

... the release of Detekt in order to avoid detection. In addition, there may be existing versions of spyware, from these or other providers, which are ...

EventSentry Light

5.1.1.106 freeware download

... temperature & humidity monitoring as well as motion/smoke/water detection. The compliance tracking feature tracks processes, console and network logons, account management activity, policy events and ...

iAlertU

0.80 freeware download

... Apple MacBook that uses the built in motion detection to trigger the alarm and the iSight to capture the image of the thief. Features: ...

Autorun Eater

2.6 freeware download

... inoffensive ) file as a virus. The incorrect detection may be due to heuristics or to an incorrect virus signature in a database. [Similar problems ...

SpyShelter Free

15.1.0 freeware download

... SpyShelter Firewall provides incoming and outgoing network requests detection, allowing you control every inbound and outbound connection that is being established. This feature locks out ...