DOWNLOADABLE ANTI SPYWARE SOFTWARE

Brand Owner (click to sort) Address Description
BETTERNET INTERSECTIONS 250 Northern Avenue, 3rd floor Boston MA 02210 Downloadable anti-spyware software; downloadable communication software for providing access to the Internet; downloadable communications software for connecting users with Internet sites; downloadable computer application software for mobile phones for ensuring user security and privacy; downloadable computer software for controlling and managing access server applications; downloadable computer software for encryption; downloadable computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable software in the nature of a mobile application for ensuring user security and privacy; downloadable network access server operating software; downloadable VPN (virtual private network) operating software; Downloadable computer application software for mobile phones, namely, software for detecting and blocking trackers and malicious websites known to host malware, viruses, and other online threats; Downloadable computer software for detecting and blocking trackers and malicious websites known to host malware, viruses, and other online threats;BETTER NET;
HEXATECH INTERSECTIONS 250 Northern Avenue, 3rd floor Boston MA 02210 Downloadable anti-spyware software; downloadable communication software for providing access to the Internet; downloadable communications software for connecting users with Internet sites; downloadable computer application software for mobile phones for ensuring user security and privacy; downloadable computer software for controlling and managing access server applications; downloadable computer software for encryption; downloadable computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable software in the nature of a mobile application for ensuring user security and privacy; downloadable network access server operating software; downloadable VPN (virtual private network) operating software; Downloadable computer application software for mobile phones, namely, software for detecting and blocking trackers and malicious websites known to host malware, viruses, and other online threats; Downloadable computer software for detecting and blocking trackers and malicious websites known to host malware, viruses, and other online threats;HEXA TECH;
MONODEFENSE KEEPSOLID INC. 347 5th Ave Suite 1402-419 New York NY 10016 Downloadable anti-spyware software; Downloadable computer application software for handheld computers, mobile phones, and electronic devices, namely, software for ensuring online security and privacy; Downloadable computer application software for handheld computers, mobile phones, and electronic devices, namely, software for online scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs; Downloadable computer application software for handheld computers, mobile phones, and electronic devices, namely, software for providing network, Internet, and computer security; Downloadable computer application software for handheld computers, mobile phones, and electronic devices, namely, software for providing online intrusion detection and prevention, providing online identity protection, privacy security, and parental control; Downloadable computer application software for handheld computers, mobile phones, and electronic devices, namely, software for storing passwords, and personal data; Downloadable computer software for controlling and managing access server applications; Downloadable computer software for encryption; Downloadable computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Downloadable computer software for the creation of firewalls; Downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Downloadable computer software for browsing the Internet; Downloadable network access server operating software; Downloadable VPN (virtual private network) operating software; Downloadable communication software for providing access to the Internet;Providing access to the Internet; Providing private and secure real time electronic communication over a computer network; Providing user access to a global computer network; Providing virtual private network (VPN) services, namely, private and secure electronic communications over a private or public computer network;MONO DEFENSE;Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services in the nature of administering digital certificates; Computer security services in the nature of administering digital keys; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Providing temporary use of a non-downloadable web application for ensuring online security and privacy; Providing temporary use of a non-downloadable web application for storing passwords and personal data, the safeguarding of digital files; Providing temporary use of a non-downloadable web application for ensuring online intrusion detection and prevention, the creation of firewalls, and controlling; Providing temporary use of a non-downloadable web application for managing access server applications; Software as a service (SAAS) services featuring software for storing passwords and personal data, the safeguarding of digital files;
PANGO INTERSECTIONS 250 Northern Avenue, 3rd floor Boston MA 02210 Downloadable anti-spyware software; downloadable communication software for providing access to the Internet; downloadable communications software for connecting users with Internet sites; downloadable computer application software for mobile phones for ensuring user security and privacy; downloadable computer software for controlling and managing access server applications; downloadable computer software for encryption; downloadable computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable software in the nature of a mobile application for ensuring user security and privacy; downloadable network access server operating software; downloadable VPN (virtual private network) operating software; Downloadable computer application software for mobile phones, namely, software for detecting and blocking trackers and malicious websites known to host malware, viruses, and other online threats; Downloadable computer software for detecting and blocking trackers and malicious websites known to host malware, viruses, and other online threats;Providing virtual private network (VPN) services;Providing online non-downloadable anti-spyware software; Providing temporary use of non-downloadable web applications for use in ensuring security and privacy, the safeguarding of digital files, and controlling and managing access server applications; Software as a service (SaaS) services featuring software for use in ensuring security and privacy, the safeguarding of digital files, and controlling and managing access server applications; Providing computer security-related services for others; Providing online non-downloadable security and privacy software for use in managing access to data, devices and networks, preventing unauthorized access to data, devices and networks, securing data, protecting online anonymity, and protecting data, devices and networks against spam and malicious activity;
RESTORO Restoro Limited SOVEREIGN HOUSE 4 CHRISTIAN ROAD Douglas IM12SD Downloadable anti-spyware software; Downloadable computer software for the creation of firewalls; Downloadable computer anti-virus software;Repair of software; Repair of computer software; Computer software development; Design and development of computer software; Design, development and implementation of software; Developing of driver and operating system software; Installation and repair of computer software, including mobile performance of such services on customer premises; Installation, repair and maintenance of computer software; Installation, maintenance and repair of software for computer systems; Installation, maintenance and repair of computer software; Maintenance and updating of computer software; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; Technical support services, namely, troubleshooting of computer software problems; Troubleshooting of computer software problems; Updating and design of computer software; Updating of computer software for others;
