R
Rodney74
Another note by reviewer offering more insight to what this AV offers. Looks like it may include a firewall too, along with the 49.00 lifetime license, this is very tempting:
Twister Antivirus is a security solution that aims to provide you with the basic tools for keeping your computer safe from virus attacks. It is a flexible program designed to detect threats and remove them with minimum effort.
The app includes antivirus protection tools and firewall components that enable you to protect your registry and other private information from being modified or accessed. You can customize the level of protection by selecting the components that you want to keep active.
As most antivirus applications, it allows you to scan the entire computer or only the memory and the OS folder in order to detect imminent threats. The user can also scan a certain folder or file by using the context menu.
An interesting feature is the ability to "set traps" for preventing threats that are detected and removed repeatedly. These traps can be configured to prevent a certain file or registry item from being created, modified or removed without your consent. The same approach can be applied for the computer processes.
Twister Antivirus is a security solution that aims to provide you with the basic tools for keeping your computer safe from virus attacks. It is a flexible program designed to detect threats and remove them with minimum effort.
The app includes antivirus protection tools and firewall components that enable you to protect your registry and other private information from being modified or accessed. You can customize the level of protection by selecting the components that you want to keep active.
As most antivirus applications, it allows you to scan the entire computer or only the memory and the OS folder in order to detect imminent threats. The user can also scan a certain folder or file by using the context menu.
An interesting feature is the ability to "set traps" for preventing threats that are detected and removed repeatedly. These traps can be configured to prevent a certain file or registry item from being created, modified or removed without your consent. The same approach can be applied for the computer processes.