Sophos Anti-Rootkit 1.3.1




The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
Benefits of Sophos Anti-Rootkit version 1.3.1 release candidate:
  • Enhanced detection and clean-up facilities
  • Uses standard Windows procedures for install and uninstall

Free rootkit detection and removal
The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator. Removing rootkits without compromising system integrity is particularly challenging and needs to be done with care. Our free software, Sophos Anti-Rootkit, finds and removes any rootkit that is hidden on your computer.
Easy to use
As part of its complete protection of endpoint computers, Sophos Anti-Virus detects rootkits and prevents them being installed on any of your desktops, laptops and servers. Sophos Anti-Rootkit provides an extra layer of detection, by safely and reliably detecting and removing any rootkit that might already have secreted itself onto your system.
Simplified management
Using Sophos Anti-Rootkit is straightforward. Whether you use its simple graphical user interface or run it from the command line you can easily detect and eliminate any rootkits on your computer.
Stay free of rootkits
Our industry-leading anti-virus software, Sophos Anti-Virus, detects and blocks rootkits that attempt to infiltrate your network.
Key features


- Scans running processes, windows registry and local hard drives for rootkits.
- Identifies known rootkits and selects, by default, files for removal which will remove the rootkit component of the malware without compromising OS integrity.
- Allows users to remove unidentified hidden files, but does not allow removal of essential system files when hidden by an identified rootkit.

- Once the user has run a scan, the screen prompts the user through the necessary steps until every rootkit has been removed.
- Users can switch between the GUI and command-line functionality.
- Both context sensitive and command-line help are available.





Reactions:

0 komentari: