Your download link is at the very bottom of the page... always.



Processed through Paypal
No account required.


Donate Bitcoin to this wallet:
1KkUMXvQ2ko3xcJkzitB7WYgoW6m79WFfm
Donate Ethereum to this wallet:
0x40E56922F43637224935CDC35e2c96E0392A8505
Donate Litecoin to this wallet:
LLYAFEyqjH69gkyCEpRjXNyedRCWrVChfL

Buy our over-priced crap to help keep things running.
Take No CrapwareOG Dad CapNo Password


Join our Facebook groupFollow us on TwitterFollow us on InstagramOur RSS FeedJoin us on TikTokJoin us on LinkedIn


 Home » OlderGeeks.com Freeware Downloads » Searching Files   
Search
Search Terms
Search Category Leave category selection blank to search within all categories.
Search Results
Files
  File Name Rating Downloads
Last Update/Developer
Prime95 v30.3
Prime95 v30.3 Great Internet Mersenne Prime Search (GIMPS) Finding World Record Primes Since 1996 Donate your computer's processing power to help search for prime numbers. BIG Changes Are Here! Prime95 version 30.3 released. For almost 25 years, GIMPS has looked for new Mersenne primes by running a primality test on one computer and later running the exact same primality test on another computer to guard against hardware errors having corrupted the first primality test. A breakthrough by Krzysztof Pietrzak makes it possible to eliminate the second primality test! The first primality test produces a proof file that can be securely verified with less than 0.5% of the work required to re-run the primality test. This breakthrough will nearly double GIMPS' throughput in the long run. Version 30.3 is now available with PRP proofs. While not a required upgrade, at some point in the future only users running version 30.3 with PRP proofs will be assigned first-time primality tests. Should you run into any problems, support is available at this thread at Mersenne Forum. Many thanks to Mihai Preda for discovering the paper on the breakthrough and realizing its importance to the GIMPS project. Also, thanks go to Pavel Atnashev for important ideas on adapting the discovery for use by GIMPS. This download is for the Windows 64bit version. If you need the Windows 32bit version, download here. If you need the Mac OS X 10.9 (Mavericks) or later version, download here. If you need the Linux 64bit version, download here. If you need the Linux 32bit version, download here. If you need the FreeBSD 11+ 64bit version, download here. The following are for administrators that want the extra security of running a traditional GUI-less service. You will still need to download the standard windows executable to configure the client. This program is for Windows Server experts only. If you need the Windows Service 64bit version, ...
5/5 8,047 Jan 23, 2021
Mersenne Prime Search <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/v25imenet_setup.png"border="0">
PrintOnly v1.0.5.4
PrintOnly v1.0.5.4 Restrict documents to be printed by physical USB printers only. PrintOnly is a Windows software tool that restricts documents (PDF, Image, Word, Excel, PowerPoint and more) to be printed only by physical USB printers and cannot be viewed or edited. Protect Files from being Modified before Printing PrintOnly prevents documents from being printed by virtual printers, which can be used to intercept and modify documents before they are printed. Limit the Number of Prints per Computer PrintOnly can be used to limit the number of times a document can be printed on each computer. This helps to prevent unlimited printing. Watermark Supported This adds an additional layer of security and traceability to your printed materials, making it easier to identify the source of any potential leaks. Restrict Printing to Physical USB Printers Only PrintOnly ensures files can only be printed by physical USB printers, which helps to prevent unauthorized printing. Set Document Print Expiration Date PrintOnly gives you control over how your documents are printed. You can set the document print expiration date to limit the printing deadline. Create POF Files from Most Popular Document Formats PrintOnly generates POF format files from a variety of document formats, including PDF, MS Word, Excel, JPG/PNG images, TXT, PowerPoint, RTF and more. Restrict Documents to be Printed Directly and Cannot be Viewed or Edited A Software Tool for Secure and Controlled Document Printing PrintOnly is a powerful software tool exclusively available for Windows, meticulously engineered to safeguard your documents by limiting their printing capabilities to physical USB printers only. PrintOnly supports most of popular document formats, including PDF, MS Word, Excel, JPG/PNG/TIF images, TXT, PowerPoint, RTF and more. PrintOnly employs a unique document format as .POF (PrintOnly File), which is impervious to viewing or modification. With this format, your documents can only be printed by physical USB printers using the PrintOnlyClient client program, adding an extra ...
5/5 586 Oct 05, 2023
PrintOnly.com <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/PrintOnly_th.png"border="0">
Privatezilla v0.60.0
Privatezilla v0.60.0 Performs a privacy and security check of Windows 10 Privatezilla integrates the most critical Windows 10 privacy settings and allows you to quickly perform a privacy check against these settings. Active settings are marked with the status "Configured" and indicates that your privacy is protected. The inactive ones are declared as "Not configured". All available settings (currently 60) can be enabled as well as disabled. Maintain privacy Block telemetry and online features, which send your data (sensitive and not) to Microsoft Remove preinstalled and sponsored apps Uninstall Windows 10’s Built-in Apps after clean installation and install your favorite apps again with built-in support for Windows Package Manager Community powered Features community powered and trending script files for your privacy, windows, apps and automation PowerShell scripting Integrated PowerShell scripting engine for adding custom automation tasks Well designed Simple to use modern and familiar UI Free and Portable Small footprint. No installation required and 100% Free Software also for commercial purposes Changes: Privatezilla 0.60.0 (Pollux) ixed critical bug in search and removal of "all built-in apps, except defaults" This was reported here #62 #34 #21 For clarification! If you only want just to remove bloatware apps, so please use the new rewritten option "Remove pre-installed bloatware apps ONLY". The matching takes place on the basis of a community list, which can be viewed here Added LoveWindowsAgain app to Privatezilla package. This is for those planning to upgrade to Windows 11. Click here to visit the author's website.
5/5 5,151 Feb 06, 2024
Builtbybel <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/spydish1_th.png"border="0">
Proxy Mask - Proxy Switcher 3.4.4
Proxy Mask - Proxy Switcher 3.4.4 Proxy Checker and Switcher allow access to blocked websites Access blocked websites, and you can watch blocked YouTube videos such as This Video Is Not Available In Your Country (by changing your IP to different country), hide your IP address, surf anonymously without a trace on the Internet. You can access many of blocked websites without using proxy with Smart DNS Changer Free. Supports HTTP and HTTPS proxy servers You can define different proxy setting for different processes at the same time At least several hundred working proxies (always) Updates Working proxy list automatically Supports all windows (XP to windows 10, 32 and 64-bits) When to use Proxy Mask or Proxy Switcher Accessing blocked websites: Your ISP (Internet Service Provider) may block some websites. Normally, network adapters on your computer, uses your IPS DNS server, and most of blocked websites blocking by your ISP's DNS server. This type of restrictions can be bypassed by changing DNS server settings of network adapters. You can use the Smart DNS Changer Free to change your DNS settings. Some websites blocks by their IP addresses and this type of restriction cannot be bypassed by changing DNS server settings. In this case you should use Proxy Mask (Proxy Switcher) to access blocked websites. Bypassing websites region (country) restrictions: Some videos on YouTube cannot be watched from some countries (because of publisher restriction or copyright etc.), In this case YouTube shows text message on video player like This Video Is Not Available In Your Country. To bypass such restrictions you can use Proxy Mask (Proxy Switcher) to access restricted contents by changing your IP address to different country (by using Elite proxy ...
5/5 5,877 Feb 25, 2017
Rentanadviser.com <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/proxymask1_th.png"border="0">
Public DNS Server Tool v2.4
Public DNS Server Tool v2.4 Public DNS Server Tool is a small utility for changing the DNS servers in Windows XP, Vista, 7, 8, 8.1 and 10 on the fly. In the past few years, many public DNS servers have been made available for everyone’s use. Some of them are Cloudflare DNS, OpenDNS, Google, Norton, Comodo Secure etc. These DNS servers offer many security and protection layers in addition to being very fast. Even though these public DNS servers are available for everyone’s use, setting up DNS servers in Windows is not an easy task. Therefore, I have created this little tool Public DNS Server Tool, using which you can easily set the domain name servers in Windows. It has been tested to work in Windows XP Professional SP3 (32-bit), Windows Vista SP2 (32-bit), Windows 7 (32-bit), Windows 8 (64-bit) and Windows 10 (32-bit). You can use a Public DNS Server Tool to quickly switch to a preset pair of public DNS servers. Currently, it has sixteen preset pairs of DNS servers — Google Public DNS Cloudflare DNS Verisign DNS OpenDNS OpenDNS FamilyShield (blocks sites inappropriate for family) Yandex Basic DNS Yandex Safe DNS Yandex Family DNS Norton ConnectSafe A (blocks malicious sites) Norton ConnectSafe B (blocks malicious sites + pornography sites) Norton ConnectSafe C (blocks malicious sites + pornography sites + non-family sites) Comodo Secure DNS (blocks malicious sites) Neustar General Neustar Threat Protection Neustar Family Secure Neustar Business Secure Backup and Restore Public DNS Server Tool allows you to backup your DNS server settings. To ...
5/5 4,732 Oct 16, 2019
TrishTech.com <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/publicdnstool1_th.png"border="0">
PuTTY v0.81
PuTTY v0.81 A free SSH, Telnet, Rlogin, and SUPDUP client for Windows systems. SSH, Telnet, Rlogin, and SUPDUP are four ways of doing the same thing: logging in to a multi-user computer from another computer, over a network. Using this type of interface, there is no need for you to be sitting at the same machine you are typing commands to. The commands, and responses, can be sent over a network, so you can sit at one computer and give commands to another one, or even to more than one. SSH, Telnet, Rlogin, and SUPDUP are network protocols that allow you to do this. On the computer you sit at, you run a client, which makes a network connection to the other computer (the server). The network connection carries your keystrokes and commands from the client to the server, and carries the server's responses back to you. These protocols can also be used for other types of keyboard-based interactive session. In particular, there are a lot of bulletin boards, talker systems and MUDs (Multi-User Dungeons) which support access using Telnet. There are even a few that support SSH. You might want to use SSH, Telnet, Rlogin, or SUPDUP if: • you have an account on a Unix system (or some other multi-user OS such as VMS or ITS) which you want to be able to access from somewhere else • your Internet Service Provider provides you with a login account on a web server. (This might also be known as a shell account. A shell is the program that runs on the server and interprets your commands for you.) • you want to use a bulletin board system, talker or MUD which can be accessed using Telnet. You probably do not want to ...
5/5 53 Apr 26, 2024
Simon Tatham <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/PuTTY1_th.png"border="0">
Q4OS v3.10
Q4OS v3.10 Q4OS is a fast and powerful operating system based on the latest technologies while offering a traditional desktop user interface. We focus on security, reliability, long-term stability and conservative integration of verified new features. System is distinguished by speed and very low hardware requirements, runs great on brand new machines as well as legacy computers. It is also very applicable for virtualization and cloud computing. Tutorials and Guides This download is for the 64bit version. If you need the 32bit version, download here. Click here to visit the author's website.
5/5 3,252 Jan 22, 2022
Q4OS Team <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Q4OS1_th.png"border="0">
qTox v1.17.6
qTox v1.17.6 A chat, voice, video, and file transfer instant messaging client using the encrypted peer-to-peer Tox protocol. Features One to one chat with friends Group chats File transfers, with previewing of images Audio calls, including group calls Video calls ToxMe and Tox URI support Translations in over 30 languages Avatars Faux offline messages History Screenshots Emoticons Auto-updates on Windows and packages on Linux And many more options! Changes: v1.17.6 This release addresses a security issue for Windows users. When installing to non-default locations, qTox now ensures that the install directory permissions are restricted. This is the first release since v1.17.4 due to a deploy issue with v1.17.5. This download is for the 64bit Windows version. If you need the 32bit Windows version, download here. If you need the MacOSx version, download here. If you need the Linux version, download here. Go here for Mac/Linux compiling instructions. Go here for manual. Click here to visit the author's website.
5/5 3,255 Aug 22, 2022
qTox Team <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/qTox1_th.png"border="0">
Quick User Manager v1.9.0.0
Quick User Manager v1.9.0.0 A portable tool, featuring all user account management options in a simple, intuitive interface. You are able to change user account settings, such as disabling/enabling the account, clear the lockout state, auto-logon a user, and remove user accounts from the welcome screen. You can also set the picture associated with a user account, set or remove its password, delete and create user accounts. The latest versions of this tool also include Account Profile Fixer, which helps you to repair issues on broken user accounts. The latest version of this application also includes our Account Profile Fixer tool, which allows you to easily repair a corrupted user account. Quick user manager was built with simplicity and ease of use in mind. All the features are shown in the main interface, so you can perform the desired changes with just a few clicks. Changing the location of the account's known folders This feature allows you to change the location of some of some of your personal folders, and also restore their default location. To access this feature, select the account of the currently logeed in user, and then press Move/Restore user personal folders. This will display a dialog box similar to the one in the picture below. You can change the location of the following folders: Desktop, Documents, Downloads, Music, Pictures and Video. The list shows the current and default location of those folders. Before moving or restoring any folder path, youu should set the extra options, in the lower pane: Also move folder contents: When this option is enabled, any existing files in the current location will be moved to the new location. If the new location is in a different volume, files will be copied instead, and then, on successful copy, deleted from the source. Overwrite existing files. This option is only relevant if Also ...
5/5 2,257 Aug 23, 2021
Carifred <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/QuickUserManager1_th.png"border="0">
QuickHash GUI v3.3.1
QuickHash GUI v3.3.1 An open-source graphical interface data hashing tool for Linux, Windows, and Apple macOSX. First created in 2011, QuickHash GUI is a graphical data hashing tool for Linux, Windows, and Apple Mac used across the world by government agencies, private industry, media outlets, academia, hobbyists, programmers, training centres, medical scientists, space scientists, operating system developers and maintainers, web developers and more besides. It enables the rapid selection &amp; hashing of data such as text, a single file, multiple files in folders, comparing files, comparing folders of files, lists of text line-by-line, disks and logical partitions, file copying with hashing, a myriad of right-click menu options and all of this on all three major operating systems. Though it was designed for Linux, is was soon made available for Windows and subsequently Apple Mac OSX (with v2.6.3 in Octo 2015). MD5, SHA1, SHA256, SHA512, xxHash, SHA-3 (256 bit), Blake2B (256 bit), Blake3 and CRC32 algorithms available. CSV\HTML\Clipboard output is available which is useful for logging as well as verifying hashes of downloaded ISOs like Linux Mint, Ubuntu, Fedora etc. A source directory can be hashed, then copied &amp; reconstructed to a destination folder where the content is then hashed again (providing verification). Selected file masks are available (*.doc; *.xls etc) ensuring only certain files are chosen if needed. Since v.2.4.0 Windows users are able to hash physical disks. Features • No installation needed making it portable and easy to run or delete after use. • A simple non-confusing tabbed interface. • Cross platform – works largely the same on Windows, Linux and Apple Mac OSX • 64-bit and 32-bit for Windows, 64-bit for OSX and Linux. • Recursive hashing, or hashing and copying to reconstructed directory directory and re-hashing ...
5/5 827 Jun 07, 2023
Ted Smith <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/QuickHash1_th.png"border="0">
Quiz/Survey/Test Online v3.12.02
Quiz/Survey/Test Online v3.12.02 A free, complete, heavy duty, open source assessment solution. For Windows (English and French), macOS, Linux and Android. Want to create an online or mobile quiz, survey or test? From a quick quiz on your phone to high stakes proctored desktop testing, our QST Builder interface makes it simple. The numerous features (WYSIWYG, Equation and Basic Editors, Question Bank, Multiple Question Types, Multiple Delivery Styles, Multiple Delivery Options, Export/Import/Convert Questions, Multiple Results Options, Randomly Chosen Questions, Branching Questions/Skip Logic, Auto Marking, Print a QST, Schedule a QST, Bulk upload students/instructors/classes, Real time results, etc.) in open source QST rival or surpass those found in commercial online examination and survey software systems. QST - GradeBook allows you to view/mark users quizzes and tests/exam and see detailed statistics for each quiz/survey/test and question(s) in it. GradeBook also allows entering marks for other assignments and adding weights(%) to qst's and assignments for a Complete Assessment Solution. Features A French version of QST is now available. See below. Spanish version coming soon! Free account at qstonline.org. Try it out! We support our software. Contact us at qstsupport@shaw.ca or through the Wiki or Discussion forum here. Rebrand or change QST. No license needed for commercial use. Licensed under GPL v2. Runs on your network on your hardware. Install on laptop, desktop, server or cloud. Easily update. Also will run on AWS (Amazon Web Services) and Azure. Easily scales to thousands of simultaneous users and more. See Hardware_and_Performance_Tuning.txt Minimal user instruction required. Convert QST interface to your language in Another Language Pack On android at https://play.google.com/store/apps/details?id=qstonline.ca or download it here. ...
5/5 1,398 Mar 13, 2024
Bob Smith <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/QuizSurveyTest1_th.png"border="0">
Radmin VPN v1.1.4288.10
Radmin VPN v1.1.4288.10 Radmin VPN is a free and easy-to-use software product to create virtual private network (VPN). The program allows users to establish a secure connection between computers over the Internet as if they were connected over a LAN. Why Radmin VPN? Security Provides you with a secure VPN tunnel. Encryption keeps your connection safe. High speed The connection speed is up to 100Mbps. Reliability Radmin VPN does not malfunction after months of continuous operation. Ease-of-use Easy to set-up, easy to manage for both - IT Pros and home techs. Use Cases Connect distributed teams together Easily connect distributed teams together, create one cohesive network no matter how far you are located from each other. Radmin VPN allows you to connect to remote PCs even behind firewalls you don’t control. Work remotely Thanks to the integration with Radmin remote control software, Radmin VPN allows you to securely access and work at your remote computer from anywhere, whether from home, hotel or airport. Your network resources – files, apps, and emails are just a click away wherever you go. Play network games over the Internet Play your favourite LAN games with your friends over the Internet. Free Radmin VPN does not limit the number of gamers. Thanks to high speed of Radmin VPN you won’t see the difference – you will play your favourite games as if you were playing in the LAN. Click here to visit the author's website.
