Your download link is at the very bottom of the page... always.



Processed through Paypal
No account required.


Donate Bitcoin to this wallet:
1KkUMXvQ2ko3xcJkzitB7WYgoW6m79WFfm
Donate Ethereum to this wallet:
0x40E56922F43637224935CDC35e2c96E0392A8505
Donate Litecoin to this wallet:
LLYAFEyqjH69gkyCEpRjXNyedRCWrVChfL

Buy our over-priced crap to help keep things running.
Take No CrapwareOG Dad CapNo Password


Join our Facebook groupFollow us on TwitterFollow us on InstagramOur RSS FeedJoin us on TikTokJoin us on LinkedIn


 Home » OlderGeeks.com Freeware Downloads » Searching Files   
Search
Search Terms
Search Category Leave category selection blank to search within all categories.
Search Results
Files
  File Name Rating Downloads
Last Update/Developer
HiJackThis+ v3.1.0.2
HiJackThis+ v3.1.0.2 The resurrection of one of our favorite virus/malware removal tools of all time! HiJackThis+ (Plus) (previously called: HiJackThis Fork v3) is a fork and a continuation of the original Trend Micro HiJackThis by Merijn Bellekom development, once a well-known tool. HiJackThis+ is a free utility for Microsoft Windows that scans your computer for settings changed by adware, spyware, malware and other unwanted programs. The difference from classical antiviruses is the ability to function without constant database updates, because HiJackThis+ primarily detects hijacking methods rather than comparing items against a pre-built database. This allows it to detect new or previously unknown malware - but it also makes no distinction between safe and unsafe items. Users are expected to research all scanned items manually, and only remove items from their PC when absolutely appropriate. Therefore, FALSE POSITIVES ARE LIKELY. If you are ever unsure, you should consult with a knowledgeable expert BEFORE deleting anything. HiJackThis+ is not a replacement of a classical antivirus. It doesn't provide a real-time protection, because it is a passive scanner only. Consider it as an addition. However, you can use it in form of boot-up automatic scanner in the following way: • Run the scanning • Add all items in the ignore-list • Set up boot-up scan in menu "File" - "Settings" - "Add HiJackThis to startup" • Next time when user logged in, HiJackThis will silently scan your OS and display UI if only new records in your system has been found. Features • Lists non-default settings in the registry, hard drive and memory related to autostart • Generates organized, easily readable reports • Does not use a database of specific malware, adware, etc • ...
5/5 1,979 Jul 14, 2023
Alex Dragokas <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/HiJackThisFork2_th.png"border="0">
Hiren’s BootCD 15.1 (Classic)
Hiren’s BootCD 15.1 (Classic) All in One Bootable CD which has all these utilities Antivirus Tools Avira AntiVir Personal (07-12-2011): Free anti-virus and anti-spyware on-demand scanner, detects and removes more than 50000 viruses and trojans (Windows Freeware). ClamWin Free Antivirus 0.97.3 (07-12-2011): A free antivirus, GNU GPL Open Source Virus Scanner (Windows Freeware). ComboFix (07-12-2011): Designed to cleanup malware infections and restore settings modified by malware (Windows Freeware). Dr.Web CureIt! Antivirus: A free standalone anti-virus and anti-spyware on-demand scanner (downloadable) (Windows Freeware). GMER 1.0.15: Hidden services, hidden registry, hidden file scanner, Rootkit Detector and Remover (Windows Freeware). Malwarebytes Anti-Malware 1.51.1 (07-12-2011): Anti-malware application that can thoroughly remove even the most advanced malware (Windows Freeware). Remove Fake Antivirus 1.82: A tool to remove virus/malware which disguises itself to be an antivirus and produces fake alert/warnings and urge you to purchase a useless copy of the fake antivirus (Windows Freeware). RootkitRevealer 1.7.1: Rootkit Revealer is an advanced patent-pending root kit detection utility (Windows Freeware). Spybot: Search &amp; Destroy 1.6.2 (07-12-2011): Application to scan for spyware, adware, hijackers and other malicious software (Windows Freeware). SuperAntispyware 5.0.1134 (07-12-2011): Remove Adware, Malware, Parasites, Rootkits, Spyware, Trojan, and Worms (a must have tool) (Windows Freeware). TDSSKiller 2.6.21.0: To remove malware belonging to the family Rootkit.Win32.TDSS aka Tidserv, TDSServ and Alureon (Windows Freeware). Backup Tools CloneDisk 1.9.6: All in one tool for MBR, Partition, Disk, VMWare Disk images vmdk/vmx/vhd, and much more (Windows Freeware). COPYR.DMA Build013: A Tool for making copies of hard disks with bad sectors (Dos Freeware). CopyWipe 1.14: Copy old hard drive to a ...
5/5 13,667 Mar 14, 2019
Hirems <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/hirensbootcd_th.png"border="0">
Homedale v2.09
Homedale v2.09 Wi-Fi / WLAN Monitor With Homedale you can scan for Wi-Fi / WLAN Access Points and monitor their signal strength. The details windows shows all ‘Information elements’ and their decoded data. Use the detected access points with Google Geolocation, Mozilla Location Service and Open WLAN Map Service to locate yourself. It works with 802.11a/b/g/n/ac wireless networks in the 2.4 GHz and 5 GHz frequency bands using 20, 40, 80 and 160 MHz width channels. Details See an overview of all available access points with their signal strength, security [WEP/WPA/WPA2], network name (SSID), BSSID, vendor based on MAC address, channel, supported data rates and much more. Details from information elements (IE) advertised by the access points are parsed and shown. Signal Strength You can also monitor the signal strength of selected access points in a graph over the time. With a right mouse click, you can start logging to a text file and create a screenshot. Frequency Usage See the usage of all Wi-Fi channels and find the optimal channel for your access point. Connect Make a right mouse click to connect and disconnect from a Wi-Fi / WLAN access point. The blue icon shows the currently connected access point. Changes: Windows Version 2.09 1-4-24 New: Grouping by MAC addresses added, oui.txt loading working again and 28 + 36 bit support for oui.txt added History macOS Version 1.17 1-3-24 New: Crash prevented History Supported Languages: English French German Greek Norwegian Polish Portuguese Russian Simplified Chinese Slovenian Swedish Traditional Chinese Ukrainian Command line options: /n <0/1/2> 0: Do not use ndis [default for >=Vista], 1: Use ndis [default for <=XP], 2: Use ndis exclusively /r <x> Refresh after x milli seconds /s <ssid1,…> Log only specified ssid's /m <12-34-56-78-90-ab,…> Log only specified bssid's /l <file name> Enable logging to specified file name /d Append to existing log file instead of deleting it first /e Log all access points /c Use , for log file instead of tab /f <filter> Filter access points for display ...
5/5 4,097 Jan 07, 2024
The SZ Development <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Homedale3_th.png"border="0">
HopToDesk v1.41.6
WARNING: If someone called who you don't know or if you dialed a number that popped up on your screen and someone sent you here to download this program... YOU ARE BEING SCAMMED. HANG UP IMMEDIATELY! HopToDesk v1.41.6 Remote Desktop Software. Free for personal and commercial use. What is HopToDesk and what makes it unique? HopToDesk is a free remote desktop tool allowing users to share their screen and allow remote control access to their computers and devices. Unlike other similar tools such as TeamViewer or AnyDesk, HopToDesk is free for both personal and business use, provides true end-to-end encryption for all peer communications, and open source. What are the main features of HopToDesk? Screen sharing, remote control, file transfer, and live chat are the basic features available with HopToDesk. Other features such as direct IP access, IP whitelisting and SOCKS5 proxy connections are supported. How secure is HopToDesk? Security and privacy is a priority at HopToDesk. All traffic between users, including chats, file transfers, and screen sharing is end-to-end encrypted. This means HopToDesk does not have the ability to see users screens, files, or any information shared between partners during a remote session. Other remote desktop products do not offer end-to-end encryption and frequently send background data to the remote desktop provider's servers, allowing them to detect commercial use and prevent the application from running again. This is not possible with HopToDesk. Do I need to configure my router or firewall to use HopToDesk? HopToDesk should simply work and be able to connect to any peer without needing to change any router or firewall settings. Other remote desktop tools such as Windows Remote Desktop and VNC do require setting up port forwarding or opening ports on the router or firewall to allow remote connections to be made, however this is not the case with HopToDesk. Can I easily use HopToDesk to manage many ...
5/5 2,908 Feb 13, 2024
HopToDesk <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/HopToDesk1_th.png"border="0">
Hosts File Editor+ v.1.5.10
Hosts File Editor+ v.1.5.10 The program allows editing hosts file. Requirements: Microsoft .NET Framework 4.0 Client Profile ------------------------------------------------ SUPPORTED OPERATING SYSTEMS (x32, x64): ------------------------------------------------ Microsoft Windows XP SP2 or SP3 ; Microsoft Windows Server 2003 Microsoft Windows Vista ; Microsoft Windows Server 2008 Microsoft Windows 7 ; Microsoft Windows Server 2008 R2 Microsoft Windows 8 ; Microsoft Windows Server 2012 Microsoft Windows 8.1 ; Microsoft Windows 8.1 With update Microsoft Windows Server 2012 R2 ; Microsoft Windows 10 ; Microsoft Windows Server 2016 The program is free. No need to install, just run the application. Additional Tools of this program: ---------------------------------------------- - | Windows Additional Tools | - (for users Windows 7, as and newer Windows OS): - (Enable / Disable Windows Update). - (Clean Windows Update History...). - (Enable / Disable Windows Firewall). - (Create Rules in Windows Firewall...). - (Enable / Disable Windows Defender...). - (Enable / Disable Hibernate...). - (Enable / Disable Windows Security Center...). - (Enable / Disable UAC). - (Temp File Cleaner (Clean: C:/Windows/Temp; C:/User/UserName/AppData/Local/Temp; C:/Windows/Prefetch and Recent items). - (Delete System Restore points). - (Block run certain Applications). The basic functions of this program: ------------------------------------------------ - Set DNS Servers (Tools/ Set DNS Servers). - Set Proxy settings (Tools/ Proxy Setings). - Change Network MAC Address - ...
5/5 5,580 Mar 31, 2020
Nebojša Vučinić - Trebinje <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Hosts File Editor+1_th.png"border="0">
HTTP Downloader v1.0.3.1 32bit
HTTP Downloader v1.0.3.1 32bit HTTP Downloader is a download manager for the HTTP(S) protocol. Maximize your download throughput by utilizing high performance input/output completion ports (IOCP). HTTP Downloader can open thousands of connections at a time and consumes very little system resources. WARNING: Using this software to download from OlderGeeks could get your IP address banned due to protections on our site. How ironic is that? HTTP Downloader is a high-performance, multi-part download manager. You can Start, Pause, Stop, and Queue up to 100 downloads at a time. Each download can be split into 100 parts. That's 10,000 connections! Drag and drop links into the program's main window or, select File > Add URL(s)... to bring up the Add URL(s) window. From here you can select the download location to save the files. The Advanced button allows you to configure the number of parts to split each download, the SSL / TSL version to use for HTTPS connections, authentication information (basic or digest), and any necessary cookies, headers, and POST data. Clicking the Download button will begin the download(s). HTTP Downloader has various options to configure the behavior of the program. The options can be accessed from Tools > Options... The first tab that appears is the General tab. In it you can choose to display the System Tray icon which will generally appear on the lower right corner of the taskbar (next to the clock). The program can be set to minimum to the System Tray instead of to the taskbar and close to the System Tray instead of exiting the program. Always on top will cause all the program's windows to appear on top of every other program's windows. Enable download history will save the entries in the main window so that they can be loaded the next time the program starts. ...
5/5 4,711 Feb 10, 2020
Eric Kutcher <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/HTTP Downloader6_th.png"border="0">
HTTP Downloader v1.0.3.1 64bit
HTTP Downloader v1.0.3.1 64bit HTTP Downloader is a download manager for the HTTP(S) protocol. Maximize your download throughput by utilizing high performance input/output completion ports (IOCP). HTTP Downloader can open thousands of connections at a time and consumes very little system resources. WARNING: Using this software to download from OlderGeeks could get your IP address banned due to protections on our site. How ironic is that? HTTP Downloader is a high-performance, multi-part download manager. You can Start, Pause, Stop, and Queue up to 100 downloads at a time. Each download can be split into 100 parts. That's 10,000 connections! Drag and drop links into the program's main window or, select File > Add URL(s)... to bring up the Add URL(s) window. From here you can select the download location to save the files. The Advanced button allows you to configure the number of parts to split each download, the SSL / TSL version to use for HTTPS connections, authentication information (basic or digest), and any necessary cookies, headers, and POST data. Clicking the Download button will begin the download(s). HTTP Downloader has various options to configure the behavior of the program. The options can be accessed from Tools > Options... The first tab that appears is the General tab. In it you can choose to display the System Tray icon which will generally appear on the lower right corner of the taskbar (next to the clock). The program can be set to minimum to the System Tray instead of to the taskbar and close to the System Tray instead of exiting the program. Always on top will cause all the program's windows to appear on top of every other program's windows. Enable download history will save the entries in the main window so that they can be loaded the next time the program starts. ...
5/5 4,425 Feb 10, 2020
Eric Kutcher <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/HTTP Downloader6_th.png"border="0">
InControl v1.0.8082.2
InControl v1.0.8082.2 Easily manage Windows 10 and 11 out-of-control updating and upgrading. Controls Windows automatic updating/upgrading system by targeting it to a specific major version and feature update release. By default, the current release will be used. So if you “Take Control” with the major version and feature release shown in the boxes in the lower left, Windows will remain right where it is – only installing monthly security updates – until you “Release control”. If you wish to move to a future release, say from Windows 10 21H1 to Windows 10 21H2, you can first “Release Control” to allow those two fields to be edited. Then change the “21H1” to “21H2” and press “Take Control”. Windows Update will now be targeted at the 21H2 feature release and will offer it for installation once it's available. And if you do nothing else, your system will remain there until you again deliberately release control. Note that InControl will hold your Windows right where it is, even after the current version and feature release has gone out of support. You will see a complaint about the current version of Windows requiring an update. But your system will not be updated while you are InControl. If you have been playing with InControl and want to restore its Version and Release fields to their natural (current) default values, delete those fields' contents while the system is not under control, then click “Take Control” and they will be set to the system's current version and feature release. That's pretty much it. Like all of GRC's ultra lightweight freeware utilities, no setup or installation is required. Just run the utility with administrative rights. What it does . . . The first thing InControl does upon starting is verify that it's running on a non-Enterprise and non-Server edition of at least Windows 10. ...
5/5 1,954 Sep 01, 2022
Gibson Research Corporation <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/InControl2_th.png"border="0">
INetGet for Windows v1.02
INetGet for Windows v1.02 Simple command-line tool for downloading files via HTTP(S) or FTP, based on the WinINet API. This program provides a similar functionality as the well-known WGet and cURL tools. However, in contrast to those, INetGet is based directly on the "native" Windows Internet programming interface (WinINet). This comes at the advantage that INetGet is very small and lightweight, as it uses the HTTP(S) and FTP services provided by the operating system, instead of having to implement these protocols on its own. There are no external dependencies (e.g. OpenSSL or GnuTLS), except for standard system libraries that are present on every Windows system anyway. Still, advanced features, such as HTTPS and IPv6, are supported. Furthermore, since INetGet is based on the Windows crypto libraries, it uses the Windows certificate store. This means that, in contrast the aforementioned tools, you do not need to provide and maintain your own certificate bundle for HTTPS. Certificate updates as well as security fixes for the underlying cryptographic routines are automatically provided, via Windows Update. On the downside, you will have to trust Microsoft's protocol implementations. And the availability of some features depends on the Windows version. System Requirements INetGet works on Windows Vista or any later Windows version. Windows XP should work too, but is not recommended these days! The 32-Bit version of INetGet runs on all 32-Bit and 64-Bit Windows versions, while the 64-Bit version of INetGet requires a 64-Bit Windows version. IPv6 support requires Internet Explorer 7 or later. Note that all supported Windows versions (Vista or later) already meet this requirement. Windows XP requires manual update to IE7 in order to enable IPv6 support. As far as HTTPS support is concerned, all relevant Windows versions (XP or later) support TLS 1.0 as well as the deprecated SSL 2.0 and SSL 3.0 protocols. Support for ...
5/5 4,950 Dec 01, 2019
LoRd_MuldeR <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/INetGet for Windows1_th.png"border="0">
Input Director v2.1.4
Input Director v2.1.4 Enables the control of multiple Windows systems using the keyboard/mouse attached to one computer. Switch control between systems either by hotkey or by moving the cursor to the screen edge on one computer for it to appear on the next one Input Director supports a shared clipboard - copy on one computer, switch control, and paste . Input Director is compatible with: Windows 11, Windows 10, Windows 8/8.1 and Windows 7. The systems must be networked. Features Easy to Use Easy to follow installation and usage guides - setup only takes a few minutes Input Director's flexible monitor layout system makes it easy to accurately reflect a monitor's physical location and size: Multi-monitor support Shared Clipboard - copy and paste between computers (including files!) Compatible with Windows 11, Windows 10, Windows 8/8.1 and Windows 7 Only Input Director ensures the cursor remains visible and correct if the mouse is disconnected on a Windows 10 or Window 11 system Transitioning control to another computer is as simple as moving your cursor off the screen on one computer for it to jump to the other Able to control a computer without needing to login to it first Supports Windows fast user switching Compatible with Windows User Account Control pop-ups Manage all your computers at once Simultaneously lock all computers Import/Export Input Director configuration and apply configuration updates from the command line Synchronise screensavers across your computers Synchronise shutdown of your system (or individually configure whether a computer goes to standby, hibernate or shuts down) Wake systems over the network Security Encrypt network data between Input Director controlled computers Lock down the Input Director configuration so that only System Administrators may make changes Systems can limit which systems can control them by host name, ip address or network subnet Transition Features Ripples surround the cursor for a few seconds after transitioning to help the eye follow the cursor from one computer to another: Transitioning using the mouse can be ...
