I will also need the registration system customized to my needs.
Feature list for the final product
----------------------------------
* Unique design, XP-alike, professional GUI
* Ability to scan memory, files and system registry
* Large definitions database of adware/spyware/malware/trojans of over 35,000 definitions
* Completely customizable settings, including
* Ability to start with Windows
* Move objects to quarantine or directly remove them
* Deep scanning of system registry
* Auto-start active monitor when program starts
* Option to kill and/or block malicious processes
* Skip non-executable files
* Ability to minimize to system tray
* Built-in Internet Explorer popup blocker
* Built-in support for stopping ActiveX installations in Internet Explorer
* Ability to unregister DLLs that are BHOs prior to removal
* Active monitoring support for real-time protection, scans processes BEFORE they are executed in memory
* Real-time homepage hijacking protection support
* Support for permanently removing suspicious files
* Built-in scanning scheduler for performing regular scans
* Built-in ignore list for ignoring certain items
* Built-in advanced report and repair tool for advanced users only, featuring:
* Reporting of all autoload entries
* Reporting of IE plugins
* Reporting of IE suspicious entries
* Reporting of IE protocols
* Reporting of all BHOs installed
* Process manager for advanced debugging purposes
* Hosts file manager
* Ability to calculate MD5 checksums for files
* Ability to generate full report logs
* Ability to repair items
* Detailed information about each item reported
* Built-in privacy protector, with the ability to clean:
* Temporary Internet files
* IE History
* Cookies
* URL Cache
* Auto-complete
* Temporary files
* Recent files
* Recycle Bin
* Built-in hexadecimal file dumper, the perfect tool for:
* In-depth analysis of binary files (i.e. cookies, etc.)
* Determining the source of a file (i.e. company, version, etc.)
* Tracking malicious code inside an executable (i.e. trojan, etc.)
* Active shields technology for live monitoring of: (currently under implementation)
* Startup changes
* IE favorites folder
* Ability to block broadcast IP2IP spam (also known as messenger spam)
* Automatic web update for performing live spyware database updates
* Built-in file quarantine with restore support for every file
* Extremely fast scanning of all files with an improved checksum-verify scanning engine
* Standalone EXE (no run-time dependencies required)