5/5 5,188 Apr 04, 2021
Famatech <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/RadminVPN1_th.png"border="0">
Random Password Generator 1.3 (0313)
Random Password Generator 1.3 (0313) Random Password Generator is developed to create powerful passwords which are not easy to be cracked. This smart and easy-to-use tool allows you to securely and easily manage your passwords and IDs with editable remark. With Random Password Generator, you don't need to worry about the security of your password being violated any more. Changelog: + Improved Support for Windows 8 + Fixed General Bugs
0/5 8,492 Mar 14, 2013
Iobit
Ratool v1.4
Ratool v1.4 Removable Access Tool (a.k.a. Ratool) is a simple to use portable freeware application which aids in the control of external storage devices such as USB flash drives, CD/DVD drives, as well as floppy, tape and WPD devices. Ratool can disable USB storage access or enable write protection on all USB flash drives, thus preventing data from being modified or deleted, protecting your confidential data from being copied by others. There are many such tools available online, but they are often easily circumvented. For example, if you use one of these USB disablers to disable a flash drive, someone could simply use another tool and enable it again. This means these tools are not actually protecting your USB ports, which is why Sordum created Ratool. By using Ratool, you won’t have to worry about this, as other tools cannot easily break Ratool’s protection. Changes: v1.4 1. [Fixed] – Ratool Password protection can be cracked – (critical) 2. [Fixed] – Ratool can’t block CD/DVDRom device on Windows Home and single language 3. [Fixed] – Ratool can’t block WPD device (Smartphone etc.) on Windows Home and Single lang. 4. [Fixed] – Ratool can’t Unblock USB ports Which blocked by Bitlocker 5. [Fixed] – Ratool settings can’t apply immediately in Windows Home and single Language 6. [Fixed] – If there is no TEMP Folder, Ratool Doesn’t work (Error line 10.) 7. [Fixed] – Prevent Installation of USB devices feature (White List) Doesn’t work 8. [Fixed] – Ratool GUI is too small 9. [Added] – x64 Version, Some code improvements and minor BUG fixes Ratool allows the following actions: 1. Block USB Storage Devices: disables all USB storage devices access to your PC. How to block all USB devices except yours (White List Mode) a. Plug in Your USB device (You can plug in more than one) b. In the Options menu, click “Prevent Installation of USB devices” Currently plugged ...
5/5 2,550 Mar 07, 2022
Sordum.net <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/ratool1_th.png"border="0">
RawTherapee v5.8
RawTherapee v5.8 RawTherapee is a free, cross-platform raw image processing program About RawTherapee is a powerful, cross-platform raw photo processing system, released as Free Software (GPLv3). It is designed for developing raw files from a broad range of digital cameras and targeted at users ranging from enthusiast newcomers who wish to broaden their understanding of how digital imaging works to professional photographers. RawTherapee provides a powerful suite of tools for you to produce amazing photos and showcase your creativity. RawTherapee benefits users who take the time to learn what it can do. Luckily the community is quite welcoming and helpful! Check out the Forum, read up on RawPedia, and ask questions - there's always something neat to learn! High Image Quality Non-destructive, 32-bit (floating point) processing engine, modern demosaicing algorithms, and advanced color+detail editing bring you the best tools to develop images of the highest quality from your raw files (including High Dynamic Range DNG). Outstanding Raw Support RawTherapee gives you best-in-class demosaicing, including using two demosaicing algorithms on the same image, compositing pixel-shift raw files with automatic ghost masking, working with multiple-frame raw files, dark frame subtraction, flat field correction, and hot/dead pixel correction! Freedom for Free RawTherapee is Free and Open Source software. This means you can use it free of charge, wherever you like and however you like as long as you abide by the copyleft GPLv3 license. Download the source code, modify it, and help improve it. It is cross-platform - you can use it on Linux, macOS, or Microsoft Windows. It is also international and available in over 15 languages! New Features Automatically recover detail lost to lens blur (diffraction) using the new Capture Sharpening tool, located in the “Raw” tab. It takes place right after demosaicing, and as it works in linear space it is not prone to haloing. Capture Sharpening ...
5/5 3,600 Dec 22, 2021
The RawTherapee Team <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/RawTherapee14_th.png"border="0">
Rdex v1.5.6
Rdex v1.5.6 Rdex is a freeform database. Use it to store addresses, phone numbers, birthdays, online ids, recipes, or a million other pieces of miscellaneous information. It is based on the idea of a cardfile—like a Rolodex. Just click "New Card," paste or type in some info and click save. Simple! Later, you can search for any text contained in the card and the card will be displayed. Just type the word you are searching for into the search box at the top. Rdex is available for Windows, Java and Android. If you keep the data file on a cloud storage service such as Dropbox your data is available anywhere and you can maintain sync between mobile and desktop access. Rdex can also encrypt the data file if you wish to ensure privacy. This download is for the Windows portable version. If you need the Java version for MacOS or Linux, download here. If you need the Android version, download here. Brief Instructions To create a new card, click on the "New" button, press <Ctrl+N>, or select "Card/New Card" from the menu. Just copy <Ctrl+C> and paste <Ctrl+V> text into the card. If you want to make the "List View" function meaningful, use the first line of the card as a title. To find a card, type a string in the Search box and press <Enter>. Search strings are not case sensitive. Press <Enter> again to find the next occurrence or <Shift-Enter> to find the previous one. If the search string is blank, you simply jump to the next (or previous) card. You can get a list of the first lines of cards that contain the text in the Search box by pressing <Alt-Enter> or selecting <Card/List View> from the menu. The clipboard button <Card/List All Cards> or <Ctrl+L> will simply list the first lines of all cards ...
5/5 2,621 Dec 27, 2020
Peter Newman <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/rdex1_th.png"border="0">
RDP-Parser v1.1
RDP-Parser v1.1 RDP-Parser extracts RDP activities from Microsoft Windows Event Logs. This tool has been designed for any investigation involving exploitation of RDP service. It supports Evt and Evtx formats. How it works This is a command line tool and there is no installer. You should unzip and copy the program where you want to use it. Open a command line in the directory where the program is. You can print help message using "RDP-Parser --h": More details about options: --p: By default, RDP-Parser will check in the current directory, so you can copy the program in the same folder as the Event Logs you want to parse. If there is no given path and current directory doesn't contain Event Logs, RDP-Parser will copy the live system Event Logs in the current directory. This command require admin priviledge and it doesn't work for old format logs. --t: There are three types of report: 1: minimal: This is the default type. The report will contain following columns: TimeGenerated, Source, EventID and Details. Only events with public IP addresses will be extracted and all details will be removed except IP address. 2: minimal with all IP addresses: Same as type 1, but it also includes private IP addresses. 3: normal: The report will contain all columns and all details. Columns are: TimeGenerated, Timewritten, Computer, Source, RecordNumber, Category, EventID, EventType and Details. Only events with public IP addresses will be extracted but all details will be included. 4: normal with all IP addresses: Same as type 3, but it also includes private IP addresses. 5: full: All events related to RDP or login activities will be included. Included events IDs are: ...
5/5 4,105 Feb 27, 2019
Alain Rioux <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/RDPParser1_th.png"border="0">
recALL v19.05
recALL v19.05 recALL allows you to quickly recover passwords from more than 300 programs (email, web browsers, instant messengers, FTP clients, wireless, etc.) and license keys from more than 2,800 applications. recALL the world's first program that enables the recovery of the majority of passwords and also licenses from damaged operating systems via native support system registry files Windows. With the unique feature of emulation FTP, POP3 and SMTP you can recover passwords from any application supporting these protocols, even if the program is not yet supported inrecALL. Works with the following programs: web Browsers 360 Browser 7.x Avant Browser 2012-2014 Beonex Communicator BlackHawk 2.x Chrome 1.x-30.x Comodo Dragon CoolNovo Browser 2.x Firefox 0.1-32.x K-Meleon 1.x Lunascape 6.x Maxthon 2.x-5.x Microsoft Internet Explorer 4.x-11.x* Netscape 8.x-9.x Opera 4.x-15.x Otter Browser beta 11 QupZilla 1.x QtWeb Internet Browser 3.x (reg) QtWeb Internet Browser Portable 3.x (ini) Safari 5.x Sleipnir 5.x Sleipnir Browser – Fenrir Pass ID Yandex Browser 1.7 UC Browser 5.x Vivaldi 1.x * Based on browser history email programs Advanced Email Checker Baby POP3 Server 1.x Becky! 2.x Calypso 3.x Claws Mail 3.x CheckMail 5.x Courier 3.x DeagleSoft MailChecker 1.x Delphi Email Client eM Client 6.x Eudora 6.x ...
5/5 9,766 May 01, 2019
Maciej Kaczkowski <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/recALL_th.png"border="0">
RegFromApp 32bit v1.33
RegFromApp 32bit v1.33 RegFromApp monitors the Registry changes made by the application that you selected, and creates a standard RegEdit registration file (.reg) that contains all the Registry changes made by the application. You can use the generated .reg file to import these changes with RegEdit when it's needed. System Requirements This utility works on Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows 8. Older versions of Windows are not supported. There is a separated version for x64 applications. Versions History Version 1.33: Fixed RegFromApp to avoid from BSOD when trying to attach to smss.exe (Be aware that RegFromApp will still fail to capture the smss.exe process) Using RegFromApp RegFromApp doesn't require any installation process or additional dll files. In order to start using it, simply run the executable file - RegFromApp.exe After running it, select the process that you want to inspect, and click Ok. After clicking Ok, each time that the selected process writes a value into the Registry, the main window of RegFromApp will display the written value in Windows .reg file format. You can copy &amp; paste the desired values to another Registry file, or alternatively, you can save the entire Registry changes into a .reg file by using the 'Save As' option. Using RegFromApp In Windows Vista RegFromApp can work in Vista even when UAC (User Account Control) is turned on, as long as the process that you wish to inspect run in the same account and security context of RegFromApp. However, if you want to inspect a process that runs under administrator account, you must also run RegFromApp as administrator. (right-click on RegFromApp.exe and choose 'Run As Administrator') RegFromApp Display Modes Starting from version 1.10, RegFromApp can work in 2 display modes: ...
5/5 8,505 Apr 26, 2019
Nir Sofer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/regfromapp_th.png"border="0">
RegFromApp 64bit v1.33
RegFromApp 64bit v1.33 RegFromApp monitors the Registry changes made by the application that you selected, and creates a standard RegEdit registration file (.reg) that contains all the Registry changes made by the application. You can use the generated .reg file to import these changes with RegEdit when it's needed. System Requirements This utility works on Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows 8. Older versions of Windows are not supported. There is a separated version for x64 applications. Versions History Version 1.33: Fixed RegFromApp to avoid from BSOD when trying to attach to smss.exe (Be aware that RegFromApp will still fail to capture the smss.exe process) Using RegFromApp RegFromApp doesn't require any installation process or additional dll files. In order to start using it, simply run the executable file - RegFromApp.exe After running it, select the process that you want to inspect, and click Ok. After clicking Ok, each time that the selected process writes a value into the Registry, the main window of RegFromApp will display the written value in Windows .reg file format. You can copy &amp; paste the desired values to another Registry file, or alternatively, you can save the entire Registry changes into a .reg file by using the 'Save As' option. Using RegFromApp In Windows Vista RegFromApp can work in Vista even when UAC (User Account Control) is turned on, as long as the process that you wish to inspect run in the same account and security context of RegFromApp. However, if you want to inspect a process that runs under administrator account, you must also run RegFromApp as administrator. (right-click on RegFromApp.exe and choose 'Run As Administrator') RegFromApp Display Modes Starting from version 1.10, RegFromApp can work in 2 display modes: ...
5/5 8,694 Apr 26, 2019
Nir Sofer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/regfromapp_th.png"border="0">
Registry Live Watch v1.0
Registry Live Watch v1.0 Registry Live Watch is a small Windows application whose purpose is to help you monitor a user-defined registry key for several changes (subkeys, subvalues, or security). Since this is a portable program, it is important to mention that it doesn’t leave any traces in the Windows Registry. You can copy it on any USB flash drive or other devices, and take it with you whenever you need to keep an eye on your registry keys on the breeze, without having to go through installation steps. Registry Live Watch delivers a user-friendly interface where all dedicated parameters are bundled in the primary panel, so you can easily tweak them. Everything is kept as simple and clear as possible, so even rookies can master the entire process with minimal effort. The program gives you the possibility to select the root key from a drop-down list (e.g. HKEY_LOCAL_MACHINE, HKEY_CURRENT_USER, HKEY_CLASSES_ROOT, HKEY_USERS), enter a custom key that you want to monitor, and watch for the desired changes (all, keys, values, or security). Additionally, you can make the program trigger an action when a key is modified, namely pop up a notification messages, execute a user-defined program, or log the information into a log. Last but not least, you are allowed to start or stop the monitoring process, save the log to plain text file format, as well as clear the log with just one click. All in all, Registry Live Watch comes packed with several handy features for helping you monitor the changes applied to a particular registry key. The intuitive layout makes it an ideal app for rookies and professionals alike.
5/5 4,881 Apr 26, 2019
LeeLu Soft <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/RegistryLiveWatch1_th.png"border="0">
RegistryChangesView v1.30
RegistryChangesView v1.30 A tool for Windows that allows you to take a snapshot of Windows Registry and later compare it with another Registry snapshots, with the current Registry or with Registry files stored in a shadow copy created by Windows. When comparing 2 Registry snapshots, you can see the exact changes made in the Registry between the 2 snapshots, and optionally export the Registry changes into a standard .reg file of RegEdit. System Requirements This utility works on any version of Windows, starting from Windows XP and up to Windows 11. Both 32-bit and 64-bit systems are supported. Changes Version 1.30: Added option to change the sorting column from the menu (View -> Sort By). Like the column header click sorting, if you click again the same sorting menu item, it'll switch between ascending and descending order. Also, if you hold down the shift key while choosing the sort menu item, you'll get a secondary sorting. Added 'Sort By' toolbar button Examples for useful things you can do with this tool You can create a Registry snapshot before installing a new software and then after the installation is completed, compare this Registry snapshot with the current Registry and see all Registry changes made by the installer (Be aware that you'll also see some changes made by Windows or other programs in the same time). If there are Registry changes that you don't like, you can generate a .reg file to revert back the changes. If you make a change in Windows configuration from the GUI of Windows and you want to see how to make this change in the Registry, simply create a Registry snapshot before making the config change and then after the configuration change, compare this Registry snapshot with ...
5/5 5,243 Sep 28, 2023
Nir Sofer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/registrychangesview_th.png"border="0">
RememBear v1.2.6 for Mac
RememBear v1.2.6 for Mac Secure and remember all your passwords… with a Bear (Free for single device) The easiest way to remember all your passwords RememBear also types in your passwords, right when you need them Easier Let a Bear remember and type in passwords for you Faster Auto-fill logins and credit cards with a click Access from anywhere Bear-rilliant apps for your computer, tablet and phone Safe and secure in an encrypted Bear hug Secured end to end Engineered so that you, and only you, can see your sensitive data Serious security Super strong 256-bit encryption Independently audited Independent and public code audit of RememBear security Click here to visit the author's website.
5/5 4,937 Mar 24, 2019
TunnelBear <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/RememBear1_th.png"border="0">
RememBear v1.2.6 for Windows
RememBear v1.2.6 for Windows Secure and remember all your passwords… with a Bear (Free for single device) The easiest way to remember all your passwords RememBear also types in your passwords, right when you need them Easier Let a Bear remember and type in passwords for you Faster Auto-fill logins and credit cards with a click Access from anywhere Bear-rilliant apps for your computer, tablet and phone Safe and secure in an encrypted Bear hug Secured end to end Engineered so that you, and only you, can see your sensitive data Serious security Super strong 256-bit encryption Independently audited Independent and public code audit of RememBear security Click here to visit the author's website.
5/5 4,882 Mar 24, 2019
TunnelBear <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/RememBear1_th.png"border="0">
Remove Windows XP End of Life Messages Utility
Remove Windows XP End of Life Messages Utility On April 8th 2014, Microsoft ended all support for Windows XP. They then released a number of Windows Updates that displays annoying messages on your desktop telling you that your operating system is now at its end of life. This is the Windows message: The second is the Microsoft Security Essentials one: We have been asked a number of times about how to remove these and we have now created a new utility that will help you to do this. (Download at bottom of page) CONSIDERATIONS There is one problem with removing the Microsoft Security Essentials end of life message. If you have already installed Version 4.5.216.0 then you cannot remove this message. Also, eventually, your system will update to this version so the best thing to do is to uninstall MSE and install another free anti-virus like Avast or Avira. If you have not yet installed Version 4.5.216.0 then this utility will work for you for the MSE part. The Windows end of life message should be able to be removed without issue using this utility. You must have Dot Net 2.0 installed for this to work. INSTRUCTIONS Once you have downloaded the file you should run the executable file to start the utility. You will then be presented with a utility that looks like this: You should then click the buttons on the right hand side in relation to what you want to do. So, if you want to remove the Windows message, click the top button, if you want to remove the MSE message, click the bottom button. Once you have done this, you should reboot your machine and you should now notice that the messages have not reappeared.
0/5 7,288 Jul 13, 2014
Techy Geeks
RemoveWGA 1.2 Remove Microsoft Windows Genuine Advantage
A small utility that enables you to remove the Microsoft Windows Genuine Advantage Notifications tool RemoveWGA will enable you to easily remove the Microsoft \\\"Windows Genuine Advantage Notifications\\\" tool, which is calling home and connect to MS servers every time you boot. Futures updates of this notification tool will (officialy) setup the connection rate to once every two weeks. Once the WGA Notification tool has checked your OS and has confirmed you had a legit copy, there is no decent point or reason to check it again and again every boot. Moreover, connecting to Microsoft brings security issue for corporate networks, and privacy issues for everyone. It is also unclear which information are transmitted (Microsoft published an official answer, but an individual study brought some questions). All of that, along the fact that Microsoft used deceptive ways to make you install this tool (it was told you it was an urgent security update, whereas it is a new installation giving you no extra security) makes me calling this tool a spyware. Also, Windows Genuine Advantage Notifications is different than Windows Genuine Advantage Validation. RemoveWGA only removes the notification part, phoning home, and does not touch the Validation part. Note: Some antivirus and antispyware programs flag RemoveWGA as being infected/malware, although the application is perfectly safe and does not pose a threat to your system. This is called a \\\'false positive\\\'. The term false positive is used when antivirus software wrongly classifies an innocuous ( inoffensive ) file as a virus. The incorrect detection may be due to heuristics or to an incorrect virus signature in a database. [Similar problems can occur with antitrojan or antispyware software.] Here are some key features of \\\"RemoveWGA\\\": · Tell you if the WGA notification tool is active on your system · Allows you to remove the WGA notification tool from your ...
