USEC Radix Icon

USEC Radix

Rootkits are dangerous programs that are downloaded from the Internet

USEC RadixOverview

Rootkits are dangerous programs that are downloaded from the Internet, or present in malicious purchased software, that once installed take over your computer without your knowledge. Rootkits can do anything from logging every one of your keystrokes, including user names and passwords, email messages or even your word processing documents and sending that data off to hackers, to executing programs in the background without your knowledge or permission.

And there's nothing that you can do about it unless you take the time right now to install Radix. It's your best hope against combating Rootkit Attacks.

Here's what Radix does...

Detects and removes Rootkits using sophisticated methodologies.
Detects and repairs drivers that have been modified by Rootkits.
Detects and repairs computer processes modified by Rootkits.
Detects and reveals hidden processes and files, including Alternate Data Streams (ADS).
Allows the removal of "locked" or "unremovable" processes and files.
Provides to dump memory areas from processes.
Shows the Global Descriptor Table (GDT) for advanced Rootkit Detection capabilities.
Shows the Import Address Table (IAT) for advanced Rootkit Detection capabilities.
Shows the Interrupt Descriptor Table (IDT) for advanced Rootkit Detection capabilities.
Shows hidden Registry Keys.
Operates in both command line mode for power users, or as a graphical tool for regular users.

NEW

Fixed some bugs.

USEC RadixInformation

Version
1.0.0.8
Date
07.07.09
License
Free
Language
English
File Size
187KB
Developer
Category
SubCategory
Operating Systems
Windows XP, 2000
System Requirements
No additional system requirements.
USHIELDS Systemshields Icon
Systemshield protects your computer by preventing the installation malwares
Free
Nemesis Anti-Spyware Icon
Protect your computer from dangerous threats that every computer faces
Trial
More
Kerio Control VPN Client (64 bit) Icon
Manage unified threat and control user internet activity.
Demo
Comodo Internet Security Icon
Detect and destroy malware and viruses.
Free
Kerio WinRoute Firewall Icon
Set new standards in versatility, security and user access control
Trial
Eproxy Proxy Server Icon
Proxy Server - HTTP, HTTPS, FTP, FTP-GATE, SOCKS4,5, MAIL(pop3proxy), mapping
Trial
HTTP-Tunnel Icon
Tired of not being able to use applications because of a firewall/proxy
Free
Netfee Icon
Netfee Analysis the firewall's log files then write the result into database.
Trial
IP Blocker Firewall Icon
Block specific IP Addresses or ranges of addresses in one-click.
Trial
ZoneAlarm Pro Firewall 2019 Icon
Block hackers and intruders from accessing your PC.
Demo
More