Instead of relying on a database of known attack signatures, this program analyzes the normal behavior of a system and uses that information to detect abnormal behavior.
It can both detect and stop previously unknown attacks as well as known attacks.
This program will replace your existing kernel and should, therefore, only be installed by very experienced users or system administrators. See the home page for more details.
Customize tray icons in Vista view it
We tell you what the system tray is, what it does and where to find it view it
In Windows XP and Vista you can use System Restore to take your computer back in time view it
Create a Windows system repair disc and be prepared if disaster strikes view it
Free up space and system resources by uninstalling programs you don't use in Windows 7 view it
With some Mac programs you have to take a few steps to make them start at login view it
How to detect and deal with spyware using anti-spyware scanners view it