Files | ||||
File Name | Rating | Downloads | ||
![]() |
Personal Backup v6.3.21.0 Personal Backup v6.3.21.0 A program for saving personal data to any destination folder. This folder may be located on a local fixed or removable drive, on a Windows network server or on an FTP server. Supported Windows versions: The 32-bit version of Personal Backup runs under: Windows 7, 8 and 10 (32 and 64 bit), Windows 11, Windows Vista, Windows XP* and Windows Server 2003* / 2008 / 2012 / 2016 / 2019 * with limitations (more details) The 64-bit version runs only under: Windows 7, 8, 10 and 11 (64 bit) and Windows Server 2008R2 / 2012 / 2016 / 2019 You can configure and store as many backup tasks as you wish. The selection of the files to be backed up is made on a by-folder basis. All subfolders are included automatically, but the user can exclude or include any subdirectories from or in the backup by selection or by filter. Additional criteria are the selection by file type, file age and/or file name filter. At the destination folder the original drives (C:, D:, etc.) appear as subdirectories named LwC, LwD, etc. The original directory structure remains unchanged beneath these folders. All files may be compressed in gzip, either in toto or separated by subfolders as zip files. Optionally all data can be AES algorythm-encrypted. Performing the backup can be done manually or automatically. During the backup the program checks whether the file to be saved is newer than one already backed up. Only new files and files with newer timestamps are saved. An alternate criteria is the archive bit of the files. Automatic backups can be started on logon, at a selectable time of day, on logoff or on shutdown. You can make scheduled backups with destination paths changing daily or weekly. For individual schedules it is easy to ... |
![]() |
7,860 | Sep 29, 2024 Dr. J. Rathlev <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/pb-en_th.png"border="0"> |
![]() |
Photon v3.0.0 Photon v3.0.0 Transfer folders and files seamlessly across your devices. Photon is a cross-platform file and folder transfer application built using flutter. It uses http to transfer files between devices. You can transfer files between any devices that run Photon. Features: • True folder sharing • Unlike other apps, photon preserves entire folder structure including sub-drectories on receivers' end. • Cross-platform support • For instance you can transfer files between Android and Windows • Transfer multiple files • You can pick any number of files. • Share raw text • You can share raw text between devices. Store raw text as txt file or copy to clipboard. • Smooth UI • Material You design. • Works between the devices connected via mobile-hotspot / between the devices connected to same router (same local area network) • HTTPS support with token based validation on v3.0.0 or above • Photon supports HTTPS on v3.0.0 or above with token based validation with random url path for each session. Older versions only use cryptographically secure secret code generation for authentication (internally), as url path for security which is secure than having static url path for all sessions. Still it is vulnerable to bruteforce attack. Use HTTPS when possible and use photon within trusted networks. • Supports high-speed data transfer • Photon is capable of transferring files at a very high rate but it depends upon the wifi bandwidth. (No internet connection required) Platforms: • Android • Windows • Linux ... |
![]() |
169 | Jan 10, 2025 Abhilash Hegde <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/photon1_th.png"border="0"> |
![]() |
PHP Mini SQL Admin v1.9.240801 PHP Mini SQL Admin v1.9.240801 Lightweight alternative to heavy phpMyAdmin for quick and easy MySQL databases access. PHP Mini SQL Admin - Lightweight alternative to heavy phpMyAdmin. Extremely small (~30Kb) standalone php script. Easy to Install, simple to use. No SQL knowledge required for basic operations. Features • full MySQL support • extremely small (~42Kb) • just in one php file How to Install 1) Download phpminiadmin.php file (very bottom of page) 2) Copy/Upload it to your webserver public directory (www or public_html or etc.) 3) Open in your browser https://yoursite.com/phpminiadmin.php Recommended: For additional security you may edit phpminiadmin.php file and set some password (see $ACCESS_PWD variable) Dependencies: • The only required php extension is mysqli. Therefore if you got a white screen install it: • sudo apt-get install php-mysql on Debian or enable extension=php_mysqli.dll in php.ini on Windows Config file (optional) You can also create phpminiconfig.php in the same directory as phpminiadmin.php with database credentials or password. This way you can easily install future releases of phpminiadmin.php In the directory samples you'll find phpminiconfig.php for known OpenSource packages • See phpminiconfig.php for an empty example • See phpminiconfig.magento.php to read Magento its app/etc/local.xml ($ACCESS_PWD is required) • See phpminiconfig.sugarcrm.php to read SugarCRM its config.php ($ACCESS_PWD is required) • See phpminiconfig.wordpress.php to read Wordpress its wp-config.php ($ACCESS_PWD is required) • See phpminiconfig.vtiger.php to read Vtiger its config.inc.php ($ACCESS_PWD is required) IMPORTANT: Right-click on the download link below and choose to save the link. Otherwise you will just be opening the php file and that will not work. Click here to visit the author's website. |
![]() |
396 | Aug 02, 2024 Oleg Savchuk <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/PHPMini1_th.png"border="0"> |
![]() |
Phrozen ADS (Alternate Data Stream) Revealer v1.0.5642 Phrozen ADS (Alternate Data Stream) Revealer v1.0.5642 Phrozen ADS (Alternate Data Stream) Revealer is a Microsoft Windows program, especially designed to reveal possible malicious ADS files in your file system. Since the Alternate Data Stream functionality is only available for NTFS (New Technology File System), the program is able to scan and detect this kind of files only for this type of file system (Physical Hard Drive/Virtual Hard Drive/Physical Removable Device/Virtual Removable Device). If some ADS Files are detected during the scan you then can decide wether or not you want to keep them or to back them up. You can also have a content preview to detect in one glance if it looks legitemate or not. Phrozen ADS Revealer is the perfect tool to sanitize your NTFS file systems against bloated content or hidden malwares. Another great tool to put in your collection and 100% free. What are Alternate Data Stream Alternate data streams allow more than one data stream to be associated with a filename, using the format "filename:streamname" (e.g., "text.txt:extrastream"). NTFS Streams were introduced in Windows NT 3.1, to enable Services for Macintosh (SFM) to store resource forks. Although current versions of Windows Server no longer include SFM, third-party Apple Filing Protocol (AFP) products (such as GroupLogic's ExtremeZ-IP) still use this feature of the file system. Very small ADS (called Zone.Identifier) are added by Internet Explorer and recently by other browsers to mark files downloaded from external sites as possibly unsafe to run; the local shell would then require user confirmation before opening them.[21] When the user indicates that they no longer want this confirmation dialog, this ADS is deleted. Alternate streams are not listed in Windows Explorer, and their size is not included in the file's size. They are ignored when the file is copied or moved ... |
![]() |
6,211 | Nov 15, 2019 PHROZEN SAS <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/adsrevealer1_th.png"border="0"> |
![]() |
Pixeloid 1.1 Pixeloid 1.1 Pixeloid A novel and uber-secure way to store data The Pixeloid Matrix The all new Pixeloid Matrix is extremely dense and enables encoding of both text and images(β) along with an automatic ciphering of the data Password Protection Pixeloid additionally provides impenetrable security to users by enabling them to password protect their matrices with Triple Data Encryption Standard (TripleDES) encryption over the automatic ciphering Licensing Pixeloid is Licensed to Ajay Menon and is completely free to use. |
![]() |
5,285 | Aug 25, 2017 Ajay Menon <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/Pixeloid4_th.png"border="0"> |
![]() |
Pleasant Windows 10 Pleasant Windows 10 Improve Windows 10 with one-click batch files. Zip File is password protected. Password is joern. Pleasant Windows 10 is a collection of one-click batch files by Ghacks reader Joern that improve the operating system in various ways. While there are plenty of tweaking and privacy tools out there for Windows 10, all have in common that you cannot verify any of the operations before they are executed. This may not be an issue for some users, but if you want full control of what is happening in this regard, you may prefer a solution that is more open. Batch files are ideal for that, as they open in any plain text editor. You may then go through them line by line to verify what they do before executing them. Another benefit of this approach is that you may adjust the batch file as you see fit. This is especially useful if multiple changes are made by it to the system. Note: It is recommended that you create a system restore point, or a backup before you run any of the tweaks. While you can verify what they do by opening them in a plain text editor, it is always better to be on the safe side and create a backup so that you can restore the system to a previous state should things go wrong. Note 2: We recommend that you check the batch files before you run them, as you may adjust them as you see fit. You may not want some settings or features changed for instance. The following batch files are included in the archive Advanced Explorer Settings -- This changes more than a dozen File Explorer related settings on Windows 10 that turn of animations, enable menus, or turn off things like Toasts. Disable Automatic App ... |
![]() |
5,849 | Nov 11, 2016 Ghacks <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/pleasant-windows-10_th.png"border="0"> |
![]() |
Plot Digitizer v2.6.11 Plot Digitizer v2.6.11 Digitize data points off of scanned plots, scaled drawings, or orthographic photographs. Includes an automatic digitization feature that can automatically digitize many types of functional data. Plot Digitizer is a Java program used to digitize scanned plots of functional data. Often data is found presented in reports and references as functional X-Y type scatter or line plots. In order to use this data, it must somehow be digitized. This program will allow you to take a scanned image of a plot (in GIF, JPEG, or PNG format) and quickly digitize values off the plot just by clicking the mouse on each data point. The numbers can then be saved to a text file and used where ever you need them. Plot Digitizer works with both linear and logarithmic axis scales. Besides digitizing points off of data plots, this program can be used to digitize other types of scanned data (such as scaled drawings or orthographic photos). To make the digitizing task easier, this program includes many handy features. For example: You can recalibrate the Y axis without having to recalibrate the X axis (multiple sets of data are commonly plotted with the same X axis). You can insert points between two already digitized points by right clicking and choosing "Insert" from the pop-up menu. You can delete points by right-clicking on the points and choosing "Delete". You can move points by clicking and dragging them. You can compute the length of a digitized curve and you can compute the area of a digitized polygon. You can zoom images in and out. You can save calibrations for an image for later use, and finally, there is unlimited undo/redo. A special feature of this program is the ability to semi-automatically digitize lines off a plot. The user simply indicates where the line ... |
![]() |
212 | Mar 12, 2025 Joseph A. Huwaldt <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/PlotDigitizer2_th.png"border="0"> |
![]() |
PNotes v3.8.1.2 PNotes v3.8.1.2 PNotes is light-weight, flexible, skinnable manager of virtual notes on your desktop. It supports multiple languages, individual note's settings, transparency and scheduling. Absolutely portable as well - no traces in registry. PNotes.NET edition requires .NET framework 4 Client Profile Features Portability (PNotes does not require installation, it can be started from any drive (fixed or flash) and leaves no traces on host computer after finishing) Flexible organization (Control Panel, groups of notes, special groups - like Diary and more) Security (password protection on program level, group level or single note level, backing up and synchronization) Unlimited formatting abilities, skins, scheduling, text-to-speech Internationalization (PNotes is available in about 40 languages) Changelog: 03 May 2019 - PNotesNET version 3.8.1.2 released New features: “Rename/Change group” window is now resizable (suggested by Peter L. Albert) New OneDrive plugin (please, remove the old one before installation) Fixed bugs: “Hide note after sending” setting does nothing (discovered by Leandro Martín Drudi) Errors on options sending (discovered by Leandro Martín Drudi) Error on saving duplicated note (discovered by Peter L. Albert) The schedule dialog box allows saving some schedule types when no values are set for required fields, such as days, weeks, etc (discovered by Peter L. Albert) The schedule is not saved if the user changes properties without change of schedule type (discovered by Peter L. Albert) Click here to visit the author's website. |
![]() |
5,819 | Jul 02, 2020 Andrey Gruber <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/PNotes2_th.png"border="0"> |
![]() |
Podman Desktop v1.19.2 Podman Desktop v1.19.2 Containers and Kubernetes for application developers. Podman Desktop is an open source graphical tool enabling you to seamlessly work with containers and Kubernetes from your local environment. Available on Windows, Mac and Linux. Use the same UI across different operating systems. Manage containers • List, Search, Inspect, Connect, Run and Stop containers. Build, Pull and Push images • Build images from the tool. • Pull and push images by managing registries. • Run containers from these images Management from the tray icon • Check status and start/stop container engines. • Create new machine if needed as well as start or stop Podman machines directly from the tray icon. • Quickly check activity status and stay updated without losing focus from other tasks. Manage Podman resources • View allocated memory, CPU and storage. • Create new machine if needed Create and start Pods with Podman • Select containers to run as a Pod. • Play Kubernetes YAML locally without Kubernetes. • Generate Kubernetes YAML from Pods. Import Docker Desktop extensions • Specify OCI image of a Docker Desktop extension to import it. • For example: security scanner or deploy to OpenShift extensions. Documentation https://podman-desktop.io/docs/intro Changes: v1.19.2 chore: update podman to v5.5.1 (backport #12762) by @mergify in #12804 This download is for the Windows 64bit installer version (very bottom of page). All other download assets are below: Windows: podman-desktop-1.19.2-setup-arm64.exe macOS: podman-desktop-1.19.2-universal.dmg podman-desktop-1.19.2-x64.dmg podman-desktop-1.19.2-arm64.dmg Linux: podman-desktop-1.19.2.flatpak podman-desktop-1.19.2.tar.gz Installers for restricted environments: podman-desktop-airgap-1.19.2-setup-x64.exe podman-desktop-airgap-1.19.2-setup-arm64.exe podman-desktop-airgap-1.19.2-x64.dmg podman-desktop-airgap-1.19.2-arm64.dmg Click here to visit the author's website. |
![]() |
386 | Jun 18, 2025 Containers <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Podman1_th.png"border="0"> |
![]() |
PortableApps.com Platform v30.0.2 PortableApps.com Platform v30.0.2 A full-featured portable software system that lets you build your own custom portable app suite for use use in your synced cloud folder, on your local PC, or on a portable USB drive. All Your Favorite Apps, Everywhere PortableApps.com lets you have all your favorite apps self contained to use from a synced cloud folder, on a local PC's internal or external drive, or carried on a portable device. Your browser with your bookmarks and extensions, your office suite, your photo editor, your music collection, your games, your development tools and more. Everything you need for work and play with you on every PC you use. Work, home, school, visiting family and friends, even while traveling. And everything stays in that one location, too, making it easy to install, update, and backup. Carried on a portable drive, every PC becomes your PC. Cloud Folder, Local PC, or Portable Device. It's Your Choice The PortableApps.com Platform comes with a smart installer that lets you easily install your environment to your cloud drive (Dropbox, Google Drive, etc), to your local PC for personal or shared use, or to your portable device. The apps are portable and will run from everywhere you work from, making it a snap to keep your apps and data with you and safely backed up to the cloud. Portable App Directory™ - Built-In App Store and Updater The PortableApps.com Platform has an app store built right in, so you can find and install the apps you want with just a few clicks. List all the available apps by category, title, newest releases or recently updated. You can find your favorite web browser, popular games, handy utilities, educational tools, image editors, chat programs and more. There are hundreds of free apps available with new apps added every week. With no download ... |
![]() |
8,610 | May 22, 2025 PortableApps.com <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/PortApps1_th.png"border="0"> |
![]() |
Pretty Clean v0.1.15 Pretty Clean v0.1.15 Modern macOS disk cleanup tools. Pretty Clean is the modern set of macOS disk cleanup tools. Programmer friendly Cleans up the compiled output in developers' projects. System Requirements MacOS 10.7.5 and above Multiple Scanning Pretty Clean has various scanning strategies for cache and installation packages in the download folder generated by users, systems, applications, etc. to help you free up disk space as much as possible. Privacy and Security Pretty Clean makes all the scanning process public, you can clearly observe all the scanned files and promise not to upload any scanned information, we absolutely guarantee your privacy and security. Developer Mode Pretty Clean supports scanning and cleaning the compilation cache left behind by major development tools, and is currently the only disk cleanup tool on the market that supports developer options. Click here to visit the author's website. |
![]() |
2,198 | Mar 07, 2022 Andy Ai <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/PrettyClean1_th.png"border="0"> |
![]() |
PreventPageFileSnoops v1.0 PreventPageFileSnoops v1.0 Changes a single registry value to force Windows to delete the pagefile.sys file when you shutdown your computer. When your computer runs out of memory (RAM), Windows keeps things running by pretending that a reserved area of your hard drive is RAM. All of the information your that Windows and you programs generate is stored in a single file called pagefile.sys in this reserved area. This file can grow to be several gigabytes in size and does not get deleted when your computer is shutdown. Not only does this use up a sizable chunk of your hard drive, it also opens you up to skilled individuals retrieving this information from your hard drive. PreventPageFileSnoops changes a single registry value to force Windows to delete the pagefile.sys file when you shutdown your computer. AllowPageFileSnoops sets this value back to its default (do not delete pagefile.sys on shutdown). KEEP IN MIND Since the pagefile.sys is sometimes huge and depending on the speed of your computer and hard drive, it could take a few minutes to shut down your computer with this enabled. INSTRUCTIONS (Note: You may not get asked all of these questions.) 1) Double or single click on PreventPageFileSnoops.reg 2) On the Security Warning window, click RUN. 3) When asked "Do you want to allow this app to make changes to your computer?", choose YES. 4) When asked "Adding information can unintentionally change or delete values and cause... Are you sure you want to continue?", choose YES. 5) On the message telling you it was successful, click OK. 6) Restart your computer. The pagefile.sys will not be deleted during this restart but it will be deleted every shutdown after that. Click here to visit the author's website. |
![]() |
2,432 | Feb 20, 2022 OlderGeeks.com <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/PreventPageFileSnoops1_th.png"border="0"> |
![]() |
