A program for recovering lost or forgotten passwords for ZIP/PKZip/WinZip archives. Supports the customizable brute-force attack, optimized for speed (more than. Download 7-Zip free for Windows 8 and also Windows RT to quickly extract.ZIP, RAR, and ISO files.
Video walkthrough available. MDrummer Small is the free version of MDrummer Large, a drum machine, and virtual drummer. Confide is a secure messaging app featuring fully encrypted self- destructing messages and more. Play. On gives you easy access to a broad range of internet content on your TV with your computer or Android.
Euler Math Toolbox (EMT) is a powerful math program combining numerical and symbolic tools. Uplay is a service created by Ubisoft that provides its users an experience similar to the achievements offered by other game companies. Available for Android here. Alternate Textbrowser makes it easy to browse through text, html and xml files with syntax highlighting for several programming languages including C++, Pascal, PHP, Perl, ASM, JScript and more. Nox. Player is an Android emulator for your PC with convenient Google Play access. Font. View. OK creates an extremely easy to use visual overview of all installed fonts.
Virus Cleaner - Antivirus provides all- in- one protection for your Android device - from app lock to Wi- Fi speed testing and everything in between. Screencastify for Chrome will record all your screen activity including audio making it perfect for You. Tube tutorials, presentations and more.
Dropbox will enable you to instantly store your files online and optionally share them. Mozilla Firefox is a fast, free and Open Source web browser that provides you with a highly customizable interface with numerous third- party add- ons, as well as Mozilla authored add- ons to choose from. Kaspersky System Checker examines your system for any software vulnerabilities, malware, and viruses as well as providing hardware details. Video tutorial available. No. Bot is a simple anti- spyware, anti- malware removal tool that targets bots, RATS, miners, keyloggers, and more. Hash. Tools quickly calculates CRC3.
MD5, SHA1, SHA2. 56, SHA3. SHA5. 12 hashes, will generate an SFV file, and instantly verify if the hashes match. Speak- A- Message offers the widest range of features for voice recording and voice email.
Metat. OGGer makes it possible to rename, tag and easily classify your Ogg Vorbis, FLAC, Speex and MP3 files. The Weather Watcher Live application is your personal, real- time Windows desktop satellite weather station. EMCO Malware Destroyer is a free personal antivirus tool that helps you to organize personal protection of your PC and perform regular fast malware scans.
Tencent PC Manager offers a user- friendly all- in- one antivirus suite that boasts a large security cloud base for detecting and neutralizing viruses, spyware, malware, rootkits, and other threats to your machine. WYSIWYG Web Builder is a (What- You- See- Is- What- You- Get) program used for creating your own web pages. HTTP requests. A- Z Freeware Launcher Plus permits you to update various programs used daily in one simple to use interface and more. SMPlayer is a trimmed down media player that uses the playback engine of MPlayer and includes built- in codecs. Bit also available. SMPlayer is a trimmed down media player that uses the playback engine of MPlayer and includes built- in codecs. Available for 3. 2- Bit.
With TSR Watermark Image you can add digital watermarks to all your images, photos, and pictures with the transparency you choose. Origin for PC lets you play games, challenge friends, explore Origin games and stay connected to the gaming community. Mozilla Thunderbird is a free cross- platform email application that's easy to set up and customize - and it's loaded with great features!
Mozilla Thunderbird Final also available. ALLPlayer is a popular program that allows you to watch movies with subtitles. Rocrail is a free application for Windows, Android, and more designed to control model train layouts. Mc. Afee Stinger is a standalone utility used to detect and remove specific viruses.
Video tutorial available. Phoenix OS is an Android based operating system that you can install on your hard drive or as a bootable DVD or thumb drive. Also available for 3. Bit here. Phoenix OS is an Android based operating system that you can install on your hard drive or as a bootable DVD or thumb drive. Also available for 6. Bit here. Black. Belt Privacy Tor+WASTE+Vo.
IP is an easy to use Tor client and server that includes WASTE and Vo. IP. Disk. Digger is a simple, straightforward, and easy to use data recovery utility.