5/5 3,538 Oct 20, 2023
Shane Richards <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Input Director1_th.png"border="0">
InSpectre v8
InSpectre v8 Easily examine and understand any Windows system's hardware and software capability to prevent Meltdown and Spectre attacks. “InSpectre” is an easy to use &amp; understand utility designed to clarify the many overlapping and confusing aspects of any Windows system's ability to prevent the Meltdown and Spectre attacks. As the application's textual display says... In early 2018 the PC industry was rocked by the revelation that common processor design features, widely used to increase the performance of modern PCs, could be abused to create critical security vulnerabilities. The industry quickly responded, and is responding, to these Meltdown and Spectre threats by updating operating systems, motherboard BIOSes and CPU firmware. Protection from these two significant vulnerabilities requires updates to every system's hardware–its BIOS which reloads updated processor firmware–and its operating system–to use the new processor features. To further complicate matters, newer processors contain features to minimize the performance impact of these important security improvements. But older processors, lacking these newer features, will be significantly burdened and system performance will suffer under some workloads. This InSpectre utility was designed to clarify every system's current situation so that appropriate measures can be taken to update the system's hardware and software for maximum security and performance. Release History Release #8 — Now shows whether an Intel microcode patch is (ever) available for Spectre. Intel has finished designing microcode update patches for its processors. On April 2nd, 2018, they announced that processors that have not yet been patches will never be patched. Their full statement is available in this PDF document. In that document, Intel specifies which of their many processors do have patches and which of their more recent processors will never receive updated firmware. Now that the industry has this information, this 8th release of InSpectre incorporates that list of CPUIDs and displays whether microcode firmware updates exist for the system's Intel CPU. BOGUS “SmartScreen” ...
5/5 4,935 Nov 13, 2019
Gibson Research Corporation <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/InSpectre1_th.png"border="0">
Integrity Downloader v2.1.0.4
Integrity Downloader v2.1.0.4 A free Internet file downloading program that prioritizes security aspects. Using it can significantly reduce the security risks associated with downloads. Integrity Downloader ensures secure file downloads in the following way: 1) Before downloading a file, it displays security information related to the given URL and domain based on queries to VirusTotal. 2) Before downloading a file, it retrieves and displays important data from the server where the file is stored (e.g., file size, last modified, content type, redirect). 3) When downloading is in progress, it provides various pieces of information on the download status. 4) After downloading a file, it compares the size of the downloaded file with the data stored on the server. Further operations are only permitted if these two values match. 5)After downloading a file, it calculates and displays MD5, SHA1, or SHA256 checksums. The integrity of the downloaded file can be verified based on the checksum. 6) Based on the checksum, it displays the results of VirusTotal scans related to the downloaded file in a simplified and visually comprehensible format. 7) Also based on the checksum, it generates a checksum file that can be interpreted by Total Commander. 8) Before executing the downloaded file, it displays simplified information from VirusTotal about the file and the most important data on any digital signatures. 9) There is an option to enable SmartScreen integration. If enabled, additional security checks are done before the file is executed. Integrity Downloader is compatible with all internet browsers and other software. The only requirement is that the software can copy the URL to the clipboard. The most popular internet browsers can send the URL ...
5/5 110 Apr 04, 2024
Peter Panisz <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/IntegDown1_th.png"border="0">
Intel-SA-00086 Detection Tool for Linux
Intel-SA-00086 Detection Tool for Linux Purpose The INTEL-SA-00086 Detection Tool will assist with detection of the security vulnerability described in INTEL-SA-00086. Read below for more information. SA00086_Windows.zip - For Windows* Users This download contains two versions of the tool. The first is an interactive GUI tool that discovers the hardware and software details of the device and provides a risk assessment. This version is recommended for a local evaluation of the system. The second version of the tool is a console executable that saves the discovery information to the Windows* registry and/or to an XML file. This version is more convenient for IT administrators wishing to perform bulk discovery across multiple machines to find systems to target for Firmware updates. SA00086_Linuxtar.gz - For Linux* Users The version of the tool is a command line executable that will display a risk assessment for the system being tested. Note: Versions of the INTEL-SA-00086 Detection Tool earlier than 1.0.0.146 did not check for CVE-2017-5711 and CVE-2017-5712. These CVE's only affect systems with Intel Active Management Technology (Intel AMT) version 8.x-10.x. Users of systems with Intel AMT 8.x-10.x are encouraged to install version 1.0.0.146, or later, to help verify the status of their system in regards to the INTEL-SA-00086 Security Advisory.
5/5 4,883 Apr 04, 2019
Intel <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/IntelSA00086Detect_th.png"border="0">
Intel-SA-00086 Detection Tool for Windows
Intel-SA-00086 Detection Tool for Windows Purpose The INTEL-SA-00086 Detection Tool will assist with detection of the security vulnerability described in INTEL-SA-00086. Read below for more information. SA00086_Windows.zip - For Windows* Users This download contains two versions of the tool. The first is an interactive GUI tool that discovers the hardware and software details of the device and provides a risk assessment. This version is recommended for a local evaluation of the system. The second version of the tool is a console executable that saves the discovery information to the Windows* registry and/or to an XML file. This version is more convenient for IT administrators wishing to perform bulk discovery across multiple machines to find systems to target for Firmware updates. SA00086_Linuxtar.gz - For Linux* Users The version of the tool is a command line executable that will display a risk assessment for the system being tested. Note: Versions of the INTEL-SA-00086 Detection Tool earlier than 1.0.0.146 did not check for CVE-2017-5711 and CVE-2017-5712. These CVE's only affect systems with Intel Active Management Technology (Intel AMT) version 8.x-10.x. Users of systems with Intel AMT 8.x-10.x are encouraged to install version 1.0.0.146, or later, to help verify the status of their system in regards to the INTEL-SA-00086 Security Advisory.
5/5 4,986 Apr 04, 2019
Intel <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/IntelSA00086Detect_th.png"border="0">
IP Changer (IPC) v1.3.4.0
IP Changer (IPC) v1.3.4.0 Provides a simple way to change your IP address for all your available network adapters. IP Changer (IPC) will detect all Network Adapters enabled on Startup; from there, you can select the Adapters you wish to configure and change between them to manage all your Network Interfaces as you see fit. It additionally includes access to Enable/Release/Renew DHCP, Enable/Disable Network Adapter, and Enter IP Manually. And you can also make Custom Settings that can be saved, making them readily available the next time you open the tool. Requirement: -Windows 7* SP1+ * Windows 7 SP1 is supported with Extended Security Updates installed. Changelog: - Self-contained EXE .Net 7 - can modify a custom ip (right-click /modify) - misc stuff / optimisation Click here to visit the author's website.
5/5 3,081 Apr 27, 2023
Wagnardsoft <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/IPC1_th.png"border="0">
ISO IPFire v2.27 core172
IPFire v2.27 core172 The Open Source Firewall Secure your network with IPFire IPFire is a hardened, versatile, state-of-the-art Open Source firewall based on Linux. Its ease of use, high performance in any scenario and extensibility make it usable for everyone. Security Security is the highest priority in IPFire. It is hardened to protect itself from attacks from the Internet and prevents attacks on your network. Firewall Its powerful firewall engine and Intrusion Prevention System protects your network against attacks from the Internet and Denial-of-Service attacks. Open Source IPFire is free software and developed by an open community and trusted by hundreds of thousands of users from all around the world. Features Security The primary objective of IPFire is security. Its easy to configure firewall engine and Intrusion Prevention System stops any attackers from breaking into your network. In the default configuration, the network is split into various zones with different security policies such as a LAN and DMZ to manage risks inside the network and have custom configuration for the specific needs of each segment of the network. But even the firewall needs to protect itself. IPFire is built from scratch and not based on any other distribution. This allows the developers to harden IPFire better than any other server operating system and build all components specifically for use as a firewall. Frequent updates keep IPFire strong against security vulnerabilities and new attack vectors. Firewall IPFire employs a Stateful Packet Inspection (SPI) firewall, which is built on top of Netfilter, the Linux packet filtering framework. It filters packets fast and achieves throughputs of up to multiple tens of Gigabit per second. Its intuitive web user interface allows to create groups of hosts and networks which can be used to keep large set of rules short and tidy - something very important in complex environments with strict access control. Logging and graphical reports give great insight. Various ...
5/5 1,503 Feb 10, 2023
Lightning Wire Labs GmbH <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/IPFire1_th.png"border="0">
Iridium Browser v2023.09.116
Iridium Browser v2023.09.116 A browser securing your privacy. That’s it.| Iridium Browser is based on the Chromium code base. All modifications enhance the privacy of the user and make sure that the latest and best secure technologies are used. Automatic transmission of partial queries, keywords and metrics to central services is prevented and only occurs with the approval of the user. In addition, all our builds are reproducible and modifications are auditable, setting the project ahead of other secure browser providers. Transparency With Iridium, the whole process is entirely transparent. The public Git repository allows a direct view on all changes made. The complete source code is therefore available. Privacy Iridium Browser has various enhancements where it forces strict security to provide the maximum level of security without compromising compatibility. Deployability We try to distribute it in ways where it allows easy installation and yet allows administrators to deploy it easily. An example is an MSI-based installation mechanism for easy deployments throughout an entire organization. Speed Iridium is just fast in every way. It starts very fast, loads and also renders very complex web sites really fast. Ease of Use Just anybody can use Iridium right away. It is simple and easy to handle, it does not require any special knowledge at all. Motivation There are many browsers out there. Chrome is fast, stable and user-friendly but does not meet many organizations’ demands for privacy. Since the tight integration with its inventor (Google) makes many things easier, it does not comply to restrictive data environments. Iridium is not another new browser from scratch. It takes the Chromium code base and enhances its security and sets certain policies by default. There are many forks of Chromium-based browsers, yet, in our opinion they failed in many other key areas important for adoption. This download is for the Windows 64bit installer version. All other download assets ...
5/5 1,316 Apr 03, 2024
NETitwork GmbH <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Iridium1_th.png"border="0">
ISO to USB v1.6
ISO to USB v1.6 ISO to USB is a free and small software that can burn the ISO image file directly to the USB drives, these USB drives include USB flash drives, memory sticks and other USB storage devices, it also supports to create a bootable USB disk with Windows operating systems. Freeware. Burn ISO to USB disks with ease The ISO image file is a popular image of the CD/DVD discs, an ISO file can include all the content on the disc, this software can easily burn these ISO files to a USB flash disk, makes it easy to carry and use. The program's interface is very simple, you only need select the ISO file you want to burn and the target USB drive, then click "Burn" button, an USB disk that includes all ISO image data will be created. There do not have any complicated settings, it is easy to use very much. Bootable USB flash disks This software currently only support Windows bootable disk, can work with both BOOTMGR and NTLDR boot mode, can create USB disk with FAT, FAT32, exFAT or NTFS file system. (When you are making a bootable USB disk, suggest you choose the FAT32 file system.) This program have be tested with Win8/Win7 PE and WinXP PE bootable ISO image files, it can work fine, the generated USB disk can normally boot the computers. Only a small part of the machines can boot Win8/Win7, but can not boot WinXP, these machines will display "NTLDR is missing", for this problem there is no good solution currently. If create bootable USB disk failed, sometimes the USB disk will be unusable, you can try the following steps to recover it: Insert your USB disk. (a) For Win8, press keyboard "Windows key" + X together to ...
5/5 4,549 Mar 15, 2020
ISOTOUSB <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/ISO to USB1_th.png"border="0">
iSpy 6.3.3.0
iSpy 6.3.3.0 iSpy uses your webcams and microphones to detect and record movement or sound and provides security, surveillance, monitoring and alerting services. Any media that is captured is compressed to flash video and made available, securely over the web. iSpy can be setup to run on multiple computers simultaneously. iSpy is free, open-source software, so if you want it to do anything else, please download the source code and customise it to your requirements. With iSpy you can: Connect and monitor as many cameras and microphones as you like. Import and export object lists to share with colleagues. Connect multiple computers in a group and manage over the web Install iSpy Server and publish your webcam to other instances of iSpy, over your network and to the web Detect, highlight, track and record movement Detect loitering Customise movement detection areas on your cameras Detect and record sound Run any program or send an email or SMS alert when movement or sound is detected Run any program or send an email or SMS alert when movement or sound is not detected (monitor machinery or staff activity) Receive email movement alerts with attached frame grab images from your webcams Periodically receive image grabs via email from your webcams Connect to any device, even webcams attached to other computers with JPEG, MJPEG, IP Cam, webcam and AVI file support Watch live and recorded media over the web (through this website) and also via mobile devices Access and control iSpy remotely Password protect iSpy and hide it in the System Tray Schedule sound and video capturing to start and stop automatically Time-lapse record from any camera Motion track and count moving objects Connect multiple instances of iSpy and iSpy server running on different computers to this website and view all aggregated media online Create groups, invite friends and share access to your webcams and microphones Receive email alerts if your connection goes offline Download the source ...
0/5 9,205 Mar 03, 2015
Developerinabox
IZArc2Go v4.4
IZArc2Go v4.4 IZArc2Go is the easiest way to Zip, Unzip and Encrypt files for free (IZArc is the portable version of IZArc2Go) Zip and Unzip files Password protect archives with strong AES encryption Support 7-ZIP, RAR, TAR and many other archives IZArc is the best free file compression utility supporting many archive formats like: 7-ZIP, A, ARC, ARJ, B64, BH, BIN, BZ2, BZA, C2D, CAB, CDI, CPIO, DEB, ENC, GCA, GZ, GZA, HA, IMG, ISO, JAR, LHA, LIB, LZH, MDF, MBF, MIM, NRG, PAK, PDI, PK3, RAR, RPM, TAR, TAZ, TBZ, TGZ, TZ, UUE, WAR, XPI, XXE, YZ1, Z, ZIP, ZOO. With a modern easy-to-use interface, IZArc provides support for most compressed and encoded files, as well as access to many powerful features and tools. It allows you to drag and drop files from and to Windows Explorer, create and extract archives directly in Windows Explorer, create multiple archives spanning disks, creating self-extracting archives, repair damaged zip archives, converting from one archive type to another, view and write comments and many more. IZArc has also build-in multilanguage support. With IZArc you can open CD image files like ISO, BIN, CDI and NRG. It is also possible to convert such files from one type to another (BIN to ISO, NRG to ISO). If you need to send large files to your colleagues, friends or customers who may not have archiving tool you can easily create self-extracting archive that can be extracted by simple double click. IZArc can be configured to run your preferred Anti-Virus scanner when you open any archives. IZArc supports 256-bit AES encryption to secure your data. IZArc is integrated in Windows so you can perform all archiving operations by using right-click menus in Windows Explorer. If you have broken archives IZArc can help ...
5/5 4,004 Jan 12, 2022
Ivan Zahariev <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/IZArc2Go1_th.png"border="0">
KCleaner v3.8.0.110
KCleaner v3.8.0.110 KCleaner is designed to be the most efficient Hard Disk cleaner, tracking every useless byte in order to give you all the ressources you may need for your documents, music, pictures, movies,... It is the first product of this kind featuring a full automatic mode, which works in background so that you don't have to care about when to launch it. As a proof of its efficiency, it often finds up to many Gb not even seen by its competitors so... give KCleaner a try ! And if data security is something you are interested in, you'll love the secured file deletion methods proposed by KCleaner, making deleted files unrecoverable by any known mean. Features Detects and cleans temporary and useless files (cache, unused setup files...) Automatic mode working in background Secured file deletion method Expert mode : let users control any file deletion done by KCleaner Internationalization support. Changes: KCleaner - 3.8 Released 2021-02-21 0006382: [Refactoring] Updated French translation (Kyle_Katarn) 0006378: [New Feature] Capacity to remove licence (Kyle_Katarn) 0004732: [Bug] Does not clean browser caches (Kyle_Katarn) 0006348: [Refactoring] Updated Chinese translation (Kyle_Katarn) 0006335: [Refactoring] Updated Dutch translation (Kyle_Katarn) Click here to visit the author's website.
5/5 4,248 Feb 22, 2021
KC Softwares <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/KCleaner1_th.png"border="0">
KeePass v2.47
KeePass v2.47 KeePass Password Safe is a free, open source, lightweight, and easy-to-use password manager for Windows. With so many passwords to remember and the need to vary passwords to protect your valuable data, it’s nice to have KeePass to manage your passwords in a secure way. KeePass puts all your passwords in a highly encrypted database and locks them with one master key or a key file. As a result, you only have to remember one single master password or select the key file to unlock the whole database. And the databases are encrypted using the best and most secure encryption algorithms currently known, AES and Twofish. Features Strong security (AES encryption, SHA-256 hash, protection against dictionary and guessing attacks, in-memory protection, ...). Portable (no installation required), available for many platforms (Windows, Linux, Mac OS X, smart devices/phones, ...). Efficient and flexible organization (entry groups, tags, time fields, file attachments, ...). Various data transfer methods (clipboard, drag and drop, auto-type, plugins can provide integration with other applications, ...). Powerful password generator (generation based on character sets and patterns, with many options). Extensible (plugin architecture) and multi-language (more than 40 languages are available). Changes from 2.46 to 2.47: New Features: In the 'Find' dialog, search parameters can now be saved as profiles; the profiles can be accessed quickly via the main menu ('Find' → 'Search Profiles') and the group context menu. Added search mode 'XPath expression' in the 'Find' dialog, which creates a KeePass 2.x XML DOM of the current database in memory and finds entries using the specified XPath expression. Added option 'History' in the 'Find' dialog, which includes history entries in searches. ...
5/5 6,309 Apr 04, 2021
KeePass <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/KeePass1_th.png"border="0">
KeyLock v2.1.20101.1
KeyLock v2.1.20101.1 KeyLock is a program to lock your computer with a USB Flash Drive or a phone. Safe: It's not possible to use your computer after you've locked it with KeyLock. Our exclusive technologies use the Windows lock screen to lock your PC, making it impossible to reach the desktop. After unlocking, you can immediately use your computer again. Easy and Quick: You quickly need your computer with the common Windows security? First you need to unlock, type your password, have a typo, type in again and finally, your pc is unlocked. With KeyLock, all these problems are solved: Press "Unlock" on your phone or put your USB Flash Drive in your computer and you can use it immediately. Changelog: 2.1.1 18 August 2018 - Bug fixes There are two malware hits on Virus Total. These are false positives. The program has been tested malware free. Click here to visit the author's website.