Prime95 v30.3 Prime95 v30.3 Great Internet Mersenne Prime Search (GIMPS) Finding World Record Primes Since 1996 Donate your computer's processing power to help search for prime numbers. BIG Changes Are Here! Prime95 version 30.3 released. For almost 25 years, GIMPS has looked for new Mersenne primes by running a primality test on one computer and later running the exact same primality test on another computer to guard against hardware errors having corrupted the first primality test. A breakthrough by Krzysztof Pietrzak makes it possible to eliminate the second primality test! The first primality test produces a proof file that can be securely verified with less than 0.5% of the work required to re-run the primality test. This breakthrough will nearly double GIMPS' throughput in the long run. Version 30.3 is now available with PRP proofs. While not a required upgrade, at some point in the future only users running version 30.3 with PRP proofs will be assigned first-time primality tests. Should you run into any problems, support is available at this thread at Mersenne Forum. Many thanks to Mihai Preda for discovering the paper on the breakthrough and realizing its importance to the GIMPS project. Also, thanks go to Pavel Atnashev for important ideas on adapting the discovery for use by GIMPS. This download is for the Windows 64bit version. If you need the Windows 32bit version, download here. If you need the Mac OS X 10.9 (Mavericks) or later version, download here. If you need the Linux 64bit version, download here. If you need the Linux 32bit version, download here. If you need the FreeBSD 11+ 64bit version, download here. The following are for administrators that want the extra security of running a traditional GUI-less service. You will still need to download the standard windows executable to configure the client. This program is for Windows Server experts only. If you need the Windows Service 64bit version, ... |
![]() |
8,570 | Jan 23, 2021 Mersenne Prime Search <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/v25imenet_setup.png"border="0"> |
![]() |
PrintOnly v1.0.5.4 PrintOnly v1.0.5.4 Restrict documents to be printed by physical USB printers only. PrintOnly is a Windows software tool that restricts documents (PDF, Image, Word, Excel, PowerPoint and more) to be printed only by physical USB printers and cannot be viewed or edited. Protect Files from being Modified before Printing PrintOnly prevents documents from being printed by virtual printers, which can be used to intercept and modify documents before they are printed. Limit the Number of Prints per Computer PrintOnly can be used to limit the number of times a document can be printed on each computer. This helps to prevent unlimited printing. Watermark Supported This adds an additional layer of security and traceability to your printed materials, making it easier to identify the source of any potential leaks. Restrict Printing to Physical USB Printers Only PrintOnly ensures files can only be printed by physical USB printers, which helps to prevent unauthorized printing. Set Document Print Expiration Date PrintOnly gives you control over how your documents are printed. You can set the document print expiration date to limit the printing deadline. Create POF Files from Most Popular Document Formats PrintOnly generates POF format files from a variety of document formats, including PDF, MS Word, Excel, JPG/PNG images, TXT, PowerPoint, RTF and more. Restrict Documents to be Printed Directly and Cannot be Viewed or Edited A Software Tool for Secure and Controlled Document Printing PrintOnly is a powerful software tool exclusively available for Windows, meticulously engineered to safeguard your documents by limiting their printing capabilities to physical USB printers only. PrintOnly supports most of popular document formats, including PDF, MS Word, Excel, JPG/PNG/TIF images, TXT, PowerPoint, RTF and more. PrintOnly employs a unique document format as .POF (PrintOnly File), which is impervious to viewing or modification. With this format, your documents can only be printed by physical USB printers using the PrintOnlyClient client program, adding an extra ... |
![]() |
1,068 | Oct 05, 2023 PrintOnly.com <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/PrintOnly_th.png"border="0"> |
![]() |
Privatezilla v0.60.0 Privatezilla v0.60.0 Performs a privacy and security check of Windows 10 Privatezilla integrates the most critical Windows 10 privacy settings and allows you to quickly perform a privacy check against these settings. Active settings are marked with the status "Configured" and indicates that your privacy is protected. The inactive ones are declared as "Not configured". All available settings (currently 60) can be enabled as well as disabled. Maintain privacy Block telemetry and online features, which send your data (sensitive and not) to Microsoft Remove preinstalled and sponsored apps Uninstall Windows 10’s Built-in Apps after clean installation and install your favorite apps again with built-in support for Windows Package Manager Community powered Features community powered and trending script files for your privacy, windows, apps and automation PowerShell scripting Integrated PowerShell scripting engine for adding custom automation tasks Well designed Simple to use modern and familiar UI Free and Portable Small footprint. No installation required and 100% Free Software also for commercial purposes Changes: Privatezilla 0.60.0 (Pollux) ixed critical bug in search and removal of "all built-in apps, except defaults" This was reported here #62 #34 #21 For clarification! If you only want just to remove bloatware apps, so please use the new rewritten option "Remove pre-installed bloatware apps ONLY". The matching takes place on the basis of a community list, which can be viewed here Added LoveWindowsAgain app to Privatezilla package. This is for those planning to upgrade to Windows 11. Click here to visit the author's website. |
![]() |
5,652 | Feb 06, 2024 Builtbybel <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/spydish1_th.png"border="0"> |
![]() |
Proxy Mask - Proxy Switcher 3.4.4 Proxy Mask - Proxy Switcher 3.4.4 Proxy Checker and Switcher allow access to blocked websites Access blocked websites, and you can watch blocked YouTube videos such as This Video Is Not Available In Your Country (by changing your IP to different country), hide your IP address, surf anonymously without a trace on the Internet. You can access many of blocked websites without using proxy with Smart DNS Changer Free. Supports HTTP and HTTPS proxy servers You can define different proxy setting for different processes at the same time At least several hundred working proxies (always) Updates Working proxy list automatically Supports all windows (XP to windows 10, 32 and 64-bits) When to use Proxy Mask or Proxy Switcher Accessing blocked websites: Your ISP (Internet Service Provider) may block some websites. Normally, network adapters on your computer, uses your IPS DNS server, and most of blocked websites blocking by your ISP's DNS server. This type of restrictions can be bypassed by changing DNS server settings of network adapters. You can use the Smart DNS Changer Free to change your DNS settings. Some websites blocks by their IP addresses and this type of restriction cannot be bypassed by changing DNS server settings. In this case you should use Proxy Mask (Proxy Switcher) to access blocked websites. Bypassing websites region (country) restrictions: Some videos on YouTube cannot be watched from some countries (because of publisher restriction or copyright etc.), In this case YouTube shows text message on video player like This Video Is Not Available In Your Country. To bypass such restrictions you can use Proxy Mask (Proxy Switcher) to access restricted contents by changing your IP address to different country (by using Elite proxy ... |
![]() |
6,456 | Feb 25, 2017 Rentanadviser.com <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/proxymask1_th.png"border="0"> |
![]() |
Public DNS Server Tool v2.4 Public DNS Server Tool v2.4 Public DNS Server Tool is a small utility for changing the DNS servers in Windows XP, Vista, 7, 8, 8.1 and 10 on the fly. In the past few years, many public DNS servers have been made available for everyone’s use. Some of them are Cloudflare DNS, OpenDNS, Google, Norton, Comodo Secure etc. These DNS servers offer many security and protection layers in addition to being very fast. Even though these public DNS servers are available for everyone’s use, setting up DNS servers in Windows is not an easy task. Therefore, I have created this little tool Public DNS Server Tool, using which you can easily set the domain name servers in Windows. It has been tested to work in Windows XP Professional SP3 (32-bit), Windows Vista SP2 (32-bit), Windows 7 (32-bit), Windows 8 (64-bit) and Windows 10 (32-bit). You can use a Public DNS Server Tool to quickly switch to a preset pair of public DNS servers. Currently, it has sixteen preset pairs of DNS servers — Google Public DNS Cloudflare DNS Verisign DNS OpenDNS OpenDNS FamilyShield (blocks sites inappropriate for family) Yandex Basic DNS Yandex Safe DNS Yandex Family DNS Norton ConnectSafe A (blocks malicious sites) Norton ConnectSafe B (blocks malicious sites + pornography sites) Norton ConnectSafe C (blocks malicious sites + pornography sites + non-family sites) Comodo Secure DNS (blocks malicious sites) Neustar General Neustar Threat Protection Neustar Family Secure Neustar Business Secure Backup and Restore Public DNS Server Tool allows you to backup your DNS server settings. To ... |
![]() |
5,212 | Oct 16, 2019 TrishTech.com <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/publicdnstool1_th.png"border="0"> |
![]() |
PuTTY v0.83 PuTTY v0.83 A free SSH, Telnet, Rlogin, and SUPDUP client for Windows systems. SSH, Telnet, Rlogin, and SUPDUP are four ways of doing the same thing: logging in to a multi-user computer from another computer, over a network. Using this type of interface, there is no need for you to be sitting at the same machine you are typing commands to. The commands, and responses, can be sent over a network, so you can sit at one computer and give commands to another one, or even to more than one. SSH, Telnet, Rlogin, and SUPDUP are network protocols that allow you to do this. On the computer you sit at, you run a client, which makes a network connection to the other computer (the server). The network connection carries your keystrokes and commands from the client to the server, and carries the server's responses back to you. These protocols can also be used for other types of keyboard-based interactive session. In particular, there are a lot of bulletin boards, talker systems and MUDs (Multi-User Dungeons) which support access using Telnet. There are even a few that support SSH. You might want to use SSH, Telnet, Rlogin, or SUPDUP if: • you have an account on a Unix system (or some other multi-user OS such as VMS or ITS) which you want to be able to access from somewhere else • your Internet Service Provider provides you with a login account on a web server. (This might also be known as a shell account. A shell is the program that runs on the server and interprets your commands for you.) • you want to use a bulletin board system, talker or MUD which can be accessed using Telnet. You probably do not want to ... |
![]() |
680 | May 23, 2025 Simon Tatham <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/PuTTY1_th.png"border="0"> |
![]() |
Q4OS v3.10 Q4OS v3.10 Q4OS is a fast and powerful operating system based on the latest technologies while offering a traditional desktop user interface. We focus on security, reliability, long-term stability and conservative integration of verified new features. System is distinguished by speed and very low hardware requirements, runs great on brand new machines as well as legacy computers. It is also very applicable for virtualization and cloud computing. Tutorials and Guides This download is for the 64bit version. If you need the 32bit version, download here. Click here to visit the author's website. |
![]() |
3,642 | Jan 22, 2022 Q4OS Team <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Q4OS1_th.png"border="0"> |
![]() |
qTox v1.17.6 qTox v1.17.6 A chat, voice, video, and file transfer instant messaging client using the encrypted peer-to-peer Tox protocol. Features One to one chat with friends Group chats File transfers, with previewing of images Audio calls, including group calls Video calls ToxMe and Tox URI support Translations in over 30 languages Avatars Faux offline messages History Screenshots Emoticons Auto-updates on Windows and packages on Linux And many more options! Changes: v1.17.6 This release addresses a security issue for Windows users. When installing to non-default locations, qTox now ensures that the install directory permissions are restricted. This is the first release since v1.17.4 due to a deploy issue with v1.17.5. This download is for the 64bit Windows version. If you need the 32bit Windows version, download here. If you need the MacOSx version, download here. If you need the Linux version, download here. Go here for Mac/Linux compiling instructions. Go here for manual. Click here to visit the author's website. |
![]() |
3,757 | Aug 22, 2022 qTox Team <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/qTox1_th.png"border="0"> |
![]() |
QuickHash GUI v3.3.1 QuickHash GUI v3.3.1 An open-source graphical interface data hashing tool for Linux, Windows, and Apple macOSX. First created in 2011, QuickHash GUI is a graphical data hashing tool for Linux, Windows, and Apple Mac used across the world by government agencies, private industry, media outlets, academia, hobbyists, programmers, training centres, medical scientists, space scientists, operating system developers and maintainers, web developers and more besides. It enables the rapid selection & hashing of data such as text, a single file, multiple files in folders, comparing files, comparing folders of files, lists of text line-by-line, disks and logical partitions, file copying with hashing, a myriad of right-click menu options and all of this on all three major operating systems. Though it was designed for Linux, is was soon made available for Windows and subsequently Apple Mac OSX (with v2.6.3 in Octo 2015). MD5, SHA1, SHA256, SHA512, xxHash, SHA-3 (256 bit), Blake2B (256 bit), Blake3 and CRC32 algorithms available. CSV\HTML\Clipboard output is available which is useful for logging as well as verifying hashes of downloaded ISOs like Linux Mint, Ubuntu, Fedora etc. A source directory can be hashed, then copied & reconstructed to a destination folder where the content is then hashed again (providing verification). Selected file masks are available (*.doc; *.xls etc) ensuring only certain files are chosen if needed. Since v.2.4.0 Windows users are able to hash physical disks. Features • No installation needed making it portable and easy to run or delete after use. • A simple non-confusing tabbed interface. • Cross platform – works largely the same on Windows, Linux and Apple Mac OSX • 64-bit and 32-bit for Windows, 64-bit for OSX and Linux. • Recursive hashing, or hashing and copying to reconstructed directory directory and re-hashing ... |
![]() |
1,291 | Jun 07, 2023 Ted Smith <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/QuickHash1_th.png"border="0"> |
![]() |
Quiz/Survey/Test Online v3.12.07 Quiz/Survey/Test Online v3.12.07 A free, complete, heavy duty, open source assessment solution. For Windows (English and French), macOS, Linux and Android. Want to create an online or mobile quiz, survey or test? From a quick quiz on your phone to high stakes proctored desktop testing, our QST Builder interface makes it simple. The numerous features (WYSIWYG, Equation and Basic Editors, Question Bank, Multiple Question Types, Multiple Delivery Styles, Multiple Delivery Options, Export/Import/Convert Questions, Multiple Results Options, Randomly Chosen Questions, Branching Questions/Skip Logic, Auto Marking, Print a QST, Schedule a QST, Bulk upload students/instructors/classes, Real time results, etc.) in open source QST rival or surpass those found in commercial online examination and survey software systems. QST - GradeBook allows you to view/mark users quizzes and tests/exam and see detailed statistics for each quiz/survey/test and question(s) in it. GradeBook also allows entering marks for other assignments and adding weights(%) to qst's and assignments for a Complete Assessment Solution. Features • A French version of QST is now available. See below. Spanish version coming soon! • Free account at qstonline.org. Try it out! • We support our software. Contact us at qstsupport@shaw.ca or through the Wiki or Discussion forum here. • Rebrand or change QST. • No license needed for commercial use. Licensed under GPL v2. • Runs on your network on your hardware. • Install on laptop, desktop, server or cloud. Easily update. • Also will run on AWS (Amazon Web Services) and Azure. • Easily scales to thousands of simultaneous users and more. See Hardware_and_Performance_Tuning.txt • Minimal user instruction required. • Convert QST interface to your language in Another Language ... |
![]() |
1,988 | Jan 17, 2025 Bob Smith <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/QuizSurveyTest1_th.png"border="0"> |
![]() |
Radmin VPN v1.1.4288.10 Radmin VPN v1.1.4288.10 Radmin VPN is a free and easy-to-use software product to create virtual private network (VPN). The program allows users to establish a secure connection between computers over the Internet as if they were connected over a LAN. Why Radmin VPN? Security Provides you with a secure VPN tunnel. Encryption keeps your connection safe. High speed The connection speed is up to 100Mbps. Reliability Radmin VPN does not malfunction after months of continuous operation. Ease-of-use Easy to set-up, easy to manage for both - IT Pros and home techs. Use Cases Connect distributed teams together Easily connect distributed teams together, create one cohesive network no matter how far you are located from each other. Radmin VPN allows you to connect to remote PCs even behind firewalls you don’t control. Work remotely Thanks to the integration with Radmin remote control software, Radmin VPN allows you to securely access and work at your remote computer from anywhere, whether from home, hotel or airport. Your network resources – files, apps, and emails are just a click away wherever you go. Play network games over the Internet Play your favourite LAN games with your friends over the Internet. Free Radmin VPN does not limit the number of gamers. Thanks to high speed of Radmin VPN you won’t see the difference – you will play your favourite games as if you were playing in the LAN. Click here to visit the author's website. |
![]() |
5,680 | Apr 04, 2021 Famatech <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/RadminVPN1_th.png"border="0"> |
![]() |
Random Password Generator 1.3 (0313) Random Password Generator 1.3 (0313) Random Password Generator is developed to create powerful passwords which are not easy to be cracked. This smart and easy-to-use tool allows you to securely and easily manage your passwords and IDs with editable remark. With Random Password Generator, you don't need to worry about the security of your password being violated any more. Changelog: + Improved Support for Windows 8 + Fixed General Bugs |
![]() |
8,908 | Mar 14, 2013 Iobit |
![]() |
Ratool v1.4 Ratool v1.4 Removable Access Tool (a.k.a. Ratool) is a simple to use portable freeware application which aids in the control of external storage devices such as USB flash drives, CD/DVD drives, as well as floppy, tape and WPD devices. Ratool can disable USB storage access or enable write protection on all USB flash drives, thus preventing data from being modified or deleted, protecting your confidential data from being copied by others. There are many such tools available online, but they are often easily circumvented. For example, if you use one of these USB disablers to disable a flash drive, someone could simply use another tool and enable it again. This means these tools are not actually protecting your USB ports, which is why Sordum created Ratool. By using Ratool, you won’t have to worry about this, as other tools cannot easily break Ratool’s protection. Changes: v1.4 1. [Fixed] – Ratool Password protection can be cracked – (critical) 2. [Fixed] – Ratool can’t block CD/DVDRom device on Windows Home and single language 3. [Fixed] – Ratool can’t block WPD device (Smartphone etc.) on Windows Home and Single lang. 4. [Fixed] – Ratool can’t Unblock USB ports Which blocked by Bitlocker 5. [Fixed] – Ratool settings can’t apply immediately in Windows Home and single Language 6. [Fixed] – If there is no TEMP Folder, Ratool Doesn’t work (Error line 10.) 7. [Fixed] – Prevent Installation of USB devices feature (White List) Doesn’t work 8. [Fixed] – Ratool GUI is too small 9. [Added] – x64 Version, Some code improvements and minor BUG fixes Ratool allows the following actions: 1. Block USB Storage Devices: disables all USB storage devices access to your PC. How to block all USB devices except yours (White List Mode) a. Plug in Your USB device (You can plug in more than one) b. In the Options menu, click “Prevent Installation of USB devices” Currently plugged ... |
![]() |
3,038 | Mar 07, 2022 Sordum.net <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/ratool1_th.png"border="0"> |
![]() |
RawTherapee v5.12 RawTherapee v5.12 A free, cross-platform raw image processing program. About RawTherapee is a powerful, cross-platform raw photo processing system, released as Free Software (GPLv3). It is designed for developing raw files from a broad range of digital cameras and targeted at users ranging from enthusiast newcomers who wish to broaden their understanding of how digital imaging works to professional photographers. It provides a powerful suite of tools for you to produce amazing photos and showcase your creativity. RawTherapee benefits users who take the time to learn what it can do. Luckily the community is quite welcoming and helpful! Check out the Forum, read up on RawPedia, and ask questions - there's always something neat to learn! High Image Quality Non-destructive, 32-bit (floating point) processing engine, modern demosaicing algorithms, and advanced color+detail editing bring you the best tools to develop images of the highest quality from your raw files (including High Dynamic Range DNG). Outstanding Raw Support RawTherapee gives you best-in-class demosaicing, including using two demosaicing algorithms on the same image, compositing pixel-shift raw files with automatic ghost masking, working with multiple-frame raw files, dark frame subtraction, flat field correction, and hot/dead pixel correction! Freedom for Free RawTherapee is Free and Open Source software. This means you can use it free of charge, wherever you like and however you like as long as you abide by the copyleft GPLv3 license. Download the source code, modify it, and help improve it. It is cross-platform - you can use it on Linux, macOS, or Microsoft Windows. It is also international and available in over 15 languages! Changes: v5.12 May 28, 2025 New Features The Raw Black Points has a new option called Dehaze. It sets the black points to the minimum values in the image, which often has the effect of reducing haze. Distortion Correction gained a ... |
