Home Contact Sitemap

N5 Net Software Repository

Your one-stop for all your software needs.

Search N5 Net Software Repository:

Search Files



Only Freeware

Sponsor:

Browse:

Areas Of Interest

Authors Area

Are you a software author? Take a look at our Author Resource Center where you will find marketing tools, software specifically created for promoting your software and a ton of other helpful resources.

Malicious File Hunter 2.1

Security & Privacy :: Other

Screenshot:

(Click to Enlarge)

Malicious File Hunter is a security software that runs on Windows and allows IT Security Administrators to search for the presence of one or multiple files across their entire network of Windows systems. For example, if a known malicious file is found on one computer, an IT Administrator can use MFH to check if any other system on the network is infected with the same malware. Search query is based on full, partial or wild card query. The software is ideal for large corporate network and can be used to find unknown malware by searching for usual malicious files used in email attacks. It can easily local any files using exact name or wildcards and alert the security administrators to sophisticated attacks that successfully evaded AV, Proxy and Firewall detection. 30 Free trial is available.

Specifications:

Version: 2.1
Author: Malicious File Hunter

License: Demo
File Size: 4 MB
Last Virus Scan: 2025-11-21
Downloads: 182
Views: 194
Price: $130.00

Installer: Install and Uninstall
Released: 1-4-2014

Recent Changes:
- Added Copy to Share Feature - Refined search within results - Added an option to pop up Computers & Accounts if missing details - Fixed an exception when searching using IP range - Updated About screen - Fixed an issue with License Activation popup text validation

Tags:
malware finder search malware on network network file search network file finder locate malicious file malicious file finder


Download

download

Buy Now | Visit Home Page

Runs on:

WinXP, WinVista, WinVista x64, Win7 x32, Win7 x64, Windows2003, WinServer, Windows Vista Ultimate, Windows Vista Ultimate x64, Windows Vista Starter, Windows Vista Home Basic, Windows Vista Home Premium, Windows Vista Business, Windows Vista Enterprise, Windows Vista Home Basic x64, Windows Vista Home Premium x64, Windows Vista Business x64, Windows Vista Enterprise x64

Requirements:

.NET Framework 4.0, Visual C++ 2010 x86

 

Similar Products:

INTERNET CLEANER 3.7

Security & Privacy :: Other
img Internet Cleaner helps you remove all traces of your online and offline activity, including the list of recently visited sites, browser cache and cookies (IE, Firefox, AOL, MSN, Mozilla, Opera and Netscape Navigator are supported), lists of recent documents in various applications (MS Office, Paint, Media Player, WordPad, Acrobat Reader, ACDSee and more) and protect your privacy by erasing the traces of Messenger, Email, News, P2P programs.
Windows | Shareware
Read More

DATA DESTROYER 17.07

Security & Privacy :: Other
img A program for secure file deletion which overwrites data in specified files so that the data cannot be recovered by any means. A single file can be purged or, in batch mode, multiple files. Selected subfolders of a folder can be purged. The user can specify the type of purge. Purge speed can be tested for an estimation of time required. Can wipe files older than a specified date. Can wipe files in the Windows 7 and 8 Recycle Bin.
Windows | Shareware
Read More

SUPER USB PORT LOCK 10.2.1

Security & Privacy :: Other
img Super USB Port Lock prevents data leaks through devices like USB drives, phones, tablets and other devices that are attached to your computer. It also prevents data leaks through any websites and programs.
Windows | Shareware
Read More

ABYLON SHREDDER 23.60.1

Security & Privacy :: Other
img The deletion of files with the windows recycle bin removes only the references to the files, without real clearing. In contrast to this the software abylon SHREDDER overwrite the data up to 35 times (Peter Gutman method). Afterwards the data can not be reconstructed any longer. The same goes for free space, clustertips, surf traces of the browser, file names, duplicate files or full drives.
Windows | Shareware
Read More

 

HOSTED BY N5 Networks