5/5 7,259 Dec 28, 2018
Brabonet <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/keylock1_th.png"border="0">
KeyScrambler 3.8.0.0
KeyScrambler 3.8.0.0 KeyScrambler encrypts your keystrokes deep in the kernel, foiling keylogging attacks with scrambled, undecipherable data. This advanced method of keystroke protection defeats both known and unknown keyloggers. The friendly interface displays realtime encrypted stream of keystrokes so you see when and how KeyScrambler is working. Strengthens where defenses are the weakest in your traditional anti-virus, anti-malware programs and PC security. Compare Editions A free browser add-on, KeyScrambler Personal protects all your inputs in IE, Firefox, and Flock. KeyScrambler Pro and Premium are paid programs that protect a wide array of apps. How It Works KeyScrambler encrypts your keystrokes at the keyboard driver level and decrypts them at the destination application, giving keyloggers "scrambled," useless keys to record. For Online Games Both KeyScrambler Pro and Premium protect your player's IDs, passwords and digital assets in over two dozen online games. For Business Read how and why KeyScrambler is important for your business. KeyScrambler Premium protects critical systems and reduces risks of information theft at the workplace. Features KeyScrambler defeats known and unknown keyloggers; also protects Chinese, Japanese, and Korean inputs; is compatible with other security programs, tokens and smart cards; and requires no user effort. How To The user-friendly interface allows you to do things on KeyScrambler for a more comfortable, personalized fit. Supports: Advanced Browser, AM Browser, AOL Explorer, AOL 9, Avant, Comodo Dragon, Comodo IceDragon, CometBird, Crazy Browser, Firefox, Flock, Google Chrome, Internet Explorer, K-meleon, Maxthon, MSN Explorer, Netscape, Orca Browser, Opera, Safari, Seamonkey, SlimBrowser, SR Iron Browser, TheWorld Browser, Palemoon, Lunascape, RockMelt, WaterFox, and Yahoo Browser.
5/5 7,582 Jul 29, 2015
QFX Software <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/Windows8_Login_th.png"border="0">
KillEmAll (command line) v21.11.12.1
KillEmAll (command line) v21.11.12.1 KillEmAll is a ‘panic‘ button with an ‘ask questions later‘ attitude, designed to identify and terminate all non-essential running programs. Great for quickly closing unwanted apps, system inspection, and even malware removal! Why Use It? The best usage case for KillEmAll to most users is to close all open web browser windows if you get a suspected malicious popup while visiting a website. The the reason you don’t simply close or “X out” the popup is because malicious code can be run even if you click the X button — it is after all just another button, you might as well be clicking “OK” or “Yes, please do what you want with my PC…” but if you don’t click anything and KillEmAll does the work, forcing the application’s process to close without any additional code execution. Other tasks that benefit from the advantage of quickly and forcefully closing all applications: before performing maintenance on your PC, before and during general troubleshooting, or before playing resource intensive games. General Usage: Simply run the .exe (from anywhere, even a flash drive or network path) and then press a key to terminate unnecessary programs running under any standard user account, or alternately you can press ‘D‘ for Debug mode (more on that below.) If your Windows is configured with UAC enabled (default) then you can right-click and choose Run as Administrator to kill all other programs running under an Administrator/System account. If started via Windows Explorer, KillEmAll will display a ‘press any key to exit’ prompt when completed, giving you the option to press ‘L‘ to generate a log file. When started from a console window you ...
5/5 2,636 Nov 19, 2021
d7xtech.com <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/KillEmAll_Mini1_th.png"border="0">
Large Text File Viewer 5.2
Large Text File Viewer 5.2 Have you ever felt frustrated when you just want to look at the content of a large text file but it takes forever for Notepad or Word to open it? This program was designed for viewing large (>1GB) text files. It uses little memory and is able to open a gigabyte file instantly. Background file indexing makes browsing even faster. It opens files that are currently being written by other programs, and automatically checks and reads the files if new contents have been appended. It supports view split. The user may split the view either horizontally or vertically, and have each side show different portion of the same file. It allows the user to perform high-speed complex text search by means of plain text or regular expression. The regular expression syntax is slightly different from the standard ones. Please click here for details. The regular expressions for finding the following items have been provided as preset for the convenience of the users: quoted string hexadecimal integer floating-point number date of any format time of any format domestic phone number (US &amp; Canada) social security number IP address email address http address ftp address ...
5/5 4,879 Oct 23, 2019
swiftgear.com <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Large Text File Viewer1_th.png"border="0">
LastActivityView v1.37
LastActivityView v1.37 A tool for Windows operating system that collects information from various sources on a running system, and displays a log of actions made by the user and events occurred on this computer. The activity displayed by LastActivityView includes: Running .exe file, Opening open/save dialog-box, Opening file/folder from Explorer or other software, software installation, system shutdown/start, application or system crash, network connection/disconnection and more... You can easily export this information into csv/tab-delimited/xml/html file or copy it to the clipboard and then paste into Excel or other software. System Requirements This utility works on any version of Windows, starting from Windows 2000 and up to Windows 11. Both 32-bit and 64-bit systems are supported. Known Limitations This tool gathers information from various sources, including the Registry, the events log of Windows, the Prefetch folder of Windows (C:\windows\Prefetch), the MiniDump folder of Windows (C:\Windows\Minidump), and more... The accuracy and the availability of the information displayed by LastActivityView might be different from one system to another. For example, if the user or a software makes changes in the Registry, the action time displayed by LastActivityView might be wrong, because it's based on the modified time of some Registry keys. Also, for every type of action/event, there is some limitation according to the way that the information is saved in the system. For example, the 'Select file in open/save dialog-box' action is limited for one action of every file extension, so if the user opened 2 .doc files with the open/save dialog-box, only the last one will be displayed. Changes Version 1.37: Fixed bug: LastActivityView crashed when trying to read empty or invalid Prefetch file. Start Using LastActivityView LastActivityView doesn't require any installation process or additional dll files. In order to start using it, simply run the executable file - LastActivityView.exe After you run LastActivityView, it scans your ...
5/5 9,023 Feb 12, 2024
Nir Sofer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/lastactivityview_th.png"border="0">
Leo Folder Locker 2.0
Leo Folder Locker 2.0 Leo Folder Locker is a software to secure your data in a smart, fast , effective and secure way. Although your operating system may offer you the possibility to hide folders, they are easy to find and reveal, since they are not protected by anything else. Thus, they cannot be considered as an option if you need to secure your sensitive data, especially on computers shared by more users at once. Leo Folder Locker comes in handy when these situations occur. This software does not encrypt your data instead it relies on some Windows OS based techniques to lock down folders. This software uses some basic techniques which are pretty good to be used on usual data. This software is not recommended to be used in high sensitivity situations where hard core encryption is required. This software was only designed to be used in general situations. Some of its key features include : Lock Down Mode As a defense from password guessing. Self Destruction Mode to provide a high level security. An Beep System used as an alert. Fully Customizable Settings. A Password Recovery System just in case you forgot yours. A new CLI based easy-to-use UI. A Freeware By Malik Usman Aura.
5/5 5,249 Jun 20, 2016
Malik Usman Aura <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/Leo Folder Locker1_th.png"border="0">
LibreWolf v99.0
LibreWolf v99.0 A fork of Firefox, focused on privacy, security and freedom. What is LibreWolf? This project is an independent fork of Firefox, with the primary goals of privacy, security and user freedom. LibreWolf is designed to increase protection against tracking and fingerprinting techniques, while also including a few security improvements. This is achieved through our privacy and security oriented settings and patches. LibreWolf also aims to remove all the telemetry, data collection and annoyances, as well as disabling anti-freedom features like DRM. Main Features No Telemetry No experiments, adware, annoyances, or unnecessary distractions. Private Search Privacy-conscious search providers: DuckDuckGo, Searx, Qwant and more. Content Blocker Included uBlock Origin is already included for your convenience. Enhanced Privacy Hardened to maximize privacy, without sacrificing usability. Fast Updates LibreWolf is always built from the latest Firefox stable source, for up-to-date security and features along with stability. Open Source Everyone can participate in the development of LibreWolf. Join them on GitLab, Matrix and Gitter. This download is for the Windows 64bit Installer version. All other download assets are below: Windows: librewolf-99.0.en-US.win64-portable.zip MacOS: librewolf-99.0-1.en-US.mac.aarch64.dmg librewolf-99.0-1.en-US.mac.x86_64.dmg Linux: LibreWolf.x86_64.AppImage See your distro's repository for custom versions. Click here to visit the author's website.
5/5 1,771 Apr 14, 2022
LibreWolf Core Contributors <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/LibreWolf2_th.png"border="0">
linkMaker v1.1.1
linkMaker v1.1.1 linkMaker provides a better interface to create shortcuts, symbolic links¹ and ntfs hardlinks/junction points². The app is intended to replace the antiquated 'Create Shortcut' wizard with something better; it makes all options available on one screen, and tries to auto-fill as much info as it can. Shell integration is provided for the 'new file' menu and the right-click drag menu. ¹Symbolic Links are similar to shortcuts, but are more transparent (most apps can't tell the difference between a symlink and the target file). I don't think Microsoft has ever provided a GUI to create them, but they're quite useful for redirecting files. ²Junction points and HardLinks are specific to ntfs filesystem, and can be somewhat fiddly. It's recommend to stick to shortcuts and symbolic links uness you understand how they work. Usage Notes Requirements: Version 4 or better of the .net framework is recommended. Get it from Microsoft. No installation; just unpack and run. A settings file and ancillary files may be created in the program folder. Instructions: You'll probably want to enable the shell integration menus... if so: Run the app, then hit the settings button and check those boxes. After that you can use the app or the shell menu's to create links. Remember you can drag files and folders to fill-in the target, and the link name will auto-fill based on that. When picking folders as a link target: The folder picker windows provides is an abomination, so we use the file picker to choose both files and folders. To pick a folder, navigate to the inside of the folder you want, then hit 'Open' with "{Press Open now to select the parent folder}" in the file name box. Note on Security and Elevation: Microsoft, in their Sublime Wisdom, decided the creation of symbolic links should be subject to special restrictions. The situation is ...
5/5 3,442 Dec 06, 2019
cresstone <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/linkMaker1_th.png"border="0">
Linux Kodachi v8.27
Linux Kodachi v8.27 Secure, open source Linux distribution Linux Kodachi operating system is based on Ubuntu 18.04.6 LTS it will provide you with a secure, anti forensic, and anonymous operating system considering all features that a person who is concerned about privacy would need to have in order to be secure. Kodachi is very easy to use all you have to do is boot it up on your PC via USB drive then you should have a fully running operating system with established VPN connection + Tor Connection established + DNScrypt service running. No setup or Linux knowledge is required from your side we do it all for you. The entire OS is functional from your temporary memory RAM so once you shut it down no trace is left behind all your activities are wiped out. Kodachi is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity. Features • VPN Ready • Tor Ready with exit node selection • DNScrypt ready • Onion Circuits/Onion share • i2p • GNUNET • Exodus multi currency wallet • Rkhunter • Peer Guardian • Panic Room • Bleachbit • Atom • Audicity • Zulucrypt • System and Security Info on Desktop • Wipe Ram • Wipe Free Space • Kill OS! • Nautilus-wipe • Keepass2x • Seahorse • Gpa ...
5/5 2,233 Feb 15, 2024
eeds <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/LinuxKodachi3_th.png"border="0">
Linux Reader v4.16
Linux Reader v4.16 Access files and folders on Ext, UFS, HFS, ReiserFS, or APFS file systems from Windows How to get safe and quick access to alternative file systems? DiskInternals Linux Reader is a new easy way to do this. This program plays the role of a bridge between your Windows and Ext2/Ext3/Ext4, HFS and ReiserFS file systems. This easy-to-use tool runs under Windows and allows you to browse Ext2/3/4, HFS and ReiserFS file systems. There are a number of evident merits of the program, which you should know. First of all, DiskInternals Linux Reader is absolutely free. Secondly, the program provides for read-only access and does not allow you to make records in file system partitions. This guarantees that the interference in an alterative file system will not affect the work of Linux later. Apart from this, it is necessary to note, that it gives you an opportunity to use common Windows Explorer for extracting data. A preview option for pictures is one more pleasant point, which is worth mentioning. How to get safe and quick access to any file systems? DiskInternals Linux Reader is an easy and short way to solve the problem! While saving, it ignores file security policies. It means that it is possible to access absolutely any file on a Linux disk from Windows. The program can create and open disk images. Do not install the program on the disk where you're going to recover lost data. Never recover deleted files to the same disk. Use a different disk or disk partition instead. Linux Reader provides you with access to files on the following file systems: • Ext2/3/4 • ReiserFS, Reiser4 • HFS, HFS+(reader) • FAT, exFAT • NTFS, ReFS • UFS2 • ...
5/5 5,374 Mar 19, 2023
DiskInternals, ltd. <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/LinuxReader2_th.png"border="0">
LocalSend v1.13.1
LocalSend v1.13.1 Share files to nearby devices. Free, open-source, cross-platform. LocalSend is a free, open-source app that allows you to securely share files and messages with nearby devices over your local network, without needing an internet connection. It's a cross-platform app that enables secure communication between devices using a REST API and HTTPS encryption. Unlike other messaging apps that rely on external servers, LocalSend doesn't require an internet connection or third-party servers, making it a fast and reliable solution for local communication. How it Works LocalSend uses a secure communication protocol that allows devices to communicate with each other using a REST API. All data is sent securely over HTTPS, and the TLS/SSL certificate is generated on the fly on each device, ensuring maximum security. For more information on the LocalSend Protocol, see the documentation. This download is for the Windows installer version. All other download assets are below: Windows (portable): LocalSend-1.13.1-windows-x86-64.zip Windows msix: LocalSend-1.13.1-windows-x86-64.msix macOS: LocalSend-1.13.1.dmg Apple App Store Linux: LocalSend-1.13.1-linux-x86-64.AppImage LocalSend-1.13.1-linux-x86-64.deb LocalSend-1.13.1-linux-x86-64.tar.gz Android: LocalSend-1.13.1.apk Google Play F-Droid Amazon Appstore iOS: Apple App Store Click here to visit the author's website.
5/5 685 Dec 15, 2023
LocalSend <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/LocalSend1_th.png"border="0">
log4j-scan v1.0
log4j-scan v1.0 A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 on hosts. Features Support for lists of URLs. Fuzzing for more than 60 HTTP request headers (not only 3-4 headers as previously seen tools). Fuzzing for HTTP POST Data parameters. Fuzzing for JSON data parameters. Supports DNS callback for vulnerability discovery and validation. WAF Bypass payloads. Description From the authors: We have been researching the Log4J RCE (CVE-2021-44228) since it was released, and we worked in preventing this vulnerability with our customers. We are open-sourcing an open detection and scanning tool for discovering and fuzzing for Log4J RCE CVE-2021-44228 vulnerability. This shall be used by security teams to scan their infrastructure for Log4J RCE, and also test for WAF bypasses that can result in achiving code execution on the organization's environment. It supports DNS OOB callbacks out of the box, there is no need to setup a DNS callback server. Usage $ python3 log4j-scan.py -h [•] CVE-2021-44228 - Apache Log4j RCE Scanner [•] Scanner provided by FullHunt.io - The Next-Gen Attack Surface Management Platform. [•] Secure your External Attack Surface with FullHunt.io. usage: log4j-scan.py [-h] [-u URL] [-l USEDLIST] [--request-type REQUEST_TYPE] [--headers-file HEADERS_FILE] [--run-all-tests] [--exclude-user-agent-fuzzing] [--wait-time WAIT_TIME] [--waf-bypass] [--dns-callback-provider DNS_CALLBACK_PROVIDER] [--custom-dns-callback-host CUSTOM_DNS_CALLBACK_HOST] optional arguments: -h, --help show this help message and exit -u URL, --url URL Check a single URL. -p PROXY, --proxy PROXY Send requests through proxy. ...
5/5 1,924 Dec 15, 2021
Mazin Ahmed <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/log4j-scan1_th.png"border="0">
LSASecretsView v1.26
LSASecretsView v1.26 Free tool to view LSA secrets stored on your computer LSASecretsView is a small utility that displays the list of all LSA secrets stored in the Registry on your computer. The LSA secrets key is located under HKEY_LOCAL_MACHINE\Security\Policy\Secrets and may contain your RAS/VPN passwords, Autologon password, and other system passwords/keys. Note: Your antivirus will probably detect this as malicious. It is malicious if someone else is using it on your computer without your knowledge. If you are using it to retrieve your own stored information, it is safe. Using LSASecretsView LSASecretsView doesn't require any installation process or additional DLLs. Just copy the executable file (LSASecretsView.exe) to any folder you like, and run it. The main window of LSASecretsView contains 2 panes: The upper pane displays the list of all LSA secret entries. When you select one or more items in the upper pane, the lower pane displays the LSA data of the selected items, in Hex and Ascii formats. Reading LSA secrets from external instance of Windows Starting from version 1.20, LSASecretsView allows you to read the LSA secrets from external instance of Windows. This feature can be useful if you have a dead system that cannot boot anymore. You can use this feature from the user-interface, by using the 'Advanced Options' in the File menu, or from command-line, by using /external parameter, for example: LSASecretsView.exe /external g:\windows System Requirement This utility works on 2000/XP/2003/2008/Vista/7/8/10/11. Windows 98/ME is not supported. License This utility is released as freeware. You are allowed to freely distribute this utility via floppy disk, CD-ROM, Internet, or in any other way, as long as you don't charge anything for this. If you distribute this utility, you must include all files in the distribution package, without any modification ! Disclaimer The software is provided "AS IS" without any warranty, either expressed or implied, including, but ...
5/5 8,888 Jan 29, 2024
Nir Sofer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/lsasecretsview_th.png"border="0">
MailChecker v15.0.26208
MailChecker v15.0.26208 MailChecker is a very easy and quick utility, allowing you to validate a list of mail addresses. Info: the mail addresses test procedure and resolution detection used by this tool are not guaranteed to be working with all the mail addresses. Part of the validation procedure depends from the communication between the program and mail servers: if some security settings at server side prevent this communication, results cannot be evaluated correctly. Enjoy MailChecker! Installation Just download the package, open it, and run “setup.exe”. On the security warning of ClickOnce setup, click “Install” button.
5/5 4,867 Jul 24, 2019
iSystems <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/MailChecker1_th.png"border="0">
Malwarebytes Anti-Exploit v1.13.1.585
Malwarebytes Anti-Exploit v1.13.1.585 Protects you against the security vulnerabilities in the code, which make up your software programs. Your software contains millions of lines of code, which unfortunately some people want to exploit. Malwarebytes Anti-Exploit protects you from these vulnerabilities which people can manipulate in order to infect your system with malware. The software gives you three layers of security protection around popular browsers and applications, thereby preventing the vulnerable code from being exploited. The software is not an antivirus product in itself, but it is compatible with most antivirus software. Features • It protects browsers and their add-ons • Protects browser components • Protects media players and PDF readers • Allows you to manage custom shields • Best of all, it's free! Changes: v1.13.1.585 Stability/issues fixed: Fixed issues with Chrome browser Fixed false positives with MS Office products Improved Logging capabilities Internal Product Improvements Click here to visit the author's website.