![]() |
4,092 | Jun 04, 2025 The RawTherapee Team <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/RawTher1_th.png"border="0"> |
![]() |
Rdex v1.5.6 Rdex v1.5.6 Rdex is a freeform database. Use it to store addresses, phone numbers, birthdays, online ids, recipes, or a million other pieces of miscellaneous information. It is based on the idea of a cardfile—like a Rolodex. Just click "New Card," paste or type in some info and click save. Simple! Later, you can search for any text contained in the card and the card will be displayed. Just type the word you are searching for into the search box at the top. Rdex is available for Windows, Java and Android. If you keep the data file on a cloud storage service such as Dropbox your data is available anywhere and you can maintain sync between mobile and desktop access. Rdex can also encrypt the data file if you wish to ensure privacy. This download is for the Windows portable version. If you need the Java version for MacOS or Linux, download here. If you need the Android version, download here. Brief Instructions To create a new card, click on the "New" button, press <Ctrl+N>, or select "Card/New Card" from the menu. Just copy <Ctrl+C> and paste <Ctrl+V> text into the card. If you want to make the "List View" function meaningful, use the first line of the card as a title. To find a card, type a string in the Search box and press <Enter>. Search strings are not case sensitive. Press <Enter> again to find the next occurrence or <Shift-Enter> to find the previous one. If the search string is blank, you simply jump to the next (or previous) card. You can get a list of the first lines of cards that contain the text in the Search box by pressing <Alt-Enter> or selecting <Card/List View> from the menu. The clipboard button <Card/List All Cards> or <Ctrl+L> will simply list the first lines of all cards ... |
![]() |
3,091 | Dec 27, 2020 Peter Newman <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/rdex1_th.png"border="0"> |
![]() |
RDP-Parser v1.1 RDP-Parser v1.1 RDP-Parser extracts RDP activities from Microsoft Windows Event Logs. This tool has been designed for any investigation involving exploitation of RDP service. It supports Evt and Evtx formats. How it works This is a command line tool and there is no installer. You should unzip and copy the program where you want to use it. Open a command line in the directory where the program is. You can print help message using "RDP-Parser --h": More details about options: --p: By default, RDP-Parser will check in the current directory, so you can copy the program in the same folder as the Event Logs you want to parse. If there is no given path and current directory doesn't contain Event Logs, RDP-Parser will copy the live system Event Logs in the current directory. This command require admin priviledge and it doesn't work for old format logs. --t: There are three types of report: 1: minimal: This is the default type. The report will contain following columns: TimeGenerated, Source, EventID and Details. Only events with public IP addresses will be extracted and all details will be removed except IP address. 2: minimal with all IP addresses: Same as type 1, but it also includes private IP addresses. 3: normal: The report will contain all columns and all details. Columns are: TimeGenerated, Timewritten, Computer, Source, RecordNumber, Category, EventID, EventType and Details. Only events with public IP addresses will be extracted but all details will be included. 4: normal with all IP addresses: Same as type 3, but it also includes private IP addresses. 5: full: All events related to RDP or login activities will be included. Included events IDs are: ... |
![]() |
4,733 | Feb 27, 2019 Alain Rioux <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/RDPParser1_th.png"border="0"> |
![]() |
recALL v19.05 recALL v19.05 recALL allows you to quickly recover passwords from more than 300 programs (email, web browsers, instant messengers, FTP clients, wireless, etc.) and license keys from more than 2,800 applications. recALL the world's first program that enables the recovery of the majority of passwords and also licenses from damaged operating systems via native support system registry files Windows. With the unique feature of emulation FTP, POP3 and SMTP you can recover passwords from any application supporting these protocols, even if the program is not yet supported inrecALL. Works with the following programs: web Browsers 360 Browser 7.x Avant Browser 2012-2014 Beonex Communicator BlackHawk 2.x Chrome 1.x-30.x Comodo Dragon CoolNovo Browser 2.x Firefox 0.1-32.x K-Meleon 1.x Lunascape 6.x Maxthon 2.x-5.x Microsoft Internet Explorer 4.x-11.x* Netscape 8.x-9.x Opera 4.x-15.x Otter Browser beta 11 QupZilla 1.x QtWeb Internet Browser 3.x (reg) QtWeb Internet Browser Portable 3.x (ini) Safari 5.x Sleipnir 5.x Sleipnir Browser – Fenrir Pass ID Yandex Browser 1.7 UC Browser 5.x Vivaldi 1.x * Based on browser history email programs Advanced Email Checker Baby POP3 Server 1.x Becky! 2.x Calypso 3.x Claws Mail 3.x CheckMail 5.x Courier 3.x DeagleSoft MailChecker 1.x Delphi Email Client eM Client 6.x Eudora 6.x ... |
![]() |
10,300 | May 01, 2019 Maciej Kaczkowski <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/recALL_th.png"border="0"> |
![]() |
Recall Wifi v1.0.0 Recall Wifi v1.0.0 A utility to recover the passwords of wireless networks saved on your computer. Features: • Recover WEP, WPA, WPA, WPA2 and WPA3 passwords. • Perform security analysis to help you identify vulnerable or insecure passwords. • Import or export saved networks to file with optional encryption (AES 256-bit) for use on another computer. • Delete saved networks. • Connect/Disconnect to or from saved networks. • Optionally view saved networks on disabled network devices. • Portable, single executable. System Requirements: • Windows XP or later (64-bit) • 16MB disk space Click here to visit the author's website. |
![]() |
43 | Jun 26, 2025 Mechanika Design <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/RecallWifi1_th.png"border="0"> |
![]() |
RegFromApp 32bit v1.33 RegFromApp 32bit v1.33 RegFromApp monitors the Registry changes made by the application that you selected, and creates a standard RegEdit registration file (.reg) that contains all the Registry changes made by the application. You can use the generated .reg file to import these changes with RegEdit when it's needed. System Requirements This utility works on Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows 8. Older versions of Windows are not supported. There is a separated version for x64 applications. Versions History Version 1.33: Fixed RegFromApp to avoid from BSOD when trying to attach to smss.exe (Be aware that RegFromApp will still fail to capture the smss.exe process) Using RegFromApp RegFromApp doesn't require any installation process or additional dll files. In order to start using it, simply run the executable file - RegFromApp.exe After running it, select the process that you want to inspect, and click Ok. After clicking Ok, each time that the selected process writes a value into the Registry, the main window of RegFromApp will display the written value in Windows .reg file format. You can copy & paste the desired values to another Registry file, or alternatively, you can save the entire Registry changes into a .reg file by using the 'Save As' option. Using RegFromApp In Windows Vista RegFromApp can work in Vista even when UAC (User Account Control) is turned on, as long as the process that you wish to inspect run in the same account and security context of RegFromApp. However, if you want to inspect a process that runs under administrator account, you must also run RegFromApp as administrator. (right-click on RegFromApp.exe and choose 'Run As Administrator') RegFromApp Display Modes Starting from version 1.10, RegFromApp can work in 2 display modes: ... |
![]() |
9,054 | Apr 26, 2019 Nir Sofer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/regfromapp_th.png"border="0"> |
![]() |
RegFromApp 64bit v1.33 RegFromApp 64bit v1.33 RegFromApp monitors the Registry changes made by the application that you selected, and creates a standard RegEdit registration file (.reg) that contains all the Registry changes made by the application. You can use the generated .reg file to import these changes with RegEdit when it's needed. System Requirements This utility works on Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows 8. Older versions of Windows are not supported. There is a separated version for x64 applications. Versions History Version 1.33: Fixed RegFromApp to avoid from BSOD when trying to attach to smss.exe (Be aware that RegFromApp will still fail to capture the smss.exe process) Using RegFromApp RegFromApp doesn't require any installation process or additional dll files. In order to start using it, simply run the executable file - RegFromApp.exe After running it, select the process that you want to inspect, and click Ok. After clicking Ok, each time that the selected process writes a value into the Registry, the main window of RegFromApp will display the written value in Windows .reg file format. You can copy & paste the desired values to another Registry file, or alternatively, you can save the entire Registry changes into a .reg file by using the 'Save As' option. Using RegFromApp In Windows Vista RegFromApp can work in Vista even when UAC (User Account Control) is turned on, as long as the process that you wish to inspect run in the same account and security context of RegFromApp. However, if you want to inspect a process that runs under administrator account, you must also run RegFromApp as administrator. (right-click on RegFromApp.exe and choose 'Run As Administrator') RegFromApp Display Modes Starting from version 1.10, RegFromApp can work in 2 display modes: ... |
![]() |
9,225 | Apr 26, 2019 Nir Sofer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/regfromapp_th.png"border="0"> |
![]() |
Registry Live Watch v1.0 Registry Live Watch v1.0 Registry Live Watch is a small Windows application whose purpose is to help you monitor a user-defined registry key for several changes (subkeys, subvalues, or security). Since this is a portable program, it is important to mention that it doesn’t leave any traces in the Windows Registry. You can copy it on any USB flash drive or other devices, and take it with you whenever you need to keep an eye on your registry keys on the breeze, without having to go through installation steps. Registry Live Watch delivers a user-friendly interface where all dedicated parameters are bundled in the primary panel, so you can easily tweak them. Everything is kept as simple and clear as possible, so even rookies can master the entire process with minimal effort. The program gives you the possibility to select the root key from a drop-down list (e.g. HKEY_LOCAL_MACHINE, HKEY_CURRENT_USER, HKEY_CLASSES_ROOT, HKEY_USERS), enter a custom key that you want to monitor, and watch for the desired changes (all, keys, values, or security). Additionally, you can make the program trigger an action when a key is modified, namely pop up a notification messages, execute a user-defined program, or log the information into a log. Last but not least, you are allowed to start or stop the monitoring process, save the log to plain text file format, as well as clear the log with just one click. All in all, Registry Live Watch comes packed with several handy features for helping you monitor the changes applied to a particular registry key. The intuitive layout makes it an ideal app for rookies and professionals alike. |
![]() |
5,359 | Apr 26, 2019 LeeLu Soft <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/RegistryLiveWatch1_th.png"border="0"> |
![]() |
RegistryChangesView v1.30 RegistryChangesView v1.30 A tool for Windows that allows you to take a snapshot of Windows Registry and later compare it with another Registry snapshots, with the current Registry or with Registry files stored in a shadow copy created by Windows. When comparing 2 Registry snapshots, you can see the exact changes made in the Registry between the 2 snapshots, and optionally export the Registry changes into a standard .reg file of RegEdit. System Requirements This utility works on any version of Windows, starting from Windows XP and up to Windows 11. Both 32-bit and 64-bit systems are supported. Changes Version 1.30: Added option to change the sorting column from the menu (View -> Sort By). Like the column header click sorting, if you click again the same sorting menu item, it'll switch between ascending and descending order. Also, if you hold down the shift key while choosing the sort menu item, you'll get a secondary sorting. Added 'Sort By' toolbar button Examples for useful things you can do with this tool You can create a Registry snapshot before installing a new software and then after the installation is completed, compare this Registry snapshot with the current Registry and see all Registry changes made by the installer (Be aware that you'll also see some changes made by Windows or other programs in the same time). If there are Registry changes that you don't like, you can generate a .reg file to revert back the changes. If you make a change in Windows configuration from the GUI of Windows and you want to see how to make this change in the Registry, simply create a Registry snapshot before making the config change and then after the configuration change, compare this Registry snapshot with ... |
![]() |
5,811 | Sep 28, 2023 Nir Sofer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/registrychangesview_th.png"border="0"> |
![]() |
RememBear v1.2.6 for Mac RememBear v1.2.6 for Mac Secure and remember all your passwords… with a Bear (Free for single device) The easiest way to remember all your passwords RememBear also types in your passwords, right when you need them Easier Let a Bear remember and type in passwords for you Faster Auto-fill logins and credit cards with a click Access from anywhere Bear-rilliant apps for your computer, tablet and phone Safe and secure in an encrypted Bear hug Secured end to end Engineered so that you, and only you, can see your sensitive data Serious security Super strong 256-bit encryption Independently audited Independent and public code audit of RememBear security Click here to visit the author's website. |
![]() |
5,484 | Mar 24, 2019 TunnelBear <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/RememBear1_th.png"border="0"> |
![]() |
RememBear v1.2.6 for Windows RememBear v1.2.6 for Windows Secure and remember all your passwords… with a Bear (Free for single device) The easiest way to remember all your passwords RememBear also types in your passwords, right when you need them Easier Let a Bear remember and type in passwords for you Faster Auto-fill logins and credit cards with a click Access from anywhere Bear-rilliant apps for your computer, tablet and phone Safe and secure in an encrypted Bear hug Secured end to end Engineered so that you, and only you, can see your sensitive data Serious security Super strong 256-bit encryption Independently audited Independent and public code audit of RememBear security Click here to visit the author's website. |
![]() |
5,337 | Mar 24, 2019 TunnelBear <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/RememBear1_th.png"border="0"> |
![]() |
Remove Windows XP End of Life Messages Utility Remove Windows XP End of Life Messages Utility On April 8th 2014, Microsoft ended all support for Windows XP. They then released a number of Windows Updates that displays annoying messages on your desktop telling you that your operating system is now at its end of life. This is the Windows message: The second is the Microsoft Security Essentials one: We have been asked a number of times about how to remove these and we have now created a new utility that will help you to do this. (Download at bottom of page) CONSIDERATIONS There is one problem with removing the Microsoft Security Essentials end of life message. If you have already installed Version 4.5.216.0 then you cannot remove this message. Also, eventually, your system will update to this version so the best thing to do is to uninstall MSE and install another free anti-virus like Avast or Avira. If you have not yet installed Version 4.5.216.0 then this utility will work for you for the MSE part. The Windows end of life message should be able to be removed without issue using this utility. You must have Dot Net 2.0 installed for this to work. INSTRUCTIONS Once you have downloaded the file you should run the executable file to start the utility. You will then be presented with a utility that looks like this: You should then click the buttons on the right hand side in relation to what you want to do. So, if you want to remove the Windows message, click the top button, if you want to remove the MSE message, click the bottom button. Once you have done this, you should reboot your machine and you should now notice that the messages have not reappeared. |
![]() |
7,765 | Jul 13, 2014 Techy Geeks |
![]() |
RemoveWGA 1.2 Remove Microsoft Windows Genuine Advantage A small utility that enables you to remove the Microsoft Windows Genuine Advantage Notifications tool RemoveWGA will enable you to easily remove the Microsoft \\\"Windows Genuine Advantage Notifications\\\" tool, which is calling home and connect to MS servers every time you boot. Futures updates of this notification tool will (officialy) setup the connection rate to once every two weeks. Once the WGA Notification tool has checked your OS and has confirmed you had a legit copy, there is no decent point or reason to check it again and again every boot. Moreover, connecting to Microsoft brings security issue for corporate networks, and privacy issues for everyone. It is also unclear which information are transmitted (Microsoft published an official answer, but an individual study brought some questions). All of that, along the fact that Microsoft used deceptive ways to make you install this tool (it was told you it was an urgent security update, whereas it is a new installation giving you no extra security) makes me calling this tool a spyware. Also, Windows Genuine Advantage Notifications is different than Windows Genuine Advantage Validation. RemoveWGA only removes the notification part, phoning home, and does not touch the Validation part. Note: Some antivirus and antispyware programs flag RemoveWGA as being infected/malware, although the application is perfectly safe and does not pose a threat to your system. This is called a \\\'false positive\\\'. The term false positive is used when antivirus software wrongly classifies an innocuous ( inoffensive ) file as a virus. The incorrect detection may be due to heuristics or to an incorrect virus signature in a database. [Similar problems can occur with antitrojan or antispyware software.] Here are some key features of \\\"RemoveWGA\\\": · Tell you if the WGA notification tool is active on your system · Allows you to remove the WGA notification tool from your ... |
![]() |
9,653 | Jul 07, 2010 Guillaume Kaddouch |
![]() |
RepairDNS 2017.7.1.2 RepairDNS 2017.7.1.2 RepairDNS is a Nicolas Coolman utility that allows to detect and remove certain DNS infection. This is particularly the case of hosts file infection that modifies the dynamic link resource "dnsapi" in order to create forwarding addresses in the Hostsfile (Jabuticaba, La Superba, V-Bates,...) . In principle this tool find a healthy copy of the infected resource and replaces it. A report is available on the user'sdesktop, it can be requested by a security expert in a forum of disinfection. The utility is portable, it means that it requires no installation. System : Windows XP/Vista/7/8/10 |
![]() |
5,669 | Nov 13, 2019 Nicolas Coolman <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/RepairDNS1_th.png"border="0"> |
![]() |
