Boot Sector Infector

Online Security ON.
          Free Downloads         Glossary         Contact Us     Russian Starforce Windows 7  

Free Downloads


Contact Us


Security software from LittleLite Software


Iside compares files and folders by computing their hash code (MD5,SHA1,...). Right click on a file, select Copy and by right clicking on another file you will discover if they are equal. Includes file comparison, hash displaying tool plus a complete folder comparison tool. The hash functions can determine if two files are different even if their size is the same. Ideal tool for configuration managers, programmers, deployers.

Developer: LittleLite Software

Download (1305 K)
Released: 2006-10-06
Language: English
Platform: Win98,WinME,WinNT 4.x,Windows2000,WinXP,Windows2003
Price: 25 $
Requirements: Requires Microsoft .NET Framework v.2.0


Definitively erase and destroy any Windows folder or file using low level overwrite and standard procedures such as US Department of Defense DOD 5220.22-M (5 overwrites ) or Gutmann (32 overwrites). With NShred you can eliminate confidential information and data from PC drives. Name, size, and contents of erased file can never be recovered, by any software or hardware means. Unused disk space may be shredded, too.

Developer: LittleLite Software

Download (1075 K)
Released: 2006-09-12
Language: English
Platform: Windows2000,WinXP,Windows2003
Price: 25 $
Requirements: Requires .NET Framework v2.0

Folder Crypt

With Folder Crypt you can password protect any Windows file or folder using low level encryption and standard algorithms, such as DES, Rijndael and Blowfish with keys up to 2048 bits. The program performs a true bit per bit encryption of your data. Original files and folders may be shredded. The encryption process is not reversibile. Easy to use with its improved shell integration. Full international characters support.

Developer: LittleLite Software

Download (2484 K)
Released: 2006-06-06
Language: English,Italian
Platform: Windows2000,WinXP,Windows2003
Price: 25 $
Requirements: Requires Microsoft .NET Framework v2.0

NCrypt TX

This text based encryption tool allows easy message hiding, to be used in e-mail, messenger and other communications. NCrypt TX also has Steganography capabilities on random generated text. It supports DES, Rijndael-AES, SHA, and MD5 algorithms, as well as historical algorithms such as ROT13 and Vigenere. Convert your text messages into a sequence of encrypted hexadecimal or Base64 characters.

Developer: LittleLite Software

Download (1090 K)
Released: 2006-10-18
Language: English
Platform: WinME,Windows2000,WinXP,Windows2003
Price: 30 $
Requirements: Requires .NET Framework v.2.0


Paloma, the password repository, provides rock solid passwords protection with no underground unknown processes and absolutely no interference with other programs. Easy to use with its "bookmarks like" tree passwords organization. The password database can be encrypted with keys up to 2048 bits and DES, 3DES, AES-Rijndael, Blowfish and ARC4 algorithms.

Developer: LittleLite Software

Download (1019 K)
Released: 2006-10-23
Language: English
Platform: Win98,WinME,Windows2000,WinXP,Windows2003
Price: 0 $
Requirements: Requires Microsoft .NET Framework v2.0

Boot Sector Infector

A boot sector infector virus places its starting code in the boot sector. When the computer tries to read and execute the program in the boot sector, the virus goes into memory where it can gain control over basic computer operations. From memory, a boot sector infector can spread to other drives (floppy, network, etc.) on the system. Once the virus is running, it usually executes the normal boot program, which it stores elsewhere on the disk. Also: Boot Virus, Boot Sector Virus, BSI.


Print this page

- ZIP File

- Worm

- Windows Scripting

- Warm Boot

- Virus Hoaxes

- Virus

- Variant

- Vaccination


- Tunneling

- Trojan Horse Program

- Triggered Event

- Timestamp

- Time Bomb


- System Boot Record

- Stealth Virus

- Sparse Infector

- Sniffer

- Slow Infector

- Signature

- Shareware

- Shared Drive

- Self-garbling Viruses

- Self-extracting Files

- Self-encrypting Virus

- Sector Viruses

- Scanner


- Resident Virus

- Replication

- Redirect

- Real-time Scanner

- RTF File

- Program Infector

- Polymorphic Virus

- Piggyback

- Payload

- Password Sniffing

- Password Attacks


- Overwriting Virus

- Operating System

- On-demand Scanner

- On-access Scanner

- Not In The Wild


- Mutating Virus

- Mutant

- Multipartite Virus

- Memory-resident Virus

- Master Boot Sector Virus

- Master Boot Sector

- Master Boot Record

- Malware

- Malicious Code

- Macro Virus

- Macro


- MP3 File


- Logic Bomb

- Library File

- Key

- Joke Programs

- JavaScript

- Infection

- Host

- Hole

- Hijacking

- Heuristic Analysis

- Firewall

- File Viruses


- Encryption

- Encrypted Virus

- EXE file

- Dropper

- Disinfection

- Direct Action Virus

- Denial Of Service (DoS)


- Cookie

- Companion Virus

- Cold Boot

- Cluster Virus

- Checksum

- Boot Sector Infector

- Boot Sector

- Boot Record

- Boot

- Batch files

- Backup

- Background Task

- Background Scanning

- Back Door


- Antivirus Virus

- Anti-virus Software

© OnlineSecurity-ON, 2004-2021. All rights are reserved.