5/5 9,372 Apr 03, 2024
Malwarebytes <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/malwarebytes-anti-exploit-free-main-window_th.png"border="0">
Malwarebytes Anti-Malware for Android 1.00.0.0400
Malwarebytes Anti-Malware for Android 1.00.0.0400 The world’s most popular anti-malware technology has now gone mobile! Malwarebytes Anti-Malware Mobile protects your phone or tablet from malware, infected apps, and unauthorized surveillance. Malwarebytes Anti-Malware Mobile Detects and eliminates malware, including spyware and Trojans Scans your apps for malicious code Stops unauthorized access to your personal data Scans your Android device for security vulnerabilities Identifies applications that are tracking your location Take your anti-malware protection to go Malwarebytes Anti-Malware Mobile guards your identity and personal data on-the-go. So you and your Android smartphone or tablet are safe from malware and unauthorized surveillance. Wherever you are. Whenever you go. Make your smartphone smarter Is that app or downloaded photo safe? With Malwarebytes Anti-Malware Mobile, you never have to worry again. Powerful anti-malware and anti-spyware technology protects your Android device. Detecting Trojans, spyware, and other malware before they can steal your identity or eavesdrop. Choose what you keep private Cybercriminals, and even legitimate companies, can collect private information from your Android device. Where you go. Who your contacts are. Malwarebytes Anti-Malware Mobile identifies what your applications are doing, and which private information is being accessed. So you can control who knows, and what they know. Close the security holes Malwarebytes Anti-Malware Mobile automatically recognizes security vulnerabilities in your Android device’s settings. Then it makes recommendations on how to close those holes. Make your smartphone lighter Mobile security software is typically bloated with location features (Remote Lock, Locate on a Map, etc.). Features that can already be found on your Android Device Manager. Malwarebytes Anti-Malware Mobile preserves your device’s performance by adding only the necessary security features. Anti-Malware/Anti-Spyware Proactively scans applications and files for malware and spyware Scans native memory and SD card Schedules automatic scans Updates the protection database automatically Privacy Manager Identifies every application’s access privileges in detail Breaks down access privileges by category: Contacts, Identity Information, Simple Message Service (SMS), and Security Settings Security Audit Identifies security vulnerabilities on ...
0/5 27,576 Nov 09, 2013
Malwarebytes Corporation
Malwarebytes Windows Firewall Control v6.9.2.0
Malwarebytes Windows Firewall Control v6.9.2.0 Managing Windows Firewall is now easier than ever Program Overview Malwarebytes Windows Firewall Control is a powerful tool which extends the functionality of Windows Firewall and provides new extra features which makes Windows Firewall better. It runs in the system tray and allows the user to control the native firewall easily without having to waste time by navigating to the specific part of the firewall. This is the best tool to manage the native firewall from Windows 11, 10, 8.1, 8, 7, Server 2012 and newer Server versions. Windows Firewall Control offers four filtering modes which can be switched with just a mouse click: High Filtering - All outbound and inbound connections are blocked. This profile blocks all attempts to connect to and from your computer. Medium Filtering - Outbound connections that do not match a rule are blocked. Only the programs that you allow can initiate outbound connections. Low Filtering - Outbound connections that do not match a rule are allowed. The user can block the programs he doesn't want to allow initiating outbound connections. No Filtering - Windows Firewall is turned off. Avoid using this setting unless you have another firewall running on your computer. Windows Firewall Control doesn't do any packet filtering and does not block or allow any connection. This is done by Windows Firewall itself based on the existing firewall rules. Program Features √ Notifications of outbound blocked connections. √ Learning mode that automatically allows digitally signed programs. √ Create temporary rules which are automatically deleted when they expire or on program restart. √ Intuitive user interface which is easy accessible through a system tray icon. √ Full support with standard user accounts. Elevated privileges are required only at installation. √ Disable the ability of other programs to tamper Windows Firewall rules and state. √ Integrated support of creating, modifying and deleting Window Firewall ...
5/5 9,487 Feb 15, 2023
Malwarebytes <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/windows_firewall_control_th.png"border="0">
McAfee Rootkit Remover 0.8.9.209
McAfee Rootkit Remover 0.8.9.209 McAfee Rootkit Remover is a stand-alone utility used to detect and remove complex rootkits and associated malware. Currently it can detect and remove ZeroAccess, Necurs and TDSS family of rootkits. McAfee Labs plans to add coverage for more rootkit families in future versions of the tool. How do you use RootkitRemover? Download the latest version of RootkitRemover When prompted, choose to save the file to a convenient location on your hard disk, such as your Desktop folder. When the download is complete, navigate to the folder that contains the downloaded RootkitRemover file, and run it. It is best to run the tool in Administrator mode. The tool then runs a window which shows the status of the process. The various stages are: Initializing Scanning Cleaning When the process is completed, it prompts the user to press any key to exit the tool. It is recommended to reboot the system and perform a full scan with the McAfee VirusScan to remove remnants of the infection that might still be left on the system. Frequently Asked Questions Q: What is the need for the RootkitRemover tool? A: RootkitRemover is not a substitute for a full anti-virus scanner. It is designed to detect and remove specific rootkit infections. Q: How to use the RootkitRemover tool? A: The tool can be run by either double clicking it or through the command-line. It is advisable to run a full system scan using McAfee VirusScan after removing any infection with the tool. Q: How do I save the scan results to a log file? A: The tool is designed to automatically save the report in the same folder as the tool is placed. Q: Why do I need to rescan with McAfee VirusScan? Would I need ...
5/5 5,950 Nov 13, 2019
McAfee Labs <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/RR1_th.png"border="0">
Mem Reduct v3.4
Mem Reduct v3.4 A lightweight real-time memory management application to monitor and clean system memory on your computer. The program used undocumented internal system features (Native API) to clear system cache (system working set, working set, standby page lists, modified page lists) with variable result ~10-50%. Application it is compatible with Windows XP SP3 and higher operating systems, but some general features available only since Windows Vista. Note: After unzipping, right-click the appropriate executable file for your version of Windows and choose "Run as Administrator". Portable mode To activate portable mode, create memreduct.ini in application folder, or move it from %APPDATA%\Henry++\Mem Reduct. GPG Signature Binaries have GPG signature memreduct.exe.sig in application folder. Public key: pubkey.asc (pgpkeys.eu) Key ID: 0x5635B5FD Fingerprint: D985 2361 1524 AB29 BE73 30AC 2881 20A7 5635 B5FD Languages Put memreduct.lng file into application directory and restart the program. Download language Read instruction to create your own localization Changes: v3.4 (25 January 2022) security code improvements improved windows 10 support added arm64 binaries (portable only) added option to opt-out cleanup standby list restriction (issue #92) added dropdown menu for button to clean specified memory region added log cleanup results into a file feature (issue #76) added option to disable tray balloon sound added command line support (issue #82) added single-click tray icon option added per-monitor dpi support changed default ranges for up-down controls (issue #107) fixed wrong unit in notification (issue #112) fixed update installation in some cases fixed winxp font selection updated translations updated ...
5/5 5,173 Apr 10, 2024
Henry++ <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/memreduct1_th.png"border="0">
MemPad v3.69
MemPad v3.69 A plain text outliner and note taking program with a structured index. All pages are stored in a single file. User interface available in 20 languages. Unicode. Features The program offers standard editing functions including cut, copy, paste, undo, date/time insert, drag and drop, and supports Web links as well as network and local file or folder links (full path not required) and internal page links. Environment variables can be used in file links to run programs, for example. The index structure can be modified by buttons, context menu or hotkeys. Cut and paste functions and quick node moving. MemPad always saves data without prompting (when closing Mempad or opening another file). Optional auto save (every 4 minutes). Automatic backup (can be disabled by option); restore last backup, reload file. Search through all pages or within a node; continue searching forwards or backwards; Replace. Sort nodes (siblings) ascending/descending. Word wrap mode, Read-only file handling, page locking (global or individual); memory stack (pages, text positions) for browser type back/forw. jumping Options include: Selectable font, Background color, Minimize to System Tray, Hotkey, Always on top, ESC shortcut to quit or minimize. Popup menus with user defined words or expressions to insert, optionally with date and time tokens. Configurable Web look up (dictionary etc.) through context menu. Mini Launcher (through Tool button, menu, System Tray) Diary support with year/month/day index structure. Go to (or create) today's page with a key stroke. Export page, node or all to a file or directly to another program; import functions. Insert text file as page. Password protected encryption. MemPad operates in file environments (by extension and/or directory), each with its own INI file. No Registry entries. File/Open menu within a chosen file environment; optional "New Window". Help is provided as MemPad file (in English, see image). Important: Installation using Windows' "Extract" function If you use Windows' built-in "Extract" function to unpack the downloaded ZIP file, first ...
5/5 4,407 Feb 18, 2022
Horst Schaeffer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/mempad1_th.png"border="0">
Metadefender Client v4.1.20.56
Metadefender Client v4.1.20.56 Metadefender Cloud Client is the most thorough free malware analysis tool available. By running data through Metadefender Cloud, Cloud Client performs a deep endpoint forensic analysis for malware using several unique methods. Look for threats and assess the security state of your endpoint if you think it may be compromised. Methods: Memory Module Multi-Scanning: process and dynamic link library (DLL) analysis using over 40 anti-malware engines Local Anti-malware Analysis: a unique and effective analysis of anti-malware log files Rogue IP Detection: ensuring there are no network connections to a rogue IP address using several IP reputation sources Memory Module Multi-Scanning Running over 40 anti-malware engines that use heuristic detection, Metadefender Cloud Client analyzes all running processes and loaded memory modules. It performs a deep scan, analyzing the DLLs accessed by these processes for malware as well. This results in a deeper analysis than that of other free tools like Process Explorer or VirusTotal. And it does all this quickly – in just a few minutes. When you run it, Metadefender Cloud Client begins scanning all processes and DLL files for any threat. Once the analysis is complete, you’ll see a summary at the top of the window of how many potential threats of all kinds were identified. You’re able to click on each individual result and see the specific processes and DLLs that may be infected. Cloud Client is unique in allowing you to review the results on such a granular level. Highlight a process to see the results of the analysis. Click the arrow next to it in order to see the libraries accessed by the application while it runs. Then, click on individual DLL files to see the threats identified, and which specific anti-malware engines identified them. You can also see a list of potentially infected ...
5/5 5,155 Nov 15, 2019
OPSWAT, Inc. <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/metadefendercloudclient1_th.png"border="0">
Metasploitable v2.0.0
Metasploitable v2.0.0 This is Metasploitable2 (Linux) Metasploitable is an intentionally vulnerable Linux virtual machine. This VM can be used to conduct security training, test security tools, and practice common penetration testing techniques. The default login and password is msfadmin:msfadmin. Never expose this VM to an untrusted network (use NAT or Host-only mode if you have any questions what that means). Metasploitable 2 Exploitability Guide is HERE. Click here to visit the author's website.
5/5 3,620 Nov 13, 2019
rapid7user <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Metasploitable1_th.png"border="0">
Microsoft Autoruns v14.11
Microsoft Autoruns v14.11 This utility, which has the most comprehensive knowledge of auto-starting locations of any startup monitor, shows you what programs are configured to run during system bootup or login, and when you start various built-in Windows applications like Internet Explorer, Explorer and media players. These programs and drivers include ones in your startup folder, Run, RunOnce, and other Registry keys. Autoruns reports Explorer shell extensions, toolbars, browser helper objects, Winlogon notifications, auto-start services, and much more. Autoruns goes way beyond other autostart utilities. Autoruns' Hide Signed Microsoft Entries option helps you to zoom in on third-party auto-starting images that have been added to your system and it has support for looking at the auto-starting images configured for other accounts configured on a system. Also included in the download package is a command-line equivalent that can output in CSV format, Autorunsc. You'll probably be surprised at how many executables are launched automatically! Usage Simply run Autoruns and it shows you the currently configured auto-start applications as well as the full list of Registry and file system locations available for auto-start configuration. Autostart locations displayed by Autoruns include logon entries, Explorer add-ons, Internet Explorer add-ons including Browser Helper Objects (BHOs), Appinit DLLs, image hijacks, boot execute images, Winlogon notification DLLs, Windows Services and Winsock Layered Service Providers, media codecs, and more. Switch tabs to view autostarts from different categories. To view the properties of an executable configured to run automatically, select it and use the Properties menu item or toolbar button. If Process Explorer is running and there is an active process executing the selected executable then the Process Explorer menu item in the Entry menu will open the process properties dialog box for the process executing the selected image. Navigate to the Registry or file system location displayed or the configuration of an auto-start item by ...
5/5 9,786 Feb 09, 2024
Microsoft Corp. <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/msautoruns_th.png"border="0">
Microsoft Edge Browser (Latest)
Microsoft Edge Browser (Latest) The browser for business is here. Built on Chromium open source, backed by Microsoft security and innovation. Supports IE Apps and sites Open Internet Explorer-based legacy apps and sites—and the modern web—all while staying in Microsoft Edge. Protects your users and data Microsoft Edge has the highest-rated protection against phishing and malware to help protect your network from external threats. Empowers productivity Microsoft Edge turns every new tab into a portal for productivity with quick access to Office apps, files, sites and built-in Microsoft Search. Unlocks remote work Use Microsoft Edge across your devices whether at home or work with cross-platform support and profiles that sync. Access legacy Internet Explorer-based sites in Microsoft Edge Microsoft Edge with Internet Explorer (IE) mode is the only browser with built-in compatibility for legacy sites and apps. Set up IE mode Improve compatibility, retain value, and streamline productivity with Microsoft Edge and Internet Explorer mode. LEARN MORE Harness Microsoft 365 Microsoft Edge seamlessly works with Microsoft 365 management, security, and productivity tools. Work across platforms Available on supported versions of Windows, macOS, iOS, Android, and Linux (coming soon). Easy sync Have your favorites, passwords, settings, and more with you on home, work, or mobile devices. Security and Protection for your users and data With built-in tools and support for Microsoft 365 security, Microsoft Edge provides a comprehensive approach to browser security on your endpoints. SmartScreen Microsoft Edge has the highest-rated protection against phishing and malware. Conditional Access Single-sign on and native Azure Active Directory Conditional Access allow IT to securely manage access to corporate data using identity. Application Guard Run Microsoft Edge in an isolated container to help prevent bad actors from infiltrating the device OS or corporate network. Information Protection Separate corporate data and control how it’s copied, pasted, or otherwise used with native support for Windows Information Protection. Data Loss Prevention (DLP) Microsoft Endpoint DLP is natively supported so organizations can easily extend their control over data when accessed from the browser. Tracking Prevention Control how ...
5/5 3,791 May 29, 2022
Microsoft Corp. <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/edge1_th.png"border="0">
MJ Registry Watcher v1.2.8.8
MJ Registry Watcher v1.2.8.8 A simple registry, file and directory hooker/poller, that safeguards the most important startup files, registry keys and values, and other more exotic registry locations commonly attacked by trojans. MJ Registry Watcher has very low resource usage, and is set to poll every 30 seconds by default, although you can adjust this to anywhere between 0 and 9999. A configuration file stores all your settings for future use. MJRW not only polls the system, but it also hooks it, so that most changes to keys, files and directories are reported instantaneously. Key deletions are still caught by the polling loop though, since they cannot be hooked. Exactly which keys and files are protected can be completely configured by the user, although the sets supplied with MJRW will cover most standard PCs. There is an additional automatic registry backup system that takes a snapshot of the entire registry about every 28 days and stores it in the directory MJRegBackup. The filename is of the form MJRegBackup_yyyymmdd.reg where yyyy is the year, mm is the month and dd is the day. The last 15 snapshots are kept. They can be restored from a menu option : this can be used in Safe Mode as administrator to rescue a non-booting PC. To install it, extract the files with pathnames, and you'll have a self-contained .exe file with a small help text file, the keys and files lists, alert sounds, and a couple of exclusion files in the MJRegWatcher directory. Set the properties for RegWatcher.exe to run it as administrator, so that it can interface to the registry properly. It may run in Accept mode without this step. To do this, go to the RegWatcher.exe file in Explorer, right-click to Properties, and go to the Compatibility tab. Check the admin box. Whenever ...
5/5 4,850 Aug 15, 2023
Mark Jacobs <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/RegWatcher1_th.png"border="0">
MobaXterm Home Edition v23.5
MobaXterm Home Edition v23.5 Enhanced terminal for Windows with X11 server, tabbed SSH client, network tools and much more. MobaXterm is your ultimate toolbox for remote computing. In a single Windows application, it provides loads of functions that are tailored for programmers, webmasters, IT administrators and pretty much all users who need to handle their remote jobs in a more simple fashion. MobaXterm provides all the important remote network tools (SSH, X11, RDP, VNC, FTP, MOSH, ...) and Unix commands (bash, ls, cat, sed, grep, awk, rsync, ...) to Windows desktop, in a single portable exe file which works out of the box. There are many advantages of having an All-In-One network application for your remote tasks, e.g. when you use SSH to connect to a remote server, a graphical SFTP browser will automatically pop up in order to directly edit your remote files. Your remote applications will also display seamlessly on your Windows desktop using the embedded X server. Key features • Embedded X server Fully configured Xserver based on X.org • Easy DISPLAY exportation DISPLAY is exported from remote Unix to local Windows • X11-Forwarding capability Your remote display uses SSH for secure transport • Tabbed terminal with SSH Based on PuTTY with antialiased fonts and macro support • Many Unix/Linux commands on Windows Basic Cygwin commands (bash, grep, awk, sed, rsync,...) • Add-ons and plugins You can extend MobaXterm capabilities with plugins • Versatile session manager All your network tools in one app: Rdp, Vnc, Ssh, Mosh, X11, ... • Portable and light application MobaXterm has been packaged as a single executable which does not require admin rights and which you can start from an USB stick • Professional application MobaXterm Professional has been designed for security and stability Changes: Version 23.5 (2023-12-01) Improvement: updated the SSH and terminal emulator engine with the latest improvements from the PuTTY project Improvement: added support for SSH ...
