Windows
Mac
Windows
Log in / Sign up
Windows
›
Tags › suspicious activity
Featured
Suspicious Activity
Software
Relevance
Popularity
Rating
Opera
free
2,767,624
Opera Software
Experience faster, distraction-free browsing with Ad blocking, and browse privately...
Experience faster, distraction-free browsing with Ad blocking, and browse privately. Smoothly sync
ESET NOD32 Antivirus
836,145
ESET, spol. s r.o.
ESET NOD32 Antivirus is the First Line of Defense in Cybersecurity. Secure your data and money against digital...
ESET NOD32 Antivirus is the First Line of Defense in Cybersecurity. Secure
NetWorx
31,349
SoftPerfect
NetWorx is a powerful tool for monitoring Internet connection. It can collect usage statistics...
limits and tracking down
suspicious
network
activity
. NetWorx
System Explorer
free
21,026
Mister Group
System Explorer is a powerful...
processes to detect
suspicious
...feature requires an
active
Internet connection
OSForensics
3,422
Passmark Software
OSForensics allows you to identify suspicious files and activity with hash matching, drive signature comparisons...
help you identify
suspicious
files and
activity
using features like
Qustodio
free
2,589
Qustodio LLC
This free program helps you to keep your children safe by monitoring their online activity. It creates reports...
monitoring their online
activity
. It creates...email when a
suspicious
activity
is detected. Qustodio
Dynamikode USB Security Suite
1,183
Dynamikode Software Ltd.
Dynamikode USB Security Suite is intended to protect...
your computer. Second,
Activity
Logger can keep...useful to detect
suspicious
software. The resulting
What's my computer doing
free
719
ITSTH
“What’s my computer doing” is a small yet powerful free utility that will give you exhaustive...
become
suspicious
of some unexpected frantic
activity
...as they become
active
together
Active Whois
370
Ivan Mayrakov
Active Whois is an easy-to-use network tool for the retrieving of all information such as country...
a single click!
Active
Whois intelligently accesses...spam (UCE),
suspicious
websites, or IRC/
AVS Antispam
free
359
Online Media Technologies Ltd.
AVS Antispam is a program designed to automatically delete all the unwanted messages...
detect and block all
suspicious
messages ...trace all the program
activities
SterJo NetStalker
free
242
SterJo Software
SterJo NetStalker is a network firewall that can monnitor TCP and UDP connections. You will be able to block...
When it notices any
suspicious
process that could
ZoneAlarm Anti-Ransomware
212
Zone Labs, L.L.C.
ZoneAlarm Anti-Ransomware analyzes all suspicious activities on your PC. It detects Ransomware attacks...
Anti-Ransomware analyzes all
suspicious
activities
on your PC
G Data TotalSecurity
37
G DATA Software AG
G Data TotalSecurity not only protects your computer from all known viruses and threats...
technology. It remains
active
in the background...spam, and hacking
activities
without using up
GlassWire Firewall
free
4
GlassWire
GlassWire's free firewall software helps protect your computer, privacy, and data by monitoring...
your network
activity
for
suspicious
activity
. You'll...knowing. Once
suspicious
activity
is detected
GlassWire Free Firewall
free
GlassWire
GlassWire's free firewall software helps protect your computer, privacy, and data by monitoring...
your network
activity
for
suspicious
activity
. You'll...knowing. Once
suspicious
activity
is detected
1
2
3
4
Tags
Suspicious files
Internet
Threats
Internet connection
CPU usage
Internet surfing
Protect computer
Free
Beta
Security
Featured stories
See all
How To Clean Up The Traces Of Your Online Activities
Want to make sure that other people can't see where you've been during your browsing sessions? Here's how to do it.
Dual-screen laptops: pros and cons, plus history
Do dual-screen laptops really marry Technology and Productivity? Can you multitask on one properly? Let's see what those devices are about.
How to set up parental controls in Windows 11
Learn how to set up Windows 11 parental controls or try the options (Kurupira, KidLogger, OurPact, Screen Time) to protect minors online.
So what works better, threatening an AI or being nice to it?
Sergey Brin reveals tone's role in AI prompts, suggesting threats might yield better responses. Is it really so? As what's the best approach to prompting in this context?
How to make a computer boot/wake faster? Simple and effective measures
Need to streamline your computer's booting? Consider Fast Startup, disabling unnecessary programs, optimizing BIOS, and utilizing max processors and memory.
AI assistant