0/5 9,093 Jul 07, 2010
Guillaume Kaddouch
RepairDNS 2017.7.1.2
RepairDNS 2017.7.1.2 RepairDNS is a Nicolas Coolman utility that allows to detect and remove certain DNS infection. This is particularly the case of hosts file infection that modifies the dynamic link resource "dnsapi" in order to create forwarding addresses in the Hostsfile (Jabuticaba, La Superba, V-Bates,...) . In principle this tool find a healthy copy of the infected resource and replaces it. A report is available on the user'sdesktop, it can be requested by a security expert in a forum of disinfection. The utility is portable, it means that it requires no installation. System : Windows XP/Vista/7/8/10
5/5 5,117 Nov 13, 2019
Nicolas Coolman <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/RepairDNS1_th.png"border="0">
Reset Windows Update Tool v11.0.0.9
Reset Windows Update Tool v11.0.0.9 This tool has been developed for use as a support of system repair options. It is possible to reset the Windows Update Components. Also is able to delete temporary files, scan, detect and repair corruptions with the Windows System image, scan all protected system files and replace any corrupted files, change invalid values in the Windows Registry, reset Winsock settings and more. The tool for Reset Windows Update Components works through command-line but need of basic requirements as a compatible operative system, run with the elevated privileges, etc. Requirements This tool is compatible with Windows 8, Windows 8.1 and Windows 10. When you run Reset Windows Update Tool is detected the version or build of the operative system determined the name and family of the operative system. If the operating system is not compatible with this tool, display an error message and the tool will be closed. Glossary DISM Deployment Image Servicing and Management is a command-line tool that can be used to service a Windows image. Fix It diagnostic program to detect problems of Windows. Registry is a database that stores settings for the operating system. Restore point is a representation of a stored state of your computer's system files. SFC System File Checker is a utility that allows users to scan for corruptions. Winsock Windows Sockets API is a technical specification that defines how Windows network software should access network. Before starting You can make some processes to ensure the proper functioning of the system. Restart your PC and verify if problem persists. Create both a System Restore Point. Make sure that your system date, time and year settings are correct on your computer. Disable antivirus ...
5/5 3,048 Feb 13, 2021
Manuel Gil <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Reset Windows Update Tool1_th.png"border="0">
Retroshare v0.6.7
Retroshare v0.6.7 Secure communication for everyone Connect with Friends and Family Retroshare establish encrypted connections between you and your friends to create a network of computers, and provides various distributed services on top of it: forums, channels, chat, mail... Retroshare is fully decentralized, and designed to provide maximum security and anonymity to its users beyond direct friends. Retroshare is entirely free and open-source software. It is available on Android, Linux, MacOS and Windows. There are no hidden costs, no ads and no terms of service. Chat Send text and images. Discuss with various people in decentralized chat rooms (like IRC). Express your emotions with the rich smiley set. Use distant chat to securely chat with friends-of-friends. Mail Send encrypted messages to other members of the network. Retroshare securely stores messages on friends' nodes to deliver messages while you're offline. File sharing Share files with your friends or with the whole network. Use the search to find files. Retroshare uses swarming similar to BitTorrent, to accelerate transfers. This makes it possible to share large files. Your privacy and anonymity is guaranteed beyond direct friends with anonymous tunnels. Forums You can read and write forum posts offline. This is perfect while you're on the go. When you have an Internet connection, Retroshare will automatically sync forums with your friends. Decentralized forums are censorship resistant by design. Boards Share your favorite pictures or links. See which pictures or links others like. Vote and discuss them using the built-in commenting system. Channels Channels allow you to publish your files. You may subscribe to channels and automatically download the latest files; comment on files and spread them to your friends. Protect your IP with Tor/I2P Retroshare can optionally be used over the Tor and I2P networks. Doing so, even friend nodes cannot see your IP, which allows to safely and anonymously connect to unknown people. While it is always possible to ...
5/5 3,922 Feb 16, 2024
Retroshare Team <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Retroshare1_th.png"border="0">
RIOT (Radical Image Optimization Tool) v2023.12
RIOT (Radical Image Optimization Tool) v2023.12 Radical Image Optimization Tool (RIOT for short) is a free image optimizer that will let you to visually adjust compression parameters while keeping minimum filesize. It uses with a side by side (dual view) or single view interface to compare the original with the optimized image in real time and instantly see the resulting file size. RIOT is lightweight, fast and simple to use, yet powerful for advanced users. You will be able to control compression, number of colors, metadata settings and much more, and select image format (JPG, GIF or PNG) for your output file. Main features • open many image types including rare/scientific types • save and optimize JPEG, WEBP, GIF and PNG with a simple, clean user interface • automatic optimization selects the most suitable format and parameters • works in dual view: (original – optimized image) or single view (optimized image). • automatic preview of resulting image • in-place compare function (alternativelly display the original image over the optimized image to notice small pixel changes) • compress files to desired filesize threshold • fast processing (all is done in memory); • see instant results including resulting filesize • batch support (process multiple files at once) • transparency handling options • decide if you want to keep metadata (comments, IPTC, Adobe XMP, EXIF profiles, ICC profiles). • Unsupported metadata is removed • transfer metadata between image formats (destination format must support them) • common tools: pan and zoom, rotate, flip • basic image adjustments: brightness, contrast, gamma, ...
5/5 4,603 Dec 29, 2023
Lucian Sabo <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/riot4_th.png"border="0">
RKill v2.9.1
RKill v2.9.1 RKill is a program that was developed at BleepingComputer.com that attempts to terminate known malware processes so that your normal security software can then run and clean your computer of infections. When RKill runs it will kill malware processes and then import a Registry file that removes incorrect file associations and fixes policies that stop us from using certain tools. When finished it will display a log file that shows the processes that were terminated while the program was running. As RKill only terminates a program's running process, and does not delete any files, after running it you should not reboot your computer as any malware processes that are configured to start automatically will just be started again. Instead, after running RKill you should immediately scan your computer using some sort of anti-malware or anti-virus program so that the infections can be properly removed. Click here to visit the author's website.
5/5 8,386 Jan 19, 2020
Bleeping Computer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/RKill_th.png"border="0">
RosarioSIS v10.9
RosarioSIS v10.9 Free Student Information System for School Management RosarioSIS is a Free and open source Student Information System (SIS), also known as School Management System (SMS) or even School ERP. RosarioSIS features students demographics, grades, scheduling, attendance, student billing, discipline and food service modules for school management, in one web-application. Primarily designed for K-12 schools, it will easily fit for any educative institution like a university, an academy, or an institute. Main features Responsive design: compatible with tablets and smartphones. Discipline, Accounting and Student Billing modules included. Translated in French, Spanish, Arabic and German. PDF documents generation. Colorful statistical charts for decision-making. Moodle Learning Management System (LMS) integration included. Online registration. RosarioSIS is free software (Gnu GPL v2) powered by PHP and a PostgreSQL database. It runs as a web application that can be accessed through any computer connected to the internet. School Management made easy Take the Tour Here is a short presentation of RosarioSIS, module by module: School Setup Create schools and edit their information. Easily add information fields about your school. Setup marking periods, school periods and grade levels. Manage and consult the calendar, including school events and student assignments. Create notes and polls. Configure RosarioSIS, activate online registration, modules and plugins. Rollover: roll data to the next school year. Students Add new students and edit their information (enrollment, demographic information, photo, addresses and contacts, medical…). Easily add information fields about your students. Print advanced reports and consult statistics. Print formatted letters and mailing labels to contact your students. ...
5/5 4,169 Mar 28, 2023
François Jacquet <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/rosariosis2_th.png"border="0">
Router Default Password v1.0
Router Default Password v1.0 Every device connected to a network must have an unique IP address to differentiate it from the others. An IP address is similar to the unique telephone number on your home phone or mobile device. No other device on your network (unless you are using NAT) will have the same IP address. In order for a sending device to transmit data to a receiving device, the sender needs to know where the destination is. The destination will either be on the same subnetwork as the source, or on some other subnetwork. If the devices are in the same subnet, the mechanism used to determine the location of the destination device is the broadcast. But what happens if they are on different networks? This is where the default gateway comes into play. The default gateway is used as the destination of all traffic that is not on the same subnet. You might need to know the IP address of the default gateway if there’s a network problem or if you need to make changes to your router. In Microsoft Windows, the IP address of a computer’s default gateway can be accessed through Command Prompt with the ipconfig command, as well as through the Control Panel. The netstat and ip route commands are used on macOS and Linux for finding the default gateway address. If you haven’t bothered to go in and make changes to your network settings, you may find that you can still access the admin panel using that information. To be able to do that though, you need to know how to find the IP address , default Username and default Password of your router. Here is “Router default Password” Utility come in handy ,it is a Portable freeware. How to use it : 1. Download Router Defauld ...
5/5 4,937 Jun 28, 2019
Sordum.org <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Routerdefaultpass3_th.png"border="0">
RunAsTool v1.4
RunAsTool v1.4 Windows’ built-in “Run As” command allows you to launch a program under a different user than the currently logged in user, However, runas.exe cannot be automated it requires that the user type in the password for the alternate account , RunAsTool is a Portable Freeware and Allows standard users run a specific program with administrator privileges without the need to enter the administrator password each time. This allows you to provide users with access to program that require admin rights. Under restircted Account , Some programs are missing administrator rights to run correctly , therefore Many users are working under administrator account , this makes the system vulnerable to malware, spyware, viruses and other security risks with RunAsTool you can change it. Since installation is not a requirement, you can just drop the program anywhere on the hard disk and run the executable file directly. Otherwise, you can save RunAsTool to a USB flash drive or similar storage unit, and run it on any computer. Therefore, you can carry the app with you whenever you’re on the move. The login information for the application like username and password are read from an encrypted file – You don’t have to worry about your Admin Password. How to use With RunAsTool You don’t have to use Cmd or any parameter to allow a standard user run a specific program with administrator rights , just download and extract RunAsTool 1) Administrators In standard user account: Run it and Choose a Admin Account (If there are more than one) and type your admin password There are two interface 1.Admin 2.Standart user (Standart users can not use Admin GUI) , in Admin GUI you can easily drag and drop any program/s to give it/them Administrator privileges ,Standart Users can create Application shortcuts too On RunAsTool there are some useful options for example ...
5/5 6,203 Dec 19, 2019
Sordum.org <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/runastool1_th.png"border="0">
RunPE Detector v2.0
RunPE Detector v2.0 Phrozen RunPE Detector is a security program, especially designed to detect and defeat some suspicious processes using a generic method. We at Phrozen Software do things differently, more creatively. So, when we set ourselves the task of creating a novel way of detecting, disabling and removing RATs, we didn't want to take the route every other anti-virus company has done before us. Phrozen Software studied the behaviour of RATs and discovered that hackers virtually always use a technique called RunPE. This technique spawns a legitimate process – often the default browser or a Microsoft system process – and replace it with a malicious program code directly in memory. Your computer is thus tricked and treats the malicious code as a legitimate process. The user and his anti-virus program have no idea that his default browser is effectively turned into a virus. RunPE is a technique that is used in several malicious ways. The two most common are : [1] FWB (Firewall Bypass): As its name suggests, this technique is implemented to bypass or disable the Application Firewall or the Firewall rules. Since most malware needs to connect to a remote Command-and-Control (C&amp;C) Server, it needs to connect to the Internet via the Firewall. Since most users are connected to the Internet at home, normally the installed Firewall would prevent the malware from connecting to the Internet. Using the RunPE technique to hijack a legitimate process that is authorized to reach Internet, any malware could subsequently connect to the C&amp;C without being detected by the Firewall. [2] Malware Packer or Crypter: Generally script kiddies – immature hackers - use a well-known type of malware that is already detected by most anti-virus programs. They then try the obfuscate this malware to evade ...
5/5 5,847 Nov 15, 2019
PHROZEN SAS <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/RunPE Detector1_th.png"border="0">
RustDesk v1.2.3-1
WARNING: If someone called who you don't know or if you dialed a number that popped up on your screen and someone sent you here to download this program... YOU ARE BEING SCAMMED. HANG UP IMMEDIATELY! RustDesk v1.2.3-1 Open source remote desktop software for Windows, MacOS, Linux and Android. The best open-source remote desktop client software, written in Rust. Works out of the box, no configuration required. Great alternative to TeamViewer and AnyDesk! You have full control of your data, with no concerns about security. You can use RustDesk's rendezvous/relay server, set up your own (Go here for instructions), or write your own rendezvous/relay server. Free Public Servers Below are the servers you are using for free, it may change along the time. If you are not close to one of these, your network may be slow. Germany Hetzner 2 vCPU / 4 GB RAM Germany Codext 4 vCPU / 8 GB RAM Ukraine (Kyiv) dc.volia 2 vCPU / 4 GB RAM Dependencies Desktop versions use sciter for GUI, please download sciter dynamic library yourself. scriter downloads: Windows Linux OSx Changes: v1.2.3-1 This fixes a RustDesk certificate vulnerability. This impacts x86-64 Windows version only. This download is for the Windows 64bit version. All other download assets are below: Windows: rustdesk-1.2.3-x86-sciter.exe MacOS: rustdesk-1.2.3-x86_64.dmg rustdesk-1.2.3-aarch64.dmg Linux: rustdesk-1.2.3-x86_64.deb rustdesk-1.2.3-aarch64.deb rustdesk-1.2.3-0-x86_64.pkg.tar.zst rustdesk-1.2.3-0.aarch64-suse.rpm rustdesk-1.2.3-0.x86_64-suse.rpm rustdesk-1.2.3-aarch64.AppImage rustdesk-1.2.3-x86_64.AppImage rustdesk-1.2.3-armv7-sciter.deb Android: rustdesk-1.2.3-aarch64-signed.apk rustdesk-1.2.3-armv7-signed.apk Click here to visit the author's website.
5/5 2,830 Feb 21, 2024
CarrieZ Studio <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/rustdesk1_th.png"border="0">
Safe Startup v4.16
Safe Startup v4.16 Attention AskWoody readers and others: PrivacyRoot, S.R.O. has removed the ability of this download installer to function and they have killed-off the program entirely. Bummer! Look under the category of "System Information and Monitoring" for similar programs. Sorry :( -Deanna This program will monitor auto-startup records in OS Windows and notify you about any new programs which will be automatically launched on your PC. Using this utility you can manage programs with auto-start option. You can choose to allow auto-start for these programs or you can choose to stop or even delete them. You can stop unwanted or useless programs, spyware or even viruses. Program works with system services also, thus you can make deep review of your PC. By using our program you can see hidden running programs, reduce number of running processes, tray icons and other apps which you don't need and, thus, really boost performance of your PC. Make your PC faster. Our program can continue working in the background to always monitor new records for auto-startup, and it will remove undesired items if they will appear again. This program compatible with any other antivirus. Our program include function to recover deleted startup records. For example, if you'll delete some important file at auto-startup by mistake you can always undo delete and everything will be back as usual. Requirement Windows XP, Vista, 7, 8, 10 .NET framework 3.5 What's new in version 4.16? • In this release we are improving security of the program. In one word: we have replaced old security schema with a newer one. Due to the nature of security itself we cannot describe in details changes that were made. Thats because first rule of security is that everything should be in a secret. • Date of release: 4 November 2019. Click here to visit the author's website.
5/5 4,782 Jun 22, 2020
PrivacyRoot, S.R.O. <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SafeStartup1_th.png"border="0">
SCleaner v1.2
SCleaner v1.2 A Small and Simple System Cleanup, Privacy Manager Utility for Windows Built with Simplicity &amp; Ease of Use in Mind! SCleaner is as Simple as any System Cleanup Utility can Get. No need to install. The program is fully portable. Supports Windows 11/10/8.1/8/7/Vista Clean what's Really need to be Cleaned Same Intention but a Different Approach. Save Hard Disk Space Removes Trash that accumulate over time with day to day System Uses. Improve Cyber Security Removes Trace of Previous Actions, Deleted Files and Folders. Protect Your Privacy Protects your Privacy from the supported Windows Applications. Click here to visit the author's website.
5/5 2,305 Oct 03, 2021
Shrewd Squad <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SCleaner1_th.png"border="0">
ScreenWings v2.16.1430
ScreenWings v2.16.1430 Anti-screenshot solution ScreenWings is an anti-screenshoting software that prevents (malicious) software from capturing your screens. If you want to test the security of ScreenWings, try Snipping Tool, pressing "Print" or any capturing software! By starting ScreenWings with the "-Ghost" parameter, you can hide all UI elements and automate its protection. Security without performance disadvantages Most of the protection is static, which minimizes the requirements for ScreenWings. Full system wide screenshot protection This application is not limited to a single screen, but all screens you want. Protects up to six screens Even if passwords are hidden behind ***, critical entries such as e-mail addresses and private notes can still be screened. Prevent this with ScreenWings! Guard against Use ScreenWings The minimalist interface works without text, yet offers an almost unbreakable protection against multiple attack vectors! Download Help File Changes: 2.16 #Improved UI warning #Detection alert resistance improved Click here to visit the author's website.
5/5 5,082 Apr 28, 2020
Hendrik Schiffer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/ScreenWings1_th.png"border="0">
Scrollout F1
Scrollout F1 An easy-to-use anti-spam email gateway. Designed for Linux and Windows administrators without advanced email security experience. Its goal is to be as simple as possible. An easy to use, already adjusted email gateway (firewall) offering free anti-spam, anti-virus protection in order to secure all existing email servers, such as Microsoft Exchange, Lotus Domino, Postfix, Exim, Qmail and more. Basic deployment in no time: In order to start using this application you need to cover only two steps, described in this basic CONFIGURATION guide CONFIGURE An email gateway (a.k.a. firewall) is a machine (physical or virtual) installed between Internet and the email server. Its primary role is to protect the email server by filtering incoming messages, via SMTP protocol, from Internet. Secondary, an email gateway may be used as an outgoing gateway in case you want to add some new email features which are not provided by older email servers. For instance, Exchange 2000 or 2003 has no DKIM signing and verification service - a quality improvement for message delivery. In order to start using this application you need to cover only the two steps of BASIC CONFIGURATION (points 1.1 and 1.2 below). 1. Basic configuration 1.1 CONNECT Set the network connection: IP address, subnet mask, gateway and DNS. 1.2 TRAFFIC You need to mention your domains and the responsible email server for each domain. Each domain must be unique, but the servers can have same value in case you are using one email server for multiple domains. The gateway system will become responsible for receiving emails that are addressed to all domains mentioned in this page and will forward the messages to the email servers. Optionally, in case you want ...
