Autorun Eater 2.6 freeware

Autorun Eater was born due to increase of malwares using the 'autorun.inf' tactic to infect users unknowingly be it from flash drives, removable hard disks or any other removable storage device. When an infected device is infected with a malware and an 'autorun.inf' file is dropped, the shell menu is normally modified to execute the malware whenever the unsuspecting user double-clicks the infected drive. ...

Author Old McDonald’s Farm
Released 2013-10-22
Filesize 1.40 MB
Downloads 551
OS Windows XP, Windows Vista, Windows Vista x64, Windows 7, Windows 7 x64, Windows 8, Windows 8 x64, Windows 10, Windows 10 x64
Installation Instal And Uninstall
Keywords remove autorun, autorun remover, scan autorun, autorun, remove, remover
Users' rating
(22 rating)
Autorun EaterOtherWindows XP, Windows Vista, Windows Vista x64, Windows 7, Windows 7 x64, Windows 8, Windows 8 x64, Windows 10, Windows 10 x64
Autorun Eater - even Freeware Download Notice

Autorun Eater Free Download - we do not host any Autorun Eater torrent files or links of Autorun Eater on rapidshare.com, depositfiles.com, megaupload.com etc. All Autorun Eater download links are direct Autorun Eater download from publisher site or their selected mirrors.

Autorun Eater freeware - The Latest User Reviews
Autorun Eater freeware - The Latest Versions History
2.6 Oct 22, 2013 New Release Added: ‘Malware Scan’ option to scan the infected storage device using Microsoft Security Essentials’ command line scanner (only works with version 2.1.1116.0 and above) after removing the suspicious ‘autorun.inf’ file.

Added: ‘MSE Scan Log’ option to view the Microsoft Security Essentials scan log.

Most popular Other freeware downloads

Portable Wise Disk Cleaner

11.1.8 Build 834 freeware download

... is designed with simplicity in mind, ensuring that even users with minimal technical expertise can navigate and utilize its features effectively. The main dashboard provides ...

Trend Micro Virus Pattern File

April 19, 2025 freeware download

... methods might miss. This proactive approach ensures that even the most cunning cyber threats are identified and dealt with swiftly. **User-Friendly and Automated** ...

New Version

Portable Wise Disk Cleaner Pro

11.1.3 freeware download

... longer used by any software on your system. Even the least experienced user can easily remove junk files with this tool. Your hard disk is ...

5 freeware award

Privacy Eraser Free

6.18.2 freeware download

... highly customizable and open plug-in architecture, you can even customize your own exclusive Privacy Eraser! Privacy Eraser works on Microsoft Windows 10/8.x/7/Vista/2012/2008 (32/64-bit) and supports ...

Privacy Eraser Portable

6.18.2 freeware download

... highly customizable and open plug-in architecture, you can even customize your own exclusive Privacy Eraser! Privacy Eraser works on Microsoft Windows 10/8.x/7/Vista/2012/2008 (32/64-bit) and supports ...

EaseFilter File Protector

5.6.3.5 freeware download

... offers robust file encryption capabilities. This ensures that even if files are intercepted or accessed by unauthorized ... of security policies. The intuitive design ensures that even users with limited technical expertise can effectively manage ...

New Version

FortiClient

7.4.2.1737 freeware download

... security posture. The software's user-friendly interface ensures that even non-technical users can navigate and utilize its features effectively. In terms of compatibility, FortiClient is ...

Easy File Locker

2.2 freeware download

... modify, delete, move, copy the locked files/folders, or even not be able to see it. The hidden ... Easy File Locker will keep protecting the files/folders even under Windows Safe Mode. It is designed for ...

PrivaZer

4.0.87 freeware download

... which makes it easy for anyone to use, even if they have little to no technical expertise. The software is also highly customizable, allowing you ...

Quick Heal Virus Database

24.00 (29 March, 202 freeware download

... and spyware. Its extensive threat library ensures that even the latest and most sophisticated threats are promptly identified and mitigated. 2. **Real-Time Updates:** In ...