Eset NOD32 Antivirus 220.127.116.11 (64-bit)Softoogle's Pick! Integrated, Real-Time Protection against viruses, worms, trojans, spyware, adware, phishing, and hackers. Best detection, fastest performance & smallest footprint » 11.04.2019 - 55 MB - Windows 7/8/10 - Trial, $40
SUPERAntiSpyware Free Edition 8.0.1034 SuperAntiSpyware with its Multi-Dimensional Scanning and Process Interrogation Technology will detect spyware and remove pests » 04.04.2019 - 37.98 MB - Windows XP/7/8/10 - Free
Symantec W32.Sasser Removal Tool 1.4.2 A Symantec tool that terminates the W32.Sasser viral processes, deletes the W32.Sasser files, and deletes the registry values that the worm adds » 03.02.2005 - 157 KB - 98/ME/XP - Free
Simple File Shredder 3.2 Simple File Shredder is a utility that securely deletes your files so they can't be restored using recovery software » 15.04.2006 - 1.23 MB - 98/ME/XP - Free
Panda Quick Remover 18.104.22.168 Panda Quick Remover is a specific anti-virus add-on, which helps you get rid of most popular parasites quickly and effectively » 17.06.2006 - 8.07 MB - 98/ME/XP - Free
Sophos Anti-Virus 4.17 Sophos Anti-Virus protects your network, desktop and even remote laptop computers from the latest viruses, Trojans, worms and spyware » 28.04.2007 - 19.7 MB - 98/ME/2K/XP - Trial, $60
Trojan Guarder Gold 7.90 Trojan Guarder initiated a system named Guard Ghost to supervise all running processes in memory system, Windows files and open ports to search worms and Trojan horses at any time » 15.09.2009 - 1.65 MB - Windows Vista/XP - Trial, $49.95
Norton Virus Definitions 24.04.2019 32-bit The latest Certified Virus Definition for Norton AntiVirus, Norton Internet Security, Norton Security, Norton Security with Backup, Norton 360 » 24.04.2019 - 66.26 MB - Windows XP/7/8/10 - Free
Norton Virus Definitions 24.04.2019 64-bit Download the latest Certified Virus Definition for Norton Security, Norton Security with Backup, Norton AntiVirus, Norton Internet Security, Norton 360 (version 22.7 or later) » 24.04.2019 - 66.3 MB - Windows XP/7/8/10 - Free
Avast Virus Definitions 24.04.2019 Avast! is a collection of award winning, high-end technologies that work in perfect synergy, having one common goal: to protect your system and valuable data against computer viruses. avast! represents a best-in-class solution for any Windows-based computer » 24.04.2019 - 186.82 MB - Windows 7/8/10 - Free
Dr.Web CureIt! 24.04.2019 Easy to use curing utility to clean your computer infected with viruses and various unwanted codes by the Dr.Web Anti-virus updated twice an hour » 24.04.2019 - 178.3 MB - Windows XP/7/8/10 - Free
Description by Software Developer: "MegaIRC is an Internet Relay Chat (IRC) Client. It allows you to connect to the IRC network a virtual meeting place where people from all over the world can meet and talk. It supports the server and channel lists, full ANSI colors, audible and visual notifications, DCC file send and receive, message logs, command line. It has the multilingual interface. The color scheme in MegaIRC are fully customizable, you can change the text and background, as well as other specific types of text eg. your own messages. MegaIRC allows you to associate sounds (mp3, ogg, wav are supported) with specific events. MegaIRC has some features that cannot be found in other IRC clients. It can work in one-windowed mode, which means that all private, channel and system messages will be shown in same text window, it can work in debug mode when all server messages will be shown to user as is, according to IRC protocol and more. MegaIRC supports their own bots-plugins."
"SuperCopier replaces windows explorer file copy and adds many features, Transfer resuming, Copy speed control, Copy speed computation , Better copy progress display, Copy list editable while copyin , Error log, Copy list saving/loading,..."
SafenSec Plus Anti-Spyware - Real-time Proactive Computer Protection against viruses, spyware, vulnerabilities and threats with an on-demand antivirus scanner - Protection against new threats and vulnerabilities - Protection of your system from external attacks and unauthorized access - Identifying the sources of new threats - Detection and elimination of known threats - Maximum protection and minimum load - Easy-to-use interface