5/5 3,929 Jun 08, 2021
Marius Gologan <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Scrollout F1_th.png"border="0">
Secret Disk Free v2021.04
Secret Disk Free v2021.04 Creates additional hidden disk protected with a password Creating a secure place for sensitive files has never been easier than with our software Secret Disk. Within a few clicks, you can create a password-protected additional hard disk to store, hide, and lock files. The software also enables you to set several automation scenarios to make usage very convenient for you. If you need more than one secret disk, that can easily be handled by our software. Easy And Fast Creation With our software, you won't need to format your hard disk or change anything to the boot sector. It can make a new disk automatically and quickly while providing you with plenty of set-up options. You can choose to make the disk invisible, including the contents in it, and keep it password-protected. The Secret Disk works similarly to a standard hard disk and provides compatibility with any other software. To top it all off, you can choose your disk letter. Clever in Any Situation In the case of a power outage or fatal error of your Windows OS, your secret disk will automatically lock and become invisible as the information related to the disk instance is stored in the virtual memory. The Secret Disk does not encrypt your files, but it does limit access to them by allowing you to keep them password protected. The software ties together your files with the virtual disk to provide ample security to keep your files secure. Regular updates Just as technology keeps advancing, we will too. As more gets added or enhanced, we will send out updates to keep you up-to-date. The update process is automatic and in the background, so you won't ever need to worry. Trust and Awards Our software has received multiple awards from world-known rating agencies and bloggers. We pride ourselves ...
5/5 6,157 Jul 12, 2021
PrivacyRoot <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/sede_1_th.png"border="0">
SecretFolder 3.0.0.0
SecretFolder 3.0.0.0 SecretFolder is a security tool to hide and lock your sensitive folder out from the other users. It provides immediate data protection (protect and unprotect commands are executed in no time). Features: Free to use at both home and in the office Support for 64-bit Windows. NTFS, FAT32, exFAT and FAT volumes are supported. Unlimited number of folders can be protected at the same time. No limits on the size of protected data. No file system structure modifications will occur. Protected uninstall. When you create a secret folder, using your own password, you can manage folder. CMD command will not be able to access the folders.
0/5 7,476 Jun 05, 2014
Oh!Soft
SecureMyBit Deny v1.4
SecureMyBit Deny v1.4 SecureMyBit Deny is a simple, light and freeware security tool that permits you to deny execution of scripts that rely on Windows Script Host, perform impairment indicators analysis to detect possible malicious behaviours in analyzed executables, type your text safely against keyloggers, mouseloggers, screenloggers, etc. Then you can monitor your file system for changes and new files, detect processes that are connected to ports commonly used by malware and optimize security settings. (Please note that some antivirus or antimalware programs can detect SecureMyBit Deny as malware, we want to specify that this is a false positive, you can add SecureMyBit Deny to the exclusion list of your antivirus/antimalware). What’s new? Fixed heuristic engine false positive of EXE Analyzer (SecureMyBit Deny.exe) Changed ON/OFF text of File System Monitor button (Thanks @ticklemefeet for the suggestion) Fixed bug in Security Ports Scan Fixed critical bug of Text Editor Anti-Logger Fixed bug in File System Monitor Heuristic engine updated to improve ransomware detection, hash computing, decryption code and registry usage of analyzed EXE Added “Clear log” button to File System Monitor Key Features: Deny scripts execution Make USB read-only Text Editor Anti-Logger Perform EXE analysis Security Ports Scan Monitor File System easily Optimize security settings Terms &amp; Conditions: WE AREN’T ABSOLUTELY RESPONSIBLE FOR ANY KIND OF PROBLEMS, DAMAGES, LOSS OF DATA, LOSS OF FILES OR ANY OTHER KINDS OF PROBLEMS. THE SOFTWARE IS PUBLISHED “AS IS”. THERE MAY BE FALSE POSITIVES IN EXE ANALYZER REPORT(S) BECAUSE OF THE HEURISTIC ANALYSIS. Thank you. SecureMyBit Development Team Compatibility Windows Vista Windows 7 Windows 8/8.1 Windows 10 Special Requirement: Microsoft .NET Framework 4.5 Languages: English SecureMyBit Deny Test:
5/5 4,614 Nov 13, 2019
JM Security <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SecureMyBit Deny1_th.png"border="0">
SecureMyBit v2.3
SecureMyBit v2.3 SecureMyBit is a free, portable, and light application , which allows to encrypt any type of file with password (using AES 256 Bit encryption method) and then, decrypt them. SecureMyBit provide, for this purpose, also a secure and strong random password generator, which can generate passwords, as long as you want. Another utility of SecureMyBit is the Secure File Shredder, which can delete a file permanently with an irreversible shredding operation. Our software provides also an utility which can validate the strength of user’s passwords; and a System Specs utility, which can tell us all the informations about our computer. SecureMyBit provides also, in addition, a secure virtual keyboard which doesn’t produce any keystroke, so this guarantee a protection while entering your password. Finally, you can also get information about your files: hashes, file type, file attributes, etc. and compress your text easily and fast! When you encrypt your file(s) or folder(s) the Smart Monitor will check in real-time if they are modified, renamed or changed/deleted. Key Features Secure File Password Encryption (AES 256 Bit) Secure File Shredder System Specs Password Generator File Info Viewer Text Compressor Smart Monitor Compatibility Windows Vista Windows 7 Windows 8/8.1 Windows 10 Special Requirement: Microsoft .NET Framework 4.5 Languages: English F.A.Q. -Why SecureMyBit is detected by my antivirus/antimalware? We want to specify that this is surely a false positive. SecureMyBit is a clean file. Do I need to install SecureMyBit? No, SecureMyBit is avalaible only in “portable” version, so it doesn’t require any installation. -Is SecureMyBit free? Yes, SecureMyBit is absolutely FREE and WITHOUT advertisements! -Does SecureMyBit protect files against ransomware? Well, SecureMyBit provides surely additional protection to the encrypted files, against ransomware, also because the extension of the encrypted files are encoded. This doesn’t mean SecureMyBit protects files against all type of ransomware. -Why SecureMyBit gives me an error message when I ...
5/5 4,880 May 19, 2019
JM Security <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SecureMyBit1_th.png"border="0">
security.txt v1.1.0
security.txt v1.1.0 A cross-platform browser extension for displaying security.txt and humans.txt files. How does it work? As you browse the web and navigate to different websites, the browser extension checks the website to see if it supports either type of file. If it does, an icon is shown in the URL bar. You can click this icon to view more details about the text files that were located. What is security.txt? security.txt is a proposed standard that provides a means for websites and software authors to define their security policies. This is useful to security researchers or anyone who would like to responsibly disclose a vulnerability to the owners of the website or software. What is humans.txt? humans.txt is a less formal initiative for providing human-readable information about the authors of the website. Where to get it: This download is the Firefox extension. To get it for other browsers, choose below: Chrome and Chromium Install from the Chrome Web Store Microsoft Edge Install from the Microsoft Edge Addon Store Install From Source Source is available on Github Click here to visit the author's website.
5/5 3,373 Dec 17, 2020
Harmless Systems <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Security.png"border="0">
SecurityQuestionsView v1.00
SecurityQuestionsView v1.00 A free tool for Windows 10 that allows you to view the security questions and their answers stored in the Registry by the Windows 10 operating system. SecurityQuestionsView can decrypt the security questions stored on your current running system (Requires elevation) and it can also decrypt the security questions stored on external hard drive. SecurityQuestionsView displays the security questions of all users on your system that chose to set their security questions, for every user there are usually 3 questions. System Requirements This tool works on Windows 10/11, both 32-bit and 64-bit systems. For extracting the security questions from external drive, you can run this tool on earlier versions of Windows (Windows 7, Windows Vista). Start Using SecurityQuestionsView SecurityQuestionsView doesn't require any installation process or additional DLL files. In order to start using it, simply run the executable file - SecurityQuestionsView.exe After running SecurityQuestionsView, you have to choose how to load the security questions - From your local system or from external drive. If you choose to load the security questions from your local system, SecurityQuestionsView will ask you to run this tool as Administrator (Elevation), because only Administrator can access and decrypt the security questions. If you choose to load the security questions from external drive, you have to type the folder where the Registry files are located, for example: K:\windows\system32\config The Registry hive needed to extract the security questions is SAM. After the security questions and their answers are displayed on the main window of SecurityQuestionsView, you can select the questions (Ctrl+A) and then export them to comma-delimited/tab-delimited/XML/HTML file by using the 'Save Selected Items' option (Ctrl+S). Translating SecurityQuestionsView to other languages In order to translate SecurityQuestionsView to other language, follow the instructions below: Run SecurityQuestionsView with /savelangfile parameter: SecurityQuestionsView.exe /savelangfile A file named SecurityQuestionsView_lng.ini will be created ...
5/5 1,869 Jan 02, 2023
Nir Sofer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/securityquestionsview1_th.png"border="0">
SepPDF v3.73
SepPDF v3.73 Split PDF files containing multiple pages into individualized single PDF files for each page. • You can split PDF file containing multiple pages into individualized single PDF files for each page. • If you want to split PDF file, drag and drop it and click the "Split(All)" button. • You can also select the page range you wish to split. • Some PDF files with security can be split. • SepPDF is Freeware. Changes: v3.73 (November 22, 2023) Fixed some bugs. Click here to visit the author's website.
5/5 4,706 Nov 29, 2023
ForestH <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SepPDF_th.png"border="0">
Service Security Editor v2.0.0.13
Service Security Editor v2.0.0.13 A Free Standalone, portable GUI utility to Set Permissions for any Windows Service Easily allow (or deny) a user the ability to start, stop, pause or modify any Windows Service with just a few clicks of your mouse. Service Security Editor will help you to configure who can access your important Windows Services. It is an easy-to-use GUI alternative to Microsoft's powerful SC and SubInACL.exe command line programs. However, as with any other administrative tool, please use it with caution. When you start Service Security Editor, it shows the list of the services running on your machine: Select a service and click the Open... button to pop up the service's standard Windows Service Security Settings window: From there, select a user in the top portion and check the boxes lower down to grant or deny him whatever capabilities you see fit. Click the Add... button to bring in an account not already on the list. And of course, click the OK or Apply buttons to record your changes. Granting a Non-Admin User Start &amp; Stop Rights to a Service For example, suppose you have a non-administrative user called Albert Newton who needs to restart the Print Spooler service when it acts up. Unfortunately he doesn't have the necessary rights and the Stop button is disabled when he opens the service from the Services Control Panel application: To grant Albert the ability to start and stop the Print Spooler service: 1) Start Service Security Editor. 2) Select the Print Spooler service from the list: 3) Click the Open... button to launch the Service Security Settings window: 4) Albert isn't on the list, so click on the Add... button to open the Select Users or Groups window. Type in Albert's ...
5/5 2,131 Sep 23, 2021
Core Technologies Consulting, LLC <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/ServiceSecurityEditor1_th.png"border="0">
Sherlock AI Detector v1.0
Sherlock AI Detector v1.0 Your Powerful Ally Against AI-Generated Texts. Introducing Sherlock AI Detector, an innovative tool employing cutting-edge technology to fight against one of the most pressing modern threats to academic integrity and business authenticity: AI-generated text fraud. Protect your institution, organization, or business from AI-produced texts, ensuring human authenticity and safeguarding your trustworthiness. Essential for the Modern Digital Landscape The rise of advanced artificial intelligence has brought along the challenge of distinguishing between human-written and AI-generated texts. AI-produced content can infringe upon academic integrity, mislead business communication, or even manipulate public perception. The Sherlock AI Detector is your defence in this high-tech era, providing a robust, easy-to-use solution. Promote Academic Integrity Sherlock AI Detector is an indispensable tool for educators seeking to maintain academic integrity. It helps detect and deter the use of AI-generated texts in academic submissions, promoting honesty and fairness in educational institutions. Preserving the integrity of academia is essential in the face of evolving technological landscapes. The rise of AI-generated text presents a new challenge to educators worldwide, but with Sherlock AI Detector, maintaining academic integrity just got easier. Features • Adaptive Learning Algorithms – Sherlock AI Detector uses human-built algorithms that are constantly adjusted and improved with each new piece of AI data, enhancing increased accuracy over time with multiple AI text generators. • Real-time AI Detection – The software performs real-time analysis of text files to immediately find patterns and other markers to detect that the text or part of it was created by artificial intelligence. • Secure and Compliant – We ensure that Sherlock AI Detector complies with all industry standards and regulations to guarantee your data’s privacy and security. To use... • Simply copy and paste text into the programs window or open an existing .txt file from your computer. • Click Start and let the program finish scanning. • Text highlighted ...
5/5 2,519 Sep 01, 2023
essayrewriteai.com <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SherlockAIDet1_th.png"border="0">
Signal v7.1.1
Signal v7.1.1 Speak Freely Say "hello" to a different messaging experience. An unexpected focus on privacy, combined with all of the features you expect. Why use Signal? Explore below to see why Signal is a simple, powerful, and secure messenger Share Without Insecurity State-of-the-art end-to-end encryption (powered by the open source Signal Protocol) keeps your conversations secure. We can't read your messages or listen to your calls, and no one else can either. Privacy isn’t an optional mode — it’s just the way that Signal works. Every message, every call, every time. Say Anything Share text, voice messages, photos, videos, GIFs and files for free. Signal uses your phone's data connection so you can avoid SMS and MMS fees. Speak Freely Make crystal-clear voice and video calls to people who live across town, or across the ocean, with no long-distance charges. Make Privacy Stick Add a new layer of expression to your conversations with encrypted stickers. You can also create and share your own sticker packs. Get Together with Groups Group chats make it easy to stay connected to your family, friends, and coworkers. No ads. No trackers. No kidding. There are no ads, no affiliate marketers, and no creepy tracking in Signal. So focus on sharing the moments that matter with the people who matter to you. Free for Everyone Signal is an independent nonprofit. We're not tied to any major tech companies, and we can never be acquired by one either. Development is supported by grants and donations from people like you. "I use Signal every day." Edward Snowden Whistleblower and privacy advocate "I trust Signal because it’s well built, but more importantly, because of how it’s built: open source, peer reviewed, and funded entirely by grants and donations. A refreshing model for how critical services should be built." Jack Dorsey CEO of Twitter and Square "Signal ...
5/5 5,892 Mar 07, 2024
Signal <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Signal3_th.png"border="0">
SilverSHield 6.0.20.120
SilverSHield 6.0.20.120 SilverSHielD, a tiny SSH and SFTP server for Windows. It features SSH2 password-based, interactive and public-key authentication methods and fully supports forwarding and sftp subsystem, along with state-of-the-art virtual folders management. Yet its management console makes it extremely easy to configure and deploy, both locally and remotely. This tiny award-winning software is built with ease-of-use and security in mind, please give it a try and if you just need a single-user/non-commercial version, then you can keep the Free edition forever, no expiration and free lifetime updates and upgrades. Whether your need is to backup your Cisco CallManager/UC or a PCI-compliant server to securely transfer any type of file, SilverSHielD is the solution you are looking for. Features: Secure Shell/Command (SSH2) Forwarding SFTP (supports files larger than 4 GB!) Compression (Zlib) Powerful script-based event handling subsystem, with support for 4 major scripting languages (NEW!)
0/5 8,508 Aug 22, 2013
K2SXS
Simple Password Manager v1.0.4
Simple Password Manager v1.0.4 A free and open source program to safely store and manage your passwords locally. Simple Password Manager is a program that allows you to store and manage your passwords in a better way than with Notepad for Windows. You can create new passwords, edit existing ones, and delete passwords that you no longer need. How to use? To start using Simple Password Manager, launch the program by double-clicking on the icon and enter the default password which is: 1234. As is evident, you can change that password in the login window for a better security. • The main window will appear, displaying a list of all the passwords you have saved in the program. By default, you have a password called "Social Networks" and you can add data there. • To create a new password, first, go to the "Add a new password" tab and complete the text boxes. The criteria to create a password consists in giving a name to the password and at least one column. You can create as many columns as possible you want but I recommend you this order: "ID, User, Email, and Password". When you add the necessary data, press the button "Create the new password". Now, go back to the "Password Manager" tab and click on the "Select a password or create a new one" drop-down menu at the top of the main window. When you clicked that drop-down menu, you will see all your passwords that was created. • If you add data to an existing password, it's very important to click the "Save" button; on another hand, if you don't save the data recently added, all of them will be lost once you close the app. All the data ...
5/5 1,011 Jul 05, 2023
Lextrack <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SimplePassMan1_th.png"border="0">
Simple Porn Blocker v1.0
Simple Porn Blocker v1.0 Simple Porn Blocker is a very simple Windows OS software that can help you to quickly block all major porn\adult websites with a single mouse click. This program blocks 3000+ popular pornographic websites on any web browser, including Internet Explorer, Firefox, Chrome, Opera, etc. It is very useful for parents to prevent the childrens from visiting porn websites. The program can block porn websites because it modifies the \etc\hosts file (some security software may show you an alert dialog, just allow\exclude our program). Works on Windows XP, Vista, 7, 8, 8.1 and Windows 10 (32\64-bit). Program Key Features Easily Block 3000+ Popular Pornographic\Adult Websites Works on Any Web Browser (Internet Explorer, Firefox, Chrome, etc) Porn Sites are Blocked by Modifying the Windows \etc\hosts File The Program is Already Translated in 28 Languages If Needed You can Quickly Un-block Pornographic\Adult Websites Run it Directly from the USB with the Portable Version Works on Windows XP, Vista, 7, 8, 10 (32\64-bit)
5/5 5,652 Jan 09, 2016
Site2unblock <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/Simple Porn Blocker1_th.png"border="0">
Simple Software-restriction Policy v2.20
Simple Software-restriction Policy v2.20 A software policy makes a powerful addition to Microsoft Windows' malware protection. In particular, it is more effective against ransomware than traditional approaches to security. If you know about the Linux 'execute permission' bit then you'll understand what this is for. The mode of operation is somewhat different in that execute permission is granted to folders and subfolders rather than individual files, but the intention is the same, to stop undesirable or unknown software from launching unless you OK it. Additionally, it is possible to specify that certain executables (typically browsers and email clients) are run with reduced rights. This is a valuable damage-limitation measure against browser plugin vulns, etc. The protection can be turned off without a reboot whilst installing legitimate software, and will automatically reactivate after a specified time Click here to visit the author's website.
