Programs

The Programs page contains a list of programs detected by WinAntiRansom. This is not a complete list of every program on your computer, we don’t include many system programs or programs run by othe programs as a part of an application. WinAntRansom detects programs immediately following installation and upgrade by scanning folders where programs are typically installed using its Auto-Discovery process. You may run Auto-Discovery at any time on demand. In addition, WinAntiRansom discovers programs when they attempt to run and even when they are copied or renamed on your computer.

What good is this data?

Haven’t you ever wondered what all was installed on your computer? Now you’ll know. 

In addition, from this page you are able to investigate each program using Details, Explorer… and Properties. If you see a program you don’t want running on your computer, block it. That’s right, simply by highlighting a program and selecting “Block”, you can prevent programs from running on your computer. Many people used this feature to block the Windows 10 update programs.

The data

    • Program Name: This is name of the program accessing the file/folder.
    • Full Path: Is the fully qualified path to  the program accessing the file/folder.
    • Version: Version of the program.
    • Architecture: 32 or 64 bit.
    • First Detected: Contains the timestamp when WAR first detected the program. This is not the date time when the program was first installed.
    • Additional columns are available in the Column Chooser.
      • This is available by right-clicking on any column header and selecting “Column Chooser”. There are many features available under the right-click, we will not discuss those here. 
      • Simply drag and drop the column you want to add to or remove from the page.
      • Columns include:
        • File Create Date
        • File Modified Date
        • SHA256
        • Signature (MD5)
        • Updated At

By default, this data is sorted alphabetically by Program Name, but you can change that by clicking in the column header. A little “carrot” appears in the far right of the column header and points in the direction of sorting.

Add…

Add Program…

Allows you to manually add a program to the Programs Page. This feature is rarely used, but there just in case it is needed.

Add Folder…

Allows you to manually add a folder to the Allowed Folder list. We explain this in more detail below.

Details…

Details provides you with a plethora of information about the selected program.

You can see % of users who allow and who block the program. In this case, we have very little data about this program so the percentages are still unknown.

You can see details about the program, including size, version, signature, MD5, SHA256 (SHA what? MD5 and SHA256 are useful for technical look-ups of the file in question) and more importantly other programs sharing the same signature.

From this screen you can view the Microsoft Properties page for the file in question.

If you’re confused about a file, open this tab. It may help you make a decision.

Explorer…

This opens a copy of Windows Explorer to the folder for the highlighted program. This allows you to quickly access folder in which any program is located so that you can investigate the program in more detail with ease.

Properties…

Are you familiar with the Windows Properties page?

If so, you can access it from here.

If not, give it a click. The Properties page provides you with even more information about a particular file.

Some would say it is for more technical users, but you can’t hurt anything by opening it up, looking around and then clicking Cancel to close it.

InternetProgramsProperties

Block

If upon reviewing the program you’ve determined the program is something you don’t want running on your computer, you can set it as “Blocked”, this will result in WAR preventing this program from ever running.

When an item is blocked by WAR for any ready, the file is immediately quarantined. By marking a program as “Blocked”, you are putting in an extra safe-guard just in case this same file is every written out to disk again.

Allow by Signature

What does that even mean?
Actually this is quite simple. What allow by signature does is take the currently highlighted programs code signing certificate and then allows all programs signed with the same code signing certificate.

OK? What? Try that again…

This is useful after installing a new application or installing a new printer or other hardware that installs a user interface, update programs or other needed programs. Typically all of those programs are signed with the same code signing certificate, therefore by allowing the one certificate you are allowing all of the programs with a single click.

Allow Folder

This is useful when you have programs that dynamically download content and then run it out of temporary or “user” folders. This is important enough of a feature that we also make this available on all “Action” pages so that you can add the folder in question without even having to navigate to that folder.
In a typical case, a program may download content to a folder like C:usersTestAppDataLocalCompanyversionxprogram.exe, with the folder changing with each version.

In this case, you should allow C:UsersTestAppDataLocalCompany, this will effectively allow all programs in the folders beneath.

We don’t really like this feature, but it is a necessary evil due to the seemingly endless ways  programs are allowed to be stored and run in Windows.

Edit Folders…

This dialog allows yAllowedFoldersou to edit allowed folders. The example above is a perfect example of why you would want to edit an allowed folder.

The program folder that is associated with the program is:

c:usersTestAppDataLocalCompanyversionx

However, the last folder in this path “versionx” is dynamic, changing with each release. Therefore, when you allow the folder you should then edit that allowed folder and remove “versionx” from the end of it to ensure all future releases are allowed. You will edit the path so that it is this:

c:usersTestAppdataLocalCompany

Remove Data

Is this screen full of old entries, things you don’t care about or entries you don’t want anyone else to see?

If so, then simply highlight some or all of the entries and click “Remote Data”. This will tell WAR will remove all of the highlighted items from the screen. Nothing is physically removed from your computer, we simply remove the data from this one screen and the underlying database.

Search for Programs

Clicking this tells WinAntiRansom to run Auto-Discovery again. This can come in handy if you’ve accidentally removed some programs from the list. WinAntiRansom automatically discovers programs when they are copied to a folder or renamed, so running Auto-Discovery post application installation/upgrade should not be necessary.

What does "Anonymous License" mean anyway?

Anonymous License

Simple. We don't know who you are and we don't care. We simply want to provide you with a great product at a great price. Like walking into a store with cash in your pocket and walking out with what you want.

When you purchase any of our products, our cart processors need to request enough information to process the order and to meet tax regulations. In other words, we need to be able to summarize all orders by county for the State of Florida where we are located. No details. We only access this summarized data at tax time.

We DO NOT receive ANY personal information, including your email address, domicile address, or even country of purchase. Our cart processors simply ask us to give them a license to send to you in exchange for processing the order.

This means unlike companies like Facebook, Google, most security products and most other companies on the Internet, we don't track you in the name of "marketing".

  • We don't collect your information.
  • We don't sell your information.
  • We don't give your information away.

We respect your privacy.