Lansweeper is an automated network discovery and asset management tool which scans all your computers and devices and displays them in an easily accessible web interface. Keppy's Synthesizer is a MIDI driver for professional use. It is a fork of the original BASSMIDI Driver by Kode. ZHPLite is a companion app to ZHPDiag, it was designed to provide a diagnostic analysis of reports generated by ZHPDiag. Restore Point Creator is a simple program for the quick and easy creation and management of system restore points. Tweak. Power is an all- in- one tool to clean, backup, and optimize your computer as well as fix common problems.
Video tutorial available. HDCleaner is designed for complete cleaning of your Windows PC including registry and backup, encrypting data, splitting files, removing traces, and more. Reg. Cool is a is an Explorer- like search tool for editing information in your registry.
One. Loupe is designed to view anything on the screen enlarged. Use it to view any fine details, even the small print in the I- Net. Let Sticky Password fill in website forms and passwords automatically to help you stay safe online. Stay safe online and save time by letting Sticky Password fill in website forms and passwords automatically.
Task Manager Free gives users a comprehensive set of tools to put them in full control of their computer. Frost. Wire is a Bit. Torrent client as well as a media player capable of searching Bit. Torrent, You. Tube, Sound. Cloud and other sources. Torrent is one of the most popular torrent downloading programs based off of Bit.
Torrent. It was designed to use minimal resources. Video tutorial available. ADVANCED Codecs is an audio and video codec package which contains a full suite of codecs whereas the STANDARD Codecs only contains the LAV filters and xy- VSFilter for subtitles. Video tutorial on codecs available. STANDARD Codecs is an audio and video codec package which only contains the LAV filters and xy- VSFilter for subtitles whereas the ADVANCED Codecs contains a full suite of codecs.
Video tutorial on codecs available. ADVANCED x. 64. Components is an audio and video codec package which contains a full suite of codecs whereas the STANDARD x.
How to Report Malware or False Positives to Multiple Antivirus Vendors. This article contains a list of every respectable Windows anti- malware vendor, with a signature based product, that I am aware of. Thus this list, in addition to showing you how to easily submit malware or false positives to all of them, also serves as a reference for anti- malware products which are confirmed to be legitimate. That said, I make no statement as to whether any particular anti- malware vendor is good at detecting malware. Some of the vendors in this list are very good and others are nearly worthless. This is not the place to discuss this.
By submitting malware to all of them you can help protect nearly all internet users, regardless of which product they choose to use for protection. Also, it would really help if you could rate this article. In addition, for those of you who are knowledgeable about anti- malware vendors, if you do find something wrong, whether it be a missing vendor, incorrect information, missing information, etc.., please read the section about How You Can Help.
I really need everyone's help in order to improve and maintain this article. Recent Changelog: 1. Added XVirus to the list. Removed online submission link for submitting false positives to Digital Defender as it was no longer working. Added English submission links for Qihoo. Index. 1. How To Easily Prepare To Submit The Samples A) Make Sure Email Client Is Set Up Properly B) Put Samples In Compressed Files. Easily Submit Malware To All Vendors.
Criteria Used For The List. List Of All Vendors. How You Can Help. How To Easily Prepare To Submit The Samples. A) Make Sure Email Client Is Set Up Properly. To follow the advice in this article you will need to have an email client, such as Thunderbird or Hotmail/Live/Outlook, set up and configured. If you have not already set this up, please do so now.
For instructions on how to set up Outlook please see this page and for instructions on how to set up Thunderbird please see this page. You will also have to be using an email services which has been confirmed to work for this process. The only one which I am currently aware of is AOL. By the way, I have confirmed that Gmail, Yahoo, Hotmail, GMX, Fast. Mail, and Shortmail do not work. In terms of the ones which do work, please note that sometimes they will force you to answer a puzzle, to prove that you're human, or even to change your password.
This is because it seems like what you're doing constitutes unusual account activity. This is not really a problem. I'm just letting you know ahead of time so you're not surprised. B) Put Samples In Compressed Files.