5/5 5,166 Nov 15, 2019
IWR Consultancy <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SSrestriction Policy1_th.png"border="0">
Skiff v1.0.0.9
Skiff v1.0.0.9 Privacy-first, end-to-end encrypted Mail, Pages, Drive, and Calendar. Skiff is a privacy-first, end-to-end encrypted workspace with Mail, Calendar, Pages, and Drive product. Sign up for a free Skiff Mail account at skiff.com. Skiff empowers free and more effective communication through private, end-to-end encrypted email. All messages sent between Skiff Mail users are end-to-end encrypted. Additionally, Skiff never stores unencrypted access to messages sent or received from external mail providers. Skiff Calendar, Pages, and Drive are also end-to-end encrypted, including all event details, files, text, and titles. Read more here. Private, end-to-end encrypted mail. Skiff Mail protects your inbox by keeping your messages end-to-end encrypted. That means that no one but you has access to your data. • 10 GB free storage Switch comfortably to Skiff with 10 GB for free - more than any other end-to-end encrypted email provider. • 1-click migration Migrate in 1-click from Gmail, Outlook, ProtonMail, and more. Making the switch is quick, easy, and completely private. • Folders, labels, and more Keep your inbox organized with folders, labels, and multiple aliases in every account. • Signatures and auto-reply Customize your signature or add an auto-reply to any inbox. • Invite your team Share workspaces and custom domains with your entire team, and stay organized with advanced admin controls. • Schedule and undo send Schedule emails for future times or undo sent mail when you need to make a change - all for free. Private, end-to-end encrypted pages. Protect your notes, documents, and wikis with Skiff Pages - end-to-end encrypted and fully collaborative. • Version history Wind back the clock to view the past state of your team’s documents. • Decentralized IPFS storage Opt-in to store your files on the interplanetary ...
5/5 247 Feb 13, 2024
Skiff <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Skiff1_th.png"border="0">
Slimjet v40.0.2.0
Slimjet v40.0.2.0 Fast web browser that automatically blocks ads and more. Tired of all the obtrusive ads that attempt to track everything you do online, irritates your eyes and wastes your time? Welcome to the ONLY browser that automatically blocks ALL ads. No plugins, opt-ins or configurations needed. Enjoy a clean and ad-free web at lightning fast speed. Maximum privacy protection Tired of being watched all the time by big companies like Facebook or Google no matter where you go? You can rest at ease here. Rebuilt from the open-source Chromium project, Slimjet doesn't send any usage data back to Google like Chrome. On top of that, Slimjet is armed with the most advanced anti-tracking technology to thwart various attempts to invade on your privacy (e.g., track your identity or profile your behavior) by the intrusive businesses. High performance blink engine Faster browser startup, faster page loading, highly responsive UI powered by industry-leading Blink engine. Unsurpassed level of integration Loaded with powerful features &amp; flexible options, Slimjet does more for every user without relying on external plugins. Multiple layers of protection Automatic protection against phishing and malware, advanced privacy control options, robust sandboxed multi-process architecture. Major Features KILL ALL ADS WITH AD BLOCKER Fed up with all the annoying ads? Kill them all with the built-in ad blocker. Boost the performance of your browser by saving memory, CPU and bandwidth consumed by the ads. HI-SPEED DOWNLOAD MANAGER Slimjet comes with a turbocharged download manager which uses multiple connections in parallel to download files up to 12x faster. It also lets you resume a download job between browser sessions. INTELLIGENT FORM FILLER Smarter and more convenient than the basic password manager in Chrome. Save page url and login data in a form file which lets you open your favorite online account with a single click later on. YOUTUBE VIDEO DOWNLOADER Download any youtube videos to local hard disk ...
5/5 2,011 Jul 14, 2023
FlashPeak Inc. <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Slimjet1_th.png"border="0">
SlunkCrypt v1.3.0
SlunkCrypt v1.3.0 An experimental cross-platform cryptography library. SlunkCrypt is an experimental cross-platform cryptography library and command-line tool. A fully-featured GUI is provided for the Windows platform. Encryption algorithm The SlunkCrypt algorithm is based on core concepts of the well-known Enigma machine but with numerous improvements, largely inspired by R. Anderson’s “A Modern Rotor Machine”: The original Enigma machine had only three (or, in some models, four) rotors, plus a static “reflector” wheel. In SlunkCrypt, we uses 256 simulated rotors for an improved security. Furthermore, the original Enigma machine supported only 26 distinct symbols, i.e. the letters A to Z. In SlunkCrypt, we use 256 distinct symbols, i.e. the byte values 0x00 to 0xFF, which allows the encryption (and decryption) of arbitrary streams of bytes, rather than just plain text. Of course, SlunkCrypt can encrypt (and decrypt) text files as well. In the original Enigma machine, the signal passes through the rotors twice, once in forward direction and then again in backwards direction – thus the “reflector” wheel. This way, the Enigma’s encryption was made involutory, i.e. encryption and decryption were the same operation. While this was highly convenient, it also severely weakened the cryptographic strength of the Enigma machine, because the number of possible permutations was reduced drastically! This is one of the main reasons why the Enigma machine eventually was defeated. In SlunkCrypt, the signal passes through the simulated rotors just once, in order to maximize the number of possible permutations. This eliminates the most important known weakness of the Enigma machine. Obviously, in SlunkCrypt, separate “modes” for encryption and decryption need to be provided, since encryption and decryption no longer are the same operation. In the original Enigma machine, the rightmost rotor was moved, by one step, after every symbol. Meanwhile, all ...
5/5 1,432 Dec 15, 2022
LoRd MuldeR <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SlunkCrypt1_th.png"border="0">
Snipe-IT v5.3.0
Snipe-IT v5.3.0 A free, open source IT asset/license management system Snipe-IT is a free and open source asset/license management system with powerful built-in features. It is a web-based software, and must be run on a web server and accessed through a web browser. Snipe-IT is very user-friendly, and is ideal for IT operations: tracking who has which laptop, handling software licenses, accessories, etc. Features Powerful, user-friendly interface Industry-standard best security practices Powerful REST API Completely free and open source Changes: New in v5.3.0 Version 5.3.0 of Snipe-IT fixes some minor XSS security issues and includes some additions to the API, as well as some small bug-fixes. We're tagging this as v5.3.0 to encourage users to upgrade for the security improvements. (Yes, we know bumping it to a full minor version is not strictly adherent to semver, but we really want folks to upgrade.) ## Added - Added [#10062]: Added Support for Heroku Deployments [#10063] - Added [#9973] - add `use_default_eula` to category API endpoint [#10069] - Added [#9969] - added `color`, `show_in_nav`, and `default_label` to status label API [#10070] - Upgraded Docker to PHP 7.4 [#10080] - Added rewrite rule for Let's Encrypt certificates [#10082] - Bumped number per page up to 1000 - Added totals to depreciation report footer [#10115] - Add user permissions message if the user is not an admin or better - Added assigned components to assets API (pass `?components=true` to the assets endpoint) [#10124] - Force revalidation headers when user logs out [#10164] ## Fixed - Fixed [#10015] - Archived Assets Showing Under Locations/'Print All Assigned' Feature [#10079] - Check for valid category name on print view of "print all assigned assets" - Fixed issue where created_at date was not showing on uploads - Fixed issue where `show_in_nav` was null (instead of zero) if no value passed - Fixed extraneous asset search in depreciation report ...
5/5 2,038 Oct 19, 2021
Grokability, Inc. <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Snipe-IT3_th.png"border="0">
SnmpWalk (Shell Tool) v1.02
SnmpWalk (Shell Tool) v1.02 SNMP is a unified protocol of network monitoring and network device management. All active network devices support SNMP. Besides that, SNMP is supported by major operational systems and a large number of network applications. SnmpWalk allows you to detect a set of variables that are available for reading on an individual device. You can obtain a full list or just part. By analyzing the results of a network device scan obtained with SnmpWalk, you can develop a list of supported MIBs and, in this way, obtain full descriptions of variables and possible values. Besides that, MIB documents contain information about SNMP variables that are available only for writing. After analyzing information retrieved with SnmpWalk from hardware or software SNMP sources, you can use SnmpSet and SnmpGet tools to change and obtain values. The value of SnmpWalk is not limited to only the SNMP analysis of supported features. This tool can efficiently get SNMP tables and read whole sections of variables. This mainly refers to tables that are often used for presenting statistical and status information. SnmpWalk is a command-line tool, which makes possible its use in scripts. This tool supports modern IPv6 in addition to the standard IPv4. Moreover, SnmpWalk allows you to use a simple version of SNMPv1/SNMPv2c and also supports a safe version of SNMPv3. Features Supports SNMP v1/v2c and SNMPv3 Supports IPv4 and IPv6 Full or partial SNMP variables tree Exports to CSV file Command line interface (CLI) Any type of SNMP variables Various Auth. &amp; Privacy protocols Windows XP-10 compatible Windows Server 2003-2016 compatible Parameters SnmpWalk.exe [-q] -r:host [-p:port] [-t:timeout] [-v:version] [-c:community] [-ei:engine_id] ...
5/5 4,399 Dec 08, 2019
SNMP Software <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/snmpwalk1_th.png"border="0">
SophiApp v1.0.97
SophiApp v1.0.97 A free, open-source app for fine-tuning Windows 10 and Windows 11. It offers a modern UI/UX, more than 130 unique tweaks, and shows how Windows can be configured without making any harm to the OS. System Requirements VersionMarketing nameBuildArchEditionsWindows 11 Insider Preview 23H22023 Update25206+Home/Pro/EnterpriseWindows 11 22H22022 Update22621+Home/Pro/EnterpriseWindows 11 21H222000.739+Home/Pro/EnterpriseWindows 10 22H22022 Update19045.2006+x64Home/Pro/EnterpriseWindows 10 21H2October 2021 Update19044.1706+x64Home/Pro/Enterprise/LTSC Core features Dynamic rendering UI—nothing is hardcoded; 👻 130+ tweaks; ⭐ SophiApp uses the MVVM pattern; Multithreading support; SophiApp is checked by the static analyzer, the license for which by courtesy of PVS-Studio; Big thanks to them for providing us the license. All builds are compiled in cloud via GitHub Actions You may compare a zip archive hash sum on the release page with the hash in cloud console in the Compress Files category to be sure that the archive wasn't spoofed (you have to be logged into you GitHub account to be able to view Actions logs); The app shows the actual state of every feature in the UI; Supports high resolutions; Has a built-in search engine; Functions can be found by searching by their headers and descriptions. GIF Supports dark &amp; light themes; The app can change its' theme instantly when you change your default Windows theme mode for apps. GIF Set up Privacy &amp; Telemetry; Turn off diagnostics tracking scheduled tasks; Set up UI &amp; Personalization; Uninstall OneDrive "correctly"; Uninstall ...
5/5 2,212 Sep 14, 2023
Sophia Community <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SophiApp1_th.png"border="0">
Sophos Scan and Clean v1.0.1
Sophos Scan and Clean v1.0.1 Free Virus Removal with Sophos Scan and Clean Modern viruses and malware are designed to bypass standard defenses, as advanced threats effectively hide from both pre-installed security software and computer users. Antivirus programs, blacklists, and other security software that require prior threat knowledge are ineffective against detecting and removing advanced virus attacks. Sophos Scan and Clean is a free, no-install, second-opinion virus removal scanner designed to rescue computers that have become infected with advanced zero-day malware, spyware, Trojans, rootkits, and other threats capable of evading real-time protection from up-to-date antivirus software. It's a powerful virus removal tool capable of both detecting and removing deeply embedded persistent threats and other malware that traditional security solutions fail to detect. How to Use Sophos Scan and Clean As an on-demand scanner, Sophos Scan &amp; Clean does not need to be installed in order to use it. It can be started directly from USB flash drives, portable SSD's, and other external drives or data storage devices, making it particularly useful in situations where malicious virus infection prevents downloading and installing new security software. Automatic Security Updates with Every Scan Sophos Scan and Clean removes viruses and threats while the OS is running and blocks re-infection by protecting registry keys and file locations. Plus, thanks to proprietary cloud technology, Sophos Scan and Clean is always up to date – no need to re-install to get updates each time the program is run. Proprietary Cloud-Assisted Miniport Hook Bypass technology allows Scan and Clean to defeat rootkit and bootkit hooks for any hard disk driver. Behavioral Scans automatically find and remove programs and binaries that look and act like malware; probing the system for characteristic reputation anomalies, origin and relation to memory, file and registry objects, structure anomalies, impersonation, tampering, visibility, activity, boot survivability and uninstallation abilities. This ...
5/5 895 Jun 20, 2023
Sophos Ltd. <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SophosScanClean1_th.png"border="0">
Sordum Random Password Generator v1.0
Sordum Random Password Generator v1.0 Your password is your metaphorical ‘key’ to unlocking you online ‘front door’. You wouldn’t hand your home key to just anyone, would you? Cybersecurity experts continually recommend to use of strong, unique passwords for several reasons , cyber-criminals compromise websites and online accounts, and post lists of usernames, email addresses, and passwords online. A criminal can look for other online shopping, social media or financial accounts for that same person. When the criminal finds those accounts they can try logging in with the exposed password. If the password is reused, they can gain access to further accounts. This is why unique passwords are so important. The use of strong passwords can slow or often defeat the various attack methods of compromising a terminal’s security. Passwords are the first line of defense against unwanted access to your accounts. The stronger a password, the better protected accounts. Your enemy isn’t some guy in a ski mask trying to guess your password one try at a time. It’s a program that automatically runs through massive databases of common passwords or random combinations of characters . Hackers use a technique called brute forcing. This is a technique where they try every possible character combination until the correct password is identified.The stronger the password the less likely brute forcing will be successful.To Create a Strong Password ; Choose a password that no one will easily guess , Do not share passwords , Make sure your password is long, Use at least one letter, number and special character in your password, Remember to update and vary passwords. How to use Sordum Random Password Generator. We have developed a free and portable software (Sordum Random Password Generator) to create random secure passwords. Download , Unzip it and run the “RandomPW.exe” file Sordum Random Password Generator has ...
5/5 4,476 Nov 26, 2019
Sordum.org <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/sordumrandompassgenerator2_th.png"border="0">
Spiceworks IT Desktop 7.5.00095
Spiceworks IT Desktop 7.5.00095 The only application that combines Network Inventory, Help Desk and more in a single, easy-to-use interface. Your network may be complicated and expensive but your IT management tools don't need to be. Spiceworks IT Desktop is the only application that combines Network Inventory, Help Desk, Reporting, a built-in TFTP Server, Monitoring, Active Directory Management, and Troubleshooting in a single, easy-to-use interface designed for IT teams in small and medium businesses. Plus, Spiceworks lets you collaborate with IT pros around the world to solve problems, share ideas and decide what additional features you need in Spiceworks. And, the best part -- it's free. Why? Because we think you shouldn't have to pay for technology to manage technology. Instead, you should spend your money on cool new hardware and software for your company. That's why top technology vendors help sponsor Spiceworks. Manage your network. Need a way to wrangle all your devices, software, cloud services, and even users? With network inventory and mapping, network monitoring and alerting, license management, troubleshooting, reporting, and much more, Spiceworks is the free IT management app with the tools you need to tackle your IT day. Run an IT help desk. User requests driving you nuts? Your current ticketing solution not quite cutting it? Spiceworks help desk software helps you run a ship-shape help desk, at the office and on the road. Manage user tickets, organize your work, create a custom user portal, and even launch a knowledge base… all for free! Monitor your network. Ever feel like your users are a step ahead of you? Meet Spiceworks Network Monitor — an easy-to-use, real-time interface that'll help you stay in-the-know about what's happening with your critical systems and catch problems long before your users do. Inventory all your hardware. From workstations and servers to routers and switches (even printers and phones) – ...
5/5 9,390 Nov 15, 2019
Spiceworks <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Spiceworks IT Desktop_screenshot_th.png"border="0">
SpywareBlaster v6.0
SpywareBlaster v6.0 Powerful protection against spyware, adware, browser hijackers, dialers and other potentially unwanted software. Trusted and effective. Why SpywareBlaster? Spyware, adware, browser hijackers, and dialers are some of the most annoying and pervasive threats on the Internet today. By simply browsing a web page, you could find your computer to be the brand-new host of one of these unwanted fiends! The most important step you can take is to secure your system. And SpywareBlaster is the most powerful protection program available. Multi-Angle Protection Prevent the installation of ActiveX-based spyware and other potentially unwanted programs. Block spying / tracking via cookies. Restrict the actions of potentially unwanted or dangerous web sites. No-Nonsense Security SpywareBlaster can help keep your system secure, without interfering with the "good side" of the web. And unlike other programs, SpywareBlaster does not have to remain running in the background. It works alongside the programs you have to help secure your system. MD5: ed3c5976a98e3729add30767794fd15d Click here to visit the author's website.
5/5 6,040 Dec 09, 2020
Brightfort <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SpywareBlaster1_th.png"border="0">
SSE Setup v8.7
SSE Setup v8.7 SSE SetupTM is a freeware Windows installation creator that is easy, full-featured and mature. Installers run on Windows 10 and all relevant Windows OS's (you choose which) Installs both 32-bit and 64-bit programs NOT some complicated scripting language! (unlike many other installers) Create a fully functional installer in minutes (NOT days!) Handles the most common things automatically Creates small, efficient .EXE's or .ZIP's, or burns to CD/DVD Non-Admin (Limited/Standard user) install support Upgrade and patch support for installed programs Integrated Internet Updater solution that can download &amp; install needed updates Prerequisites checks to look for needed hardware / OS's / software Can download any required software (runtimes) your program needs For .NET installs, easy framework download if user needs For Access developers: Easy Access database deployment Built-in Language support for 12 of the world's most-used (multilanguage) Works well with UAC / Very "UAC Friendly" Customizable GUI and 7 presets to choose from Ability to digitally sign installer/uninstaller/your program's files Display license agreement that must be agreed to Install files &amp; shortcuts; modify registry Automatic DLL/OCX registration or font installation if needed Full Unicode support Complete context-sensitive help a button away Automatic removal of everything installed during uninstall Run external programs during install/uninstall Show welcome screen or custom messages Play audio files Associate filetypes with your ...