5/5 3,293 Dec 04, 2023
Mobatek <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/MobaXterm3_th.png"border="0">
Monitor File Events v1.03
Monitor File Events v1.03 "Monitor File Events" is an activity sniffer on your system, it determines any change on any file or folder on your computer. Possibility to scan up to 5 different directories and their relative sub-directories with search filters for directories and files, obtaining precise targets, without messing up the list with hundreds of processes in other paths that are not interest. The selected filters determine what you are watching and thus, which events can be triggered. So what is going on in your system, something that even the Task Manager cannot say. Quick Inspection of the Directory, with a double click on the Events or Processes displayed. Saving of log activities in * .txt format, with a simple and clean reading, to easily compare the activities in order of time and scan, thanks to the time stamped in each line. Window position selectable with switch activities in Top Most. Automatic saving of last User Settings. Features Watch Process : processes activity with any process association in run mode or in background mode. Process activity splitted into a columns: "ID" "PROCESS NAME" "EXECUTABLE PATH" "COMMAND LINE" Events Folders &amp; Files : "Name-Dir" "Name-File" "Creation-Time" "Size-Change" "Security" "Attributes" "Last-Write" "Last-Access" Something is Changed : Occurs when a file or directory in the specified Path is changed. Something has been Created: Occurs when a file or directory in the specified Path is created. Something has been Deleted : Occurs when a file or directory in the specified Path is deleted. Something has been Renamed : Occurs when a file or directory in the specified Path is renamed. Attributes : The attributes of the file or folder. CreationTime : The time ...
5/5 3,059 May 27, 2020
Alex Malkovich <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Monitor File Events2_th.png"border="0">
MonitorControl v4.0.1
MonitorControl v4.0.1 Controls your external Apple display brightness and volume and shows native OSD. Use menulet sliders or the keyboard, including native Apple keys! Major features Control your display's brightness, volume and contrast! Shows native OSD for brightness and volume. Supports multiple protocols to adjust brightness: DDC for external displays (brightness, contrast, volume), native Apple protocol for Apple and built-in displays, Gamma table control for software adjustment (recommended for OLED), shade control for AirPlay, Sidecar and Display Link devices. Supports smooth brightness transitions. Seamlessly combined hardware and software dimming extends dimming beyond the minimum brightness available on your display. Synchronize brightness from built-in and Apple screens - replicate Ambient light sensor and touch bar induced changes to a non-Apple external display! Sync up all your displays using a single slider or keyboard shortcuts. Allows dimming to full black (advanced feature). Support for custom keyboard shortcuts as well as standard brightness and media keys on Apple keyboards. Dozens of customization options to tweak the inner workings of the app to suit your hardware and needs (don't forget to enable Show advanced settings in app Preferences). Modern, stylish and highly customizable menulet reflecting the design of Control Control introduced in Big Sur. Simple, unobstrusive UI to blend in to the general aesthetics of macOS (even the menu icon can be hidden). Supports automatic updates for a hassle-free experience. How to install and use the app 1) Download the app below 2) Copy the MonitorControl app file from the .DMG to your Applications folder 3) Click on the MonitorControl app file 4) Add the app to Accessibility under System ...
5/5 1,941 Nov 10, 2021
MonitorControl <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/MonitorControl1_th.png"border="0">
Monochrome v1.3
Monochrome v1.3 Monochrome is an IRC client intended for long-time IRC users. Its primary goals are security, reliability and stability despite IRC network failures or connectivity problems. If you have not used IRC before, you should probably look for another client; Monochrome is currently lacking documentation and assumes the user to have basic knowledge of common IRC commands and conventions. Main features: Reliable automatic identification with NickServ on most popular IRC networks. Full Unicode support. Sending and receiving of DCC file transfers, with auto-accept whitelist. Ignore and half-ignore lists. Trigger word list. Auto-away, monitoring of away state of other users. Logging. Customizable command aliases. Variety of entertaining easter eggs! Noteworthy features currently missing: Scripting - though functionality such as identifying with NickServ is automated, so there's no major need for running custom scripts. Help and documentation. System requirements: Windows XP or newer. .NET framework 4.x. License: GNU General Public License, version 2 Changes: Version 1.3 highlights: Added "nick account" to server parameters - use this to specify your primary nick when identifying with NickServ from another nick. Useful when keeping more than one client connected. Added widely requested "hide specific status messages" functionality so you can suppress joins/quits/modes. Holding shift key while launching now suppresses automatically connecting to configured IRC servers. Added mudlord's bsfilter code (hidden feature, only configurable via the XML). Added safeguards so you can't run more than one Monochrome instance with the same configuration file; existing instance is activated instead. Fixed incompatibility with servers ...
5/5 4,243 Feb 05, 2020
Peter Pawlowski <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Monochrome1_th.png"border="0">
Mozilla Firefox Portable v118.0.2
Mozilla Firefox Portable v118.0.2 Portable Firefox is a fully functional package of Firefox optimized for use on a USB key drive. It has some specially-selected optimizations to make it perform faster and extend the life of your USB key as well as a specialized launcher that will allow most of your favorite extensions to work as you switch computers. It will also work from a CDRW drive (in packet mode), ZIP drives, external hard drives, some MP3 players, flash RAM cards and more. To install, just download the ZIP and unzip it to the root directory of your USB drive. It will create a "firefox" directory and all the requisite directories underneath. To use Firefox on your drive, launch it with the PortableFirefox.exe file in the firefox directory. DO NOT launch the firefox.exe file directly, as this will create a profile on your hard drive or use an existing one. Additionally, be sure you've closed any local copies of Firefox and that they've finished shutting down. Otherwise, a new window of your local install will be launched. This is a feature of Firefox itself to prevent multiple copies running at the same time. Mozilla Firefox - Your web, the way you like it: high performance, easy customization and advanced security. Features: Anti-Malware Firefox protects you from viruses, worms, trojan horses and spyware delivered over the Web. If you accidentally access an attack site, it will warn you away from the site and tell you why it isn’t safe to use. Anti-Phishing Shop and do business safely on the Internet. Firefox gets a fresh update of web forgery sites 48 times in a day, so if you try to visit a fraudulent site that’s pretending to be a site you trust (like your bank), a browser message—big as life—will stop you. Instant Web Site ID Want to be extra sure ...
5/5 9,667 Oct 12, 2023
Mozilla & John T. Haller <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/FirefoxPortable_th.png"border="0">
Mozilla Thunderbird v115.7.0
Mozilla Thunderbird v115.7.0 Meet Supernova: Mozilla's fastest, most beautiful email, calendar, and contacts release yet. Designed to maximize your freedoms. Freedom from Chaos Waste less time finding browser tabs. Access all your messages, calendars, and contacts in one fast app. Filter and organize the way you like. Manage all accounts separately or in a unified inbox. Thunderbird simply makes your life simpler. Freedom from Manipulation Mozilla's agenda isn’t hidden. It’s to make the world better. Thunderbird is funded by user donations. They don’t collect personal data, sell ads in your inbox, or secretly train AI with your private conversations. Thunderbird is open source. As part of the Mozilla family you can be confident they always put your privacy and security first. Freedom to Geek Out Thunderbird is yours. Thunderbird is clean and elegant by default, but easily customizable to match your workflow and visual preferences. It is loaded with unique and powerful features. Key Features Include: • Mail Account Setup Wizard • One-click Address Book • Attachment Reminder • Tabbed Email • Quick Filter Toolbar • Search Tools • Message Archive • Large Files Management • Smart Folders • Add-ons Manager • Robust Privacy • Phishing Protection • Automated Update • Junk Mail Tools • Open Source This download is for the Windows version. All other download assets are below: MacOS: Thunderbird 115.7.0.dmg Linux: thunderbird-115.7.0.tar.bz2 Click here to visit the author's website.
5/5 7,087 Jan 26, 2024
The Mozilla Organization <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/mozillathunderbird_th.png"border="0">
MP4Tools v3.8
MP4Tools v3.8 A collection of cross-platform free tools to manipulate MP4 files. MP4Tools is a collection of simple free tools to manipulate MP4 files without re-encoding and without quality loss. It is Open Source Software and is completely free. MP4Tools contains following applications: • MP4Joiner is a free application that allows join multiple MP4 files into one without reencoding and without quality loss. • MP4Splitter is a free application that allows split a MP4 file in multiple files without reencoding and without quality loss Changes: MP4Joiner: added possibility to specify audio sample rate and bitrate for re-encoding MP4Splitter: added possibility to split on key frames only (disabled by default) MP4Splitter: added support of drag and drop updaed Spain translation (thanks to Alejandro Cremades Bernabeu) added Spain (Venezuela) (thanks to Ricardo A. Rivas) added Korean translation (thanks to Hae Moon, Kwon) added Sinhala translation (thanks to Asanka Sovis / අසංක සෝවිස්) updated ffmpeg to version 4.1.1 This download is for the Windows version. If you need the macOS (OS X ≥ 10.10, Catalina+) version, download here. Starting MP4Tools on macOS Catalina or higher: To start MP4Tools you need to control-click the app icon, then choose Open from the shortcut menu. The app is saved as an exception to your security settings, and you can open it in the future by double-clicking it, just as you can any authorized app. Click here to visit the author's website.
5/5 1,069 Jun 04, 2023
Alex Thüring <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/MP4Tools2_th.png"border="0">
Mumble v1.4.287
Mumble v1.4.287 Open Source, Low Latency, High Quality Voice Chat Mumble was the first VoIP application to establish true low latency voice communication over a decade ago. But low latency and gaming are not the only use cases it shines in. "We heard from users who record podcasts with our multi-channel audio recorder, players seeking realism with our positional audio in games, Eve Online players with huge communities of over 100 simultaneous voice participants (I bet they make good use of our extensive permission system 😄), the competitive Team Fortress 2 community making us their required voice communication platform, hobby radio transmission users, and a variety of workplaces adapting Mumble to fit their needs - be it on-head mobile devices or communicating across countries or into airplanes." "Administrators appreciate Mumble for being able to self host and have control over data security and privacy. Some make use of the extensive permission system for complex scenarios (for example separating two groups but leaders being able to talk to both). Some love to provide their users with additional functionality with scripts making use of server APIs, or host music bots and the like that connect to the server. Those that have an existing user database often make use of authenticators to allow authenticating with existing account login data." -Mumble Project Team Features Different user groups are interested in different capabilities For End-Users Low-latency - great for talking and gaming Stay private and secure always encrypted communication Public/private-key authentication by default Recognize friends across servers For gamers: In-game Overlay - see who is talking, FPS and the current time Positional ...
5/5 1,328 Oct 03, 2022
Mumble Project Team <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Mumble1_th.png"border="0">
Net Disabler v1.1
Net Disabler v1.1 On average, teens spend nine hours a day using media for entertainment – that’s more time than they spend sleeping and far more time than they spend studying. This is why more and more families are looking into ways to block internet access temporarily.But as we all know, it can be hard to give up things that are bad for us, we get home from work but continue to check email, waste time on social networking sites, or stare blankly at a computer for such reason We may want to turn the internet off temporarily. The reasons to Completely Disable Internet are varied and many , for example : 1. To prevent programs from calling home or from updating. 2. To prevent your computer from receiving email or social media alerts etc. you could also use it to avoid distractions during work. 3. Disconnecting from the internet can limit the impact of the malware it is a security technique known as an “air gap”. By separating the computer from any network makes it more secure. 4. Internet access can be harmful if employees spend too much time browsing the Internet instead of performing their regular duties… Technically, you can control internet by running netsh interface command in command prompt window to enable and disable the network connection that has the internet access. But This method can be easily circumvented and does not offer a guarantee. If you want to disable Internet connectivity for some time or on some events, you can easily do it with Net Disabler it is a small portable Freeware tool, you can use it to quickly turn the Internet off or on again. The application displays the current status of the Internet connection in the interface above is on status and below is off Usage is very simple,there are 4 Internet ...
5/5 4,949 Apr 16, 2021
Sordum.org <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/NetDisabler1_th.png"border="0">
NetAdapter Repair All In One 1.2
NetAdapter Repair All In One 1.2 NetAdapter Repair is an All In One program that allows a user to effectively troubleshoot and repair common problems with windows networking adapters. Repair Buttons and Additional Tools: Advanced Repair (WinSock/TCP IP Repair, Clear all Proxy/VPN Settings, Windows Firewall Repair) Release and Renew DHCP Address Clear Host File Clear Static IP Settings (enable DHCP) Change to Google DNS Flush DNS Cache Clear ARP/Route Table NetBIOS Reload and Release Internet Options - Clear SSL State Enable LAN Adapters Enable Wireless Adapters Reset Internet Options Security/Privacy Set Network Windows Services Default
0/5 7,629 Jul 18, 2014
Conner Bernhard
NetHotfixScanner 1.5
NetHotfixScanner 1.5 Network Hotfix Scanner is a free advanced hotfix check utility that scans network computers for missing hotfixes and patches, and helps you download and install them. NetHotfixScanner gives you a quick look at the hotfixes and patches installed or missed on any remote computer in your corporate network, it tells you by colored icons specific security bulletin rating ( critical, important, moderate ), title, description and bulletin URL. The tool is designed with a user-friendly interface and is easy to use.
5/5 8,895 Nov 15, 2019
Nsasoft LLC <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/nethotfixscanner_th.png"border="0">
Network Profile Name Changer v1.4
Network Profile Name Changer v1.4 Delete / Rename Network Connections When you connect to a Ethernet or wired network for the first time, Windows automatically creates a network profile and assigns generic names like Network 1, Network 2, etc. finally stores it on your computer as a known network. A wireless network profile will use the SSID of the wireless network (ex: router) . Some users and administrators may dislike the non-descriptive network connections names and want to rename , delete or clear redundant network profiles (names). After Windows 7 , Microsoft removed Netork Profile rename option therefore you will not find any option whatsoever in the Settings app or Control Panel to change the network name. It is still possible to edit network profile names to make them more descriptive but the only effective way to Rename or remove the connections in Windows 11, Windows 10 and Windows 8 is by using the registry editor. (valid in all Windows versions) Changes What is New (Thursday, September 28, 2023) 1.[FIXED] – Deleted network profile leaves leftover in a registry key 2.[FIXED] – Can’t upper/lower letter in renaming 3.[ADDED] – Multiple selection feature in the List with Ctrl key 4.[ADDED] – x64 version 5.[ADDED] – High contrast support 6.[ADDED] – Manage Known Networks has been added (Under the menu button) 7.[ADDED] – Some code Improvements How to Change the Active Network Profile Name You can check the current name in the Network and Sharing Center on Windows , press the Windows + R keys to open the Run dialog, type one of the following commands and press Enter. control.exe /name Microsoft.NetworkAndSharingCenter explorer.exe shell:::{8E908FC9-BECC-40f6-915B-F4CA0E70D03D} The name of the network is displayed at the very top of the page. Windows Users have three main options to change a network name; 1. Using Local Security Policy (It is only available in professional versions of Windows) 2. Using the Windows Registry 3. Using Network ...
5/5 3,255 Mar 17, 2024
Sordum.org <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/NetProfNameChange1_th.png"border="0">
Network Security Toolkit (NST) v38
Network Security Toolkit (NST) v38 A network security analysis and monitoring toolkit Linux distribution. Network Security Toolkit (NST) is a bootable ISO image (Live USB Flash Drive) based on Fedora 36 providing easy access to best-of-breed Open Source Network Security Applications and should run on most x86_64 systems. The main intent of developing this toolkit was to provide the security professional and network administrator with a comprehensive set of Open Source Network Security Tools. The majority of tools published in the article: Top 125 Security Tools by INSECURE.ORG are available in the toolkit. An advanced Web User Interface (WUI) is provided for system/network administration, navigation, automation, network monitoring, host geolocation, network analysis and configuration of many network and security applications found within the NST distribution. In the virtual world, NST can be used as a network security analysis, validation and monitoring tool on enterprise virtual servers hosting virtual machines. Features Multi-Tap Network Packet Capture Web-Based Network Security Tools Management Host/IPv4 Address Geolocation Network/System Monitoring Network Intrusion Detection Network Interface Bandwidth Monitor Web-based Snort IDS Integration Active Connections Monitor Network Segment ARP Scanner Network Packet Capture CloudShark Upload Support Multi-Port Terminal Server VNC / RDP Desktop Session Management Click here to visit the author's website.
5/5 2,507 Oct 03, 2023
networksecuritytoolkit.org <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/NST1_th.png"border="0">
NETworkManager v2021.2.17.0
NETworkManager v2021.2.17.0 NETworkManager is a powerful tool for managing networks and troubleshoot network problems! You can view and configure network interfaces, scan for wifi networks, capture lldp or cdp packages, perform an IP or port scan, ping your hosts, and troubleshoot your connection using traceroute or a DNS lookup. It contains a remote desktop and PowerShell for managing Windows devices. You can use PuTTY, TigerVNC or the web console to administrate Linux or other devices (e.g. switches). And best of all… everything has tabs and you can create a profile for each of your hosts that can be used across all features. The profile files can be stored encrypted on disk and protected with a master password to provide an additional layer of security. There are some more features such as a subnet calculator, a Whois lookup or a database in which you can find MAC address vendors or TCP / UDP ports with a description. Features Dashboard Network Interface - Information, Bandwidth, Configure WiFi - Networks, Channels IP Scanner Port Scanner Ping Monitor Traceroute DNS Lookup Remote Desktop PowerShell PuTTY (requires PuTTY) TigerVNC (requires TigerVNC) Web Console (requires Microsoft Edge - WebView2 Runtime) SNMP - Get, Walk, Set Discovery Protocol - LLDP, CDP Wake on LAN Whois Subnet Calculator - Calculator, Subnetting, Supernetting Lookup - OUI, Port Connections Listeners ARP Table Hosts can be stored in profiles, which can be used across all features. Individual settings ...
5/5 2,518 Mar 13, 2021
BornToBeRoot <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/NETworkManager1_th.png"border="0">
APK NewPipe v0.21.15
NewPipe v0.21.15 The lightweight YouTube experience for Android. Do you like watching videos on YouTube but want an intuitive, feature-rich and privacy friendly app for that? NewPipe has been created with the purpose of getting the original YouTube experience on your smartphone without annoying ads and questionable permissions. Supported services YouTube YouTube is one of the most popular video and live streaming platforms, including music, news, gaming and much more. PeerTube PeerTube is a decentralized video platform. Any PeerTube instance can be added to NewPipe. SoundCloud SoundCloud is a streaming platform for music. Bandcamp Bandcamp is an artist-friendly platform for sharing music. It offers user-friendly DRM-free downloads. media.ccc.de media.ccc.de is the video archive and live streaming platform of the German hacker and information security activist group Chaos Computer Club. And more to come! Special instructions to use .apk files in Android Allow app installations from unknown sources in Android. We found a great article on how to do this HERE. Features and screenshots Advanced search with filters Customizable downloads Play downloads Normal player Popup player Background player View channels Trending page Subscriptions Custom feed History Enhanced playback settings Playlist support This download is for the Android 4.4 or higher version. If you need the Android 4.1-4.3 version, download here. Click here to visit the author's website.