If you're planning on submitting a suspicious file, or multiple files, for analysis, the easiest way to do this is to install a program called 7- Zip. It can be downloaded from this page. Once it's installed right click on the sample you would like to submit and select . If you are submitting multiple samples then highlight then all and then right click on them. Then choose . Submitting multiple samples at once can save you a lot of time if you have a lot of samples to submit.
However, I would suggest that you do not submit more than 5 at a time as some vendors will begin to reject these. After selecting . Then, in the options for . Then enter in 'infected' as the password. Do not include the quotes. Then select ok. After this is done, in order to submit it to many of the remaining vendors, once again follow exactly the same steps only this time change the .
Then put in the same password and select OK. Now you should have the samples by themselves, a password protected zip file, and a password protected 7z file. Easily Submit Malware To All Vendors. One of the main purposes of this article is to make it as easy as possible for anyone who comes across malware to submit it to all security vendors in as few steps as possible.
Also, don't worry about duplicate submissions. This has been taken care of for this list. You can submit the password protected zip file by clicking on this link. Then paste them in the contact line of your email.
You can submit the password protected 7z file by clicking on this link. Then paste them in the contact line of your email.
If the email is not delivered correctly please see my comments in section A1 to make sure that you are not using one of the email services which do not work with this list. At this point you've submitted the sample to all vendors below marked with a . This does include most of them. Also, if a message failed to be delivered to one or more of the vendors, which does happen sometimes, you can manually submit it to them below if you like. Also, if you wish, you can submit the sample to the rest of the vendors who have submission information. Each of these vendors is marked with a . However, this will be much more time consuming as you will have to manually submit the sample to each vendor individually.
Note that for online forms, unless instructed otherwise, you should upload the file directly and not in a compressed file. Criteria Used For The List. My only criteria for adding vendors to this list are that they have to have their own website, which must provide contact information. Also, the vendor must have a signature based anti- malware product, not have a bad reputation, and their main site cannot be rated orange or red by Web Of Trust - which is a criterion imposed by techsupportalert and is non- negotiable. If, in the list, I say that I have confirmed something, that means that I have either been provided that information directly from the vendor or from some other official source with connections to the vendor. I've already run across some occasions where, for example, the website indicates there is not a particular submission option, but their support tells me that there is. Thus, you can rest assured that if I say that something is confirmed to not exist, that information is trustworthy.
The only way it can be incorrect is if the vendor now provides a particular submission option which they previously did not. List Of All Vendors. Unless otherwise noted, when submitting a sample via an online form you should upload the file directly and not in a compressed file.
Also, unless otherwise noted, submissions by email should be put in a password protected zip file. Just click on the link for the vendor you wish to submit it to and it will automatically fill the necessary details into your default email client. Then all you need to do is attach the zip file and click send. For any cases where the vendors require different steps they are clearly noted. The symbol denotes vendors who are included in the mailing lists in the previous section. You've already submitted the samples to them.
The symbol denotes vendors who do not have an email address for submission but do have some alternate options for submitting samples. The symbol denotes vendors who use the signatures of other vendors. Thus you don't need to submit samples to them directly. If a vendor is unmarked this indicates that I currently have no information about how to submit malware to them. An . If you have any information your assistance would be greatly appreciated.
To jump to the relevant section of the list please click on the letter that the vendor you're interested in begins with. The vendors are arranged alphabetically. A, B, C, D, E, F, G, H, I, K, L, M, N, P, Q, R, S, T, U, V, W, X, ZPlease note that some products are known by multiple names.
Thus, if you are having trouble finding a particular vendor, or product, it will likely be very helpful to search for them using ctrl- f. Vendor. Submit Malware. Submit False Positives. Aegis. Lab. Home.
Page. Online Malware Submissionor. Report Malware via Email. I have confirmed that there is no online false positive submission form.
Report False Positive via Email. Agnitum/Outpost. Home. Pageunofficial Forum. Online Malware Submissionor. Report Malware via Email. Online False Positive Submission.