5/5 4,922 Nov 20, 2019
Chris Long <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SSE Setup1_th.png"border="0">
Stirling-PDF v0.21.0
Stirling-PDF v0.21.0 Your free, locally hosted one-stop-shop for all your PDF needs. This is a powerful locally hosted web based PDF manipulation tool using docker that allows you to perform various operations on PDF files, such as splitting merging, converting, reorganizing, adding images, rotating, compressing, and more. This locally hosted web application started as a 100% ChatGPT-made application and has evolved to include a wide range of features to handle all your PDF needs. Stirling PDF makes no outbound calls for any record keeping or tracking. All files and PDFs exist either exclusively on the client side, reside in server memory only during task execution, or temporarily reside in a file solely for the execution of the task. Any file downloaded by the user will have been deleted from the server by that point. Powerful PDF Tools Stirling PDF provides you with powerful tools to manage your PDF files. Merge, split, or convert your PDF files with ease. Secure and Reliable Your files' security is our priority. Stirling PDF does not maintain any files, tracking or data. It operates fully on your local machine, ensuring privacy and control over your data. Personalized for you Stirling-PDF is designed with user-centricity in mind. The interface, App name and description is all customizable, letting you adjust the settings according to your preferences and needs. Changes v0.21.0 Language updates Stamp feature enhancements / changes (@sbplat ) All images use Alpine to reduce docker size (This may cause issues with new versioning of apps like LibreOffice PLEASE RAISE TICKETS! ) (Special thanks to @Zoey2936 for this one for spending so long on it due to different issues!) Removal of DockerFileBase image New icon!! Several various tune-ups and changes from @Ludy87 Fixed the "Bored Waiting" button :) Blank page detection now uses Java not Python and works better Note: You must download and install the JDK development environment from Oracle before you can use Stirling-PDF. ...
5/5 415 Feb 29, 2024
Stirling-PDF, Inc. <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Stirling PDF_th.png"border="0">
StopUpdates10 v4.5.2023
StopUpdates10 v4.5.2023 Take your Control over Windows updates with StopUpdates10 Free! StopUpdates10 has 2 modes: • Windows Updates 100% Bulleteproof Hard Block (with Double Protection). • Windows Updates Soft Block - Pause Updates until 11/18/2099 with ability update Windows Defender and Windows Store Apps. Features: • Stops Windows updates. • Stops forced upgrades. • Stops annoying upgrade notifications. • Restore updates with one-click. • Pauses updates. • Disables Windows 7-8 'End of support' and 'End of Service' notifications. Benefits: • Easy to disable and re-enable Windows updates. • StopUpdates10 does not delete files, does not change file rights or another destructive actions. • StopUpdates10 is lightweight. vStopUpdates10 is free of charge. What's the difference between 'stop updates' and 'pause updates'? • Stopping updates prevents downloading and installing any updates. • It blocks the Windows update service. • Pausing updates only block installing, not downloading, updates. • Microsoft allows you to pause updates for limited number of days and only once. • You can not pause updates again after resuming. StopUpdates10 removes limitations for pausing updates: • You can pause updates until up to 2099 year. • You can pause and resume updates as many times as you want. • You can set different pause date and time for Feature updates and for Quality updates. What's the difference between Feature updates and Quality updates? • Feature update is a new version of Windows. It is installed as an upgrade to the existing version with ...
5/5 3,885 Jan 11, 2024
Greatis Software <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/StopUpdates10_th.png"border="0">
StorURL v3.0.35.0
StorURL v3.0.35.0 A bookmark manager that helps you to store links to all of your favorite websites in one central repository. It works with the browsers installed on your system so you can open your links in any web browser you’d like from one central interface. Import your bookmarks from most major browsers, including Google Chrome, Mozilla Firefox, Internet Explorer and Opera. Open websites in any browser installed on your computer, directly from within StorURL. Store and sort sites in unlimited categories. Enable a floating toolbar that you can keep anywhere on your screen, for quick access to all your bookmarks. Generate HTML “home” pages containing links from one or all categories. Supported/Tested Operating Systems Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 Changes: 3.0.35.0 (Released: 2021-10-03) fixed bug where using the "Override system default browser" also overrode individual default browsers fixed bug where the Open URL button on the main toolbar ignored all specified browsers and launched the system default fixed mnemonic underlining in the Site Information panel fixed help browser so external links open in your system's default browser, instead of IE updated some documentation to be more clear about scanning URLs Prerequisites The following items are required for StorURL to run properly. .NET 3.5 TLS 1.2 support (Win 7 details) (broken links) .NET 3.5 TLS 1.2 support (Win7 32-bit) (direct download) .NET 3.5 TLS 1.2 support (Win7 64-bit) (direct download) .NET 3.5 TLS 1.2 support (Win8/10) .NET Framework Microsoft Visual C++ 2005 Service Pack 1 Redistributable Package MFC ...
5/5 5,032 Oct 04, 2021
HazteK Software <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/StorURL1_th.png"border="0">
Strong Passwords Need Entropy v18.0
Strong Passwords Need Entropy v18.0 SPNE is a great strength and survivability checker, and a strong password generator Features: • 16 rules to be respected when it comes to password policy and security • Password properties • Search passwords in worst list (10,032 passwords) • Password generator via different modules: - Guid - Mac adress - Random - Serial - Prononceable word (Password Psychology) - Morse code (Password Psychology) - Emoticons (Password Psychology) - Cryptocode (Password Psychology) - Leetspeak (Password Psychology) - Hexspeak (Password Psychology) - Special dictionary - Piece of poetry Tools: - WPA2 key generator with histogram - Password versus Password - comparison - Pick up your pseudo - Hash detector INSTALL - No Adware No Spyware - 100% freeware - No install required. Just unzip in the directory of your choice - No modification of the registry - Requires no administrator authorization - Doesn't modify files outside own directories - Requires no internet connection SHA-256: E958D744913B29169BDA22236378D8C5B74DEF4ACBAF26AB5765F36155878996 Version 18.0 - Update from 19th of May 2021 • Updated length of password (maximum: 64) • Updated List of worst passwords (+22) • Improvement of pronounceable section • New function: Poetry section. Replacement of 'e' with other symbols • New function: Properties available in the list section • Improvement of histogram (WPA2 key) • New function: Create a dictionary from the list section • Improvement of design Click here to visit the author's website.
5/5 3,997 Jun 18, 2021
ProtoSoftware <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/StrongPasswordsNeedEntropy1_th.png"border="0">
Sylpheed v3.7
Sylpheed v3.7 Sylpheed is a simple, lightweight but featureful, and easy-to-use e-mail client. Sylpheed provides intuitive user-interface. Sylpheed is also designed for keyboard-oriented operation, so Sylpheed can be widely used from beginners to power users. Sylpheed is a free software distributed under the GNU GPL (the library part is GNU LGPL). You can freely use, modify and redistribute it under the license. Simple, beautiful, and well-polished user interface Comfortable operationality which is built in detail Well-organized, easy-to-understand configuration Lightweight operation High reliability with one-mail-corresponding-to-one-file format Extensibility by plug-in faculty Powerful filtering and search Junk mail control Security features (GnuPG, SSL/TLSv1) Various protocols support Internationalization and Multilingualization support High-level Japanese processing Flexible cooperation with external commands Changes since Sylpheed 3.6 The function to export the address book to CSV files was added. 'Nick Name' column was added to the address book. Context menu was added to the search result of the query search dialog. When attaching UTF-16 text files, they are automatically converted into UTF-8 now. Show original From on the summary view if the display-name seems to be an e-mail address. The bug that wrong reply target could be selected when the summary was sorted by the unread flag (#286). Win32: the bug that Japanese characters were overlapped on printings with some font settings was fixed. Win32: the bug that empty lines were not properly spaced on printings with some font settings was fixed. Win32: OpenSSL ...
5/5 8,034 May 05, 2019
Sylpheed <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/sylpheed_th.png"border="0">
TakeStock v2.0 R69
TakeStock v2.0 R69 The world’s most popular completely free full-featured personal investment management software for Windows. TakeStock 2 is a from-the-ground-up rewrite of the original version first released in 2002, and is used by thousands of independent and professional investors worldwide to help make better informed investment decisions. TakeStock 2 lets you: • Check the performance of your stocks, ETFs and mutual funds. • Track dividends, capital gain distributions, margin equity and cash flow. • View a security’s price chart, find historical prices and read company information. • Get price quotes (usually delayed by 15 minutes). • Be alerted when a security’s target buy or sell price is reached. • Easily identify short and long term gains for tax reporting purposes. But that’s just scratching the surface! With TakeStock 2, your financial data remains on your computer — where it belongs — and not at a website whose security could be compromised. The portable version of TakeStock 2 even runs entirely off a USB stick, allowing you to use TakeStock 2 on different computers without leaving any data on those devices. TakeStock 2 is 100% free, displays no advertising or nag screens, and doesn’t require registration of any kind. Changes Version 2.0 Release 69, published 25 Feb 2024 Bug fixes: Bug #248, Reported 2024.02.12 by several users. The unathenticated data provider is sometimes unable to retrieve information. Bug #249, Reported 2024.02.12 by Ravi Bhavnani The chart provider is sometimes unable to retrieve a chart. This download is for the portable ...
5/5 5,048 Mar 15, 2024
Ravi Bhavnani <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/takestock1_th.png"border="0">
TeamViewer v15.5.6
TeamViewer v15.5.6 Desktop sharing has never been easier: With TeamViewer you will be able to connect to the desktop of a partner anywhere on the Internet. TeamViewer also works in the other direction: Show your own desktop to a partner over the Internet and illustrate your own developed software, presentations or solutions. Remote Control without Installation With TeamViewer you can remotely control any PC anywhere on the Internet. No installation is required, just run the application on both sides and connect - even through tight firewalls. Remote Presentation of Products, Solutions and Services The second TeamViewer mode allows you to present your desktop to a partner. Show your demos, products and presentations over the Internet within seconds - live from your screen. NOTE: Free for non-commercial use only. Features: Remote Control without Installation: With TeamViewer you can remotely control any PC anywhere on the Internet. No installation is required, just run the application on both sides and connect - even through tight firewalls. Remote Presentation of Products, Solutions and Services: The second TeamViewer mode allows you to present your desktop to a partner. Show your demos, products and presentations over the Internet within seconds - live from your screen. File Transfer: TeamViewer comes with integrated file transfer that allows you to copy files and folders from and to a remote partner - which also works behind firewalls Works behind Firewalls: The major difficulties in using remote control software are firewalls and blocked ports, as well as NAT routing for local IP addresses. If you use TeamViewer you don't have to worry about firewalls: TeamViewer will find a route to your partner. Highest Security Standard: TeamViewer is a very secure solution. The commercial TeamViewer versions feature completely secure data channels with key exchange and RC4 session encoding, the same security standard used by https/SSL. High Performance: Optimized for connections over LANs AND the Internet, TeamViewer features automatic bandwidth-based quality selection for optimized ...
5/5 9,247 May 21, 2020
TeamViewer GmbH <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/TeamViewer1_th.png"border="0">
Teeworlds v0.7.5
Teeworlds v0.7.5 A free online multiplayer platformer game, available for all major operating systems. Battle with up to 16 players in a variety of game modes, including Team Deathmatch and Capture The Flag. You can even design your own maps! Changes: v0.7.5 2020-04-19 Server + Fix laser bounce delay when server runs for a very long time + Rename tune_dump to tunes Client + Improve client loading + Add an option to turn off whispers + Server browser - store password of favorites - improve looks of the friends tab - quick search now also matches gametypes - some fixes + Chat commands - add autocompletion hint - add descriptions to server-side commands - remove the chat command limit - some fixes + Sliders - logarithmic scales - move to mouse position on click - some fixes + Fix statboard not closing with Escape + Fix double binds + Fix the warmup overlapping with MOTD/scoreboards + Fix spectator HUD not rendering in some cases + A fix to the menus music + A fix to double binds + Some fixes to the demo player + Rename dump_binds to binds OS X + Fix accent menu showing up ingame Graphics + A fix to jungle_background + A fix to jungle_midground Editor + Add automapper for jungle_deathtiles + Add mapres preview + Show current quad when pressing space in editor + Fix a crash Security + Patch a server vulnerability that exposed all 0.7 servers to crashes Maps + Some minor bugfixes to ctf5 and dm7 This download is for the Windows 64bit version. All other download assets are below: Windows: teeworlds-0.7.5-win32.zip MacOS: teeworlds-0.7.5-osx.dmg Linux: teeworlds-0.7.5-linux_x86_64.tar.gz teeworlds-0.7.5-linux_x86.tar.gz Click here to visit the author's website.
5/5 8,548 Dec 05, 2021
Magnus Auvinen <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Teeworlds1_th.png"border="0">
Telegram Desktop v4.15.0
Telegram Desktop v4.15.0 A new era of messaging. Telegram is a messaging app with a focus on speed and security, it’s super-fast, simple and free. You can use Telegram on all your devices at the same time — your messages sync seamlessly across any number of your phones, tablets or computers. With Telegram, you can send messages, photos, videos and files of any type (doc, zip, mp3, etc), as well as create groups for up to 100,000 people or channels for broadcasting to unlimited audiences. You can write to your phone contacts and find people by their usernames. As a result, Telegram is like SMS and email combined — and can take care of all your personal or business messaging needs. In addition to this, we support end-to-end encrypted voice calls. Who is Telegram for? Telegram is for everyone who wants fast and reliable messaging and calls. Business users and small teams may like the large groups, usernames, desktop apps and powerful file sharing options. Since Telegram groups can have up to 100,000 members, we support replies, mentions and hashtags that help maintain order and keep communication in large communities efficient. You can appoint admins with advanced tools to help these communities prosper in peace. Public groups can be joined by anyone and are powerful platforms for discussions and collecting feedback. In case you're more into pictures, Telegram has animated gif search, a state of the art photo editor, and an open sticker platform (find some cool stickers here or here). What‘s more, there is no need to worry about disk space on your device. With Telegram’s cloud support and cache management options, Telegram can take up nearly zero space on your phone. Those looking for extra privacy should check out our advanced settings and rather revolutionary policy. And if you want secrecy, try our device-specific Secret ...
5/5 8,381 Mar 07, 2024
telegram.org <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Telegram Desktop1_th.png"border="0">
The Classic Browser v8.0
The Classic Browser v8.0 “Designed to serve YOU not corporations!” Browser Features ● Stop Press! New fantastic feature built into the browser... The Classic Browser’s new “Internet TV &amp; Radio Menu” is the world’s most comprehensive IPTV software ever developed for any platform, offering hundreds of worldwide streaming entertainment channels to enjoy via a user-friendly interface. Access needs no subscription, no membership, no money, no special hardware, no DRMs, and no external media player even; just click on any of the hundreds of channel logos on offer to instantly enjoy directly in a browser tab RIGHT NOW, with no ifs and no buts! We have swept all the technical obstacles away to bring everyone instant FREE Internet streaming entertainment; in top quality 1080p or 720p graphics, so here is at least ONE good reason why the Classic Browser is a MUST HAVE app on all your Windows desktops, laptops, and tablets! So whether you’re at home, at the office, or stuck at some airport thousands of miles away... you can always count on the Classic Browser delivering instant free streaming entertainment to you once connected to the Internet. ● The Hallmark of the Classic browser: The Internet is all about the websites YOU like to visit often so bookmarks to these sites are THE most important aspect of a browser. You'd be lost without your bookmarks, which is why we designed the Classic browser to accentuate YOUR favorites as they should be! Simultaneously it's important to compare this with what is NOT important about the Internet such as what Google thinks, what Microsoft has on offer, and what other corporations may be doing because the truth is... we don't care! So using this browser essentially means that YOUR needs are elevated to the highest possible level while dominant corporations are demoted to an almost nonexistent status where they belong! While using the ...
5/5 5,387 Mar 01, 2022
theclassictools.com <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/The Classic Browser1_th.png"border="0">
TightVNC v2.8.63
TightVNC v2.8.63 A free remote control software package. With TightVNC, you can see the desktop of a remote machine and control it with your local mouse and keyboard, just like you would do it sitting in the front of that computer. TightVNC is: free for both personal and commercial usage, with full source code available, useful in administration, tech support, education, and for many other purposes, cross-platform, available for Windows and Unix, with Java client included, compatible with standard VNC software, conforming to RFB protocol specifications. With TightVNC, you can: cut your expenses and save your time on traveling, help your friends and family to solve problems with their computers remotely, make sure nothing wrong is happening on your computers when you are away. Configuration window, Administration tab. As you can set administrative password to protect TightVNC Server from being re-configured or shut down by any user. It is recommended that you set such a password for the service. This window demonstrates improvements in the user interface. The window documents itself, remembers past connections and provides an option to attach viewers in view-only mode. Changes: TightVNC 2.8.63 Server for Windows: Improved techniques of fast screen grabbing enabled in Windows 8 and later versions of Windows. Server for Windows: Improved stability of sharing RDP sessions. Server for Windows: Fixed encoding of color cursors, which worked incorrectly for certain cursor formats and shapes. Server for Windows: Fixed erroneous generation of extra character in Greek keyboard layout. Viewer for Windows: Fixed a security problem which could allow a specially crafted "evil" server execute code on the viewer machine. Technically, the ...