RepairKit v1.2.9 RepairKit v1.2.9 A free, all-in-one Java-based Windows repair and maintenance toolkit. Features Automatic Repairs Automatically perform a comprehensive system cleanup and repair, including: • Deleting restrictive system policies • Running registry and system tweaks • Removing pre-installed bloatware • Cleaning unnecessary junk files • Repairing various disk issues • Updating outdated installed programs • Scanning for malware with security software Every function in the repair is fully customizable, allowing you to enable or disable specific repairs as needed using either the checkboxes on the panel, or the configuration files located in the config folder. Only modify these files if you know what you are doing. Note: The malware scan automatically runs a quick scan with Windows Defender. In the event that Windows Defender is disabled or unavailable, a quick scan is performed with Sophos Scan and Clean instead. Useful Programs Access essential software tools for system maintenance, including: • CPU-Z: Identify your system hardware details. • HWMonitor: Monitor hardware temperatures and specs. • Emsisoft Scan: Scan for malware using Emsisoft Emergency Kit. • Sophos Scan: Scan for malware using Sophos Scan & Clean. • TreeSize: Analyze and manage disk contents. • Everything: An ultra-fast file search engine. • CrystalDiskInfo: Monitor your disk drive's health and status. • CrystalDiskMark: Benchmark your disk drive's read/write speeds. • Autoruns: An alternative to Windows Startup Manager. • Process Explorer: An alternative to Windows Task Manager. • Process Monitor: Monitor system activity and processes. • BlueScreenView: View and analyze Windows ... |
![]() |
543 | Mar 07, 2025 Foulest <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/RepairKit1_th.png"border="0"> |
![]() |
Retroshare v0.6.7 Retroshare v0.6.7 Secure communication for everyone Connect with Friends and Family Retroshare establish encrypted connections between you and your friends to create a network of computers, and provides various distributed services on top of it: forums, channels, chat, mail... Retroshare is fully decentralized, and designed to provide maximum security and anonymity to its users beyond direct friends. Retroshare is entirely free and open-source software. It is available on Android, Linux, MacOS and Windows. There are no hidden costs, no ads and no terms of service. Chat Send text and images. Discuss with various people in decentralized chat rooms (like IRC). Express your emotions with the rich smiley set. Use distant chat to securely chat with friends-of-friends. Mail Send encrypted messages to other members of the network. Retroshare securely stores messages on friends' nodes to deliver messages while you're offline. File sharing Share files with your friends or with the whole network. Use the search to find files. Retroshare uses swarming similar to BitTorrent, to accelerate transfers. This makes it possible to share large files. Your privacy and anonymity is guaranteed beyond direct friends with anonymous tunnels. Forums You can read and write forum posts offline. This is perfect while you're on the go. When you have an Internet connection, Retroshare will automatically sync forums with your friends. Decentralized forums are censorship resistant by design. Boards Share your favorite pictures or links. See which pictures or links others like. Vote and discuss them using the built-in commenting system. Channels Channels allow you to publish your files. You may subscribe to channels and automatically download the latest files; comment on files and spread them to your friends. Protect your IP with Tor/I2P Retroshare can optionally be used over the Tor and I2P networks. Doing so, even friend nodes cannot see your IP, which allows to safely and anonymously connect to unknown people. While it is always possible to ... |
![]() |
4,373 | Feb 16, 2024 Retroshare Team <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Retroshare1_th.png"border="0"> |
![]() |
RIOT (Radical Image Optimization Tool) v2023.12 RIOT (Radical Image Optimization Tool) v2023.12 Radical Image Optimization Tool (RIOT for short) is a free image optimizer that will let you to visually adjust compression parameters while keeping minimum filesize. It uses with a side by side (dual view) or single view interface to compare the original with the optimized image in real time and instantly see the resulting file size. RIOT is lightweight, fast and simple to use, yet powerful for advanced users. You will be able to control compression, number of colors, metadata settings and much more, and select image format (JPG, GIF or PNG) for your output file. Main features • open many image types including rare/scientific types • save and optimize JPEG, WEBP, GIF and PNG with a simple, clean user interface • automatic optimization selects the most suitable format and parameters • works in dual view: (original – optimized image) or single view (optimized image). • automatic preview of resulting image • in-place compare function (alternativelly display the original image over the optimized image to notice small pixel changes) • compress files to desired filesize threshold • fast processing (all is done in memory); • see instant results including resulting filesize • batch support (process multiple files at once) • transparency handling options • decide if you want to keep metadata (comments, IPTC, Adobe XMP, EXIF profiles, ICC profiles). • Unsupported metadata is removed • transfer metadata between image formats (destination format must support them) • common tools: pan and zoom, rotate, flip • basic image adjustments: brightness, contrast, gamma, ... |
![]() |
5,287 | Dec 29, 2023 Lucian Sabo <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/riot4_th.png"border="0"> |
![]() |
RKill v2.9.1 RKill v2.9.1 RKill is a program that was developed at BleepingComputer.com that attempts to terminate known malware processes so that your normal security software can then run and clean your computer of infections. When RKill runs it will kill malware processes and then import a Registry file that removes incorrect file associations and fixes policies that stop us from using certain tools. When finished it will display a log file that shows the processes that were terminated while the program was running. As RKill only terminates a program's running process, and does not delete any files, after running it you should not reboot your computer as any malware processes that are configured to start automatically will just be started again. Instead, after running RKill you should immediately scan your computer using some sort of anti-malware or anti-virus program so that the infections can be properly removed. Click here to visit the author's website. |
![]() |
8,867 | Jan 19, 2020 Bleeping Computer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/RKill_th.png"border="0"> |
![]() |
RosarioSIS v10.9 RosarioSIS v10.9 Free Student Information System for School Management RosarioSIS is a Free and open source Student Information System (SIS), also known as School Management System (SMS) or even School ERP. RosarioSIS features students demographics, grades, scheduling, attendance, student billing, discipline and food service modules for school management, in one web-application. Primarily designed for K-12 schools, it will easily fit for any educative institution like a university, an academy, or an institute. Main features Responsive design: compatible with tablets and smartphones. Discipline, Accounting and Student Billing modules included. Translated in French, Spanish, Arabic and German. PDF documents generation. Colorful statistical charts for decision-making. Moodle Learning Management System (LMS) integration included. Online registration. RosarioSIS is free software (Gnu GPL v2) powered by PHP and a PostgreSQL database. It runs as a web application that can be accessed through any computer connected to the internet. School Management made easy Take the Tour Here is a short presentation of RosarioSIS, module by module: School Setup Create schools and edit their information. Easily add information fields about your school. Setup marking periods, school periods and grade levels. Manage and consult the calendar, including school events and student assignments. Create notes and polls. Configure RosarioSIS, activate online registration, modules and plugins. Rollover: roll data to the next school year. Students Add new students and edit their information (enrollment, demographic information, photo, addresses and contacts, medical…). Easily add information fields about your students. Print advanced reports and consult statistics. Print formatted letters and mailing labels to contact your students. ... |
![]() |
4,667 | Mar 28, 2023 François Jacquet <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/rosariosis2_th.png"border="0"> |
![]() |
Router Default Password v1.0 Router Default Password v1.0 Every device connected to a network must have an unique IP address to differentiate it from the others. An IP address is similar to the unique telephone number on your home phone or mobile device. No other device on your network (unless you are using NAT) will have the same IP address. In order for a sending device to transmit data to a receiving device, the sender needs to know where the destination is. The destination will either be on the same subnetwork as the source, or on some other subnetwork. If the devices are in the same subnet, the mechanism used to determine the location of the destination device is the broadcast. But what happens if they are on different networks? This is where the default gateway comes into play. The default gateway is used as the destination of all traffic that is not on the same subnet. You might need to know the IP address of the default gateway if there’s a network problem or if you need to make changes to your router. In Microsoft Windows, the IP address of a computer’s default gateway can be accessed through Command Prompt with the ipconfig command, as well as through the Control Panel. The netstat and ip route commands are used on macOS and Linux for finding the default gateway address. If you haven’t bothered to go in and make changes to your network settings, you may find that you can still access the admin panel using that information. To be able to do that though, you need to know how to find the IP address , default Username and default Password of your router. Here is “Router default Password” Utility come in handy ,it is a Portable freeware. How to use it : 1. Download Router Defauld ... |
![]() |
5,342 | Jun 28, 2019 Sordum.org <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Routerdefaultpass3_th.png"border="0"> |
![]() |
RunAsTool v1.4 RunAsTool v1.4 Windows’ built-in “Run As” command allows you to launch a program under a different user than the currently logged in user, However, runas.exe cannot be automated it requires that the user type in the password for the alternate account , RunAsTool is a Portable Freeware and Allows standard users run a specific program with administrator privileges without the need to enter the administrator password each time. This allows you to provide users with access to program that require admin rights. Under restircted Account , Some programs are missing administrator rights to run correctly , therefore Many users are working under administrator account , this makes the system vulnerable to malware, spyware, viruses and other security risks with RunAsTool you can change it. Since installation is not a requirement, you can just drop the program anywhere on the hard disk and run the executable file directly. Otherwise, you can save RunAsTool to a USB flash drive or similar storage unit, and run it on any computer. Therefore, you can carry the app with you whenever you’re on the move. The login information for the application like username and password are read from an encrypted file – You don’t have to worry about your Admin Password. How to use With RunAsTool You don’t have to use Cmd or any parameter to allow a standard user run a specific program with administrator rights , just download and extract RunAsTool 1) Administrators In standard user account: Run it and Choose a Admin Account (If there are more than one) and type your admin password There are two interface 1.Admin 2.Standart user (Standart users can not use Admin GUI) , in Admin GUI you can easily drag and drop any program/s to give it/them Administrator privileges ,Standart Users can create Application shortcuts too On RunAsTool there are some useful options for example ... |
![]() |
6,885 | Dec 19, 2019 Sordum.org <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/runastool1_th.png"border="0"> |
![]() |
RunPE Detector v2.0 RunPE Detector v2.0 Phrozen RunPE Detector is a security program, especially designed to detect and defeat some suspicious processes using a generic method. We at Phrozen Software do things differently, more creatively. So, when we set ourselves the task of creating a novel way of detecting, disabling and removing RATs, we didn't want to take the route every other anti-virus company has done before us. Phrozen Software studied the behaviour of RATs and discovered that hackers virtually always use a technique called RunPE. This technique spawns a legitimate process – often the default browser or a Microsoft system process – and replace it with a malicious program code directly in memory. Your computer is thus tricked and treats the malicious code as a legitimate process. The user and his anti-virus program have no idea that his default browser is effectively turned into a virus. RunPE is a technique that is used in several malicious ways. The two most common are : [1] FWB (Firewall Bypass): As its name suggests, this technique is implemented to bypass or disable the Application Firewall or the Firewall rules. Since most malware needs to connect to a remote Command-and-Control (C&C) Server, it needs to connect to the Internet via the Firewall. Since most users are connected to the Internet at home, normally the installed Firewall would prevent the malware from connecting to the Internet. Using the RunPE technique to hijack a legitimate process that is authorized to reach Internet, any malware could subsequently connect to the C&C without being detected by the Firewall. [2] Malware Packer or Crypter: Generally script kiddies – immature hackers - use a well-known type of malware that is already detected by most anti-virus programs. They then try the obfuscate this malware to evade ... |
![]() |
6,438 | Nov 15, 2019 PHROZEN SAS <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/RunPE Detector1_th.png"border="0"> |
![]() |
RustDesk v1.4.0 Are you being scammed? If someone called you or if you dialed a number that popped-up on your screen and someone on the phone sent you here to download this program... HANG UP IMMEDIATELY! RustDesk v1.4.0 Open source remote desktop software for Windows, MacOS, Linux and Android. The best open-source remote desktop client software, written in Rust. Works out of the box, no configuration required. Great alternative to TeamViewer and AnyDesk! You have full control of your data, with no concerns about security. You can use RustDesk's rendezvous/relay server, set up your own (Go here for instructions), or write your own rendezvous/relay server. Free Public Servers Below are the servers you are using for free, it may change along the time. If you are not close to one of these, your network may be slow. Germany Hetzner 2 vCPU / 4 GB RAM Germany Codext 4 vCPU / 8 GB RAM Ukraine (Kyiv) dc.volia 2 vCPU / 4 GB RAM Changes: v1.4.0 Added Allow logon screen password on lock screen Take screenshot Hostname as id for Pro Auto update on Windows, manual update on Windows and Mac Web socket support on all platform Trackpad speed adjustment #11680 Changes Remove system proxy dep of reqwest Capitalize display name Only use tcp in socks5 proxy since so many users failed to set up UDP for socks5 including ourselves "Exit" changed to "Stop service" on tray to avoid confusion Fixes Virtual F11 key to macOS (11366) Tray startup is tried via sudo (and denied) which results in an email #9802 Http proxy with reqwest Hide cm Lan discovery Rdp #10039 ... |
![]() |
3,574 | Jun 20, 2025 CarrieZ Studio <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/rustdesk1_th.png"border="0"> |
![]() |
S.O.S. Security Suite v2.9.2.0 S.O.S. Security Suite v2.9.2.0 A free tool to help get rid of malware, adware and spyware, and prevent infections. There is also a hardware and security flaws detection element and a system optimization module. All these features together bring you what the application's initials stand for: A Safer and Optimal System. Based on the well known UVK tech, S.O.S. Security Suite contains everything most users need to keep their computer safe and running smoothly. S.O.S. Security Suite is not an antivirus application in the sense it does not provide real time analysis of running application and Internet traffic. It should be used as a complement to your current antivirus and a second opinion malware scanner, to improve the protection of your data through methods not provided by regular security applications. In addition to the threat prevention and removal, S.O.S. Security also includes: • A system flaw detection module that tells you about software and hardware related issues and helps you to fix them. • A system optimization, maintenance and repair module that lets you esily ensure the best privacy, performance and reliabillity of your system. S.O.S. Security Suite ican be used as a portable tool or an installed application. Portable tool is great if you plan to use the threat scanner and the optimization modules in many computers. Otherwise, if you plan to use the System Immunization or Execute Prevent modules, you should install the app. Once installed, you can uninstall S.O.S. Security from the Settings tab, or as any other application, from the Windows Settings App. The protection provided by S.O;S; Security does not use any system resources, except when it is performing the threat scan, which usually only takes a minute or two. System immunization and Execute prevent work by preventing ... |
![]() |
76 | May 29, 2025 Carifred <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SOSSec2_th.png"border="0"> |
![]() |
Safe Startup v4.16 Safe Startup v4.16 Attention AskWoody readers and others: PrivacyRoot, S.R.O. has removed the ability of this download installer to function and they have killed-off the program entirely. Bummer! Look under the category of "System Information and Monitoring" for similar programs. Sorry :( -Deanna This program will monitor auto-startup records in OS Windows and notify you about any new programs which will be automatically launched on your PC. Using this utility you can manage programs with auto-start option. You can choose to allow auto-start for these programs or you can choose to stop or even delete them. You can stop unwanted or useless programs, spyware or even viruses. Program works with system services also, thus you can make deep review of your PC. By using our program you can see hidden running programs, reduce number of running processes, tray icons and other apps which you don't need and, thus, really boost performance of your PC. Make your PC faster. Our program can continue working in the background to always monitor new records for auto-startup, and it will remove undesired items if they will appear again. This program compatible with any other antivirus. Our program include function to recover deleted startup records. For example, if you'll delete some important file at auto-startup by mistake you can always undo delete and everything will be back as usual. Requirement Windows XP, Vista, 7, 8, 10 .NET framework 3.5 What's new in version 4.16? • In this release we are improving security of the program. In one word: we have replaced old security schema with a newer one. Due to the nature of security itself we cannot describe in details changes that were made. Thats because first rule of security is that everything should be in a secret. • Date of release: 4 November 2019. Click here to visit the author's website. |
![]() |
5,288 | Jun 22, 2020 PrivacyRoot, S.R.O. <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SafeStartup1_th.png"border="0"> |
![]() |
SCleaner v1.9 SCleaner v1.9 A small and simple system cleanup, privacy manager utility for Windows. Built with simplicity and ease of use in mind. • As simple as any system cleanup utility can get. • No need to install. • The program is fully portable. Clean what really needs to be cleaned. • Save Hard Disk Space - Removes Trash that accumulate over time with day to day System Uses. • Improve Cyber Security - Removes Trace of Previous Actions, Deleted Files and Folders. • Protect Your Privacy - Protects your Privacy from the supported Windows Applications. Supported operating systems: Windows (64bit only) 11/10/8.1/8/7 Note 1: You MUST install the Microsoft .NET Core 3.1 Desktop Runtime for this program to work. Get it here: https://dotnet.microsoft.com/en-us/download/dotnet/thank-you/runtime-desktop-3.1.22-windows-x64-installer Note 2: SCleaner will ask you if you want to install Microsoft .NET Core 3.1 Desktop Runtime but answering yes will not work. You will need to download and install it yourself (see Note 1). Click here to visit the author's website. |
![]() |
4,042 | Apr 16, 2025 Shrewd Squad <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SCleaner1_th.jpg"border="0"> |
![]() |
SCP - Containment Breach v1.3.11 SCP - Containment Breach v1.3.11 A free survival horror game for Windows written in Blitz3D. The events of the game take place in a containment site of The SCP Foundation, a secret organization dedicated to containing and researching anomalous artifacts and entities that threaten the normality of the world. You're thrown into the boots of a Class D test subject, one of the Foundation's disposable human guinea pigs. Not long after receiving your first assignment, the facility undergoes a massive containment breach, leaving you alone in the darkness with the escaped entities roaming around the facility. Your goal is to make it out alive. You can also search the facility for documents and other clues to figure out what led to the breach, and even attempt to do your part in fixing the situation. The main antagonist of the game is SCP-173, an animate concrete sculpture that kills all living things on sight, moving toward its victims at a speed of several feet in one blink of an eye and snapping their necks with irresistible strength and lethal precision. Fortunately, SCP-173 has one key weakness: it is frozen in place as long as someone is looking at it. To make things more interesting, SCP - Containment Breach has a blinking mechanic that forces the character to blink regularly (which often has fatal consequences in the vicinity of SCP-173). One of the key elements of the game is the procedurally generated map - no playthrough is the same, and you can never know for sure what is going to happen next. There are plenty of obstacles to make the way out of the facility less pleasant. Decontamination gas that makes you blink faster, locked doors that require a key card with a sufficient security clearance or a specific access code to open, ... |
![]() |
152 | Dec 13, 2024 Joonas Rikkonen/SCP Foundation <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SCP_th.png"border="0"> |
![]() |
ScreenWings v2.16.1430 ScreenWings v2.16.1430 Anti-screenshot solution ScreenWings is an anti-screenshoting software that prevents (malicious) software from capturing your screens. If you want to test the security of ScreenWings, try Snipping Tool, pressing "Print" or any capturing software! By starting ScreenWings with the "-Ghost" parameter, you can hide all UI elements and automate its protection. Security without performance disadvantages Most of the protection is static, which minimizes the requirements for ScreenWings. Full system wide screenshot protection This application is not limited to a single screen, but all screens you want. Protects up to six screens Even if passwords are hidden behind ***, critical entries such as e-mail addresses and private notes can still be screened. Prevent this with ScreenWings! Guard against Use ScreenWings The minimalist interface works without text, yet offers an almost unbreakable protection against multiple attack vectors! Download Help File Changes: 2.16 #Improved UI warning #Detection alert resistance improved Click here to visit the author's website. |
![]() |
5,650 | Apr 28, 2020 Hendrik Schiffer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/ScreenWings1_th.png"border="0"> |
![]() |
Scrollout F1 Scrollout F1 An easy-to-use anti-spam email gateway. Designed for Linux and Windows administrators without advanced email security experience. Its goal is to be as simple as possible. An easy to use, already adjusted email gateway (firewall) offering free anti-spam, anti-virus protection in order to secure all existing email servers, such as Microsoft Exchange, Lotus Domino, Postfix, Exim, Qmail and more. Basic deployment in no time: In order to start using this application you need to cover only two steps, described in this basic CONFIGURATION guide CONFIGURE An email gateway (a.k.a. firewall) is a machine (physical or virtual) installed between Internet and the email server. Its primary role is to protect the email server by filtering incoming messages, via SMTP protocol, from Internet. Secondary, an email gateway may be used as an outgoing gateway in case you want to add some new email features which are not provided by older email servers. For instance, Exchange 2000 or 2003 has no DKIM signing and verification service - a quality improvement for message delivery. In order to start using this application you need to cover only the two steps of BASIC CONFIGURATION (points 1.1 and 1.2 below). 1. Basic configuration 1.1 CONNECT Set the network connection: IP address, subnet mask, gateway and DNS. 1.2 TRAFFIC You need to mention your domains and the responsible email server for each domain. Each domain must be unique, but the servers can have same value in case you are using one email server for multiple domains. The gateway system will become responsible for receiving emails that are addressed to all domains mentioned in this page and will forward the messages to the email servers. Optionally, in case you want ... |
![]() |
4,414 | Jun 08, 2021 Marius Gologan <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Scrollout F1_th.png"border="0"> |
![]() |
SD Memory Card Formatter v5.0.3 SD Memory Card Formatter v5.0.3 Free formatter for SD/SDHC/SDXC/SDUC memory cards in Windows, macOS and Linux. The SD Memory Card Formatter formats SD Memory Card, SDHC Memory Card, SDXC Memory Card and SDUC Memory Card (respectively SD/SDHC/SDXC/SDUC Cards) complying with the SD File System Specification created by the SD Association (SDA). It is strongly recommended to use the SD Memory Card Formatter to format SD/SDHC/SDXC/SDUC Cards rather than using formatting tools provided with individual operating systems. In general, formatting tools provided with operating systems can format various storage media including SD/SDHC/SDXC/SDUC Cards, but it may not be optimized for SD/SDHC/SDXC/SDUC Cards and it may result in lower performance. SD/SDHC/SDXC Cards have a “Protected Area” for SD Card security purposes. The SD Memory Card Formatter does not format the protected area in the SD/SDHC/SDXC Cards. The protected area shall be formatted by an appropriate PC application or SD host devices that provide SD security function. Note: SDUC Card has no Protected Area. The SD Memory Card Formatter doesn’t support SD/SDHC/SDXC/SDUC Card encrypted by the “BitLocker To Go” functionality of Windows. Please format the SD/SDHC/SDXC/SDUC Card after it has been unlocked. Supported operating systems: Windows 10 Version 22H2 Windows 11 Version 22H2 Windows 11 Version 23H2 Windows 11 Version 24H2 macOS 11 Big Sur macOS 12 Monterey macOS 13 Ventura macOS 14 Sonoma macOS 15 Sequoia Note: If you have a Mac with Apple silicon, e.g. M1, you might be asked to install Rosetta in order to open the SD Card Formatter. Important: Administrator Rights is required for Windows and macOS to execute SD Memory Card Formatter. User's Manuals English Japanese This download is for the Windows version (very bottom of page). All other download assets are below: macOS: Install SD Card Formatter.mpkg Linux: SDCardFormatterv1.0.3_Linux_x86_64.tgz SDCardFormatterv1.0.3_Linux_ARM64.tgz Click here to visit the author's website. |
![]() |
330 | Dec 20, 2024 Tuxera <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SDMemCrdForm_th.png"border="0"> |
![]() |
Secret Disk Free v2021.04 Secret Disk Free v2021.04 Creates additional hidden disk protected with a password Creating a secure place for sensitive files has never been easier than with our software Secret Disk. Within a few clicks, you can create a password-protected additional hard disk to store, hide, and lock files. The software also enables you to set several automation scenarios to make usage very convenient for you. If you need more than one secret disk, that can easily be handled by our software. Easy And Fast Creation With our software, you won't need to format your hard disk or change anything to the boot sector. It can make a new disk automatically and quickly while providing you with plenty of set-up options. You can choose to make the disk invisible, including the contents in it, and keep it password-protected. The Secret Disk works similarly to a standard hard disk and provides compatibility with any other software. To top it all off, you can choose your disk letter. Clever in Any Situation In the case of a power outage or fatal error of your Windows OS, your secret disk will automatically lock and become invisible as the information related to the disk instance is stored in the virtual memory. The Secret Disk does not encrypt your files, but it does limit access to them by allowing you to keep them password protected. The software ties together your files with the virtual disk to provide ample security to keep your files secure. Regular updates Just as technology keeps advancing, we will too. As more gets added or enhanced, we will send out updates to keep you up-to-date. The update process is automatic and in the background, so you won't ever need to worry. Trust and Awards Our software has received multiple awards from world-known rating agencies and bloggers. We pride ourselves ... |
![]() |
6,596 | Jul 12, 2021 PrivacyRoot <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/sede_1_th.png"border="0"> |
![]() |
SecretFolder 3.0.0.0 SecretFolder 3.0.0.0 SecretFolder is a security tool to hide and lock your sensitive folder out from the other users. It provides immediate data protection (protect and unprotect commands are executed in no time). Features: Free to use at both home and in the office Support for 64-bit Windows. NTFS, FAT32, exFAT and FAT volumes are supported. Unlimited number of folders can be protected at the same time. No limits on the size of protected data. No file system structure modifications will occur. Protected uninstall. When you create a secret folder, using your own password, you can manage folder. CMD command will not be able to access the folders. |
![]() |
7,899 | Jun 05, 2014 Oh!Soft |
![]() |
SecureMyBit Deny v1.4 SecureMyBit Deny v1.4 SecureMyBit Deny is a simple, light and freeware security tool that permits you to deny execution of scripts that rely on Windows Script Host, perform impairment indicators analysis to detect possible malicious behaviours in analyzed executables, type your text safely against keyloggers, mouseloggers, screenloggers, etc. Then you can monitor your file system for changes and new files, detect processes that are connected to ports commonly used by malware and optimize security settings. (Please note that some antivirus or antimalware programs can detect SecureMyBit Deny as malware, we want to specify that this is a false positive, you can add SecureMyBit Deny to the exclusion list of your antivirus/antimalware). What’s new? Fixed heuristic engine false positive of EXE Analyzer (SecureMyBit Deny.exe) Changed ON/OFF text of File System Monitor button (Thanks @ticklemefeet for the suggestion) Fixed bug in Security Ports Scan Fixed critical bug of Text Editor Anti-Logger Fixed bug in File System Monitor Heuristic engine updated to improve ransomware detection, hash computing, decryption code and registry usage of analyzed EXE Added “Clear log” button to File System Monitor Key Features: Deny scripts execution Make USB read-only Text Editor Anti-Logger Perform EXE analysis Security Ports Scan Monitor File System easily Optimize security settings Terms & Conditions: WE AREN’T ABSOLUTELY RESPONSIBLE FOR ANY KIND OF PROBLEMS, DAMAGES, LOSS OF DATA, LOSS OF FILES OR ANY OTHER KINDS OF PROBLEMS. THE SOFTWARE IS PUBLISHED “AS IS”. THERE MAY BE FALSE POSITIVES IN EXE ANALYZER REPORT(S) BECAUSE OF THE HEURISTIC ANALYSIS. Thank you. SecureMyBit Development Team Compatibility Windows Vista Windows 7 Windows 8/8.1 Windows 10 Special Requirement: Microsoft .NET Framework 4.5 Languages: English SecureMyBit Deny Test: |
![]() |
5,069 | Nov 13, 2019 JM Security <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SecureMyBit Deny1_th.png"border="0"> |
![]() |
SecureMyBit v2.3 SecureMyBit v2.3 SecureMyBit is a free, portable, and light application , which allows to encrypt any type of file with password (using AES 256 Bit encryption method) and then, decrypt them. SecureMyBit provide, for this purpose, also a secure and strong random password generator, which can generate passwords, as long as you want. Another utility of SecureMyBit is the Secure File Shredder, which can delete a file permanently with an irreversible shredding operation. Our software provides also an utility which can validate the strength of user’s passwords; and a System Specs utility, which can tell us all the informations about our computer. SecureMyBit provides also, in addition, a secure virtual keyboard which doesn’t produce any keystroke, so this guarantee a protection while entering your password. Finally, you can also get information about your files: hashes, file type, file attributes, etc. and compress your text easily and fast! When you encrypt your file(s) or folder(s) the Smart Monitor will check in real-time if they are modified, renamed or changed/deleted. Key Features Secure File Password Encryption (AES 256 Bit) Secure File Shredder System Specs Password Generator File Info Viewer Text Compressor Smart Monitor Compatibility Windows Vista Windows 7 Windows 8/8.1 Windows 10 Special Requirement: Microsoft .NET Framework 4.5 Languages: English F.A.Q. -Why SecureMyBit is detected by my antivirus/antimalware? We want to specify that this is surely a false positive. SecureMyBit is a clean file. Do I need to install SecureMyBit? No, SecureMyBit is avalaible only in “portable” version, so it doesn’t require any installation. -Is SecureMyBit free? Yes, SecureMyBit is absolutely FREE and WITHOUT advertisements! -Does SecureMyBit protect files against ransomware? Well, SecureMyBit provides surely additional protection to the encrypted files, against ransomware, also because the extension of the encrypted files are encoded. This doesn’t mean SecureMyBit protects files against all type of ransomware. -Why SecureMyBit gives me an error message when I ... |
![]() |
5,328 | May 19, 2019 JM Security <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SecureMyBit1_th.png"border="0"> |
![]() |
security.txt v1.1.0 security.txt v1.1.0 A cross-platform browser extension for displaying security.txt and humans.txt files. How does it work? As you browse the web and navigate to different websites, the browser extension checks the website to see if it supports either type of file. If it does, an icon is shown in the URL bar. You can click this icon to view more details about the text files that were located. What is security.txt? security.txt is a proposed standard that provides a means for websites and software authors to define their security policies. This is useful to security researchers or anyone who would like to responsibly disclose a vulnerability to the owners of the website or software. What is humans.txt? humans.txt is a less formal initiative for providing human-readable information about the authors of the website. Where to get it: This download is the Firefox extension. To get it for other browsers, choose below: Chrome and Chromium Install from the Chrome Web Store Microsoft Edge Install from the Microsoft Edge Addon Store Install From Source Source is available on Github Click here to visit the author's website. |
![]() |
3,759 | Dec 17, 2020 Harmless Systems <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Security.png"border="0"> |
![]() |
SecurityQuestionsView v1.00 SecurityQuestionsView v1.00 A free tool for Windows 10 that allows you to view the security questions and their answers stored in the Registry by the Windows 10 operating system. SecurityQuestionsView can decrypt the security questions stored on your current running system (Requires elevation) and it can also decrypt the security questions stored on external hard drive. SecurityQuestionsView displays the security questions of all users on your system that chose to set their security questions, for every user there are usually 3 questions. System Requirements This tool works on Windows 10/11, both 32-bit and 64-bit systems. For extracting the security questions from external drive, you can run this tool on earlier versions of Windows (Windows 7, Windows Vista). Start Using SecurityQuestionsView SecurityQuestionsView doesn't require any installation process or additional DLL files. In order to start using it, simply run the executable file - SecurityQuestionsView.exe After running SecurityQuestionsView, you have to choose how to load the security questions - From your local system or from external drive. If you choose to load the security questions from your local system, SecurityQuestionsView will ask you to run this tool as Administrator (Elevation), because only Administrator can access and decrypt the security questions. If you choose to load the security questions from external drive, you have to type the folder where the Registry files are located, for example: K:\windows\system32\config The Registry hive needed to extract the security questions is SAM. After the security questions and their answers are displayed on the main window of SecurityQuestionsView, you can select the questions (Ctrl+A) and then export them to comma-delimited/tab-delimited/XML/HTML file by using the 'Save Selected Items' option (Ctrl+S). Translating SecurityQuestionsView to other languages In order to translate SecurityQuestionsView to other language, follow the instructions below: Run SecurityQuestionsView with /savelangfile parameter: SecurityQuestionsView.exe /savelangfile A file named SecurityQuestionsView_lng.ini will be created ... |
![]() |
2,412 | Jan 02, 2023 Nir Sofer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/securityquestionsview1_th.png"border="0"> |
![]() |
SepPDF v3.89 SepPDF v3.89 Split PDF files containing multiple pages into individualized single PDF files for each page. • You can split PDF file containing multiple pages into individualized single PDF files for each page. • If you want to split PDF file, drag and drop it and click the "Split(All)" button. • You can also select the page range you wish to split. • Some PDF files with security can be split. • SepPDF is Freeware. Changes: v3.89 (April 18, 2025) Fixed some bugs. Click here to visit the author's website. |
![]() |
5,339 | Apr 18, 2025 ForestH <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SepPDF_th.png"border="0"> |
![]() |
Service Security Editor v2.0.0.13 Service Security Editor v2.0.0.13 A Free Standalone, portable GUI utility to Set Permissions for any Windows Service Easily allow (or deny) a user the ability to start, stop, pause or modify any Windows Service with just a few clicks of your mouse. Service Security Editor will help you to configure who can access your important Windows Services. It is an easy-to-use GUI alternative to Microsoft's powerful SC and SubInACL.exe command line programs. However, as with any other administrative tool, please use it with caution. When you start Service Security Editor, it shows the list of the services running on your machine: Select a service and click the Open... button to pop up the service's standard Windows Service Security Settings window: From there, select a user in the top portion and check the boxes lower down to grant or deny him whatever capabilities you see fit. Click the Add... button to bring in an account not already on the list. And of course, click the OK or Apply buttons to record your changes. Granting a Non-Admin User Start & Stop Rights to a Service For example, suppose you have a non-administrative user called Albert Newton who needs to restart the Print Spooler service when it acts up. Unfortunately he doesn't have the necessary rights and the Stop button is disabled when he opens the service from the Services Control Panel application: To grant Albert the ability to start and stop the Print Spooler service: 1) Start Service Security Editor. 2) Select the Print Spooler service from the list: 3) Click the Open... button to launch the Service Security Settings window: 4) Albert isn't on the list, so click on the Add... button to open the Select Users or Groups window. Type in Albert's ... |
![]() |
2,712 | Sep 23, 2021 Core Technologies Consulting, LLC <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/ServiceSecurityEditor1_th.png"border="0"> |
![]() |
Sherlock AI Detector v1.0 Sherlock AI Detector v1.0 Your Powerful Ally Against AI-Generated Texts. Introducing Sherlock AI Detector, an innovative tool employing cutting-edge technology to fight against one of the most pressing modern threats to academic integrity and business authenticity: AI-generated text fraud. Protect your institution, organization, or business from AI-produced texts, ensuring human authenticity and safeguarding your trustworthiness. Essential for the Modern Digital Landscape The rise of advanced artificial intelligence has brought along the challenge of distinguishing between human-written and AI-generated texts. AI-produced content can infringe upon academic integrity, mislead business communication, or even manipulate public perception. The Sherlock AI Detector is your defence in this high-tech era, providing a robust, easy-to-use solution. Promote Academic Integrity Sherlock AI Detector is an indispensable tool for educators seeking to maintain academic integrity. It helps detect and deter the use of AI-generated texts in academic submissions, promoting honesty and fairness in educational institutions. Preserving the integrity of academia is essential in the face of evolving technological landscapes. The rise of AI-generated text presents a new challenge to educators worldwide, but with Sherlock AI Detector, maintaining academic integrity just got easier. Features • Adaptive Learning Algorithms – Sherlock AI Detector uses human-built algorithms that are constantly adjusted and improved with each new piece of AI data, enhancing increased accuracy over time with multiple AI text generators. • Real-time AI Detection – The software performs real-time analysis of text files to immediately find patterns and other markers to detect that the text or part of it was created by artificial intelligence. • Secure and Compliant – We ensure that Sherlock AI Detector complies with all industry standards and regulations to guarantee your data’s privacy and security. To use... • Simply copy and paste text into the programs window or open an existing .txt file from your computer. • Click Start and let the program finish scanning. • Text highlighted ... |
![]() |
3,078 | Sep 01, 2023 essayrewriteai.com <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SherlockAIDet1_th.png"border="0"> |
![]() |
Signal v7.33.0 Signal v7.33.0 Speak Freely Say "hello" to a different messaging experience. An unexpected focus on privacy, combined with all of the features you expect. Why use Signal? Explore below to see why Signal is a simple, powerful, and secure messenger Share Without Insecurity State-of-the-art end-to-end encryption (powered by the open source Signal Protocol) keeps your conversations secure. We can't read your messages or listen to your calls, and no one else can either. Privacy isn’t an optional mode — it’s just the way that Signal works. Every message, every call, every time. Say Anything Share text, voice messages, photos, videos, GIFs and files for free. Signal uses your phone's data connection so you can avoid SMS and MMS fees. Speak Freely Make crystal-clear voice and video calls to people who live across town, or across the ocean, with no long-distance charges. Make Privacy Stick Add a new layer of expression to your conversations with encrypted stickers. You can also create and share your own sticker packs. Get Together with Groups Group chats make it easy to stay connected to your family, friends, and coworkers. No ads. No trackers. No kidding. There are no ads, no affiliate marketers, and no creepy tracking in Signal. So focus on sharing the moments that matter with the people who matter to you. Free for Everyone Signal is an independent nonprofit. We're not tied to any major tech companies, and we can never be acquired by one either. Development is supported by grants and donations from people like you. "I use Signal every day." Edward Snowden Whistleblower and privacy advocate "I trust Signal because it’s well built, but more importantly, because of how it’s built: open source, peer reviewed, and funded entirely by grants and donations. A refreshing model for how critical services should be built." Jack Dorsey CEO of Twitter and Square "Signal is ... |
![]() |
6,522 | Nov 14, 2024 Signal <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Signal3_th.png"border="0"> |
![]() |
SilverSHield 6.0.20.120 SilverSHield 6.0.20.120 SilverSHielD, a tiny SSH and SFTP server for Windows. It features SSH2 password-based, interactive and public-key authentication methods and fully supports forwarding and sftp subsystem, along with state-of-the-art virtual folders management. Yet its management console makes it extremely easy to configure and deploy, both locally and remotely. This tiny award-winning software is built with ease-of-use and security in mind, please give it a try and if you just need a single-user/non-commercial version, then you can keep the Free edition forever, no expiration and free lifetime updates and upgrades. Whether your need is to backup your Cisco CallManager/UC or a PCI-compliant server to securely transfer any type of file, SilverSHielD is the solution you are looking for. Features: Secure Shell/Command (SSH2) Forwarding SFTP (supports files larger than 4 GB!) Compression (Zlib) Powerful script-based event handling subsystem, with support for 4 major scripting languages (NEW!) |
![]() |
8,964 | Aug 22, 2013 K2SXS |
![]() |
Simple Password Manager v1.0.4 Simple Password Manager v1.0.4 A free and open source program to safely store and manage your passwords locally. Simple Password Manager is a program that allows you to store and manage your passwords in a better way than with Notepad for Windows. You can create new passwords, edit existing ones, and delete passwords that you no longer need. How to use? To start using Simple Password Manager, launch the program by double-clicking on the icon and enter the default password which is: 1234. As is evident, you can change that password in the login window for a better security. • The main window will appear, displaying a list of all the passwords you have saved in the program. By default, you have a password called "Social Networks" and you can add data there. • To create a new password, first, go to the "Add a new password" tab and complete the text boxes. The criteria to create a password consists in giving a name to the password and at least one column. You can create as many columns as possible you want but I recommend you this order: "ID, User, Email, and Password". When you add the necessary data, press the button "Create the new password". Now, go back to the "Password Manager" tab and click on the "Select a password or create a new one" drop-down menu at the top of the main window. When you clicked that drop-down menu, you will see all your passwords that was created. • If you add data to an existing password, it's very important to click the "Save" button; on another hand, if you don't save the data recently added, all of them will be lost once you close the app. All the data ... |
![]() |
1,491 | Jul 05, 2023 Lextrack <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SimplePassMan1_th.png"border="0"> |
![]() |
Simple Porn Blocker v1.0 Simple Porn Blocker v1.0 Simple Porn Blocker is a very simple Windows OS software that can help you to quickly block all major porn\adult websites with a single mouse click. This program blocks 3000+ popular pornographic websites on any web browser, including Internet Explorer, Firefox, Chrome, Opera, etc. It is very useful for parents to prevent the childrens from visiting porn websites. The program can block porn websites because it modifies the \etc\hosts file (some security software may show you an alert dialog, just allow\exclude our program). Works on Windows XP, Vista, 7, 8, 8.1 and Windows 10 (32\64-bit). Program Key Features Easily Block 3000+ Popular Pornographic\Adult Websites Works on Any Web Browser (Internet Explorer, Firefox, Chrome, etc) Porn Sites are Blocked by Modifying the Windows \etc\hosts File The Program is Already Translated in 28 Languages If Needed You can Quickly Un-block Pornographic\Adult Websites Run it Directly from the USB with the Portable Version Works on Windows XP, Vista, 7, 8, 10 (32\64-bit) |
![]() |
6,139 | Jan 09, 2016 Site2unblock <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/Simple Porn Blocker1_th.png"border="0"> |
![]() |
Simple Software-restriction Policy v2.20 Simple Software-restriction Policy v2.20 A software policy makes a powerful addition to Microsoft Windows' malware protection. In particular, it is more effective against ransomware than traditional approaches to security. If you know about the Linux 'execute permission' bit then you'll understand what this is for. The mode of operation is somewhat different in that execute permission is granted to folders and subfolders rather than individual files, but the intention is the same, to stop undesirable or unknown software from launching unless you OK it. Additionally, it is possible to specify that certain executables (typically browsers and email clients) are run with reduced rights. This is a valuable damage-limitation measure against browser plugin vulns, etc. The protection can be turned off without a reboot whilst installing legitimate software, and will automatically reactivate after a specified time Click here to visit the author's website. |
![]() |
5,642 | Nov 15, 2019 IWR Consultancy <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SSrestriction Policy1_th.png"border="0"> |
![]() |
Slimjet v40.0.2.0 Slimjet v40.0.2.0 Fast web browser that automatically blocks ads and more. Tired of all the obtrusive ads that attempt to track everything you do online, irritates your eyes and wastes your time? Welcome to the ONLY browser that automatically blocks ALL ads. No plugins, opt-ins or configurations needed. Enjoy a clean and ad-free web at lightning fast speed. Maximum privacy protection Tired of being watched all the time by big companies like Facebook or Google no matter where you go? You can rest at ease here. Rebuilt from the open-source Chromium project, Slimjet doesn't send any usage data back to Google like Chrome. On top of that, Slimjet is armed with the most advanced anti-tracking technology to thwart various attempts to invade on your privacy (e.g., track your identity or profile your behavior) by the intrusive businesses. High performance blink engine Faster browser startup, faster page loading, highly responsive UI powered by industry-leading Blink engine. Unsurpassed level of integration Loaded with powerful features & flexible options, Slimjet does more for every user without relying on external plugins. Multiple layers of protection Automatic protection against phishing and malware, advanced privacy control options, robust sandboxed multi-process architecture. Major Features KILL ALL ADS WITH AD BLOCKER Fed up with all the annoying ads? Kill them all with the built-in ad blocker. Boost the performance of your browser by saving memory, CPU and bandwidth consumed by the ads. HI-SPEED DOWNLOAD MANAGER Slimjet comes with a turbocharged download manager which uses multiple connections in parallel to download files up to 12x faster. It also lets you resume a download job between browser sessions. INTELLIGENT FORM FILLER Smarter and more convenient than the basic password manager in Chrome. Save page url and login data in a form file which lets you open your favorite online account with a single click later on. YOUTUBE VIDEO DOWNLOADER Download any youtube videos to local hard disk ... |
![]() |
2,482 | Jul 14, 2023 FlashPeak Inc. <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Slimjet1_th.png"border="0"> |
![]() |
SlunkCrypt v1.3.2 SlunkCrypt v1.3.2 An experimental cross-platform cryptography library. SlunkCrypt is an experimental cross-platform cryptography library and command-line tool. A fully-featured GUI is provided for the Windows platform. Encryption algorithm The SlunkCrypt algorithm is based on core concepts of the well-known Enigma machine but with numerous improvements, largely inspired by R. Anderson’s “A Modern Rotor Machine”: The original Enigma machine had only three (or, in some models, four) rotors, plus a static “reflector” wheel. In SlunkCrypt, we uses 256 simulated rotors for an improved security. Furthermore, the original Enigma machine supported only 26 distinct symbols, i.e. the letters A to Z. In SlunkCrypt, we use 256 distinct symbols, i.e. the byte values 0x00 to 0xFF, which allows the encryption (and decryption) of arbitrary streams of bytes, rather than just plain text. Of course, SlunkCrypt can encrypt (and decrypt) text files as well. In the original Enigma machine, the signal passes through the rotors twice, once in forward direction and then again in backwards direction – thus the “reflector” wheel. This way, the Enigma’s encryption was made involutory, i.e. encryption and decryption were the same operation. While this was highly convenient, it also severely weakened the cryptographic strength of the Enigma machine, because the number of possible permutations was reduced drastically! This is one of the main reasons why the Enigma machine eventually was defeated. In SlunkCrypt, the signal passes through the simulated rotors just once, in order to maximize the number of possible permutations. This eliminates the most important known weakness of the Enigma machine. Obviously, in SlunkCrypt, separate “modes” for encryption and decryption need to be provided, since encryption and decryption no longer are the same operation. In the original Enigma machine, the rightmost rotor was moved, by one step, after every symbol. Meanwhile, all ... |
![]() |
1,965 | Nov 18, 2024 LoRd MuldeR <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SlunkCrypt1_th.png"border="0"> |
![]() |
Snipe-IT v5.3.0 Snipe-IT v5.3.0 A free, open source IT asset/license management system Snipe-IT is a free and open source asset/license management system with powerful built-in features. It is a web-based software, and must be run on a web server and accessed through a web browser. Snipe-IT is very user-friendly, and is ideal for IT operations: tracking who has which laptop, handling software licenses, accessories, etc. Features Powerful, user-friendly interface Industry-standard best security practices Powerful REST API Completely free and open source Changes: New in v5.3.0 Version 5.3.0 of Snipe-IT fixes some minor XSS security issues and includes some additions to the API, as well as some small bug-fixes. We're tagging this as v5.3.0 to encourage users to upgrade for the security improvements. (Yes, we know bumping it to a full minor version is not strictly adherent to semver, but we really want folks to upgrade.) ## Added - Added [#10062]: Added Support for Heroku Deployments [#10063] - Added [#9973] - add `use_default_eula` to category API endpoint [#10069] - Added [#9969] - added `color`, `show_in_nav`, and `default_label` to status label API [#10070] - Upgraded Docker to PHP 7.4 [#10080] - Added rewrite rule for Let's Encrypt certificates [#10082] - Bumped number per page up to 1000 - Added totals to depreciation report footer [#10115] - Add user permissions message if the user is not an admin or better - Added assigned components to assets API (pass `?components=true` to the assets endpoint) [#10124] - Force revalidation headers when user logs out [#10164] ## Fixed - Fixed [#10015] - Archived Assets Showing Under Locations/'Print All Assigned' Feature [#10079] - Check for valid category name on print view of "print all assigned assets" - Fixed issue where created_at date was not showing on uploads - Fixed issue where `show_in_nav` was null (instead of zero) if no value passed - Fixed extraneous asset search in depreciation report ... |
![]() |
2,590 | Oct 19, 2021 Grokability, Inc. <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Snipe-IT3_th.png"border="0"> |
![]() |
SnmpWalk (Shell Tool) v1.02 SnmpWalk (Shell Tool) v1.02 SNMP is a unified protocol of network monitoring and network device management. All active network devices support SNMP. Besides that, SNMP is supported by major operational systems and a large number of network applications. SnmpWalk allows you to detect a set of variables that are available for reading on an individual device. You can obtain a full list or just part. By analyzing the results of a network device scan obtained with SnmpWalk, you can develop a list of supported MIBs and, in this way, obtain full descriptions of variables and possible values. Besides that, MIB documents contain information about SNMP variables that are available only for writing. After analyzing information retrieved with SnmpWalk from hardware or software SNMP sources, you can use SnmpSet and SnmpGet tools to change and obtain values. The value of SnmpWalk is not limited to only the SNMP analysis of supported features. This tool can efficiently get SNMP tables and read whole sections of variables. This mainly refers to tables that are often used for presenting statistical and status information. SnmpWalk is a command-line tool, which makes possible its use in scripts. This tool supports modern IPv6 in addition to the standard IPv4. Moreover, SnmpWalk allows you to use a simple version of SNMPv1/SNMPv2c and also supports a safe version of SNMPv3. Features Supports SNMP v1/v2c and SNMPv3 Supports IPv4 and IPv6 Full or partial SNMP variables tree Exports to CSV file Command line interface (CLI) Any type of SNMP variables Various Auth. & Privacy protocols Windows XP-10 compatible Windows Server 2003-2016 compatible Parameters SnmpWalk.exe [-q] -r:host [-p:port] [-t:timeout] [-v:version] [-c:community] [-ei:engine_id] ... |
![]() |
4,927 | Dec 08, 2019 SNMP Software <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/snmpwalk1_th.png"border="0"> |
![]() |
SophiApp v1.0.97 SophiApp v1.0.97 A free, open-source app for fine-tuning Windows 10 and Windows 11. It offers a modern UI/UX, more than 130 unique tweaks, and shows how Windows can be configured without making any harm to the OS. System Requirements VersionMarketing nameBuildArchEditionsWindows 11 Insider Preview 23H22023 Update25206+Home/Pro/EnterpriseWindows 11 22H22022 Update22621+Home/Pro/EnterpriseWindows 11 21H222000.739+Home/Pro/EnterpriseWindows 10 22H22022 Update19045.2006+x64Home/Pro/EnterpriseWindows 10 21H2October 2021 Update19044.1706+x64Home/Pro/Enterprise/LTSC Core features Dynamic rendering UI—nothing is hardcoded; 👻 130+ tweaks; ⭐ SophiApp uses the MVVM pattern; Multithreading support; SophiApp is checked by the static analyzer, the license for which by courtesy of PVS-Studio; Big thanks to them for providing us the license. All builds are compiled in cloud via GitHub Actions You may compare a zip archive hash sum on the release page with the hash in cloud console in the Compress Files category to be sure that the archive wasn't spoofed (you have to be logged into you GitHub account to be able to view Actions logs); The app shows the actual state of every feature in the UI; Supports high resolutions; Has a built-in search engine; Functions can be found by searching by their headers and descriptions. GIF Supports dark & light themes; The app can change its' theme instantly when you change your default Windows theme mode for apps. GIF Set up Privacy & Telemetry; Turn off diagnostics tracking scheduled tasks; Set up UI & Personalization; Uninstall OneDrive "correctly"; Uninstall ... |
![]() |
2,633 | Sep 14, 2023 Sophia Community <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SophiApp1_th.png"border="0"> |
![]() |
Sophos Scan and Clean v1.0.1 Sophos Scan and Clean v1.0.1 Free Virus Removal with Sophos Scan and Clean Modern viruses and malware are designed to bypass standard defenses, as advanced threats effectively hide from both pre-installed security software and computer users. Antivirus programs, blacklists, and other security software that require prior threat knowledge are ineffective against detecting and removing advanced virus attacks. Sophos Scan and Clean is a free, no-install, second-opinion virus removal scanner designed to rescue computers that have become infected with advanced zero-day malware, spyware, Trojans, rootkits, and other threats capable of evading real-time protection from up-to-date antivirus software. It's a powerful virus removal tool capable of both detecting and removing deeply embedded persistent threats and other malware that traditional security solutions fail to detect. How to Use Sophos Scan and Clean As an on-demand scanner, Sophos Scan & Clean does not need to be installed in order to use it. It can be started directly from USB flash drives, portable SSD's, and other external drives or data storage devices, making it particularly useful in situations where malicious virus infection prevents downloading and installing new security software. Automatic Security Updates with Every Scan Sophos Scan and Clean removes viruses and threats while the OS is running and blocks re-infection by protecting registry keys and file locations. Plus, thanks to proprietary cloud technology, Sophos Scan and Clean is always up to date – no need to re-install to get updates each time the program is run. Proprietary Cloud-Assisted Miniport Hook Bypass technology allows Scan and Clean to defeat rootkit and bootkit hooks for any hard disk driver. Behavioral Scans automatically find and remove programs and binaries that look and act like malware; probing the system for characteristic reputation anomalies, origin and relation to memory, file and registry objects, structure anomalies, impersonation, tampering, visibility, activity, boot survivability and uninstallation abilities. This ... |
![]() |
1,483 | Jun 10, 2025 Sophos Ltd. <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SophosScanClean1_th.png"border="0"> |
![]() |
Sordum Random Password Generator v1.0 Sordum Random Password Generator v1.0 Your password is your metaphorical ‘key’ to unlocking you online ‘front door’. You wouldn’t hand your home key to just anyone, would you? Cybersecurity experts continually recommend to use of strong, unique passwords for several reasons , cyber-criminals compromise websites and online accounts, and post lists of usernames, email addresses, and passwords online. A criminal can look for other online shopping, social media or financial accounts for that same person. When the criminal finds those accounts they can try logging in with the exposed password. If the password is reused, they can gain access to further accounts. This is why unique passwords are so important. The use of strong passwords can slow or often defeat the various attack methods of compromising a terminal’s security. Passwords are the first line of defense against unwanted access to your accounts. The stronger a password, the better protected accounts. Your enemy isn’t some guy in a ski mask trying to guess your password one try at a time. It’s a program that automatically runs through massive databases of common passwords or random combinations of characters . Hackers use a technique called brute forcing. This is a technique where they try every possible character combination until the correct password is identified.The stronger the password the less likely brute forcing will be successful.To Create a Strong Password ; Choose a password that no one will easily guess , Do not share passwords , Make sure your password is long, Use at least one letter, number and special character in your password, Remember to update and vary passwords. How to use Sordum Random Password Generator. We have developed a free and portable software (Sordum Random Password Generator) to create random secure passwords. Download , Unzip it and run the “RandomPW.exe” file Sordum Random Password Generator has ... |
![]() |
4,973 | Nov 26, 2019 Sordum.org <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/sordumrandompassgenerator2_th.png"border="0"> |
![]() |
Spiceworks IT Desktop 7.5.00095 Spiceworks IT Desktop 7.5.00095 The only application that combines Network Inventory, Help Desk and more in a single, easy-to-use interface. Your network may be complicated and expensive but your IT management tools don't need to be. Spiceworks IT Desktop is the only application that combines Network Inventory, Help Desk, Reporting, a built-in TFTP Server, Monitoring, Active Directory Management, and Troubleshooting in a single, easy-to-use interface designed for IT teams in small and medium businesses. Plus, Spiceworks lets you collaborate with IT pros around the world to solve problems, share ideas and decide what additional features you need in Spiceworks. And, the best part -- it's free. Why? Because we think you shouldn't have to pay for technology to manage technology. Instead, you should spend your money on cool new hardware and software for your company. That's why top technology vendors help sponsor Spiceworks. Manage your network. Need a way to wrangle all your devices, software, cloud services, and even users? With network inventory and mapping, network monitoring and alerting, license management, troubleshooting, reporting, and much more, Spiceworks is the free IT management app with the tools you need to tackle your IT day. Run an IT help desk. User requests driving you nuts? Your current ticketing solution not quite cutting it? Spiceworks help desk software helps you run a ship-shape help desk, at the office and on the road. Manage user tickets, organize your work, create a custom user portal, and even launch a knowledge base… all for free! Monitor your network. Ever feel like your users are a step ahead of you? Meet Spiceworks Network Monitor — an easy-to-use, real-time interface that'll help you stay in-the-know about what's happening with your critical systems and catch problems long before your users do. Inventory all your hardware. From workstations and servers to routers and switches (even printers and phones) – ... |
![]() |
9,962 | Nov 15, 2019 Spiceworks <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Spiceworks IT Desktop_screenshot_th.png"border="0"> |
![]() |
SpywareBlaster v6.0 SpywareBlaster v6.0 Powerful protection against spyware, adware, browser hijackers and other potentially unwanted software. Why SpywareBlaster? Spyware, adware and browser hijackers are some of the most annoying and pervasive threats on the Internet today. By simply browsing a web page, you could find your computer to be the brand-new host of one of these unwanted fiends! The most important step you can take is to secure your system and SpywareBlaster is a powerful protection program. Multi-Angle Protection • Prevent the installation of ActiveX-based spyware and other potentially unwanted programs. • Block spying / tracking via cookies. • Restrict the actions of potentially unwanted or dangerous web sites. No-Nonsense Security SpywareBlaster can help keep your system secure, without interfering with the "good side" of the web. And unlike other programs, SpywareBlaster does not have to remain running in the background. It works alongside the programs you have to help secure your system. Click here to visit the author's website. |
![]() |
6,740 | Sep 10, 2024 Brightfort <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SpywareBlaster1_th.png"border="0"> |
![]() |
SSE Setup v8.7 SSE Setup v8.7 SSE SetupTM is a freeware Windows installation creator that is easy, full-featured and mature. Installers run on Windows 10 and all relevant Windows OS's (you choose which) Installs both 32-bit and 64-bit programs NOT some complicated scripting language! (unlike many other installers) Create a fully functional installer in minutes (NOT days!) Handles the most common things automatically Creates small, efficient .EXE's or .ZIP's, or burns to CD/DVD Non-Admin (Limited/Standard user) install support Upgrade and patch support for installed programs Integrated Internet Updater solution that can download & install needed updates Prerequisites checks to look for needed hardware / OS's / software Can download any required software (runtimes) your program needs For .NET installs, easy framework download if user needs For Access developers: Easy Access database deployment Built-in Language support for 12 of the world's most-used (multilanguage) Works well with UAC / Very "UAC Friendly" Customizable GUI and 7 presets to choose from Ability to digitally sign installer/uninstaller/your program's files Display license agreement that must be agreed to Install files & shortcuts; modify registry Automatic DLL/OCX registration or font installation if needed Full Unicode support Complete context-sensitive help a button away Automatic removal of everything installed during uninstall Run external programs during install/uninstall Show welcome screen or custom messages Play audio files Associate filetypes with your ... |
![]() |
5,341 | Nov 20, 2019 Chris Long <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SSE Setup1_th.png"border="0"> |
![]() |
Stirling-PDF v0.46.0 Stirling-PDF v0.46.0 Your free, locally hosted one-stop-shop for all your PDF needs. This is a powerful locally hosted web based PDF manipulation tool using docker that allows you to perform various operations on PDF files, such as splitting merging, converting, reorganizing, adding images, rotating, compressing, and more. This locally hosted web application started as a 100% ChatGPT-made application and has evolved to include a wide range of features to handle all your PDF needs. Stirling PDF makes no outbound calls for any record keeping or tracking. All files and PDFs exist either exclusively on the client side, reside in server memory only during task execution, or temporarily reside in a file solely for the execution of the task. Any file downloaded by the user will have been deleted from the server by that point. Powerful PDF Tools Stirling PDF provides you with powerful tools to manage your PDF files. Merge, split, or convert your PDF files with ease. Secure and Reliable Your files' security is our priority. Stirling PDF does not maintain any files, tracking or data. It operates fully on your local machine, ensuring privacy and control over your data. Personalized for you Stirling-PDF is designed with user-centricity in mind. The interface, App name and description is all customizable, letting you adjust the settings according to your preferences and needs. Changes v0.46.0 Some bug fixes in this release including Multi tool select buttons bug Footer fix in view-pdf Make file extension checks case-insensitive signed rotated document different the preview H2 datasource configuration in DatabaseService causing errors in certain usecases And a new feature! New 'unlock PDF Form' functionality to remove read-only locks from forms (Thanks to @MariaLaranjeira ) What's Changed Bug Fixes (Snyk) Fixed finding: "Improper Neutralization of CRLF Sequences in HTTP Headers" by @pixeebot ... |
![]() |
1,201 | May 06, 2025 Stirling-PDF, Inc. <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/StirlingPDF1_th.png"border="0"> |
![]() |
StopUpdates10 v4.6.2024 StopUpdates10 v4.6.2024 Take your Control over Windows updates with StopUpdates10 Free! StopUpdates10 has 2 modes: • Windows Updates 100% Bulleteproof Hard Block (with Double Protection). • Windows Updates Soft Block - Pause Updates until 11/18/2099 with ability update Windows Defender and Windows Store Apps. Features: • Stops Windows updates. • Stops forced upgrades. • Stops annoying upgrade notifications. • Restore updates with one-click. • Pauses updates. • Disables Windows 7-8 'End of support' and 'End of Service' notifications. Benefits: • Easy to disable and re-enable Windows updates. • StopUpdates10 does not delete files, does not change file rights or another destructive actions. • StopUpdates10 is lightweight. vStopUpdates10 is free of charge. What's the difference between 'stop updates' and 'pause updates'? • Stopping updates prevents downloading and installing any updates. • It blocks the Windows update service. • Pausing updates only block installing, not downloading, updates. • Microsoft allows you to pause updates for limited number of days and only once. • You can not pause updates again after resuming. StopUpdates10 removes limitations for pausing updates: • You can pause updates until up to 2099 year. • You can pause and resume updates as many times as you want. • You can set different pause date and time for Feature updates and for Quality updates. What's the difference between Feature updates and Quality updates? • Feature update is a new version of Windows. It is installed as an upgrade to the existing version with ... |
![]() |
4,454 | Jul 12, 2024 Greatis Software <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/StopUpdates10_th.png"border="0"> |
![]() |
StorURL v3.0.35.0 StorURL v3.0.35.0 A bookmark manager that helps you to store links to all of your favorite websites in one central repository. It works with the browsers installed on your system so you can open your links in any web browser you’d like from one central interface. Import your bookmarks from most major browsers, including Google Chrome, Mozilla Firefox, Internet Explorer and Opera. Open websites in any browser installed on your computer, directly from within StorURL. Store and sort sites in unlimited categories. Enable a floating toolbar that you can keep anywhere on your screen, for quick access to all your bookmarks. Generate HTML “home” pages containing links from one or all categories. Supported/Tested Operating Systems Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 Changes: 3.0.35.0 (Released: 2021-10-03) fixed bug where using the "Override system default browser" also overrode individual default browsers fixed bug where the Open URL button on the main toolbar ignored all specified browsers and launched the system default fixed mnemonic underlining in the Site Information panel fixed help browser so external links open in your system's default browser, instead of IE updated some documentation to be more clear about scanning URLs Prerequisites The following items are required for StorURL to run properly. .NET 3.5 TLS 1.2 support (Win 7 details) (broken links) .NET 3.5 TLS 1.2 support (Win7 32-bit) (direct download) .NET 3.5 TLS 1.2 support (Win7 64-bit) (direct download) .NET 3.5 TLS 1.2 support (Win8/10) .NET Framework Microsoft Visual C++ 2005 Service Pack 1 Redistributable Package MFC ... |
![]() |
5,520 | Oct 04, 2021 HazteK Software <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/StorURL1_th.png"border="0"> |
![]() |
Strong Passwords Need Entropy v19.0 Strong Passwords Need Entropy v19.0 A free password strength and survivability checker, and a strong password generator. Features: • 16 rules to be respected when it comes to password policy and security • Password properties • Search passwords in worst list (10,032 passwords) • 12 different modules: - Guid - Mac adress - Random - Serial - Prononceable - Morse code - Emoticons - Cryptocode - Leetspeak - Hexspeak - Complex words - Piece of poetry Tools: - WPA2 key generator - Password versus Password - Pick up your pseudo - Hash detector Changes: Version 19.0 - Update from 23rd of May 2024 • Real-time data binding. The ‘Enter’ key is no longer required (section: Your password) • Better layout of certain elements • Improvement of design (certains modules) • Adding hashes: SHA-384, SHA-512 • Optimisation of certain features • Module Hexpseak: more entropy • Module Morse: more entropy • WPA2-PSK. Generate multi-keys • Many new complex words added in the module dictionary • Many new pseudos added • Before: MaxLength password 64. Now: Maxlength password 99 (certains modules) • New function: Add to list • Correction of minors bugs Use 7-Zip to unzip this file. Click here to visit the author's website. |
![]() |
4,538 | May 27, 2024 ProtoSoftware <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SPNE1_th.png"border="0"> |
![]() |
Supermium v132.0 Supermium v132.0 An up-to-date Chromium-based web browser compatible with Windows XP, 2003, Vista, 7, 8.x, and newer. Supermium is a drop-in replacement for Google Chrome with privacy and usability enhancements, optimized for legacy and modern Windows systems alike. It aims to restore classic Chrome features, as well as to ensure that compatibility with legacy Windows is preserved. Features: • Aero Glass and Aero Glass-style titlebars instead of Windows 10-style ones (#force-xp-theme in chrome://flags for the latter) • Turnaround for major vulnerability patches generally less than one week from upstream disclosure • A functional sandbox for enhanced security • Google Sync • On Windows 7 and up, Widevine CDM support for viewing DRM content • GDI font rendering, using #force-gdi in chrome://flags • Persistent dark mode on the browser's UI elements, using #force-dark-mode in chrome://flags • Custom tab options including trapezoidal tabs, transparent tabs, and outlined tabs • Many flags from ungoogled-chromium • Support for SSE2-only processors in the 32-bit build System Requirements: • Windows XP SP1 or later or Windows Server 2003 SP1 or later • An Intel Pentium 4 processor or later that's SSE2 capable. Hyper-threading or dual-core recommended. • A minimum of 768 MB of RAM. 2 GB or greater is recommended for a smooth browsing experience. Supports your ... |
![]() |
96 | Jun 08, 2025 Shane Fournier <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/supermium_th.png"border="0"> |
![]() |
SuperMSConfig v1.4.0 SuperMSConfig v1.4.0 MSConfig of our dreams... An advanced and fully automated alternative to the traditional MSConfig tool. We all know MSConfig, the tool that helps you manage some system settings. SuperMSConfig takes things a step further by automating many of these tasks Built specifically for Windows 11, it not only enhances system configuration but also customizes your system right after installation by revisiting the Out-of-Box Experience (OOBE), ensuring your Windows setup starts off perfectly. What Does SuperMSConfig Do? While MSConfig traditionally allows you to manage startup settings and system drivers, SuperMSConfig goes much further: • Reconfigures Windows 11 OOBE: SuperMSConfig revisits the out-of-box setup, letting you fine-tune the Windows 11 post-installation experience. Whether it’s disabling intrusive features or optimizing services, it provides full control over how your system behaves immediately after setup. • Automates MSConfig: It streamlines and automates MSConfig tasks, eliminating the hassle of manual configuration. SuperMSConfig scans your system to detect unnecessary startup apps, services, and system tweaks—cleaning up what slows down your PC. • Comprehensive System Checker: It checks for Windows 11’s bad habits—unwanted services, sneaky startup programs, intrusive browser settings, system configurations, unwanted updates, security settings, ads, and much more. How SuperMSConfig Enhances Windows 11’s OOBE Unlike the default Windows 11 setup, which can leave unnecessary features enabled by default, SuperMSConfig revisits the Out-of-Box Experience after installation, giving you control over: • Disabling annoying ads and unwanted telemetry • Tweaking system settings for better performance and privacy • Optimizing configurations that Windows leaves on by default, improving your user experience right from the start How to Use 1) Open SuperMSConfig. 2) Click "Check" to start scanning your system for bad habits. 3) Review the issues ... |
![]() |
338 | Oct 04, 2024 Builtbybel <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SupMSConf1_th.png"border="0"> |
![]() |
Sylpheed v3.7 Sylpheed v3.7 Sylpheed is a simple, lightweight but featureful, and easy-to-use e-mail client. Sylpheed provides intuitive user-interface. Sylpheed is also designed for keyboard-oriented operation, so Sylpheed can be widely used from beginners to power users. Sylpheed is a free software distributed under the GNU GPL (the library part is GNU LGPL). You can freely use, modify and redistribute it under the license. Simple, beautiful, and well-polished user interface Comfortable operationality which is built in detail Well-organized, easy-to-understand configuration Lightweight operation High reliability with one-mail-corresponding-to-one-file format Extensibility by plug-in faculty Powerful filtering and search Junk mail control Security features (GnuPG, SSL/TLSv1) Various protocols support Internationalization and Multilingualization support High-level Japanese processing Flexible cooperation with external commands Changes since Sylpheed 3.6 The function to export the address book to CSV files was added. 'Nick Name' column was added to the address book. Context menu was added to the search result of the query search dialog. When attaching UTF-16 text files, they are automatically converted into UTF-8 now. Show original From on the summary view if the display-name seems to be an e-mail address. The bug that wrong reply target could be selected when the summary was sorted by the unread flag (#286). Win32: the bug that Japanese characters were overlapped on printings with some font settings was fixed. Win32: the bug that empty lines were not properly spaced on printings with some font settings was fixed. Win32: OpenSSL ... |
![]() |
8,451 | May 05, 2019 Sylpheed <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/sylpheed_th.png"border="0"> |
![]() |
TakeStock v2.0 R75 TakeStock v2.0 R75 The world’s most popular completely free full-featured personal investment management software for Windows. TakeStock 2 is a from-the-ground-up rewrite of the original version first released in 2002, and is used by thousands of independent and professional investors worldwide to help make better informed investment decisions. TakeStock 2 lets you: • Check the performance of your stocks, ETFs and mutual funds. • Track dividends, capital gain distributions, margin equity and cash flow. • View a security’s price chart, find historical prices and read company information. • Get price quotes (usually delayed by 15 minutes). • Be alerted when a security’s target buy or sell price is reached. • Easily identify short and long term gains for tax reporting purposes. But that’s just scratching the surface! With TakeStock 2, your financial data remains on your computer — where it belongs — and not at a website whose security could be compromised. The portable version of TakeStock 2 even runs entirely off a USB stick, allowing you to use TakeStock 2 on different computers without leaving any data on those devices. TakeStock 2 is 100% free, displays no advertising or nag screens, and doesn’t require registration of any kind. Changes v2.0 Release 75, published 25 Mar 2025 Bug fixes: Issue #264, Reported 2024.10.12 by Ravi Bhavnani A folder’s Transactions tab always displays zero in the Cash Balance column. Issue #275, Reported 2024.11.21 by NB Suggestion: Provide the ability to print to an HTML file. ... |
![]() |
5,810 | Mar 31, 2025 Ravi Bhavnani <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/takestock1_th.png"border="0"> |
![]() |
Tasktile v0.1.5 Tasktile v0.1.5 A free, open source task tracker for macOS that works from the menu bar. Track tasks with a tiled Activity Graph that visually represents task completion for each day of the month. Supported operating systems: macOS 14.0 and above. Installation: 1) Download the .zip file below. 2) Unzip the file. 3) Drag and drop Tasktile.app into your Applications folder. 4) The installation requires an extra step which is to confirm the download through Settings -> Privacy and Security and click Open Anyway. Click here to visit the author's website. |
![]() |
43 | May 30, 2025 wolteh <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/TaskTile_th.png"border="0"> |
![]() |
TeamViewer v15.5.6 TeamViewer v15.5.6 Desktop sharing has never been easier: With TeamViewer you will be able to connect to the desktop of a partner anywhere on the Internet. TeamViewer also works in the other direction: Show your own desktop to a partner over the Internet and illustrate your own developed software, presentations or solutions. Remote Control without Installation With TeamViewer you can remotely control any PC anywhere on the Internet. No installation is required, just run the application on both sides and connect - even through tight firewalls. Remote Presentation of Products, Solutions and Services The second TeamViewer mode allows you to present your desktop to a partner. Show your demos, products and presentations over the Internet within seconds - live from your screen. NOTE: Free for non-commercial use only. Features: Remote Control without Installation: With TeamViewer you can remotely control any PC anywhere on the Internet. No installation is required, just run the application on both sides and connect - even through tight firewalls. Remote Presentation of Products, Solutions and Services: The second TeamViewer mode allows you to present your desktop to a partner. Show your demos, products and presentations over the Internet within seconds - live from your screen. File Transfer: TeamViewer comes with integrated file transfer that allows you to copy files and folders from and to a remote partner - which also works behind firewalls Works behind Firewalls: The major difficulties in using remote control software are firewalls and blocked ports, as well as NAT routing for local IP addresses. If you use TeamViewer you don't have to worry about firewalls: TeamViewer will find a route to your partner. Highest Security Standard: TeamViewer is a very secure solution. The commercial TeamViewer versions feature completely secure data channels with key exchange and RC4 session encoding, the same security standard used by https/SSL. High Performance: Optimized for connections over LANs AND the Internet, TeamViewer features automatic bandwidth-based quality selection for optimized ... |
![]() |
9,825 | May 21, 2020 TeamViewer GmbH <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/TeamViewer1_th.png"border="0"> |
![]() |
Teeworlds v0.7.5 Teeworlds v0.7.5 A free online multiplayer platformer game, available for all major operating systems. Battle with up to 16 players in a variety of game modes, including Team Deathmatch and Capture The Flag. You can even design your own maps! Changes: v0.7.5 2020-04-19 Server + Fix laser bounce delay when server runs for a very long time + Rename tune_dump to tunes Client + Improve client loading + Add an option to turn off whispers + Server browser - store password of favorites - improve looks of the friends tab - quick search now also matches gametypes - some fixes + Chat commands - add autocompletion hint - add descriptions to server-side commands - remove the chat command limit - some fixes + Sliders - logarithmic scales - move to mouse position on click - some fixes + Fix statboard not closing with Escape + Fix double binds + Fix the warmup overlapping with MOTD/scoreboards + Fix spectator HUD not rendering in some cases + A fix to the menus music + A fix to double binds + Some fixes to the demo player + Rename dump_binds to binds OS X + Fix accent menu showing up ingame Graphics + A fix to jungle_background + A fix to jungle_midground Editor + Add automapper for jungle_deathtiles + Add mapres preview + Show current quad when pressing space in editor + Fix a crash Security + Patch a server vulnerability that exposed all 0.7 servers to crashes Maps + Some minor bugfixes to ctf5 and dm7 This download is for the Windows 64bit version. All other download assets are below: Windows: teeworlds-0.7.5-win32.zip MacOS: teeworlds-0.7.5-osx.dmg Linux: teeworlds-0.7.5-linux_x86_64.tar.gz teeworlds-0.7.5-linux_x86.tar.gz Click here to visit the author's website. |
![]() |
9,045 | Dec 05, 2021 Magnus Auvinen <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Teeworlds1_th.png"border="0"> |
![]() |
Telegram Desktop v5.13.1 Telegram Desktop v5.13.1 A new era of messaging. Telegram is a messaging app with a focus on speed and security, it’s super-fast, simple and free. You can use Telegram on all your devices at the same time — your messages sync seamlessly across any number of your phones, tablets or computers. With Telegram, you can send messages, photos, videos and files of any type (doc, zip, mp3, etc), as well as create groups for up to 100,000 people or channels for broadcasting to unlimited audiences. You can write to your phone contacts and find people by their usernames. As a result, Telegram is like SMS and email combined — and can take care of all your personal or business messaging needs. In addition to this, we support end-to-end encrypted voice calls. Who is Telegram for? Telegram is for everyone who wants fast and reliable messaging and calls. Business users and small teams may like the large groups, usernames, desktop apps and powerful file sharing options. Since Telegram groups can have up to 100,000 members, we support replies, mentions and hashtags that help maintain order and keep communication in large communities efficient. You can appoint admins with advanced tools to help these communities prosper in peace. Public groups can be joined by anyone and are powerful platforms for discussions and collecting feedback. In case you're more into pictures, Telegram has animated gif search, a state of the art photo editor, and an open sticker platform (find some cool stickers here or here). What‘s more, there is no need to worry about disk space on your device. With Telegram’s cloud support and cache management options, Telegram can take up nearly zero space on your phone. Those looking for extra privacy should check out our advanced settings and rather revolutionary policy. And if you want secrecy, try our device-specific Secret ... |
![]() |
9,014 | Apr 15, 2025 telegram.org <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Telegram Desktop1_th.png"border="0"> |
![]() |
The Classic Browser v8.0 The Classic Browser v8.0 “Designed to serve YOU not corporations!” Browser Features ● Stop Press! New fantastic feature built into the browser... The Classic Browser’s new “Internet TV & Radio Menu” is the world’s most comprehensive IPTV software ever developed for any platform, offering hundreds of worldwide streaming entertainment channels to enjoy via a user-friendly interface. Access needs no subscription, no membership, no money, no special hardware, no DRMs, and no external media player even; just click on any of the hundreds of channel logos on offer to instantly enjoy directly in a browser tab RIGHT NOW, with no ifs and no buts! We have swept all the technical obstacles away to bring everyone instant FREE Internet streaming entertainment; in top quality 1080p or 720p graphics, so here is at least ONE good reason why the Classic Browser is a MUST HAVE app on all your Windows desktops, laptops, and tablets! So whether you’re at home, at the office, or stuck at some airport thousands of miles away... you can always count on the Classic Browser delivering instant free streaming entertainment to you once connected to the Internet. ● The Hallmark of the Classic browser: The Internet is all about the websites YOU like to visit often so bookmarks to these sites are THE most important aspect of a browser. You'd be lost without your bookmarks, which is why we designed the Classic browser to accentuate YOUR favorites as they should be! Simultaneously it's important to compare this with what is NOT important about the Internet such as what Google thinks, what Microsoft has on offer, and what other corporations may be doing because the truth is... we don't care! So using this browser essentially means that YOUR needs are elevated to the highest possible level while dominant corporations are demoted to an almost nonexistent status where they belong! While using the ... |
![]() |
5,927 | Mar 01, 2022 theclassictools.com <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/The Classic Browser1_th.png"border="0"> |
![]() |
TightVNC v2.8.63 TightVNC v2.8.63 A free remote control software package. With TightVNC, you can see the desktop of a remote machine and control it with your local mouse and keyboard, just like you would do it sitting in the front of that computer. TightVNC is: free for both personal and commercial usage, with full source code available, useful in administration, tech support, education, and for many other purposes, cross-platform, available for Windows and Unix, with Java client included, compatible with standard VNC software, conforming to RFB protocol specifications. With TightVNC, you can: cut your expenses and save your time on traveling, help your friends and family to solve problems with their computers remotely, make sure nothing wrong is happening on your computers when you are away. Configuration window, Administration tab. As you can set administrative password to protect TightVNC Server from being re-configured or shut down by any user. It is recommended that you set such a password for the service. This window demonstrates improvements in the user interface. The window documents itself, remembers past connections and provides an option to attach viewers in view-only mode. Changes: TightVNC 2.8.63 Server for Windows: Improved techniques of fast screen grabbing enabled in Windows 8 and later versions of Windows. Server for Windows: Improved stability of sharing RDP sessions. Server for Windows: Fixed encoding of color cursors, which worked incorrectly for certain cursor formats and shapes. Server for Windows: Fixed erroneous generation of extra character in Greek keyboard layout. Viewer for Windows: Fixed a security problem which could allow a specially crafted "evil" server execute code on the viewer machine. Technically, the ... |
![]() |
5,941 | Mar 02, 2022 TightVNC Software <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/tightvnc_th.png"border="0"> |
![]() |
Tom's AD Password Extender 2.0.0.0 Tom's AD Password Extender 2.0.0.0 Tom's AD Password Extender is a free Windows utility that allows you to select a user account and extend the password expiration date by the amount of days specified in your Group Policy. This is often helpful when you have end-users who are travelling and can’t log into the VPN or other Active Directory authenticated system. By extending the expiration you ensure that accounts don’t get compromised from having to communicate the password across insecure channels. Have you ever gotten the call from the Road Warrior or frequent business traveler saying: “I am on the road and I can’t log into the VPN”? It is a common problem and happens frequently because end-users forget to change their passwords before they leave for that stressful trip. So, what do we do? In some cases we break security protocols by asking them for their password and set the password to be the same. In other cases we set a new password, but now the cached laptop password is different from their domain or VPN password causing confusion. In either case we might have compromised the account as others might have overheard the conversation. In some cases, we even say they are out of luck until they return to the office temporarily preventing them from working and as a result greatly reduces business productivity. This is where Tom’s AD Password Extender can help. Simply pull up their account using the intuitive user interface, highlight, and select Extend Password. Requirements: Microsoft .NET Framework 4.5.2 (MD5: DC5D6A9FA8D2874A67E1491BAACE830A ) |
![]() |
5,507 | Aug 06, 2024 Tom Andreas Mannerud <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Toms-AD-Password-Extender_th.png"border="0"> |
![]() |
Tree Notebook v1.1.0 Tree Notebook v1.1.0 Tree Notebook is a hierarchical notes manager designed for keeping personal information. The notebook consists of two parts: the public part can be accessed without password, the private part is encrypted, it requires entering a password in order to be opened and used. Tree Notebook comes as two applications: the desktop one for OS Windows, and the mobile one for iOS (iPhone and iPad devices). The data can be synchronized between the Windows computer and up to three iOS devices via a local Wi-Fi network. No access to Internet is needed for synchronizing. Tree Notebook keeps a tree-like multilevel hierarchy of folders and notes. Any folder can include notes and other folders, and so fourth. Any item (a note or a folder) can include text of any size. Besides, items can keep attachments like images or other files. Tree Notebook has useful navigation tools: three separate panes for the entire tree, the current folder in the tree, the current item in the folder, status line indicating the current position in the tree, the lists of History and Favorites which alleviate getting back to the items recently or frequently visited. Both Windows and iOS apps support quick global search (simplified or conditional) and also local search inside an item text. The information in Tree Notebook can be attributed in many ways by using various font types, colored flags, graphic icons. The items can be sorted out by several criteria: alphabetically, by creation or modification time, and even by hand (in manually defined order). Among others, Tree Notebook includes a calendar feature. Any item can have an Event attribute and serve as an alarm clock or reminder. The Windows Tree Notebook application can import data from OneNote and Evernote. It can also export the information to the Evernote and simple RTF formats. The Windows app has the context ... |
![]() |
5,157 | Oct 24, 2019 Lena Pankratova <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Tree Notebook1_th.png"border="0"> |
![]() |
TreeNoote v1.6 TreeNoote v1.6 A free, hierarchically organized note taking application. Full-Text Search Simply start typing in the search area. Immediately the records found are displayed in the treeview, with a count of the cards found at the bottom left. Backup For even greater security, TreeNoote can save your data each time the software is launched, store them where you want and keep the number of backups you want. And of course you can choose to restore your backed up data at any time! Password Protection You can choose to protect the use of TreeNoote with a password ... and ask that TreeNoote ask for it again after a period of inactivity. Advanced Content Place images, photos, rich text and links in yours notes. Synchronized or Not... With Treenoote, you choose the place where your notes are stored. On your computer, on a USB key or in a folder synchronized in the cloud ... It's up to you. PDF Export your notes in PDF format. Print Print function with preview, page selection, color or black and white mode, printer selection ... Portable App TreeNoote for Windows does not use an installer. All the files required to run the application reside in a single folder. If you move the folder, the application will always work the same way. For example, place it on a USB key, and you can use it from one computer to another. TreeNoote leaves no footprints on the PCs on which you run it. Rich Text Editor Integrated rich text editor: choice of font, bold, italic, highlighted, alignment, bullets, line, insertion of time and date ... Windows 10 32/64 bit Windows 8 32/64 bit Windows 7 32/64 bit Version 1.6 (May 9, 2021) Added: • Word wrap according to the width of the editor window. • Access button to the data storage folder. • Automatic data backup option when launching TreeNoote, with choice of storage path and number of copies to keep. • Access button to the ... |
![]() |
2,704 | May 17, 2021 TreeNoote <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/TreeNote1_th.png"border="0"> |
![]() |
Trend Micro Rescue Disk 3.0.0.1023 Trend Micro Rescue Disk 3.0.0.1023 Trend Micro Rescue Disk allows you to use a CD, DVD, or USB drive to examine your computer without launching Microsoft Windows. It finds and removes persistent or difficult-to-clean security threats that can lurk deep within your operating system. Rescue Disk does not need to load potentially-infected system files into memory before trying to remove them. It can scan hidden files, system drivers, and the Master Boot Record (MBR) of your computer’s hard drive without disturbing the operating system. Getting Started Click Download to begin. If prompted, click Save or Save As, and save the file on your computer’s desktop. While the installer downloads, prepare one of the following: Blank CD or DVD (do not use a rewritable disc) Empty USB Drive (128MB or larger) NOTE: The drive will be reformatted before creating Rescue Disk, and anything already on the USB drive will be lost. Please back up any important files before using a USB drive for Trend Micro Rescue Disk. When you have finished downloading the file, double-click the Trend Micro Rescue Disk icon to start the installer. To launch your computer from a CD or DVD, you must set the BIOS to boot from a different device. While the exact procedure differs from computer to computer, the overall process is usually like this: Insert the disc or USB drive into the computer. Restart the computer. When the computer powers up again, look for a BIOS setup message, which often looks like “Press [KEY] to run ... |
![]() |
7,186 | Nov 13, 2019 Trend Micro Incorporated <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/Trend Micro Rescue Disk type of device_th.png"border="0"> |
![]() |
Trojan.Kotver Removal Tool 32bit 2.4.0.1 Trojan.Kotver Removal Tool 32bit 2.4.0.1 This tool removes Trojan.Kotver infections. Trojan.Kotver is a Trojan horse that performs click-fraud operations on the compromised computer. Discovered: September 23, 2015 Type: Removal Information This tool is designed to remove the infection of Trojan.Kotver. How to download and run the tool Important: Selecting "Run as administrator" will result in an incomplete repair. You must be logged in to the Administrator account and all other users must be logged out in order for the tool to work correctly. There are two versions of this tool, one designed to run on 32-bit computers and one designed to run on 64-bit computers. To find out if your computer is running a 32-bit or 64-bit version of Windows, please read the following Microsoft Knowledge Base article: How to determine whether a computer is running a 32-bit version or 64-bit version of the Windows operating system Note for network administrators: If you are running MS Exchange 2000 Server, we recommend that you exclude the M drive from the scan by running the tool from a command line, with the Exclude switch. For more information, read the Microsoft Knowledge Base article: Issues caused by a back up or a scan of the Exchange 2000 M drive Follow these steps to download and run the tool: Download FixToolKotver64.exe for 64-bit computers and FixToolKotver32.exe for 32-bit computers. Save the file to a convenient location, such as your Windows desktop. If you are sure that you are downloading this tool from the Security Response website, you can skip this step. If you are not sure, or are a network administrator and need to authenticate the files before deployment, follow the steps in the Digital Signature section before proceeding ... |
![]() |
5,916 | Nov 13, 2019 Symantec <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/KovterRemovalTool1_th.png"border="0"> |
![]() |
Trojan.Kotver Removal Tool 64bit 2.4.0.1 Trojan.Kotver Removal Tool 64bit 2.4.0.1 This tool removes Trojan.Kotver infections. Trojan.Kotver is a Trojan horse that performs click-fraud operations on the compromised computer. Discovered: September 23, 2015 Type: Removal Information This tool is designed to remove the infection of Trojan.Kotver. How to download and run the tool Important: Selecting "Run as administrator" will result in an incomplete repair. You must be logged in to the Administrator account and all other users must be logged out in order for the tool to work correctly. There are two versions of this tool, one designed to run on 32-bit computers and one designed to run on 64-bit computers. To find out if your computer is running a 32-bit or 64-bit version of Windows, please read the following Microsoft Knowledge Base article: How to determine whether a computer is running a 32-bit version or 64-bit version of the Windows operating system Note for network administrators: If you are running MS Exchange 2000 Server, we recommend that you exclude the M drive from the scan by running the tool from a command line, with the Exclude switch. For more information, read the Microsoft Knowledge Base article: Issues caused by a back up or a scan of the Exchange 2000 M drive Follow these steps to download and run the tool: Download FixToolKotver64.exe for 64-bit computers and FixToolKotver32.exe for 32-bit computers. Save the file to a convenient location, such as your Windows desktop. If you are sure that you are downloading this tool from the Security Response website, you can skip this step. If you are not sure, or are a network administrator and need to authenticate the files before deployment, follow the steps in the Digital Signature section before proceeding ... |
![]() |
6,224 | Nov 13, 2019 Symantec <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/KovterRemovalTool1_th.png"border="0"> |
![]() |
TrustViewer v2.5.1 TrustViewer v2.5.1 TrustViewer is a complete solution for remote access and users support via the Internet. Just download the full version of TrustViewer smaller than 2 MB, and immediately get to work, without installation and registration, without limitations, for free for home and commercial use! Quick start Download the full version of TrustViewer, run it (enough minimal user rights) and immediately start working, without the need for installation and additional configuration. Free forever TrustViewer is completely free software, without registration and without restrictions, both for home and for commercial use! Easy connection To connect to a remote computer - it is enough to specify a unique twelve-digit ID for each session, and the connection will be immediately established, without problems with NAT or Proxy. Multifunctionality Control the desktop of the remote computer, exchange files, make voice and video calls, or just chat, and all in one convenient application. Complete anonymity TrustViewer does not require authorization or input of other personal data, and our servers do not store an IP address or other information identifying your computer. Absolute safety Do not worry about the safety of your computer, because due to architectural features, TrustViewer is not able in principle to provide unauthorized access to it. Your own server The computers of participants in priority directly connected, forming a protected p2p-tunnel based on modern cryptoprotocols. Internet servers are used only for coordination, as well as in cases when direct connection is impossible. However, you can install on your server a free dedicated proxy server "TrustServer", and get 100% - independence and control over traffic, incl. in private networks without access to the Internet. Your own client The built-in wizard will help you to create the original TrustViewer portable client with your branding (logo, contact information, etc.), with the ability to integrate into your own products and solutions (including commercial ones), with which you can free, quickly and it is ... |
![]() |
5,559 | Dec 28, 2020 TrustViewer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/TrustViewer1_th.png"border="0"> |
OlderGeeks.com Copyright (c) 2025