McAfee posts results 1-15 from 323

 

  • McAfee Stinger v12.1.0.1029 | 10.5/11.8 MiB
    direct download link

    AntiVirus. Malware (viruses, trojans, spyware, worms, bots, keyloggers, rootkits, ...) Removal Tool
    Continue Reading

  • McAfee Stinger v12.1.0.989 | 10.5/11.8 MiB
    direct download link

    AntiVirus. Malware (viruses, trojans, spyware, worms, bots, keyloggers, rootkits, ...) Removal Tool
    Continue Reading
  • McAfee Labs Stinger 12.1.0.979

    McAfee Labs Stinger 12.1.0.979 | 10.4 Mb

    Malware (viruses, trojans, spyware, adware, worms, bots, keyloggers, rootkits, ...) Removal Tool. McAfee Stinger is a standalone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but a specialized tool to assist administrators and users when dealing with infected system. Stinger utilizes next-generation scan technology, including rootkit scanning, and scan performance optimizations. It detects and removes threats identified under the "Threat List" option under Advanced menu options in the Stinger application.
    Continue Reading
  • Best Internet Links

    45 Anonymous 23.09.2014

  • McAfee Stinger v12.1.0.949 | 10.4/11.7 MiB
    direct download link

    Malware (viruses, trojans, spyware, worms, bots, keyloggers, rootkits, ...) Removal Tool
    Continue Reading
  • McAfee Labs Stinger 12.1.0.894 Final
    McAfee Labs Stinger 12.1.0.933 Final | 23.2 Mb

    Malware (viruses, trojans, spyware, adware, worms, bots, keyloggers, rootkits, ...) Removal Tool. McAfee Stinger is a standalone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but a specialized tool to assist administrators and users when dealing with infected system. Stinger utilizes next-generation scan technology, including rootkit scanning, and scan performance optimizations. It detects and removes threats identified under the "Threat List" option under Advanced menu options in the Stinger application.
    Continue Reading


  • McAfee Stinger 12.1.0.924 | 10.2 / 11.1 Mb
    Mirrors: Rapidgator | Letitbit | Turbobit

    Malware (viruses, trojans, spyware, adware, worms, bots, keyloggers, rootkits, ...) Removal Tool. McAfee Stinger is a standalone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but a specialized tool to assist administrators and users when dealing with infected system. Stinger utilizes next-generation scan technology, including rootkit scanning, and scan performance optimizations. It detects and removes threats identified under the "Threat List" option under Advanced menu options in the Stinger application.
    Continue Reading
  • McAfee Real Time for ePO 2.1.0

    McAfee Real Time for ePO 2.1.0 | 79 MB

    McAfee® Real Time for McAfee ® ePolicy Orchestrator ® gathers up-to-the-minute data about your managed systems and allows you to take action based on the real-time condition of these systems. With McAfee Real Time for McAfee ePO, there is no delay in gathering system data, allowing for instant analysis of systems' health and quick response to events. It collects data from all enterprise systems, even if the network has hundreds of thousands of systems, and even if they are eographically distributed over networks with slow connections.
    Continue Reading
  • McAfee Policy Auditor Content Creator Tool 6.2.0

    McAfee Policy Auditor Content Creator Tool 6.2.0 | 14.8 MB

    McAfee ® Policy Auditor Content Creator is designed to supplement the McAfee-supplied benchmarks and checks with auditing rules that are specific to your rganization.With its simplified user interface, this tool can be used to create supplemental benchmarks and checks without any knowledge of XCCDF or OVAL.You can export the benchmark or checks in XCCDF or OVAL format and then import them into the McAfee ® Benchmark Editor or check editor for use in audits
    Continue Reading
  • McAfee Policy Auditor Server Extension 6.2.0

    McAfee Policy Auditor Server Extension 6.2.0 | 63.9 MB

    McAfee® Policy Auditor automates the process required to conduct system compliance audits. It measures compliance by comparing the actual configuration of a system to the desired state of a system. This guide provides system requirements for McAfee Policy Auditor software, and information about installing it as a managed product, as well as modifying, repairing, removing, and reinstalling the software.
    Continue Reading
  • McAfee NSP Sensor Software I1200 v7.1.1.9

    McAfee NSP Sensor Software I1200 v7.1.1.9 | 19.7 MB

    McAfee Network Security Platform is a uniquely intelligent security solution that discovers and blocks sophisticated threats in the network. Using advanced threat detection techniques, it moves beyond mere pattern matching to defend against stealthy attacks with extreme accuracy, while its next-generation hardware platform scales to speeds of over 80 Gbps to meet the needs of demanding networks.
    Continue Reading
  • McAfee NSP NTBA Software T200 8.1.3.6

    McAfee NSP NTBA Software T200 8.1.3.6 | 57.7 MB

    Earlier, the NTBA Virtual Appliance software was available as an ISO image. With this release, McAfee provides the OVA image option as well for fresh installations. Open Virtualization Format (OVF) is an open standard across various virtualization platforms, for packaging and distributing the software to be run on virtual machines. An OVF virtual machine consists of a folder containing virtual machine files and a file describing them. An Open Virtualization Appliance (OVA) file is a single compressed file that contains the contents of an OVF folder. The NTBA OVA image comes with pre‑installed NTBA Appliance software, including the recommended
    configurations and therefore, is easier to deploy.
    Continue Reading
  • McAfee Deep Defender 1.6.0.513.1

    McAfee Deep Defender 1.6.0.513.1 | 210.6 MB

    McAfee Deep Defender is a software application designed to help you add an extra security layer to your computer in order to prevent stealth attacks from comprising your system, while leaving a minimal footprint on computer resources. The program offers real-time kernel memory and CPU monitoring protection for detecting and removing hidden threats. Advanced malware may be detected by your antivirus application, but by that that time hidden rootkits have already infiltrated into your computer and caused damage.
    Continue Reading
  • McAfee Logon Collector 2.1

    McAfee Logon Collector 2.1 | 194.7 MB

    The McAfee® Logon Collector is software that monitors Active Directory domains and collects logon information. Logon Collector polls Microsoft Active Directory omain controllers for user logon events and sends this information to security appliances to correlate network traffic with user behavior. Logon Collector is installed on separate Windows‑based servers to communicate with the Active Directory, and supports distributed deployment. Logon Collector deployment does not require any modification to the Active Directory or the Active Directory schema and requires no agents
    Continue Reading
  • McAfee Management of Native Encryption 1.0.0.211

    McAfee Management of Native Encryption 1.0.0.211 | 26.9 MB

    McAfee Management of Native Encryption (MNE) is a management product that allows McAfee ePolicy Orchestrator (McAfee ePO) administrators to manage Apple FileVault, which is an encryption product from Apple that provides encryption on Macintosh (Mac) systems.
    Continue Reading
  • McAfee File and Removable Media Protection 4.3.0

    McAfee File and Removable Media Protection 4.3.0 | 28.4 MB

    An increasingly mobile workforce requires ready access to the company information they need to stay productive, regardless of where or how they work. Portability
    of both access and data is critical to day-to-day operations, but this convenience brings increased risk to your company’s most sensitive information assets, such as
    intellectual property and regulated data. How do you balance the need for anywhere, anytime access with the need to protect your organization against intentional or
    accidental exposure of sensitive data?
    Continue Reading