Home > Spyware Removal Tools > Pest Patrol
Security and personal privacy tool
Pest Patrol (now branded as CA Anti-Spyware) is a powerful anti-spyware tool that detects and eliminates destructive pests like trojans, spyware, adware and hacker tools. It complements your anti-virus and firewall software, extending your protection against non-viral malicious software that can evade your existing security and invade your personal privacy.
Pest Patrol lets you sweep your PC of malicious software that invisibly track the sites you surf, the products you buy, and the messages you send. After easy installation, your PC will stay free and clear of spyware, adware, and other non-virus threats.
[Supported OS: Windows 2000/XP/NT/98/Me]
||(Home User License)
||( 10 User License)
Pest Patrol Main Features:
- Comprehensive Spyware Detection and Removal – Provides complete protection against spyware, adware, keyloggers, Remote Access Trojans (RATs), and browser hijackers
- Stops known and unknown keyloggers from hooking your keyboard
- Quarantines or deletes any identified pest
- Checks and removes pests from registry and start-up areas
- Real-time Protection – Proactively protects your PCs against new spyware threats
- Active Protection – Scans memory for active pests and kills active pests in memory and zaps spyware cookies before they can phone home about you
- Automatic Updates – Downloads and installs updates automatically on availability. Makes sure you're always covered against the latest spyware threats
- Detailed Scan Results
- Scans all or selected file types, including inside archives.
- Delivers the specific threat level of any pest found, and allows you to link to our pest database for more information.
- Saves all pest-related events in an easy-to-read log file.
- Security you can Trust – Your security is backed by the industry‘s largest research team, the CA Security Advisory Team
PestPatrol defeats the threat by detecting and removing:
- Spyware and adware that "phones home" information about you, your computer, and your surfing habits
- Remote access trojans (RATs) that allow an attacker to remotely control your computer
- Keystroke loggers that can steal passwords and other confidential data
- Denial-of-service (DoS) attack agents that can crash or hang a program, or your entire system
- Probe tools that look for vulnerabilities on your system that a hacker can exploit
||(3 Home User License)
||( 10 User License )