Select language:    Bookmark and Share  
Home   Buy now   Screenshots   Compare   Download   Support   Partners   Contact
Product Info
Overview
Live video demos
Report & Management Live Demo
Screenshots
Editions Comparison
Why MyUSBOnly
Report & Management New!
Version History
Download free trial
See our clients
 
Ordering
Pricing
Buy now
Locate a local reseller
Purchase orders
Volume discounts
 
Support
Lost registration key
Online manual
Translations
Security news
Contact us
 


Types of Threats

There are a vast number of threats that could affect your computer today:

Worms

This malicious program category largely exploits operating system vulnerabilities to
spread itself. The class was named for the way the worms crawl from computer to
computer, using networks and e-mail. This feature gives many worms a rather high
speed in spreading themselves.

Viruses

Programs that infected other programs, adding their own code to them to gain
control of the infected files when they are opened. This simple definition explains the
fundamental action performed by a virus - infection.

Trojans

Programs that carry out unauthorized actions on computers, such as deleting
information on drives, making the system hang, stealing confidential information,
etc. This class of malicious program is not a virus in the traditional sense of the word
(meaning it does not infect other computers or data). Trojans cannot break into
computers on their own and are spread by hackers, who disguise them as regular
software. The damage that they incur can exceed that done by traditional virus
attacks by several fold.

Spyware

Software that collects information about a particular user or organization without
their knowledge. You might never guess that you have spyware installed on your
computer.

Riskware

Potentially dangerous applications include software that has not malicious features
but could form part of the development environment for malicious programs or could
be used by hackers as auxiliary components for malicious programs.

Rootkits

Utilities used to conceal malicious activity. They mask malicious programs to keep
anti-virus programs from detecting them. Rootkits modify the operating system on
the computer and alter its basic functions to hide its own existence and actions that
the hacker undertakes on the infected computer.


 

SATISFACTION
GUARANTEED!

 

We offer you a 30-day unconditional money back guarantee! 100% satisfaction or your money back.

 

SYSTEM
REQUIREMENTS

 

Microsoft Windows XP, Server 2003, Vista, 7, 8, 10, Server 2008 - MyUSBOnly is not a resource-consuming utility.

 

Home | Pricing | Buy now | Screenshots | Download | Support | Resellers | Affiliates | Pressroom | Contact | About | Sitemap

Copyright © Atombaby Limited. 2002-2018. All Rights Reserved. EULA | Privacy Statement