Product Comparison
Snitch - The essential toolset for cleaning household computer hard drives of unwanted material. Incorporates all features required to ensure a clean system.
Snitch Plus - Fully rewritten and updated version, featuring all the core functionality from Snitch, but with new and powerful detection features for the advanced home user.
PinPoint Auditor - Our enterprise level software, designed from the ground up for deployment in a corporate environment. Includes remote workstation scanning, report generation, scheduled scanning, scan queues, etc.
Now includes full support for Microsoft Windows 11™ and earlier operating systems, 32 and 64 bit
All products feature a scanning and analysis engine designed to detect and analyze files for inappropriate content, including images and movies, documents, cookies, internet history and more. Detected files can be reviewed by the user and deleted interactively.
Snitch products feature an advanced visual analysis system that analyzes images and movie files to detect the presence of offensive content, including nudity and adult material.
Any undesirable items can be deleted interactively using a user-friendly interface.
Detects and previews many different media types, including image, video and audio files.
Snitch can detect images containing nudity with its proprietary image processing technology, and then sort the results by 'suspiciousness'. This allows easy location of pornography and other adult material. Recovered files can easily be deleted from the system.
Quickly determine suitability of detected images and movies by browsing through them using pages of small images or 'thumbnails'. Questionable images can be enlarged to full screen for further inspection.
Snitch uses a range of techniques to detect inappropriate internet usage. Snitch can recover internet history from common browsers, and check for suspicious activities, and visitation of inappropriate internet sites. Snitch can scan internet history for known suspicious keywords, and prioritise the results accordingly. Results can be sorted by filename obscenity, SkinScan™ rating, date, alphabetically, size etc depending on result type.
Snitch incorporates a vastly expanded database of keywords that can be used to enhance search results. Filenames can be checked for the presence of keywords, text based files and documents can be scanned for contained keywords, and the results can be used to boost the suspiciousness rating of files.
Deletion of offending files and internet results could not be easier. Results can be added, within the Snitch interface, to a deletion list. At the completion of result viewing, the selected items are permanently deleted with the touch of a single button.
The user is now able to add files to a 'safe file' list which flags them as safe and prevents them from appearing in results in future scans. This is useful in speeding up scanning and saves the user from reviewing of files that are known to be benign. The user is also able to exclude specified folders from future scans if they are known to be clean.
Snitch is simple to operate for users who are unfamiliar with computers. With the press of a button, Snitch will automatically scan the target computer using the most common settings, and return results without user intervention.
Most of the algorithms that Snitch employs can be configured by the user for optimum results. Advanced users can set up their own behavioral template that Snitch will adhere to when scanning the target computer.
The user can set Snitch to require a password before use, to prevent unauthorized access by third parties.
Featuring improved performance and accuracy over our second generation engine, includes more and updated proprietary image analysis algorithms to increase detection accuracy.
Rewritten entirely using modern techniques, for enhanced compatibility with current and future technologies, speed and performance improvements.
Includes support for Mozilla Firefox internet history scanning
More image, audio and video file types can be analyzed including (Video) FLV, 3GP, DIVX, XVID, M4V, MOV, WMV, MP4, (Images) TIFF, (Audio) WMA
Scan inside compressed files for items of interest.
Perform keyword analysis on files that use non-english character sets.
Recovers without loss of result data from scans that are interrupted by power outage, unscheduled shutdowns, etc and resumes the interrupted scan.
Keyword categories for enhanced text file analysis
Global folder exclusion decreases scanning time by excluding user specified folders from all searches.
Searches can now have more flexible exclusion of files based on date, size and more.
Includes analysis of textual metadata carried within media files to further improve identification of suspicious items.
Displays more information about detected files (all dates, size, dimensions, suspicion, file owner, keywords etc), text/graphical mode for all categories, suspicion filtering for all categories, improved sorting options
Automatically generate reports on user selected results, in various formats including HTML. Reports can also be further edited with the built in report editor. User-centric reports can contain thumbnails of images and movies, and can hyperlink to a local copy of the actual file for further review.
Scans workstations across the network from a remote computer. Minimal impact on workstations, users can continue working unaware. Batch scanning, with predefined search parameters, caters for regular, automated scans of groups of workstations, reducing operator workload. Scheduling allows scans to take place after hours, to minimize bandwidth impact.
Enterprise solutions are licensed to scan server computers. Scan user profiles / user storage areas directly on the server.
Create and import custom keyword sets, export, import and manage keyword sets that are relevant to your organization.
Specify position of keywords relative to other keywords or phrases. Specify how keywords should appear in context.
Recover automatically from scans that were interrupted due to scheduled or unscheduled shutdowns, including system outages. Resume long duration scans without losing accumulated results.
More efficient use of system memory when scanning large sets of data, increases speed and stability of system.
Suspicious files hidden inside compressed files (.zip , .ace etc) are no challenge for Snitch. Offending files can be identified by type, filename obscenity, SkinScan™ results of relevant file kinds etc. Files requiring further action can be extracted and investigated further.
Check for data and files hidden in NTFS Alternate Data Streams.
Scans a user-specified subset of the target files to give a rapid indication of whether further scanning is required.