Autorun Eater 2.6 freeware

Autorun Eater was born due to increase of malwares using the 'autorun.inf' tactic to infect users unknowingly be it from flash drives, removable hard disks or any other removable storage device. When an infected device is infected with a malware and an 'autorun.inf' file is dropped, the shell menu is normally modified to execute the malware whenever the unsuspecting user double-clicks the infected drive. ...

Author Old McDonald’s Farm
Released 2013-10-22
Filesize 1.40 MB
Downloads 553
OS Windows XP, Windows Vista, Windows Vista x64, Windows 7, Windows 7 x64, Windows 8, Windows 8 x64, Windows 10, Windows 10 x64
Installation Instal And Uninstall
Keywords remove autorun, autorun remover, scan autorun, autorun, remove, remover
Users' rating
(22 rating)
Autorun EaterOtherWindows XP, Windows Vista, Windows Vista x64, Windows 7, Windows 7 x64, Windows 8, Windows 8 x64, Windows 10, Windows 10 x64
Autorun Eater - database Freeware Download Notice

Autorun Eater Free Download - we do not host any Autorun Eater torrent files or links of Autorun Eater on rapidshare.com, depositfiles.com, megaupload.com etc. All Autorun Eater download links are direct Autorun Eater download from publisher site or their selected mirrors.

Autorun Eater freeware - The Latest User Reviews
Autorun Eater freeware - The Latest Versions History
2.6 Oct 22, 2013 New Release Added: ‘Malware Scan’ option to scan the infected storage device using Microsoft Security Essentials’ command line scanner (only works with version 2.1.1116.0 and above) after removing the suspicious ‘autorun.inf’ file.

Added: ‘MSE Scan Log’ option to view the Microsoft Security Essentials scan log.

Most popular Other freeware downloads

Trend Micro Virus Pattern File

May 5, 2025 freeware download

... entities. It does so by leveraging an extensive database of known threats, which is continuously updated to include the latest malware signatures. This ensures that ...

New Version

XCA for Linux

2.6.0 freeware download

... All cryptographic data is stored in a SQL database. Supported are SQLite (Single file) MySQL (MariaDB) PostgreSQL Microsoft SQL-Server (via ODBC) Features: ...

XCA

2.7.0 freeware download

... making it accessible without sacrificing functionality. XCA's database-driven approach ensures that all cryptographic keys and certificates are stored securely and can be easily retrieved ...

Google Hack Database

1.5 freeware download

... vulnerabilities is an absolute must. The Google Hack Database is a completely free tool from one of ... will display all of the different types of databases contained on your web servers. It will show ...

Quick Heal Virus Database

24.00 (27 April, 202 freeware download

**Quick Heal Virus Database: A Robust Shield for Your Digital World** ... in cybersecurity, brings you the Quick Heal Virus Database, an essential component of their antivirus solutions. This ...

MongoDB for Linux

4.0.28 freeware download

... "humongous") is a scalable, high-performance, open source NoSQL database. Written in C++, MongoDB features: Document-Oriented Storage » JSON-style documents with dynamic schemas offer simplicity ...

AlienVault OTX Reputation Monitor Alert

1.0 freeware download

... blacklist, or the AlienVault Open Threat Exchange (OTX) database, indicating a potential breach. The OTX database is the industry's only open and collaborative threat ... like Pastie or Pastebin.com, or our own reputation database, chances are that one or more of these ...

SpyShelter Free

15.1.0 freeware download

... SpyShelter does not rely on an antivirus signature database, because our software understands how malware works. SpyShelter protects you from both known and unknown threats, ...

History Spy for Safari

1.0 freeware download

... all the website data from the Safari history database with just a click of button. Safari History Spy works on both 32-bit & 64-bit platforms ...

DLL Magic

1.0 freeware download

... in any Windows Process. Every Process maintains internal database of loaded Modules/DLLs in the form of three linked lists. Each of these linked list represents ...