5/5 1,832 Dec 31, 2021
Team NewPipe <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/NewPipe1_th.png"border="0">
Nmap Security Scanner v7.94
Nmap Security Scanner v7.94 A free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), a utility for comparing scan results (Ndiff), and a packet generation and response analysis tool (Nping). Features: Flexible: Supports dozens of advanced techniques for mapping out networks filled with IP filters, firewalls, routers, and other obstacles. This includes many port scanning mechanisms (both TCP &amp; UDP), OS detection, version detection, ping sweeps, and more. See the documentation page. Powerful: Nmap has been used to scan huge networks of literally hundreds of thousands of machines. Portable: Most operating systems are supported, including Linux, Microsoft Windows, FreeBSD, OpenBSD, Solaris, IRIX, Mac OS X, HP-UX, NetBSD, Sun OS, Amiga, and more. Easy: While Nmap offers a rich set of advanced features for power users, you can start out as simply as "nmap -v -A targethost". Both traditional command line and graphical (GUI) versions are available to suit your preference. Binaries are available for those who do not wish to compile Nmap from source. Free: The primary ...
5/5 9,283 Nov 21, 2023
Nmap <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/nmap4_th.png"border="0">
NordLocker (MacOS) v1.0.47
NordLocker (MacOS) v1.0.47 Store and share your files securely. Encryption is on us. Encrypt 5 GB for free! Personal files. For your eyes only. Photos, videos, notes Think of all the personal files you’d rather keep private. Prevent them from ending up in the wrong hands and being exploited in malicious ways. Finances, IDs, passwords Getting this info compromised may lead to identity theft or loss of money. NordLocker ensures top-notch security for your sensitive data. Your secrets Whether it’s your diary or a secret music collection, NordLocker protects it from prying eyes so you don’t have to worry about someone trying to snoop on you. Work-related data. Secured. Freelancing work Use NordLocker to ensure secure file access and make your professionalism shine when sharing your work with clients. Confidential work in progress If you’re an entrepreneur, programmer, researcher or any other professional in the process of creating something big, keep it confidential as long as you need. Medical records Medical data is increasingly becoming a target for cybercrime. Protect sensitive data of your patients by storing it securely encrypted. Leading-edge encryption at your fingertips We use the most advanced ciphers and principles, featuring Argon2, AES256, ECC (with XChaCha20, EdDSA and Poly1305), and other creations of modern cryptography to guarantee ultimate security of your files. Encrypt everything, worry about nothing We protect your files with seamless end-to-end encryption. Enjoy peace of mind – files encrypted with NordLocker are safe no matter where you decide to keep them. Secure all types of files – as many as you like. Safeguard your cloud data Cloud services give you storage – we add security on top. Encrypt your files with NordLocker before uploading to the cloud and enjoy peace of mind knowing that no one’s peeking. NordLocker plays nicely with all cloud storage providers. Share securely Need to transfer confidential data to a partner or a client? Give them access to the encrypted file and send ...
5/5 3,738 Jan 30, 2020
NordLocker <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/NordLocker1_th.png"border="0">
NordLocker (Windows) v1.0.47
NordLocker (Windows) v1.0.47 Store and share your files securely. Encryption is on us. Encrypt 5 GB for free! Personal files. For your eyes only. Photos, videos, notes Think of all the personal files you’d rather keep private. Prevent them from ending up in the wrong hands and being exploited in malicious ways. Finances, IDs, passwords Getting this info compromised may lead to identity theft or loss of money. NordLocker ensures top-notch security for your sensitive data. Your secrets Whether it’s your diary or a secret music collection, NordLocker protects it from prying eyes so you don’t have to worry about someone trying to snoop on you. Work-related data. Secured. Freelancing work Use NordLocker to ensure secure file access and make your professionalism shine when sharing your work with clients. Confidential work in progress If you’re an entrepreneur, programmer, researcher or any other professional in the process of creating something big, keep it confidential as long as you need. Medical records Medical data is increasingly becoming a target for cybercrime. Protect sensitive data of your patients by storing it securely encrypted. Leading-edge encryption at your fingertips We use the most advanced ciphers and principles, featuring Argon2, AES256, ECC (with XChaCha20, EdDSA and Poly1305), and other creations of modern cryptography to guarantee ultimate security of your files. Encrypt everything, worry about nothing We protect your files with seamless end-to-end encryption. Enjoy peace of mind – files encrypted with NordLocker are safe no matter where you decide to keep them. Secure all types of files – as many as you like. Safeguard your cloud data Cloud services give you storage – we add security on top. Encrypt your files with NordLocker before uploading to the cloud and enjoy peace of mind knowing that no one’s peeking. NordLocker plays nicely with all cloud storage providers. Share securely Need to transfer confidential data to a partner or a client? Give them access to the encrypted file and send ...
5/5 3,326 Jan 30, 2020
NordLocker <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/NordLocker1_th.png"border="0">
Norton Remove and Reinstall Tool v4.5.0.148
Norton Remove and Reinstall Tool v4.5.0.148 Norton Remove &amp; Reinstall tool helps to uninstall and reinstall Norton security products. Before you begin The Norton Remove and Reinstall tool uninstalls most Norton products, and reinstalls the latest version. Before you proceed, make sure that you meet the following requirements: You need to have an Internet connection The tool does not remove Norton Utilities or Norton Family The tool does not remove your Norton Identity Safe local vault You can also choose to just uninstall without reinstalling. Click here to visit the author's website.
5/5 6,109 Dec 01, 2020
Symantec <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/NortonRemovalTool_th.png"border="0">
NoScript v11.4.24
NoScript v11.4.24 Free Open Source Software (FOSS) providing extra protection for Firefox (on Android, too!), Chrome, Edge, Brave and other web browsers. NoScript is a built-in key security component of the Tor Browser, the top anonymity tool defending millions against surveillance and censorship. This browser extension allows JavaScript and other potentially harmful content to be executed only by trusted web sites of your choice (e.g. your online bank). NoScript also provides the most powerful anti-XSS protection ever available in a browser. NoScript's unique pre-emptive script blocking approach prevents exploitation of security vulnerabilities (known, such as Meltdown or Spectre, and even not known yet!) with no functionality loss: you can enable JavaScript and other dynamic capabilities for sites you trust with a simple click. Experts* will agree: the web is really safer with NoScript. * experts endorsing NoScript, among others: Edward Snowden (former NSA analyst and whistleblower against surveillance state); Window Snyder (former top security officer at Microsoft, Square, Inc., Apple, Fastly, Intel and Mozilla Corp.); Douglas Crockford (Javascript expert and creator of the JSON format); the Sans Internet Storm Center Changes: v11.4.24 [XSS] Fix Base64 hash checks interfering with query string checks (thanks barbaz for reporting) [TabGuard] Stop exempting domains bidirectionally by default [TabGuard] Fix destination domain being reported as the trigger of a warning prompt when all the other tab-tied domains have been exempted (thanks barbaz for report) This download is for the Firefox version. If you need the Chrome and other Chromium-based browsers (eg. Edge, Brave, Vivaldi...) version, download here. Click here to visit the author's website.
5/5 8,786 Jun 30, 2023
InformAction <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/noscript_th.png"border="0">
NoWinLock v1.0
NoWinLock v1.0 Disable the Lock feature in Windows 10 and 11. Disabling Lock, forces all users to sign out or shutdown their computers preventing the ability to leave programs running or files open when their computer is not in use. INSTRUCTIONS (Note: You may not get asked all of these questions.) 1) Double or single click on NoWinLock.reg 2) On the Security Warning window, click RUN. 3) When asked "Do you want to allow this app to make changes to your computer?", choose YES. 4) When asked "Adding information can unintentionally change or delete values and cause... Are you sure you want to continue?", choose YES. 5) On the message telling you it was successful, click OK. 6) Restart your computer. To undo NoLockScreen, run UndoNoWinLock.reg using the same instructions. Click here to visit the author's website.
5/5 1,793 Feb 20, 2022
OlderGeeks.com <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/NoWinLock1_th.png"border="0">
NVIDIA GeForce Experience v3.20.5.70
NVIDIA GeForce Experience v3.20.5.70 Keep your drivers up to date. Optimize your game settings. Even capture and share videos, screenshots, and livestreams with friends. GeForce® Experience™ lets you do it all. It’s the perfect companion to your GeForce® GTX graphics card. Share Your Greatest Moments Now you can record and share gameplay videos and livestreams on YouTube, Twitch, and Facebook. NVIDIA ShadowPlay™ technology lets you broadcast with minimal performance overhead, so you never miss a beat in your games. The GeForce Experience in-game overlay makes it fast and easy. Broadcast to Facebook Live. Automatically record with ShadowPlay Highlights. Get Game Ready Drivers For each major game release, NVIDIA works closely with developers to boost performance, fix bugs, and improve your gaming experience. Technologies like NVIDIA GameWorks™ give you the tools you need to optimize gameplay and bring you these improvements through a Game Ready driver update. GeForce Experience automatically notifies you when these drivers are available, and with a single click, you can update to the latest driver--without leaving your desktop. Optimize Your Game Settings GeForce Experience takes the hassle out of PC gaming by configuring your game’s graphics settings for you. Don’t know what texture filtering level to set in Overwatch? Not to worry - NVIDIA taps into the power of the NVIDIA cloud data center to test thousands of PC hardware configurations and find the best balance of performance and image quality. Then it automatically configures personalized graphics settings based on your PC’s GPU, CPU, and display. Supported for over 400 Games GEFORCE EXPERIENCE 3.20.5 RELEASE HIGHLIGHTS What's new in GeForce Experience 3.20.5 Enhanced In-Game Overlay GeForce Experience 3.20.5 Beta now adds new performance monitoring metrics in the in-game overlay. In addition to FPS, the performance monitoring metrics now show detailed performance stats, temperature, and latency metrics. ...
5/5 8,624 Jan 12, 2021
NVIDIA <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/geforce-experience1_th.png"border="0">
NxFilter v4.5.4.1
NxFilter v4.5.4.1 A freeware web-filter designed for enterprise environments. It started as a dns-filter. Now it provides web-proxy based filtering as well. NxFilter can do everything you can expect from a dns-filter or a web-filter. Faster and lighter Filtering requires an extra process for your network. It can be a bottle neck in your network and cause a latency problem. NxFilter uses lightweight DNS protocol for its filtering. There will be no latency problem from NxFilter. Network performance NxFilter doesn’t just do filtering. It caches DNS responses from public DNS servers. Once it cached, it will be resolved in your local network. It will save you a lot of bandwidth and improve your network performance. Scalability We see many sites running NxFilter for several thousand users. At the moment, the biggest number of users for a single NxFilter server we have seen is 60,000. We don’t know its limit yet. Authentication You want to protect your network with a login procedure and differentiate users with userames and IP addresses on your report view. NxFilter offers IP and password based authentication by itself. Active Directory integration You can import users and groups from an Active Directory domain and you can filter them by multiple policies based on those imported groups and users. Single sign-on Your users don’t want to go through any other login process after they logged in to their PCs. NxFilter provides several kinds of single sign-on agents. Some of them can be used for Active Directory integration. Multiple policies You can have multiple policies for your users. One policy for staffs and a stricter policy for your students. You can apply these policies based on IP and IP ranges or users and groups created on NxFilter GUI or imported from your Active Directory domain. Easy deployment You can say that NxFilter is the easiest webfilter to install and manage. Many of our users are ...
5/5 6,334 Jan 27, 2022
Jahastech <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/NxFilter_th.png"border="0">
OandO ShutUp10++ v1.9.1436
OandO ShutUp10++ v1.9.1436 Free antispy tool for Windows 10 and 11 OandO ShutUp10++ means you have full control over which comfort functions under Windows 10 and Windows 11 you wish to use, and you decide when the passing on of your data goes too far. Using a very simple interface, you decide how Windows 10 and Windows 11 should respect your privacy by deciding which unwanted functions should be deactivated. OandO ShutUp10++ is entirely free and does not have to be installed – it can be simply run directly and immediately on your PC. And it will not install or download retrospectively unwanted or unnecessary software, like so many other programs do these days! More control over your operating system Adapt your security settings Protect your privacy Control location services Do not pass on your user data and diagnostics Further information Portable Version – no installation required Free of charge for private users, companies and educational institutions Operating System: Supports all Microsoft® Windows 11 and Windows 10 Available in English, German, French, Italian, Spanish, Russian and Chinese (simplified) Windows 11 and Windows 10 wants to give users the easiest possible daily experience and in doing so very rarely forces you to actually read and confirm a security notice. Unfortunately, this simplified approach from Microsoft means much more data is passed onto them than many users would like. Microsoft uses most data to display personalized information to you that is aimed at making your computer life easier. As an example, Windows can remind you to set off to the airport 30 minutes earlier due to traffic en route. In order to deliver this information to you, ...
5/5 6,878 Dec 07, 2023
OandO Software GmbH <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/ShutUp10start_th.png"border="0">
OfflineInsiderEnroll v2.6.4
OfflineInsiderEnroll v2.6.4 A simple Windows Command Prompt script to enable access to the Windows Insider Program on machines not signed in with Microsoft Account. This script is compatible only with Windows 11 or Windows 10 version 1809 and later. Usage This script requires administrative priviliges to run. You can simply execute it by right clicking it > Run as Administrator. Installation and configuration changes After starting, the script offers selection of Windows Insider Program channels. To make a selection, press a letter coresponding to option you choose and press ENTER. If the machine was not enrolled to the Insider Program, you will get prompted to restart your machine to enable Microsoft Flight Signing which is required by Windows Insider Program. Notice: Windows Insider Program requires telemetry to be set to Full. After enrolling your machine to the Windows Insider Program please make sure that your diagnostic data collection settings are set to Full. Some Insider Preview builds may not get offered in Windows Update if you do not have correct telemetry settings. You can verify or modify your telemetry settings as follows: Windows 11: Settings > Privacy and Security > Diagnostics &amp; feedback Windows 10: Settings > Privacy > Diagnostics &amp; Feedback Restoring Windows Insider Program to default options To restore Windows Insider Program to default settings simply choose Stop receiving Insider Preview builds in OfflineInsiderEnroll Script. You will get prompted to reboot, because this option will disable Microsoft Flight Signing. How does this work? This script takes advantage of undocumented TestFlags registry value. If this value is set to 0x20, all access to online Windows Insider services gets disabled. Because of this, we can set our own Windows Insider Preview configuration without being overriden by the contact to the service. Since Windows Update does not check if machine is actually enrolled to the program, you will get offered Insider Preview builds by ...
5/5 2,200 Mar 13, 2023
abbodi1406 <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/OfflineInsiderEnroll1_th.png"border="0">
OnionShare v2.1 (MacOS)
OnionShare v2.1 (MacOS) OnionShare lets you securely and anonymously send and receive files. It works by starting a web server, making it accessible as a Tor onion service, and generating an unguessable web address so others can download files from you, or upload files to you. It does not require setting up a separate server or using a third party file-sharing service. If you want to send files to someone, OnionShare hosts them on your own computer and uses a Tor onion service to make them temporarily accessible over the internet. The receiving user just needs to open the web address in Tor Browser to download the files. If you want to receive files, OnionShare hosts an anonymous dropbox directly on your computer and uses a Tor onion service to make it temporarily accessible over the internet. Other users can upload files to you from by loading the web address in Tor Browser. Documentation To learn how OnionShare works, what its security properties are, and how to use it, check out the wiki. Click here to visit the author's website.
5/5 4,149 Sep 23, 2019
Micah Lee <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/onionshare1_th.png"border="0">
OnionShare v2.1 (Windows)
OnionShare v2.1 (Windows) OnionShare lets you securely and anonymously send and receive files. It works by starting a web server, making it accessible as a Tor onion service, and generating an unguessable web address so others can download files from you, or upload files to you. It does not require setting up a separate server or using a third party file-sharing service. If you want to send files to someone, OnionShare hosts them on your own computer and uses a Tor onion service to make them temporarily accessible over the internet. The receiving user just needs to open the web address in Tor Browser to download the files. If you want to receive files, OnionShare hosts an anonymous dropbox directly on your computer and uses a Tor onion service to make it temporarily accessible over the internet. Other users can upload files to you from by loading the web address in Tor Browser. Documentation To learn how OnionShare works, what its security properties are, and how to use it, check out the wiki. Click here to visit the author's website.
5/5 4,221 Sep 23, 2019
Micah Lee <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/onionshare1_th.png"border="0">
Open Source Point of Sale v3.3.9
Open Source Point of Sale v3.3.9 A free, open source, web based point of sale application written in PHP using CodeIgniter framework. It uses MySQL as the data back end and has a Bootstrap 3 based user interface. The main features are: • Stock management (Items and Kits with extensible list of Attributes) • VAT, GST, customer and multi tiers taxation • Sale register with transactions logging • Quotation and invoicing • Expenses logging • Cashup • Receipt and invoice printing and/or emailing • Barcode generation and printing • Suppliers and Customers database • Multiuser with permission control • Reporting on sales, orders, expenses, inventory status • Receivings • Giftcard • Rewards • Restaurant tables • Messaging (SMS) • Multilanguage • Selectable Boostrap (Bootswatch) based UI theme • Mailchimp integration • reCAPTCHA to protect login page from brute force attacks • GDPR ready The software is written in PHP language, it uses MySQL (or MariaDB) as data storage back-end and has a simple but intuitive user interface. The latest 3.x version is a complete overhaul of the original software. It is now based on Bootstrap 3 using Bootswatch themes, and uses CodeIgniter version 3 as framework. It also has improved functionality and security. Try the online demo. A demo version of the latest master version can be found on the developer's Demo Server. LOGIN using username: admin password: pointofsale Server Requirements PHP version 7.2 ...