5/5 5,236 Mar 02, 2022
TightVNC Software <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/tightvnc_th.png"border="0">
TinyWall v3.2.5
TinyWall v3.2.5 A free, lightweight and non-intrusive firewall What is TinyWall TinyWall is a lightweight, user-friendly, and secure firewall for Windows. It is also completely free. TinyWall includes a combination of features that sets it apart from both commercial and freeware firewalls. TinyWall does not annoy you with popups at all, yet it is still extremely easy to add exceptions to your firewall rules. TinyWall actively blocks hundreds of trojans, viruses and worms. TinyWall does not require you to know about ports, protocols and application details. TinyWall prevents malicious programs from modifying the settings of Windows Firewall. TinyWall does not install drivers or other kernel components, is free and lightweight. Features Multiple and easy ways to whitelist programs Automatic learning mode Firewall tampering protection Password lockdown of settings Windows Store &amp; UWP support Support for both WSL and WSL 2 Support for whitelisting processes from network shares Various quick-modes, like standard, only-outgoing, block all, etc. Support for temporary/timed firewall rules Integrated port and domain blocklists Hosts file protection Boot-time filtering Filtering of promiscuous apps Port-scan prevention Option to always allow communication within LAN Option to restrict an application to the LAN Recognition of safe software and impostors Full IPv6 support Can list established and blocked connections Can list open ports on your machine No telemtery, no data collection. 100% free and clean software. ...
5/5 3,687 Mar 03, 2022
Károly Pados <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/tinywall2_th.png"border="0">
Tixati v2.86 (Windows/Linux)
Tixati v2.86 (Windows/Linux) A peer-to-peer file sharing program that uses the popular BitTorrent protocol. This protocol allows many peers to form a cooperative swarm and download very large files with great efficiency. How does it work? Once the Tixati software is installed, starting a download is easy. First, the user finds a .torrent file on the web. A .torrent file is very small, and contains meta-data describing the much larger file that is to be downloaded from a swarm of other peers. These .torrent files can be easily found by using Google, or one of hundreds of Torrent Sites which also feature organized categories for the user to browse. Once the user has chosen and downloaded a .torrent file from the web, they simply open it from within Tixati by clicking the 'Add' button. After the .torrent is opened, Tixati connects to other peers in the swarm and downloads the desired files automatically, leaving them in a convenient 'Downloads' folder on the user's desktop. Why choose Tixati? Tixati is one of the most advanced and flexible BitTorrent clients available. And unlike many other clients, Tixati contains NO SPYWARE, NO ADS, and NO GIMMICKS. Tixati has the following features: detailed views of all aspects of the swarm, including peers, pieces, files, and trackers support for magnet links, so no need to download .torrent files if a simple magnet-link is available super-efficient peer choking/unchoking algorithms ensure the fastest downloads peer connection encryption for added security full DHT (Distributed Hash Table) implementation for trackerless torrents, including detailed message traffic graphs and customizable event logging advanced bandwidth charting of overall traffic and per-transfer traffic, with separate classification of protocol and file bytes, and with separate classification of outbound traffic ...
5/5 4,165 Oct 29, 2021
Tixati Software Inc. <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Tixati1_th.png"border="0">
Tom’s AD Password Extender 2.0.0.0
Tom’s AD Password Extender 2.0.0.0 Tom’s AD Password Extender is a free Windows utility that allows you to select a user account and extend the password expiration date by the amount of days specified in your Group Policy. This is often helpful when you have end-users who are travelling and can’t log into the VPN or other Active Directory authenticated system. By extending the expiration you ensure that accounts don’t get compromised from having to communicate the password across insecure channels. Have you ever gotten the call from the Road Warrior or frequent business traveler saying: “I am on the road and I can’t log into the VPN”? It is a common problem and happens frequently because end-users forget to change their passwords before they leave for that stressful trip. So, what do we do? In some cases we break security protocols by asking them for their password and set the password to be the same. In other cases we set a new password, but now the cached laptop password is different from their domain or VPN password causing confusion. In either case we might have compromised the account as others might have overheard the conversation. In some cases, we even say they are out of luck until they return to the office temporarily preventing them from working and as a result greatly reduces business productivity. This is where Tom’s AD Password Extender can help. Simply pull up their account using the intuitive user interface, highlight, and select Extend Password. Requirements: Microsoft .NET Framework 4.5.2 (MD5: DC5D6A9FA8D2874A67E1491BAACE830A )
5/5 4,927 Nov 15, 2019
Tom Andreas Mannerud <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Toms-AD-Password-Extender_th.png"border="0">
Tree Notebook v1.1.0
Tree Notebook v1.1.0 Tree Notebook is a hierarchical notes manager designed for keeping personal information. The notebook consists of two parts: the public part can be accessed without password, the private part is encrypted, it requires entering a password in order to be opened and used. Tree Notebook comes as two applications: the desktop one for OS Windows, and the mobile one for iOS (iPhone and iPad devices). The data can be synchronized between the Windows computer and up to three iOS devices via a local Wi-Fi network. No access to Internet is needed for synchronizing. Tree Notebook keeps a tree-like multilevel hierarchy of folders and notes. Any folder can include notes and other folders, and so fourth. Any item (a note or a folder) can include text of any size. Besides, items can keep attachments like images or other files. Tree Notebook has useful navigation tools: three separate panes for the entire tree, the current folder in the tree, the current item in the folder, status line indicating the current position in the tree, the lists of History and Favorites which alleviate getting back to the items recently or frequently visited. Both Windows and iOS apps support quick global search (simplified or conditional) and also local search inside an item text. The information in Tree Notebook can be attributed in many ways by using various font types, colored flags, graphic icons. The items can be sorted out by several criteria: alphabetically, by creation or modification time, and even by hand (in manually defined order). Among others, Tree Notebook includes a calendar feature. Any item can have an Event attribute and serve as an alarm clock or reminder. The Windows Tree Notebook application can import data from OneNote and Evernote. It can also export the information to the Evernote and simple RTF formats. The Windows app has the context ...
5/5 4,722 Oct 24, 2019
Lena Pankratova <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Tree Notebook1_th.png"border="0">
TreeNoote v1.6
TreeNoote v1.6 A free, hierarchically organized note taking application. Full-Text Search Simply start typing in the search area. Immediately the records found are displayed in the treeview, with a count of the cards found at the bottom left. Backup For even greater security, TreeNoote can save your data each time the software is launched, store them where you want and keep the number of backups you want. And of course you can choose to restore your backed up data at any time! Password Protection You can choose to protect the use of TreeNoote with a password ... and ask that TreeNoote ask for it again after a period of inactivity. Advanced Content​ Place images, photos, rich text and links in yours notes. Synchronized or Not... With Treenoote, you choose the place where your notes are stored. On your computer, on a USB key or in a folder synchronized in the cloud ... It's up to you. PDF Export your notes in PDF format. Print Print function with preview, page selection, color or black and white mode, printer selection ... Portable App TreeNoote for Windows does not use an installer. All the files required to run the application reside in a single folder. If you move the folder, the application will always work the same way. For example, place it on a USB key, and you can use it from one computer to another. TreeNoote leaves no footprints on the PCs on which you run it. Rich Text Editor Integrated rich text editor: choice of font, bold, italic, highlighted, alignment, bullets, line, insertion of time and date ... Windows 10 32/64 bit Windows 8 32/64 bit Windows 7 32/64 bit Version 1.6 (May 9, 2021) Added: • Word wrap according to the width of the editor window. • Access button to the data storage folder. • Automatic data backup option when launching TreeNoote, with choice of storage path and number of copies to keep. • Access button to the ...
5/5 2,306 May 17, 2021
TreeNoote <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/TreeNote1_th.png"border="0">
TreeSize Free v4.51
TreeSize Free v4.51 Tells you where precious disk space has gone. Use the treemap to keep an eye on your disk space. The freeware can be started from the context menu of a folder or drive and shows you the size of this folder, including its subfolders in an Explorer-like fashion. Large folders can be identified at a glance thanks to the gradient bar displayed in the background. All scan results can be drilled down to file level and filters, e.g. for files of a certain type, can be applied. TreeSize Free will even scan smartphones and mobile devices. TreeSize Free scans network drives and locally synchronized cloud shares (except on Windows servers and within a Windows domain) - just like TreeSize Personal, our storage analysis solution with many other features! The column view presents more detailed information for each file and folder. Here you will find the size or number of files as well as the last access date and the owner (and other useful facts). On touchscreen devices (Windows 8 and higher) you can switch to the intuitive touch interface for even easier navigation. Scan results can be broken down with the flexible filter feature. You can use the filters, for example, to find files of a certain type, such as temporary files, text files or images and use this information to clean up your hard disks. TreeSize Free works on the MFT (Master File Table) and reaches extremely high scan speeds. Scanning operations run in a thread, so you will see results almost instantly while TreeSize Free is working in the background. The Explorer context menu and drag &amp; drop operations are supported within the application. TreeSize Free can apply NTFS compression to directory branches and also displays the compression rate. As the only disk space management solution on the market, TreeSize ...
5/5 5,290 Jul 20, 2021
Jam Software <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/TreeSize Free3_th.png"border="0">
Trend Micro Rescue Disk 3.0.0.1023
Trend Micro Rescue Disk 3.0.0.1023 Trend Micro Rescue Disk allows you to use a CD, DVD, or USB drive to examine your computer without launching Microsoft Windows. It finds and removes persistent or difficult-to-clean security threats that can lurk deep within your operating system. Rescue Disk does not need to load potentially-infected system files into memory before trying to remove them. It can scan hidden files, system drivers, and the Master Boot Record (MBR) of your computer’s hard drive without disturbing the operating system. Getting Started Click Download to begin. If prompted, click Save or Save As, and save the file on your computer’s desktop. While the installer downloads, prepare one of the following: Blank CD or DVD (do not use a rewritable disc) Empty USB Drive (128MB or larger) NOTE: The drive will be reformatted before creating Rescue Disk, and anything already on the USB drive will be lost. Please back up any important files before using a USB drive for Trend Micro Rescue Disk. When you have finished downloading the file, double-click the Trend Micro Rescue Disk icon to start the installer. To launch your computer from a CD or DVD, you must set the BIOS to boot from a different device. While the exact procedure differs from computer to computer, the overall process is usually like this: Insert the disc or USB drive into the computer. Restart the computer. When the computer powers up again, look for a BIOS setup message, which often looks like “Press [KEY] to run ...
5/5 6,466 Nov 13, 2019
Trend Micro Incorporated <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/Trend Micro Rescue Disk type of device_th.png"border="0">
Trojan.Kotver Removal Tool 32bit 2.4.0.1
Trojan.Kotver Removal Tool 32bit 2.4.0.1 This tool removes Trojan.Kotver infections. Trojan.Kotver is a Trojan horse that performs click-fraud operations on the compromised computer. Discovered: September 23, 2015 Type: Removal Information This tool is designed to remove the infection of Trojan.Kotver. How to download and run the tool Important: Selecting "Run as administrator" will result in an incomplete repair. You must be logged in to the Administrator account and all other users must be logged out in order for the tool to work correctly. There are two versions of this tool, one designed to run on 32-bit computers and one designed to run on 64-bit computers. To find out if your computer is running a 32-bit or 64-bit version of Windows, please read the following Microsoft Knowledge Base article: How to determine whether a computer is running a 32-bit version or 64-bit version of the Windows operating system Note for network administrators: If you are running MS Exchange 2000 Server, we recommend that you exclude the M drive from the scan by running the tool from a command line, with the Exclude switch. For more information, read the Microsoft Knowledge Base article: Issues caused by a back up or a scan of the Exchange 2000 M drive Follow these steps to download and run the tool: Download FixToolKotver64.exe for 64-bit computers and FixToolKotver32.exe for 32-bit computers. Save the file to a convenient location, such as your Windows desktop. If you are sure that you are downloading this tool from the Security Response website, you can skip this step. If you are not sure, or are a network administrator and need to authenticate the files before deployment, follow the steps in the Digital Signature section before proceeding ...
5/5 5,386 Nov 13, 2019
Symantec <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/KovterRemovalTool1_th.png"border="0">
Trojan.Kotver Removal Tool 64bit 2.4.0.1
Trojan.Kotver Removal Tool 64bit 2.4.0.1 This tool removes Trojan.Kotver infections. Trojan.Kotver is a Trojan horse that performs click-fraud operations on the compromised computer. Discovered: September 23, 2015 Type: Removal Information This tool is designed to remove the infection of Trojan.Kotver. How to download and run the tool Important: Selecting "Run as administrator" will result in an incomplete repair. You must be logged in to the Administrator account and all other users must be logged out in order for the tool to work correctly. There are two versions of this tool, one designed to run on 32-bit computers and one designed to run on 64-bit computers. To find out if your computer is running a 32-bit or 64-bit version of Windows, please read the following Microsoft Knowledge Base article: How to determine whether a computer is running a 32-bit version or 64-bit version of the Windows operating system Note for network administrators: If you are running MS Exchange 2000 Server, we recommend that you exclude the M drive from the scan by running the tool from a command line, with the Exclude switch. For more information, read the Microsoft Knowledge Base article: Issues caused by a back up or a scan of the Exchange 2000 M drive Follow these steps to download and run the tool: Download FixToolKotver64.exe for 64-bit computers and FixToolKotver32.exe for 32-bit computers. Save the file to a convenient location, such as your Windows desktop. If you are sure that you are downloading this tool from the Security Response website, you can skip this step. If you are not sure, or are a network administrator and need to authenticate the files before deployment, follow the steps in the Digital Signature section before proceeding ...
5/5 5,634 Nov 13, 2019
Symantec <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/KovterRemovalTool1_th.png"border="0">
TrustViewer v2.5.1
TrustViewer v2.5.1 TrustViewer is a complete solution for remote access and users support via the Internet. Just download the full version of TrustViewer smaller than 2 MB, and immediately get to work, without installation and registration, without limitations, for free for home and commercial use! Quick start Download the full version of TrustViewer, run it (enough minimal user rights) and immediately start working, without the need for installation and additional configuration. Free forever TrustViewer is completely free software, without registration and without restrictions, both for home and for commercial use! Easy connection To connect to a remote computer - it is enough to specify a unique twelve-digit ID for each session, and the connection will be immediately established, without problems with NAT or Proxy. Multifunctionality Control the desktop of the remote computer, exchange files, make voice and video calls, or just chat, and all in one convenient application. Complete anonymity TrustViewer does not require authorization or input of other personal data, and our servers do not store an IP address or other information identifying your computer. Absolute safety Do not worry about the safety of your computer, because due to architectural features, TrustViewer is not able in principle to provide unauthorized access to it. Your own server The computers of participants in priority directly connected, forming a protected p2p-tunnel based on modern cryptoprotocols. Internet servers are used only for coordination, as well as in cases when direct connection is impossible. However, you can install on your server a free dedicated proxy server "TrustServer", and get 100% - independence and control over traffic, incl. in private networks without access to the Internet. Your own client The built-in wizard will help you to create the original TrustViewer portable client with your branding (logo, contact information, etc.), with the ability to integrate into your own products and solutions (including commercial ones), with which you can free, quickly and it is ...
5/5 5,030 Dec 28, 2020
TrustViewer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/TrustViewer1_th.png"border="0">
TurboVNC v2.2.4 (MacOS)
TurboVNC v2.2.4 (MacOS) TurboVNC is a derivative of VNC (Virtual Network Computing) that is tuned to provide peak performance for 3D and video workloads. TurboVNC was originally a fork of TightVNC 1.3.x, and on the surface, the X server and Windows viewer still behave similarly to their parents. However, the current version of TurboVNC contains a much more modern X server code base (based on X.org 7.7) and a variety of other features and fixes not present in TightVNC, including a high-performance Java viewer. In addition, TurboVNC compresses 3D and video workloads significantly better than the “tightest” compression mode in TightVNC 1.3.x while using only typically 15-20% of the CPU time of the latter. Using non-default settings, TurboVNC can also match the best compression ratios produced by TightVNC 1.3.x for 2D workloads. Furthermore, TurboVNC contains some unique features that are designed specifically for visualization applications. All VNC implementations, including TurboVNC, use the RFB (remote framebuffer) protocol to send “framebuffer updates” from the VNC server to any connected "viewers." Each framebuffer update can contain multiple "rectangles" (regions that have changed since the last update.) As with TightVNC, TurboVNC analyzes each rectangle, splits it into multiple "subrectangles", and attempts to encode each subrectangle using the "subencoding type" that will provide the most efficient compression, given the number of unique colors in the subrectangle. The process by which TurboVNC does this is referred to as an "encoding method." A rectangle is first analyzed to determine if any significant portion of it is solid, and if so, that portion is encoded as a bounding box and a fill color ("Solid subencoding.") Of the remaining subrectangles, those with only two colors are encoded as a 1-bit-per-pixel bitmap with a 2-color palette ("Mono subencoding"), those with low numbers of unique colors are encoded as a color palette ...
5/5 3,812 Mar 17, 2020
turbovnc.org <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/TurboVNC1mac_th.png"border="0">
TurboVNC v2.2.4 (Win32)
TurboVNC v2.2.4 (Win32) TurboVNC is a derivative of VNC (Virtual Network Computing) that is tuned to provide peak performance for 3D and video workloads. TurboVNC was originally a fork of TightVNC 1.3.x, and on the surface, the X server and Windows viewer still behave similarly to their parents. However, the current version of TurboVNC contains a much more modern X server code base (based on X.org 7.7) and a variety of other features and fixes not present in TightVNC, including a high-performance Java viewer. In addition, TurboVNC compresses 3D and video workloads significantly better than the “tightest” compression mode in TightVNC 1.3.x while using only typically 15-20% of the CPU time of the latter. Using non-default settings, TurboVNC can also match the best compression ratios produced by TightVNC 1.3.x for 2D workloads. Furthermore, TurboVNC contains some unique features that are designed specifically for visualization applications. All VNC implementations, including TurboVNC, use the RFB (remote framebuffer) protocol to send “framebuffer updates” from the VNC server to any connected "viewers." Each framebuffer update can contain multiple "rectangles" (regions that have changed since the last update.) As with TightVNC, TurboVNC analyzes each rectangle, splits it into multiple "subrectangles", and attempts to encode each subrectangle using the "subencoding type" that will provide the most efficient compression, given the number of unique colors in the subrectangle. The process by which TurboVNC does this is referred to as an "encoding method." A rectangle is first analyzed to determine if any significant portion of it is solid, and if so, that portion is encoded as a bounding box and a fill color ("Solid subencoding.") Of the remaining subrectangles, those with only two colors are encoded as a 1-bit-per-pixel bitmap with a 2-color palette ("Mono subencoding"), those with low numbers of unique colors are encoded as a color palette ...