SECURE THE PLANET Raygoza, Favian APT 707 115 Sandra Muraida Way Austin TX 78703 Downloadable anti-spyware software;
TOUCH VPN INTERSECTIONS 250 Northern Avenue, 3rd floor Boston MA 02210 Downloadable anti-spyware software; downloadable computer application software for mobile phones for ensuring user security and privacy; downloadable computer software for controlling and managing access server applications; downloadable computer software for encryption; downloadable computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable software in the nature of a mobile application for ensuring user security and privacy; downloadable network access server operating software; downloadable VPN (virtual private network) operating software; Downloadable computer application software for mobile phones, namely, software for detecting and blocking trackers and malicious websites known to host malware, viruses, and other online threats; Downloadable computer software for detecting and blocking trackers and malicious websites known to host malware, viruses, and other online threats;TOUCH VIRTUAL PRIVATE NETWORK;VPN;
TRIPLEENABLE RiVidium, Inc. 10530 Linden Lake Plaza, Suite 200 Manassas VA 20109 Downloadable anti-spyware software; Downloadable computer search engine software; Downloadable computer software for blockchain based domain name service security; Recorded software for blockchain based domain name service security;TRIPLE ENABLE;Domain name registration services;Development of software for secure network operations; Information technology consulting services; Internet security consultancy;
TWINGATE TWINGATE INC. 541 Jefferson Avenue, Suite 100 Redwood City CA 94063 Downloadable anti-spyware software; Downloadable computer application software for mobile phones, namely, software for detecting and blocking trackers and malicious websites known to host malware, viruses, and other online threats; Downloadable computer software for detecting and blocking trackers and malicious websites known to host malware, viruses, and other online threats;TWIN GATE;Providing online non-downloadable anti-spyware software;
WAZUH Wazuh, Inc. 999 W. Big Beaver Rd. Troy MI 48084 Downloadable anti-spyware software; downloadable computer network security, system security, application security, file security, and data security software for collecting, aggregating, indexing, and analyzing security data, and detecting intrusions, threats, and behavioral anomalies; downloadable computer security software for detecting changes, indicators of compromise, and threats against the integrity of software and cloud based virtual computer network systems and computer network systems; downloadable computer security software for providing computer network security compliance monitoring and configuration control; downloadable cybersecurity software for controlling and monitoring computer network system configurations, monitoring network user identification and security vulnerabilities, detecting security attacks and breaches, automating computer network security processes, integrating computer network security requirements with operational software, identifying compromised servers, monitoring servers for security compliance, generating security reports, auditing system changes and anomalies for security risk, monitoring compliance with government regulations, computer network security initiatives and standards, tracking security risk factors due to computer network system configuration changes, and communication software utilizing encrypted communications; multi-platform, downloadable computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral based predictive execution modeling;Cloud computing featuring software for use in the field of computer and network security for collecting, aggregating, indexing, and analyzing security data, and detecting intrusions, threats, and behavioral anomalies; computer services, namely, acting as an application service provider in the field of knowledge management to host computer application software for creating databases of information and data related to malware and computer and network security, online scanning, detecting, quarantining, and eliminating viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, networks, and electronic devices; customizing computer software; implementing computer security plans for others for improving computer and network security and preventing criminal activity for businesses and governmental agencies, namely, identifying malware on computer systems, identifying the source and genealogy of malware, and identifying the technical security breach objectives of computer system attackers; software as a service (saas) services featuring computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling; technical support services, namely, troubleshooting of computer security software problems and technical consulting services for all of the above services; providing temporary use of non-downloadable computer software for anti-spyware software; providing temporary use of non-downloadable computer software for computer network security, system security, application security, file security, and data security for collecting, aggregating, indexing, and analyzing security data, and detecting intrusions, threats, and behavioral anomalies; providing temporary use of non-downloadable computer software for computer security software for detecting changes, indicators of compromise, and threats against the integrity of software and cloud based virtual computer network systems and computer network systems; providing temporary use of non-downloadable computer software for computer security software for providing computer network security compliance monitoring and configuration control; providing temporary use of non-downloadable computer cybersecurity software for controlling and monitoring computer network system configurations, monitoring network user identification and security vulnerabilities, detecting security attacks and breaches, automating computer network security processes, integrating computer network security requirements with operational software, identifying compromised servers, monitoring servers for security compliance, generating security reports, auditing system changes and anomalies for security risk, monitoring compliance with government regulations, computer network security initiatives and standards, tracking security risk factors due to computer network system configuration changes, and communication software utilizing encrypted communications;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. There is disclosed an apparatus for controlling a physical layer interface of a network interface card. The apparatus comprises: 1) a read only memory (ROM) for storing an embedded control program; 2) a random access memory for storing a downloadable software control program; and 3) a microcontroller for controlling the physical layer interface, wherein the microcontroller in a first operating mode executes the embedded control program to thereby control the physical layer interface, and wherein the microcontroller in a second operating mode downloads the downloadable software control program from an external processing system and executes the software control program in place of the embedded control program to thereby control the physical layer interface.