5/5 2,236 Feb 18, 2024
opensourcepos <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/OSPOS_th.png"border="0">
OpenPuff v4.01
OpenPuff v4.01 An open source, professional steganography tool OpenPuff is a professional steganography tool: HW seeded random number generator (CSPRNG) Deniable steganography Carrier chains (up to 256Mb of hidden data) Carrier bits selection level Modern multi-cryptography (16 algorithms) Multi-layered data obfuscation (3 passwords) X-squared steganalysis resistance Unique layers of security and obfuscation: 256bit+256bit symmetric-key cryptography (with KDF4 password extension) 256bit symmetric-key data scrambling (CSPRNG-based shuffling) 256bit symmetric-key data whitening (CSPRNG-based noise mixing) Adaptive non-linear carrier bit encoding OpenPuff supports many carrier formats: Images (BMP, JPG, PCX, PNG, TGA) Audio support (AIFF, MP3, NEXT/SUN, WAV) Video support (3GP, MP4, MPG, VOB) Flash-Adobe support (FLV, SWF, PDF) OpenPuff is a portable/stealth software: Native portable structure (no installation, registry keys, .ini files) Runs in user mode with DEP on Multithread support (up to 32 CPUs) = Faster processing OpenPuff is safe: Spyware/adware-free Fully redistributable OpenSource core crypto-library (libObfuscate) OpenPuff is a professional steganography tool with unique features, suitable for highly sensitive data covert transmission. Carrier chains: Data is split among many carriers. Only the correct carrier sequence enables unhiding. Moreover, up to 256Mb can be hidden, if you have enough carriers at disposal. Last carrier will be filled with random bits in order to make it undistinguishable from others. Supported formats: Images, audios, videos, flash, adobe. Layers of security: Data, before carrier injection, is encrypted ...
5/5 1,931 Feb 10, 2022
Embedded SW <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/OpenPuff1_th.png"border="0">
Optimizer v15.8
Optimizer v15.8 An advanced configuration utility designed to enhance your privacy and security on Windows. This tool is highly recommended for use after a fresh installation of Windows to achieve maximum privacy and security benefits. Depending on your Windows version, Optimizer can also help you apply specific system tweaks. Note: This program has 4 hits on VirusTotal These are false positives due to the changes this program makes to your computer. The program is safe. Features: • Full multilingual support (22 languages available) • Enhance system and network performance • Disable unnecessary Windows services • Turn off Windows telemetry, Cortana, and more • Disable Office telemetry (works with Office 2016 or newer) • Stop automatic Windows 10 updates • Download multiple useful apps quickly • Uninstall UWP apps • Clean system drive and browser profiles • Fix common registry issues • Ping IPs and assess latency • Search IPs on SHODAN.io • Quickly change DNS server (from a pre-made list) • Flush DNS cache • Remove unwanted startup programs • Edit your HOSTS file • Identify and terminate file lock handles • Hardware inspection tool • Add items to the desktop right-click menu • Define custom commands for the run dialog • Support silent runs using a template file Compatibility: • Requires .NET Framework 4.8.1 • Compatible with Windows 7, 8, 8.1, 10, 11 • Can run on Windows Server 2008, 2012, ...
5/5 3,739 Sep 12, 2023
hellzerg <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Optimizer1_th.png"border="0">
OSE File and Text Encryption v1.11
OSE File and Text Encryption v1.11 Free tool to encrypt files and text using any one of a number of ciphers and modes provided by OpenSSL. Features • Completely portable • Ideal for Tails persistent storage • Very fast encryption Note from the author: OSE, A Graphical Frontend to OpenSSL's symmetric encryption OSE will encrypt files and text using any one of a number of ciphers and modes provided by OpenSSL, and its use is quite self explanatory. OSE is completely self contained and portable, making it ideal for USB flash drives and Tails persistent storage. It will create one file in the working directory, ".ose_cipher", which simply keeps track of the last used cipher. It is not necessary, just there for convenience, and if it's removed or not there, OSE will simply create another one defaulting to aes-128-ecb. Of course, OpenSSL must be present for OSE to work, and additionally, it makes calls to the system utility "echo" when encrypting text, so: Linux - OpenSSL and echo are already part of every distribution Windows - OpenSSL is probably not installed on your system, and the Windows "echo" call is inadequate for use by OSE. OSE, when launched, will spawn both openssl.exe and echo.exe in the working directory. (echo.exe is a Windows port of the UNIX/Linux echo) OSE will clean up these files upon terminating. Notes on long text strings: While you can encrypt a lot of text with the "echo" pipe, it's not unlimited. If you run into the case where OSE informs of a too long text string, an option is included to encrypt text using the TCL AES package using a 256 bit keystream and cbc mode. The password hashing and salting using this mode are extremely robust; you lose no security. Using this mode, the length of the ...
5/5 1,516 Feb 06, 2024
Dana Booth <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/OSEFileTextEncrypt1_th.png"border="0">
OSFMount v3.1.1002
OSFMount v3.1.1002 Mount local disk image files (bit-for-bit copies of a disk partition) in Windows with a drive letter. OSFMount also supports the creation of RAM disks, basically a disk mounted into RAM. This generally has a large speed benefit over using a hard disk. As such this is useful with applications requiring high speed disk access, such a database applications, games (such as game cache files) and browsers (cache files). A second benefit is security, as the disk contents are not stored on a physical hard disk (but rather in RAM) and on system shutdown the disk contents are not persistent. OSFMount supports mounting images of CDs in .ISO format , which can be useful when a particular CD is used often and the speed of access is important. System requirements Win 10 and Win 11 Win 7 SP1, Win 8, Windows Server 2008, 2012 (Windows Server 2016 has issues) are supported but have not been validated 64bit support (For 32-bit support, please use OSFMount v2) CPU with SSE4.2 instruction set (i.e. CPUs released after 2010) Users must have administrator privileges. RAM: 1GB (When mounting large disk images, the more RAM the better) Disk space: 15 MB of free hard disk space for the installation files. Known issues #1: On certain Windows systems (mostly Windows server 2016), when using OSFMount, Windows will prevent the OSFMount driver from loading. See the following page for more details, "Why do I get the error, Error loading OSFMount Driver?" #2: If you get an Access Denied message during install for the osfmount.sys file, or OSFmount driver is disabled error. Reboot the machine and reinstall. A previous version of the driver was likely still loaded in memory, preventing an update. Changes v3.1.1002, 15 Sep 2023 Fixed mounting of image files located on a network share using physical emulation This download is for the 64bit version. ...
5/5 5,074 Sep 15, 2023
Passmark Software <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/osfmount1_th.png"border="0">
OW Shredder v6.45.872.0
OW Shredder v6.45.872.0 File, folder and drive eraser OW Shredder is a powerful security tool, that allows you to completely erase sensitive data from your computer. Individual files, free disk space, and entire volumes get erased securely. In addition OW Shredder offers various tools to scan, analyze, and wipe; other traces that were left behind. OW Shredder also supports a desktop widget, a context menu integration and automatic recycle bin cleaning. All in all this small and portable application gives users or even companies the perfect solution to eleminate sensitive data from their computers or servers. Desktop widget Customizable GUI Command line support Simple drag and drop Advanced multi-threading Context menu integration Automatic recycle bin cleaning Different and custom erase algorithm Changes: 6.45 NEW: Software web parts updated to schiffer.tech Click here to visit the author's website.
5/5 4,162 Feb 13, 2019
Hendrik Schiffer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/OW Shredder1_th.png"border="0">
Oxynger KeyShield v2.2
Oxynger KeyShield v2.2 Private and Secure Virtual Keyboard Anti-Spyware Virtual Keyboard Oxynger KeyShield is a secure virtual keyboard for Windows to enter passwords and other confidential information to get protection from malicious programs known as keyloggers. Oxynger KeyShield protects its keystrokes from keystroke logging, screen logging, mouse logging, clipboard logging and shoulder surfing. Oxynger KeyShield is an essential security tool for protecting high-stakes passwords such as master password, online bank password or cryptocurrency wallet password. Keystroke Logging Protection Oxynger KeyShield provides the world's best protection from keylogging. It is 100% protected against hook based, API based, kernel/driver based and hardware keyloggers. Ordinary anti-keyloggers only protect from some type software keyloggers. But Oxynger KeyShield protect its keystrokes from software and hardware keyloggers. Most virtual keyboards (such as the virtual keyboard that comes with Windows) send normal keyboard event messages to the target program to type text. Almost every software keylogger can record these typed characters. Oxynger KeyShield do not use ordinary methods to send keystrokes to target application. Instead it uses a very secure communication channel for sending keystrokes to target application. Keyloggers will not be able to record keystrokes send through this channel. Screen Capture Protection Oxynger KeyShield is protected from making its screenshots or video. Many modern keyloggers are able to capture screens while entering passwords using a virtual keyboard. Screen capture protection of Oxynger KeyShield is currently the world's best. It prevents taking its screenshot using screen capture programs. It is also protected from video recording programs. Mouse Logging Protection Oxynger KeyShield provides superior protection from mouse logging. Protection from mouse logging is accomplished by not using the common QWERTY layout for positioning keys in Oxynger KeyShield. If mouse logging protection is turned on then it uses a random key layout. Thus hackers won’t get any idea of the key layout of Oxynger KeyShield in a ...
5/5 1,966 Dec 08, 2021
Oxynger Technologies <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Oxynger4_th.png"border="0">
Pale Moon v33.1.0
Pale Moon v33.1.0 Your browser, Your way! Pale Moon is an Open Source, Goanna-based web browser available for Microsoft Windows, focusing on efficiency and customization. Make sure to get the most out of your browser! Pale Moon offers you a browsing experience in a browser completely built from its own, independently developed source that has been forked off from Firefox/Mozilla code a number of years ago, with carefully selected features and optimizations to improve the browser's stability and user experience, while offering full customization and a growing collection of extensions and themes to make the browser truly your own. Main features: • Optimized for modern processors • Based on our own optimized layout and rendering engine (Goanna) • Safe: forked from mature Mozilla code and regularly updated with the latest security patches • Secure: Additional security features and security-aware development • Supported by our user community, and fully non-profit • Familiar, efficient, fully customizable interface • Support for full themes: total freedom for any element's design • Support for easily-created lightweight themes (skins) • Smooth and speedy page drawing and script processing • Increased stability: experience fewer browser crashes • Support for many "legacy" Firefox extensions • Support for a growing number of Pale Moon exclusive extensions • Extensive and growing support for existing web standards This browser, even though fairly close to Gecko-based browsers like Mozilla Firefox and SeaMonkey in the way it works, is based on a different layout engine and offers a different set of features. It aims to provide close adherence to official web standards and specifications in its implementation (with minimal ...
5/5 4,052 Apr 23, 2024
Moonchild Productions <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Pale Moon_th.png"border="0">
Password Generator v3.8
Password Generator v3.8 Password Generator can generate secure and easy to read and remember passwords. The most important features are: Password Generator can generate WEP and WPA2 keys for Wireless LAN (WLAN). Due to separate use of vowels and consonants, as well as separate syllables, the created passwords are easy to read and easy to remember. For a fast creation of passwords you can use user defined password-set. These password-sets allows the definition of the length and the character types to be used in the passwords. Reconstructable passwords can be created from sentences. Passwords for UNIX, PHP and .HTACCESS (DES, MD5 and SHA1) can be created. The checksums of passwords (MD5, SHA1, SHA256 and SHA512) can be generated. Password Generator can analyze the security of passwords and also shows details. 1.000 passwords can be created at once. The passwords can be saved in a plain text file. Password Generator is portable and can be used on USB devices. After you start the program, you can change the display language my choosing Extras and then Language from the drop-down menus. Languages: English, German, Catalan, Chinese, Chinese (trad.), Dutch, French, Greek, Italian, Japanese, Norwegian, Polish, Portuguese, Portuguese (brasil.), Russian, Spanish, Swedish, Ukrainian 7-Zip Code--- Use 7-Zip 32bit or 7-Zip 64bit to unzip this file. Changelog Version 3.8 Changed Password Generator has been converted to Microsoft .NET Framework 4. Click here to visit the author's website.
5/5 3,822 Aug 06, 2020
Gaijin.at <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/PasswordGenerator1_th.png"border="0">
Password Safe v3.65.0
Password Safe v3.65.0 How many passwords do you have to secure? Whether the answer is one or hundreds, Password Safe allows you to safely and easily create a secured and encrypted user name/password list. With Password Safe all you have to do is create and remember a single "Master Password" of your choice in order to unlock and access your entire user name/password list. Security starts with you, the user. Keeping written lists of passwords on scraps of paper, or in a text document on your desktop is unsafe and is easily viewed by prying eyes (both cyber-based and human). Using the same password over and over again across a wide spectrum of systems and web sites creates the nightmare scenario where once someone has figured out one password, they have figured out all your passwords and now have access to every part of your life (system, e-mail, retail, financial, work). Start your safe and simplified digital life Free open source software Installation in minutes on Windows 7, 8,10 and 11 Designed by renowned security technologist Bruce Schneier Over 5 million downloads Changes: PasswordSafe 3.64.1 Release Nov 2023 Bugs fixed in 3.64.1 Support control of screen capture protection feature at installation time, via checkbox in exe installer, SCREENCAPTUREPROTECTION=False option via msiexec. GH1041 PasswordSafe now verifies the signature when loading an app-specific dll. This download is for the Windows 64bit version. If you need the Windows 32bit version, download here. If you need the macOS version, download here. Click here to visit the author's website.
5/5 6,913 Jan 23, 2024
Bruce Schneier <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/passwordsafe_th.png"border="0">
ZIP Password Security Scanner v1.61
Password Security Scanner v1.61 This utility scans the passwords stored by popular Windows applications (Microsoft Outlook, Internet Explorer, Mozilla Firefox, and more...) and displays security information about all these passwords. The security information of every stored password includes the total number of characters, number of numeric characters, number of lowercase/uppercase characters, number of repeating characters, and password strength. You can use this tool to determine whether the passwords used by other users are secured enough, without watching the passwords themselves. System Requirements This utility works on any version of Windows, starting from Windows 2000 and up to Windows 10. Supported Applications Currently, Password Security Scanner scans the passwords of the following applications: Internet Explorer 4.0 - 6.0 Internet Explorer 7.0 - 11.0 Mozilla Firefox (All Versions) Mozilla Thunderbird Google Chrome Dialup/VPN passwords of Windows (Requires elevation) MSN/Windows Messenger Microsoft Outlook Windows Live Mail Yandex Web Browser Vivaldi Web Browser SeaMonkey Web browser. Pale Moon Web browser. Chromium-Based Edge Web browser Opera Web browser (Version 15 or greater) Windows Credentials Passwords (Requires elevation) Support for more applications will be added in future versions. Known Limitations Password Security Scanner cannot scan the passwords of Firefox if they are protected by a master password. The dialup passwords and Credentials passwords of Windows can only be detected if you run Password Security Scanner with Administrator privileges (elevation). This download is for the 64bit version. If you need the 32bit version, download here. Versions History Version 1.61: Fixed Password Security Scanner to ...
5/5 3,502 Jul 09, 2020
Nir Sofer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/passwordscan_th.png"border="0">
Patch My PC Home Updater v4.2.0.0
Patch My PC Home Updater v4.2.0.0 Patch My PC Updater is a free, easy-to-use program that keeps over 300 apps up-to-date on your computer. It is an easy way to update or install any of these programs on to your computer. A key component of staying safe online is keeping your computer up-to-date. Hackers and virus writers love targetting outdated software. Outdated software often contains security vulnerability’s, bugs, and performance issues that are often resolved in the latest version. These are some of the reasons why it’s essential to keep the apps updated (or “patched”). When you open Patch My PC Updater, it will scan your system for outdated programs. Programs that are outdated will be shown in – Red Programs that are updated will be shown in – Green Programs that are not installed will be shown in – Black Whether you are a computer novice, semi-tech savvy, the go-to tech person for your family and friends, or an IT professional, Patch My PC Updater will make patching your PC easy. Quick Start Guide Download Patch My PC Home Updater Patch My PC Home Updater Documentation Patch My PC Home Updater Features Updates over 300 common apps including portable Ability to cache updates for use on multiple machines No bloatware during installations Applications install/update silently by default no install wizard needed Optionally, disable silent install to perform a manual custom install Easy to use user interface Installs 64-bit apps by default on 64-bit windows Optionally choose to install 32-bit apps on 64-bit Windows Change updated and outdated apps color for color blindness Option to automatically kill programs ...
5/5 9,362 Sep 29, 2020
PatchMyPC.net <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/PatchMyPCUpdater_th.png"border="0">
PC Services Optimizer 2.2.385
PC Services Optimizer 2.2.385 PC Services Optimizer is an open source system tweaking solution that enables you to optimize Windows services in an easy, automatic and safe way based on the way you use your computer. It does not require any technical knowledge, as it provides easy to understand options to tune-up your system for better performance and security. Automatic TuneUp Automatic TuneUp tweaks your PC settings for best performance in an easy and safe way according to the way you use your computer. It will turn off unneeded Windows services without affecting the normal function, this will make your PC run faster and more secure. Manual TuneUp Manual TuneUp gives you the power to optimize Windows services in an easy, safe and advanced way without getting involved with Windows services functions and dependencies. Gaming Mode Gaming Mode will give your system an immediate performance boost. Unneeded Windows features will be temporary turned off to free up computer resources and concentrate computer power on programs you are currently using. Services Profiles PC Services Optimizer can save your services settings in profiles, enabling you to apply your different settings in seconds, saving you a lot of time specially when dealing with multiple computers or users. Services Manager Services Manager enables advanced users to master Windows services including third party services. It provides several tools for performing advanced functions for example you can install, start, stop, delete and specify the startup type of Windows services. Change Info: + Vista Services Optimizer name changed to PC Services Optimizer. + Added support for Microsoft Windows 8.1. + Added support for high DPI settings. + Added services snapshot creation notice. + Improved Live Update. + Fixed bug in Live Update. + Minor UI enhancements and bug fixes.
0/5 8,454 Feb 19, 2014
Smart PC Utilities
PDF24 Creator v11.12.0
PDF24 Creator v11.12.0 Free and easy to use PDF solution with many features. The Tools: PDF Creator Easily assemble, create and modify PDF files with the Drag and Drop enabled user interface. • Merge or split PDF files • Add, remove, extract, rotate, sort and move PDF pages • Import and automatic conversion of documents (Word, Excel, images, etc. to PDF • Various preview modes for easy editing of PDF documents • Integrated viewer • Drag and Drop wherever possible • Follow up tools: Save, Print, Email, Fax, ... PDF Printer Print on this printer in order to create a PDF or use it as a universal PDF converter that converts any printable file to PDF. • Virtual printer for PDF creation • Multiple PDF printers for different tasks • Automatic saving • Profiles for recurring tasks • PDF printer assistant for saving, sending by e-mail, ... • Universal PDF converter • Digital letter paper PDF Reader A full featured and lightweight PDF Reader for displaying PDFs is also included. • Full PDF Reader for viewing PDFs • Lightweight, without ballast • Low resource requirements • Short starting time • Has all the features of a normal PDF reader • Comes as a replacement for other PDF readers PDF Converter Convert files to PDF and PDF files to other file types PDF Compression Convert files to PDF and PDF files to other file types PDF OCR Recognize text in PDF and image files via OCR ...