5/5 4,032 Mar 17, 2020
turbovnc.org <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/TurboVNC1_th.png"border="0">
TurboVNC v2.2.4 (Win64)
TurboVNC v2.2.4 (Win64) TurboVNC is a derivative of VNC (Virtual Network Computing) that is tuned to provide peak performance for 3D and video workloads. TurboVNC was originally a fork of TightVNC 1.3.x, and on the surface, the X server and Windows viewer still behave similarly to their parents. However, the current version of TurboVNC contains a much more modern X server code base (based on X.org 7.7) and a variety of other features and fixes not present in TightVNC, including a high-performance Java viewer. In addition, TurboVNC compresses 3D and video workloads significantly better than the “tightest” compression mode in TightVNC 1.3.x while using only typically 15-20% of the CPU time of the latter. Using non-default settings, TurboVNC can also match the best compression ratios produced by TightVNC 1.3.x for 2D workloads. Furthermore, TurboVNC contains some unique features that are designed specifically for visualization applications. All VNC implementations, including TurboVNC, use the RFB (remote framebuffer) protocol to send “framebuffer updates” from the VNC server to any connected "viewers." Each framebuffer update can contain multiple "rectangles" (regions that have changed since the last update.) As with TightVNC, TurboVNC analyzes each rectangle, splits it into multiple "subrectangles", and attempts to encode each subrectangle using the "subencoding type" that will provide the most efficient compression, given the number of unique colors in the subrectangle. The process by which TurboVNC does this is referred to as an "encoding method." A rectangle is first analyzed to determine if any significant portion of it is solid, and if so, that portion is encoded as a bounding box and a fill color ("Solid subencoding.") Of the remaining subrectangles, those with only two colors are encoded as a 1-bit-per-pixel bitmap with a 2-color palette ("Mono subencoding"), those with low numbers of unique colors are encoded as a color palette ...
5/5 3,822 Mar 17, 2020
turbovnc.org <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/TurboVNC1_th.png"border="0">
Tweaking.com - Remote Desktop IP Monitor & Blocker Portable Version v1.0.0
==Official Mirror== Tweaking.com - Remote Desktop IP Monitor and Blocker Portable Version v1.0.0 For Windows XP, 2003, Vista, 2008, 7, 8 &amp; 2012 (32 &amp; 64 Bit) I made this program after seeing brute force attacks on a customers server who had remote desktop enabled and open to the internet. The attacks were trying to brute force the password for the administrator account. The Windows Event Viewer was not showing which IP address the connections were coming from. They were also coming from multiple locations and hitting at random times during the day and night. So tracking them down with the built in Windows tools was going nowhere. So I decided to make a tool that will monitor and log any IP that hits the remote desktop and to be able to block those IP's. This free program will monitor the remote desktop port using the Windows netstat API and keep them in a log for later viewing. The program has a built in block IP tool to easily block any IP address. It does this by using the built in Windows IP Security Policy (IPSec). It can only block IP's, but it can not unblock them. To unblock them I have included a guide here: How to remove IP's from the Windows IP Security (IPSec) Added by the Tweaking.com - Block IP Tool How to remove IP's from the Windows IP Security (IPSec) Added by the Tweaking.com - Block IP Tool Even though this tool was built for watching the remote desktop port you can use it to watch any single port on the system. So if you have another kind of server running and the port open to the internet you can now log any IP that hits it.
0/5 8,592 Dec 21, 2013
Tweaking.com
Tweaking.com - Remote Desktop IP Monitor & Blocker v1.0.0
==Official Mirror== Tweaking.com - Remote Desktop IP Monitor and Blocker v1.0.0 For Windows XP, 2003, Vista, 2008, 7, 8 &amp; 2012 (32 &amp; 64 Bit) I made this program after seeing brute force attacks on a customers server who had remote desktop enabled and open to the internet. The attacks were trying to brute force the password for the administrator account. The Windows Event Viewer was not showing which IP address the connections were coming from. They were also coming from multiple locations and hitting at random times during the day and night. So tracking them down with the built in Windows tools was going nowhere. So I decided to make a tool that will monitor and log any IP that hits the remote desktop and to be able to block those IP's. This free program will monitor the remote desktop port using the Windows netstat API and keep them in a log for later viewing. The program has a built in block IP tool to easily block any IP address. It does this by using the built in Windows IP Security Policy (IPSec). It can only block IP's, but it can not unblock them. To unblock them I have included a guide here: How to remove IP's from the Windows IP Security (IPSec) Added by the Tweaking.com - Block IP Tool How to remove IP's from the Windows IP Security (IPSec) Added by the Tweaking.com - Block IP Tool Even though this tool was built for watching the remote desktop port you can use it to watch any single port on the system. So if you have another kind of server running and the port open to the internet you can now log any IP that hits it.
0/5 8,569 Dec 21, 2013
Tweaking.com
TweakPower v2.048
TweakPower v2.048 Powerful, free PC optimization tool TweakPower is an all-in-one suite that has been designed to keep you and all your family’s computers running at optimal speed and efficiency. TweakPower is an intelligent software tool that allows users to fine-tune their operating systems and programs for optimum performance. TweakPower protects users from PC problems, while increasing the performance and security of their computer. TweakPower includes advanced performance optimizers, helping you achieve super-fast application load times, work faster and make your games run smoother. Now it’s easier than ever to get a clean PC. TweakPower can quickly remove Windows, program and browser clutter while refreshing your registry and deleting massive disk space hogs. Also, its easy-to-use wizards and diagnostic tools help you find vulnerabilities and errors on your computer. Customize Windows System Settings - Change the settings of the system, the input devices, drives, application programs, and effects to better customize Windows to your needs. Communication - Customize Internet Explorer, Firefox and your connections to your needs and synchronize your computer with the atomic clock of a time server of your choice. Customize Windows - Give Windows your own style. Customize the Windows interface by customizing the appearance of Windows, including colors, window frames, icons, buttons, startup and logon screen, startup menu, desktop display, explorer, and login. Clean up Clean up - keep your PC fit. Remove unnecessary files, clean up the registry, delete internet traces, and optimize your computer with just one click to ensure more stability. Privacy Security - Protect your PC with the security features of Windows. Configure and manage the settings for the firewall, defrag, automatic updates, user account control, and security center. Permanently delete sensitive data from the hard drive, encrypt files using the highly advanced Advanced Encryption Standard (AES encryption), and safely delete the original files, control the settings of the display, printer, ...
5/5 8,767 Dec 22, 2023
KurtZimmermann SOFTWARE <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/TweakPower1_th.png"border="0">
Ultimate Windows Tweaker 5 for Windows 11
Ultimate Windows Tweaker 5 for Windows 11 This popular Windows tweaking software adds tweaks for Windows 11. Those of you who have upgraded to Windows 11, can use it to judiciously tweak your Windows 11 and personalize your computing experience, and can make your system faster, and private. This tweaker is just around 219 KB in size and includes over 200 tweaks. Like its predecessors, UWT 5 sports the familiar, clean, minimalistic UI, offering links in the left panel, and tabs on the top, in some categories. Hover over any tweak, and helpful tooltips will tell you what the tweak does. While you may be able to access all these via the Windows 11 Settings app, the Registry Editor or the Group Policy Editor, Ultimate Windows Tweaker makes things easier for you by offering all useful tweaks from its single UI. Highlights: • A new tab has been added for Windows 11 • Option to control Taskbar size • Add option to revert to Ribbon UI in File Explorer • Option to restore Windows 10 styled context menu • Tweak to customize Taskbar Content Alignment • Option to remove Open In Windows Terminal option from Desktop Context Menu • Option to hide the recommended list from Start Menu • Option to enable classic Alt+Tab Menu • Option to disable Transparency effects throughout Windows 11 • Option to enable accent color for Start menu and taskbar. • Several privacy tweaks are there under the Privacy section. • Many tweaks in Context Menu for Store Apps to support Windows 11. • It calculates Windows Experience Index ...
5/5 1,354 Feb 14, 2023
Anand Khanse <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/UWT51_th.png"border="0">
Ultimate Windows Tweaker v4.7.1 for Windows 10
Ultimate Windows Tweaker v4.7.1 for Windows 10 The most popular tweaking software, Ultimate Windows Tweaker 4 for Windows 10 adds several new tweaks for the new operating system. Those of you who have upgraded to Windows 10, would want to use it to judiciously tweak your Windows 10 and personalize your computing experience. With judicious tweaking, it can make your system faster, more stable, personal, and more secure with just a few mouse clicks. Ultimate Windows Tweaker is like a TweakUI for Windows 10. While you may be able to access all these via the Windows 10 Settings app, the Registry Editor or the Group Policy Editor, Ultimate Windows Tweaker makes things easier for you by offering all useful tweaks from its single UI. This tweaker is just around 750 KB in size and includes over 200 tweaks. Like its predecessors, UWT 4.0 sports a clean, minimalistic UI, offering links in the left panel, and tabs on the top, in some categories. Hover over any tweak, and helpful tooltips will tell you what the tweak does. What is new Ultimate Windows Tweaker 4 for Windows 10 adds several new tweaks. Here are the highlights: Seeing the concerns being raised about privacy issues, several tweaks have been added under a new Privacy section. Many new tweaks in Context Menu for Store Apps to support Windows 10. The empty.ico file is not required now for “Remove Shortcut Arrows From Icons” to function properly It calculates Windows Experience Index from the main page. Click on Run assessment to recalculate the WEI. You can Run DISM command to fix corrupted system image You can now pin Drives to Desktop Context Menu Many new tweaks to customize Windows 10 ...
5/5 7,351 Mar 12, 2020
Paras Sidhu <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Ultimate-Windows-Tweaker-4-Windows-10_th.png"border="0">
Uniform Server v15.0.1
Uniform Server v15.0.1 A free lightweight WAMP server solution for Windows. Built using a modular design approach, it includes the latest versions of Apache, MySQL or MariaDB, PHP (with version switching), phpMyAdmin or Adminer. No installation required! No registry dust! Just unpack and fire up! Note: The latest version of Uniform Server requires a 64-bit version of Windows. Features • Apache 2 • PHP 7.0, PHP 7.1, PHP 7.2, PHP 7.3, PHP 7.4, PHP 8.0, PHP 8.1 and PHP 8.2 • MySQL 8 • MariaDB 10 • phpMyAdmin, Adminer • Database Backup with MySQLAutoBackup • Perl • Portable Pale Moon browser • Portable FileZilla FTP server • Run as a Service with UniService Free and Open-Source Anyone is freely licensed to use, copy, study, and change the software in any way, and the source code is openly shared on GitHub. Portable and Expandable Run it live straight out of your USB stick on any Windows PC. No installation or registry dust involved. Add or remove modules as required. Comprehensive Security and Updates All applications are set to the highest security setting for a production live server. Updates are rolled out with the latest release of each application and components. Settings and Logs Easily change and manage your server settings. View access and error logs. Read The Uniform Server Documentation here. This download (bottom of page) is for the server itself. You also need the modules: The Uniform Server ZeroXV design is modular. Install only modules (plugins) that you require. Each server requires a controller, which automatically detects installed plugins. All of this is included in this .zip file, here. Click here to visit the author's website.
5/5 1,143 Jan 20, 2023
The Uniform Server Development Team <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/UniforServ1_th.png"border="0">
UninstallView v1.50
UninstallView v1.50 A tool for Windows that collects information about all programs installed on your system and displays the details of the installed programs in one table. You can use it to get installed programs information for your local system, for remote computer on your network, and for external hard-drive plugged to your computer. It also allows you to easily uninstall a software on your local computer and remote computer (Including quiet uninstall if the installer supports it). System Requirements This tool works on any version of Windows, starting from Windows XP and up to Windows 11. Both 32-bit and 64-bit systems are supported. Changes: v1.50: Added 'Sort By' toolbar button. Start Using UninstallView UninstallView doesn't require any installation process or additional DLL files. In order to start using it, simply run the executable file - UninstallView.exe After running UninstallView, it scans your local system and collects all information about the programs installed on your system. When the scanning process is finished, the installed programs information is displayed in the main window. Notice: UninstallView first takes the official uninstall information in the Registry provided by the software itself and then tries to complete any missing information from other places. It's possible that some of the unofficial information collected by UninstallView will be inaccurate. Loading uninstall information from other sources In order to load uninstall information from other sources (instead of your current system), press F9 (Advanced Options) and choose the desired option in the 'Load From' combo-box: Local system - current user: This is the default option, the uninstall information is loaded from your local system and current user. Local system - all users: UninstallView loads the uninstall information from your local system and current user, and also from all other users on this system. The scanning of other ...
5/5 5,292 Feb 20, 2024
Nir Sofer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/uninstallview1_th.png"border="0">
Universal Android Debloater v2.9.1
Universal Android Debloater v2.9.1 Description and information from the author: "DISCLAIMER: Use this script at your own risk. I am not responsible for anything that could happen to your phone. Summary I try to maintain a universal tool which removes bloatwares on any Android phones by using ADB. The main goal is to improve battery performance and privacy by removing unnecessary and obscure system apps. This can also contribute to improve security by reducing the attack surface. The script has a menu that lets you choose what debloat list you want to use. I strongly encourage you to take a look at the lists because the default selection may not suit you. All packages are as well documented as possible in order to provide a better understanding of what you can delete or not. This script should be safe with the default selection. The worse thing which could happen is preventing an essential system process to be loaded during boot causing then an unfortunate bootloop. If you used the non-root solution, after about 5 failed system boots, the phone will automatically reboot in recovery mode and you'll have to perform a FACTORY RESET. So make a backup! If you have a rooted device you can also physically delete the apks. Ironically this solution is safer because the script saves the apks before their removal. In case of bootloop you just need to run the script from a recovery with ADB support (e.g TWRP) and restore them. In any case, you can NOT brick your device with this script! That's the main thing, right? Features Quick search among all the packages of an android device Uninstallation of system/user packages (manually or with the debloat lists) Reinstallation of system packages (manually or with the debloat lists) ADB backup/restore (not really reliable, see the FAQ) Device brand detection and auto-selection of ...
5/5 2,661 Jun 09, 2021
W1nst0n <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/AndroidDebloat1_th.png"border="0">
UpdateHub v2.4.0
UpdateHub v2.4.0 A free app that simplifies updating software on your computer. What is it? UpdateHub is a user-friendly application designed to streamline the software update process for your computer. With this app, you can quickly check for updates for all the software installed on your device, including operating systems and applications. The app's straightforward interface displays all available updates and lets you choose which ones to install, making the updating process quick and convenient.. Why is it important? Outdated applications can bring unwanted security threats. Take, for example, Chrome. On April 21, 2023, Google Chrome faced multiple vulnerabilities. These included the following: [21 April 2023] Google Chrome (Desktop) - Zero-Day Vulnerability NIST: https://nvd.nist.gov/vuln/detail/CVE-2023-2033 Type confusion in V8 in Google Chrome before 112.0.5615.121 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Google Blog: https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_14.html Google is aware that an exploit for CVE-2023-2033 exists in the wild. To fix this, you had to update to the latest version. But Google Chrome may not tell you this; our app will. You can also get new features and bug fixes in apps and keep your OS and some drivers up-to-date, making your system potentially faster and better. UpdateHub ensures that your device's software is up-to-date and secure, making updating as hassle-free as possible. What features does it have? The app also features a rollback function. This feature means you can quickly revert to the previous version if you don't like an update or updated by accident. Additionally, the app provides detailed information about each update, including release notes and version numbers, allowing you to stay informed about the changes and improvements made to your software. What makes this unique or better than others? UpdateHub doesn't just update apps. It can also update apps ...
5/5 5,308 Apr 08, 2024
KK-Designs <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/UpdateHub1_th.png"border="0">
USB Flash Drives Control 4.1.0.0
USB Flash Drives Control 4.1.0.0 USB Flash Drives Control is a freeware program that runs in system tray, next to the system clock, and provides access to control the way in which the USB removable drives are used on your computer. These options are available through the right click context menu on the system tray icon of the program. It also displays the connected drives. Use left click context menu to view the list of connected drives and explore the content of them. USB Flash Drives Control contains two parts, a GUI interface which is used for configuration and a Windows service which ensures that the program options are applied to all user accounts from the local computer: Read Mode - By disabling this option, USB removable drives will not be mounted and will not be accessible to the user. The reading of data from USB removable drives will not be available. Write Mode - By disabling this option, write access will be denied on all USB removable drives used on the current computer. All USB removable drives become read-only and copying data on them is not possible. Execute Mode - By disabling this option, execute access will be denied for all executable files on all USB removable drives used on the current computer, for all user accounts. This ensures a plus of security to the system against dangerous and malicious software, like worms, backdoors or password stealers. This setting is not available in Windows Vista. All the above options are not applied to the existing connected drives. Connected drives must be first removed and then reconnected in order to make these options apply to them. Program Features √ Intuitive and easy accessible user interface in the system tray. √ Enable or disable USB removable drives with just a mouse click. √ Deny write access on all USB removable ...
5/5 5,021 Mar 07, 2017
BiniSoft.org <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/USB Flash Drives Control2_th.png"border="0">
USB Raptor v0.18.84
USB Raptor v0.18.84 Turn any USB flash drive to a computer lock and unlock key! USB Raptor can lock the system once a specific USB drive is removed from the computer and unlock when the drive is plugged in again to any USB port. The utility checks constantly the USB drives for the presence of a specific unlock file with encrypted content. If this specific file is found the computer stays unlocked otherwise the computer locks. To release the system lock user must plug the USB with the file in any USB port. Alternative the user can enable (or disable) two additional ways to unlock the system such is network messaging or password. Features • Automated USB lock and unlock function • Lock file contents are encrypted • Password to override lock (can be enabled by user) • Network command to override lock (can enabled by user) • USB drive serial number check (can be enabled by user) • Unique key for each system (can be enabled by user) • Status report function Features Automated Windows lock/unlock with the use of common USB flash drives Compatible with all types of USB flash drives Robust design Easy to setup and use High security option to verify the serial number of the flash drive Various alternative unlock methods Supports LAN lockdown (and unlock) function Synchronized lock and unlock on LAN for multiple PCs Status report over internet and LAN Supports serial command integration (beta stage) Tray icon based application Option to delay and cancel the lock, to avoid unwanted locks Windows 10, Windows 7, Windows 8 and Windows XP compatible Multi screen ...
5/5 5,740 Sep 13, 2021
Nikos Georgousis <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/USB Raptor5_th.png"border="0">
   
Showing rows 201 to 300 of 336 Showing Page 3 of 4  «  1  2  3  4  » 


OlderGeeks.com Copyright (c) 2024