5/5 6,391 May 22, 2023
Geek Software GmbH <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/PDF24_th.png"border="0">
PeaZip v9.7.0
PeaZip v9.7.0 Free, cross-platform zip/unzip software, Rar file extractor and file/archive manager. PeaZip is a free file archiver utility and rar extractor for Windows and Linux, work with 200+ archive types and variants (7z, ace, arc, bz2, cab, gz, iso, paq, pea, rar, tar, wim, zip, zipx...), handle spanned archives (001, r01, z01...) and support multiple archive encryption standards. The project aims to provide a cross-platform, portable, GUI frontend for multiple Open Source technologies (7-Zip, FreeArc, PAQ, PEA, UPX) focused on file and archive management, and security (strong encryption, two factor authentication, encrypted password manager, secure delete). The program is written in Lazarus / FreePascal (Windows installable packages are scripted with InnoSetup) and offers a LGPLv3 alternative to proprietary software (WinZip, WinRar, etc), running as native application on Windows/Win64, Wine/ReactOS, Linux x86/x86-64 (with Linux ARM and BSD ports also available), and Darwin / macOS both Intel x86_64 and aarch64 (e.g. M1 Apple Silicon SoC). Features Volume spanning Compression Authenticated encryption Supports: 7Z, 7-Zip sfx, ACE, ARJ, Brotli, BZ2, CAB, CHM, CPIO, DEB, GZ, ISO, JAR, LHA/LZH, NSIS, OOo, PAQ/LPAQ, PEA, QUAD, RAR, RPM, split, TAR, Z, ZIP, ZIPX, Zstandard. Changes https://peazip.github.io/changelog.html This download is for the Windows 64bit portable version. All other download assets are below: Windows: peazip-9.7.0.WIN64.exe (64bit) peazip-9.7.0.WINDOWS.exe (32bit) peazip_portable-9.7.0.WINDOWS.zip (32bit) MacOS: peazip-9.7.0.DARWIN.x86_64.dmg peazip-9.7.0.DARWIN.aarch64.dmg FreeBSD: peazip_portable-9.7.0.BSD.GTK2.x86_64.tar.gz Linux: peazip_portable-9.7.0.LINUX.Qt5.x86_64.tar.gz peazip_portable-9.7.0.LINUX.GTK2.x86_64.tar.gz peazip_9.7.0.LINUX.Qt5-1_amd64.deb peazip_9.7.0.LINUX.GTK2-1_amd64.deb peazip-9.7.0.LINUX.Qt5-1.x86_64.rpm peazip-9.7.0.LINUX.GTK2-1.x86_64.rpm Click here to visit the author's website.
5/5 5,676 Feb 14, 2024
PeaZip <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/peazip1_th.png"border="0">
Pegasus Mail v4.80
Pegasus Mail v4.80 A free email client for Windows. Pegasus Mail is an e-mail client that runs on computers using Microsoft Windows: by client, we mean that it interacts directly with the user, allowing mail to be sent, read, filed, printed and otherwise manipulated through a graphical interface. Probably one of the most feature-rich mail clients available, most users say that they find the program easy to use despite its richness. Small and fast, Pegasus Mail can be left running permanently on the workstation and includes powerful tools to notify the user when new mail arrives. Features • Multilingual availability - available with fully-translated French, German and Italian interfaces, as well as English. • Security, security, security: Pegasus Mail protects you from even the worst HTML-borne virus and trojans, and protects your privacy by intercepting web bugs. Pegasus Mail is immune to *all* the exploits that affect the "other" mailer - browse your mail with genuine confidence. • View your folders in either a multi-pane mode (like the "other" mailer) or in Pegasus Mail's powerful "classic" mode, where each folder has its own window and can be manipulated separately. Switching between these views is as simple as clicking a single button. • Mail filtering; Pegasus Mail pioneered this in 1991, and it's still the most powerful implementation of automated rule-based filtering you'll find in a mail client. • Bayesian filtering - Pegasus Mail's built-in Spamhalter Bayesian filter learns from the spam you receive and automatically files it in your junk folder. • Content control allows you to apply comprehensive rules to trap spam and unwanted mail • MailMerge allows you to create customized form letters to multiple recipients ...
5/5 5,900 Apr 22, 2024
David Harris <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Pegasus Mail1_th.png"border="0">
pelook v1.65
pelook v1.65 Pelook is a comprehensive information tool for 32 and 64 bit Windows EXE, DLL, driver and OBJ files (PE/COFF images). This tool is suitable for reverse engineers or anyone needing to delve into the internals of Windows PE files. At first glance, pelook may seem a lot like Microsoft's dumpbin tool, however you'll find it has many additional features and doesn't have the unnecessary verbosity of dumpbin. Rather than blindly dumping fields from the various headers and sections that comprise a PE image, pelook creates an intelligent report of the most useful information in the most compact form possible without sacrificing readibility. Why shouldn't you be able to see the target architecture, dependency DLLs, section list, loader flags, supported .NET framework and version resource all within the same screenful of information and all within the same tool? Pelook was originally written for the virtual memory map display and pointer to image-file-offset conversions; two features I always needed but never found in other PE dumping tools. Pelook combines the most widely used features in these popular tools in addition to other useful features: Dumpbin - Microsoft's PE/COFF header dump tool Depends - Microsoft's Dependency Walker imports/exports tool filever - Microsoft's version information resource dump tool clrver - Microsoft's CLR version tool (determine .NET Framework version needed for an EXE) Some of pelook's features are: Support for both 32-bit and 64-bit Windows modules (PE32 and PE32+, a.k.a. PE64) Dump COFF and section headers (Portable Executable/OBJ files) Dump Data Directory table Dump Debug Directory Summary (recognition of Microsoft and Borland debug) Dump import and delay-import dependency DLLs and associated functions (or just a DLL name list ...
5/5 4,427 Dec 12, 2019
BYTE* <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/pelook1_th.png"border="0">
Permanent Eraser v2.9.1
Permanent Eraser v2.9.1 When you normally delete files on the Mac, the operating system is only forgetting where those particular files are placed, while the data still physically remains on the drive. Beginning with Mac OS X 10.3, Apple enhanced its security by introducing the Secure Empty Trash feature, which follows the U.S. DoD pattern of overwriting data seven times. This feature was then later removed in OS X 10.11 El Capitan. Permanent Eraser provides additional wiping methods such as the 3-pass DoE or 35-pass Gutmann algorithms. This utility overwrites your data multiple times, scrambles the original file name, and truncates the file size to nothing before Permanent Eraser finally unlinks it from the system. Once your data has been erased, it can no longer be read through traditional means. CD/DVD Erasing Permanent Eraser fills in what the Finder forgot! Simply drag a CD-RW or DVD-RW onto Permanent Eraser to erase the disc's contents. Finder Integration Don't want to take up more space in your already cluttered Dock? Instead, drag Permanent Eraser into your Finder's toolbar or sidebar for easy access to wipe away the files you no longer need. Click the icon to empty your Trash, or drag and drop files to erase them. Better Progress Not only has the progress meter's accuracy greatly increased over earlier versions, but it is also displayed from the Dock's icon. Automator + Services Mac OS 10.4+ users get to make use of the bonus Automator Actions and Finder plug-in built to work with Permanent Eraser. Right-click on items you want to destroy and select Services → Erase, or make use of the Erase Trash, Erase Selected Items, or Erase Free Space Automator Actions. International Permanent Eraser has been translated for English, German, French, Italian, Dutch, Swedish, Traditional Chinese, and Welsh. Changes: Permanent Eraser 2.9.1 (18 July 2020) ...
5/5 2,867 Jan 12, 2022
Edenwaith <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Permanent Eraser2_th.png"border="0">
Personal Backup v6.3.5.0
Personal Backup v6.3.5.0 A program for saving personal data to any destination folder. This folder may be located on a local fixed or removable drive, on a Windows network server or on an FTP server. Supported Windows versions: The 32-bit version of Personal Backup runs under: Windows 7, 8 and 10 (32 and 64 bit), Windows 11, Windows Vista, Windows XP* and Windows Server 2003* / 2008 / 2012 / 2016 / 2019 * with limitations (more details) The 64-bit version runs only under: Windows 7, 8, 10 and 11 (64 bit) and Windows Server 2008R2 / 2012 / 2016 / 2019 You can configure and store as many backup tasks as you wish. The selection of the files to be backed up is made on a by-folder basis. All subfolders are included automatically, but the user can exclude or include any subdirectories from or in the backup by selection or by filter. Additional criteria are the selection by file type, file age and/or file name filter. At the destination folder the original drives (C:, D:, etc.) appear as subdirectories named LwC, LwD, etc. The original directory structure remains unchanged beneath these folders. All files may be compressed in gzip, either in toto or separated by subfolders as zip files. Optionally all data can be AES algorythm-encrypted. Performing the backup can be done manually or automatically. During the backup the program checks whether the file to be saved is newer than one already backed up. Only new files and files with newer timestamps are saved. An alternate criteria is the archive bit of the files. Automatic backups can be started on logon, at a selectable time of day, on logoff or on shutdown. You can make scheduled backups with destination paths changing daily or weekly. For individual schedules it is easy to ...
5/5 6,993 Jul 24, 2023
Dr. J. Rathlev <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/pb-en_th.png"border="0">
Phrozen ADS (Alternate Data Stream) Revealer v1.0.5642
Phrozen ADS (Alternate Data Stream) Revealer v1.0.5642 Phrozen ADS (Alternate Data Stream) Revealer is a Microsoft Windows program, especially designed to reveal possible malicious ADS files in your file system. Since the Alternate Data Stream functionality is only available for NTFS (New Technology File System), the program is able to scan and detect this kind of files only for this type of file system (Physical Hard Drive/Virtual Hard Drive/Physical Removable Device/Virtual Removable Device). If some ADS Files are detected during the scan you then can decide wether or not you want to keep them or to back them up. You can also have a content preview to detect in one glance if it looks legitemate or not. Phrozen ADS Revealer is the perfect tool to sanitize your NTFS file systems against bloated content or hidden malwares. Another great tool to put in your collection and 100% free. What are Alternate Data Stream Alternate data streams allow more than one data stream to be associated with a filename, using the format "filename:streamname" (e.g., "text.txt:extrastream"). NTFS Streams were introduced in Windows NT 3.1, to enable Services for Macintosh (SFM) to store resource forks. Although current versions of Windows Server no longer include SFM, third-party Apple Filing Protocol (AFP) products (such as GroupLogic's ExtremeZ-IP) still use this feature of the file system. Very small ADS (called Zone.Identifier) are added by Internet Explorer and recently by other browsers to mark files downloaded from external sites as possibly unsafe to run; the local shell would then require user confirmation before opening them.[21] When the user indicates that they no longer want this confirmation dialog, this ADS is deleted. Alternate streams are not listed in Windows Explorer, and their size is not included in the file's size. They are ignored when the file is copied or moved ...
5/5 5,697 Nov 15, 2019
PHROZEN SAS <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/adsrevealer1_th.png"border="0">
Pixeloid 1.1
Pixeloid 1.1 Pixeloid A novel and uber-secure way to store data The Pixeloid Matrix The all new Pixeloid Matrix is extremely dense and enables encoding of both text and images(β) along with an automatic ciphering of the data Password Protection Pixeloid additionally provides impenetrable security to users by enabling them to password protect their matrices with Triple Data Encryption Standard (TripleDES) encryption over the automatic ciphering Licensing Pixeloid is Licensed to Ajay Menon and is completely free to use.
5/5 4,849 Aug 25, 2017
Ajay Menon <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/Pixeloid4_th.png"border="0">
Pleasant Windows 10
Pleasant Windows 10 Improve Windows 10 with one-click batch files. Zip File is password protected. Password is joern. Pleasant Windows 10 is a collection of one-click batch files by Ghacks reader Joern that improve the operating system in various ways. While there are plenty of tweaking and privacy tools out there for Windows 10, all have in common that you cannot verify any of the operations before they are executed. This may not be an issue for some users, but if you want full control of what is happening in this regard, you may prefer a solution that is more open. Batch files are ideal for that, as they open in any plain text editor. You may then go through them line by line to verify what they do before executing them. Another benefit of this approach is that you may adjust the batch file as you see fit. This is especially useful if multiple changes are made by it to the system. Note: It is recommended that you create a system restore point, or a backup before you run any of the tweaks. While you can verify what they do by opening them in a plain text editor, it is always better to be on the safe side and create a backup so that you can restore the system to a previous state should things go wrong. Note 2: We recommend that you check the batch files before you run them, as you may adjust them as you see fit. You may not want some settings or features changed for instance. The following batch files are included in the archive Advanced Explorer Settings -- This changes more than a dozen File Explorer related settings on Windows 10 that turn of animations, enable menus, or turn off things like Toasts. Disable Automatic App ...
5/5 5,313 Nov 11, 2016
Ghacks <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/pleasant-windows-10_th.png"border="0">
PNotes v3.8.1.2
PNotes v3.8.1.2 PNotes is light-weight, flexible, skinnable manager of virtual notes on your desktop. It supports multiple languages, individual note's settings, transparency and scheduling. Absolutely portable as well - no traces in registry. PNotes.NET edition requires .NET framework 4 Client Profile Features Portability (PNotes does not require installation, it can be started from any drive (fixed or flash) and leaves no traces on host computer after finishing) Flexible organization (Control Panel, groups of notes, special groups - like Diary and more) Security (password protection on program level, group level or single note level, backing up and synchronization) Unlimited formatting abilities, skins, scheduling, text-to-speech Internationalization (PNotes is available in about 40 languages) Changelog: 03 May 2019 - PNotesNET version 3.8.1.2 released New features: “Rename/Change group” window is now resizable (suggested by Peter L. Albert) New OneDrive plugin (please, remove the old one before installation) Fixed bugs: “Hide note after sending” setting does nothing (discovered by Leandro Martín Drudi) Errors on options sending (discovered by Leandro Martín Drudi) Error on saving duplicated note (discovered by Peter L. Albert) The schedule dialog box allows saving some schedule types when no values are set for required fields, such as days, weeks, etc (discovered by Peter L. Albert) The schedule is not saved if the user changes properties without change of schedule type (discovered by Peter L. Albert) Click here to visit the author's website.
5/5 5,207 Jul 02, 2020
Andrey Gruber <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/PNotes2_th.png"border="0">
PortableApps.com Platform v29.5
PortableApps.com Platform v29.5 A full-featured portable software system that lets you build your own custom portable app suite for use use in your synced cloud folder, on your local PC, or on a portable USB drive. All Your Favorite Apps, Everywhere PortableApps.com lets you have all your favorite apps self contained to use from a synced cloud folder, on a local PC's internal or external drive, or carried on a portable device. Your browser with your bookmarks and extensions, your office suite, your photo editor, your music collection, your games, your development tools and more. Everything you need for work and play with you on every PC you use. Work, home, school, visiting family and friends, even while traveling. And everything stays in that one location, too, making it easy to install, update, and backup. Carried on a portable drive, every PC becomes your PC. Cloud Folder, Local PC, or Portable Device. It's Your Choice The PortableApps.com Platform comes with a smart installer that lets you easily install your environment to your cloud drive (Dropbox, Google Drive, etc), to your local PC for personal or shared use, or to your portable device. The apps are portable and will run from everywhere you work from, making it a snap to keep your apps and data with you and safely backed up to the cloud. Portable App Directory™ - Built-In App Store and Updater The PortableApps.com Platform has an app store built right in, so you can find and install the apps you want with just a few clicks. List all the available apps by category, title, newest releases or recently updated. You can find your favorite web browser, popular games, handy utilities, educational tools, image editors, chat programs and more. There are hundreds of free apps available with new apps added every week. With no download ...
5/5 7,955 Apr 25, 2024
PortableApps.com <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/portableapps2_th.png"border="0">
Pretty Clean v0.1.15
Pretty Clean v0.1.15 Modern macOS disk cleanup tools. Pretty Clean is the modern set of macOS disk cleanup tools. Programmer friendly Cleans up the compiled output in developers' projects. System Requirements MacOS 10.7.5 and above Multiple Scanning Pretty Clean has various scanning strategies for cache and installation packages in the download folder generated by users, systems, applications, etc. to help you free up disk space as much as possible. Privacy and Security Pretty Clean makes all the scanning process public, you can clearly observe all the scanned files and promise not to upload any scanned information, we absolutely guarantee your privacy and security. Developer Mode Pretty Clean supports scanning and cleaning the compilation cache left behind by major development tools, and is currently the only disk cleanup tool on the market that supports developer options. Click here to visit the author's website.
5/5 1,742 Mar 07, 2022
Andy Ai <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/PrettyClean1_th.png"border="0">
PreventPageFileSnoops v1.0
PreventPageFileSnoops v1.0 Changes a single registry value to force Windows to delete the pagefile.sys file when you shutdown your computer. When your computer runs out of memory (RAM), Windows keeps things running by pretending that a reserved area of your hard drive is RAM. All of the information your that Windows and you programs generate is stored in a single file called pagefile.sys in this reserved area. This file can grow to be several gigabytes in size and does not get deleted when your computer is shutdown. Not only does this use up a sizable chunk of your hard drive, it also opens you up to skilled individuals retrieving this information from your hard drive. PreventPageFileSnoops changes a single registry value to force Windows to delete the pagefile.sys file when you shutdown your computer. AllowPageFileSnoops sets this value back to its default (do not delete pagefile.sys on shutdown). KEEP IN MIND Since the pagefile.sys is sometimes huge and depending on the speed of your computer and hard drive, it could take a few minutes to shut down your computer with this enabled. INSTRUCTIONS (Note: You may not get asked all of these questions.) 1) Double or single click on PreventPageFileSnoops.reg 2) On the Security Warning window, click RUN. 3) When asked "Do you want to allow this app to make changes to your computer?", choose YES. 4) When asked "Adding information can unintentionally change or delete values and cause... Are you sure you want to continue?", choose YES. 5) On the message telling you it was successful, click OK. 6) Restart your computer. The pagefile.sys will not be deleted during this restart but it will be deleted every shutdown after that. Click here to visit the author's website.
5/5 1,929 Feb 20, 2022
OlderGeeks.com <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/PreventPageFileSnoops1_th.png"border="0">
   
Showing rows 101 to 200 of 336 Showing Page 2 of 4  «  1  2  3  4  » 


OlderGeeks.com Copyright (c) 2024