|
Your download link is at the very bottom of the page... always. |
Processed through Paypal No account required. Donate Bitcoin to this wallet: 1KkUMXvQ2ko3xcJkzitB7WYgoW6m79WFfm Donate Ethereum to this wallet: 0x40E56922F43637224935CDC35e2c96E0392A8505 Donate Litecoin to this wallet: LLYAFEyqjH69gkyCEpRjXNyedRCWrVChfL |
Files | ||||
File Name | Rating | Downloads | ||
525 DOS Games From The 1980s 525 DOS Games From The 1980s One giant zip file containing all of the games in this list. Run on an old computer or in a DOS virtual machine. See Virtualization Software in our download section. 007 - Licence To Kill (1989) (Quixel) 10th Frame Bowling (1988) (Access) [v2] 20000 Leagues Under the Sea (1988) (Coktel Vision) 2400 A.D. (1988) (Origin Systems) 3-Demon (1983) (PC Research Inc) 4th and Inches (1987) (Accolade) 4x4 Off-Road Racing (1988) (Epyx) 8088 Othello (1985) (M.W. Bayley) A Mind Forever Voyaging (1985) (Infocom) A Nightmare on Elm Street (1989) (Westwood Studios) A-Maze (1989) (Wizard Games) A10 Tank Killer (1989) (Dynamix) Aaargh! (1988) (Arcadia) Ace (1987) (Cascade) Ace 2 (1987) (Cascade) Ace of Aces (1987) (Artech) Action Fighter (1989) (Core Design) Action in the North Atlantic (1989) (General Quarters) Adventure Construction Set (1987) (Electronic Arts) Adventures in Math (1983) (IBM) [v1.00] Adventures in Serenia (1986) (Sierra) African Raiders-01 (1986) (Tomahawk) Afterburner (1989) (Unlimited Software) Air Trax (1983) (Presearch Incorporated) Airball (1987) (MicroDeal) Airborne Ranger (1988) (MPS Labs) Aldo Again (1989) (David & Benjamin Ibach) Aldo's Adventure (1987) (David & Benjamin Ibach) Alf (1988) (Alien Productions) Alice in Wonderland (1989) (Robin Johnson) Alien Syndrome (1987) (Sega) Alley Cat (1984) (Synapse) Alter Ego - Female (1983) (Activision) Alter Ego - Male (1983) (Activision) Amazing Maze (1983) (Donovan W. Foster) [v1.2] Amnesia (1986) (Cognetics Corporation) Ancient Land of Ys (1989) (Kyodai) Andromeda Conquest (1982) (Avalon Hill) Annals of Rome (1986) (PSS) Antarctic Adventure (1984) (Friends Software) Anti-Ballistic-Missile (1982) (Davis Disk) AntiXonix (1985) (D. Pavlovsky) Apache Strike (1989) (Activision) Arcade Volleyball (1988) (Vladimir Zakharov) Archipelagos (1989) (Logotron) Archon (1984) (Mission Accomplished) Arctic Fox (1986) (Dynamix) Arkanoid (1988) (Taito) Arkanoid 2 - Revenge of Doh (1989) (Taito) Arnhem (1985) (Cases Computer Simulations) Aspar GP Master (1989) (Dinamic) Astro Blaster (1988) (Rolf Franzon) Astrotit (1987) (Rudeware) Autoduel (1988) (MicroMagic) Avoid the Noid (1989) (BlueSky Software) [cga] Avoid the Noid (1989) (BlueSky Software) [ega] Axe of Rage (1989) (Palace Software) Backgammon (1987) (ShareData) Bad Cat (1988) (Rainbow Arts) Bad Street Brawler (1987) (Beam Software) Ballyhoo (1986) (Infocom) Barbarian (1989) (Mastertronic) Barbarian 2 (1989) (Palace Software) Batalia (1986) (The Right Brothers) Batman - The Caped Crusader (1988) (Ocean) Battle ... |
8,220 | Oct 06, 2023 Various <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SilentService_th.png"border="0"> |
||
All Bitdefender Uninstall Tools 2015-2022 All Bitdefender Uninstall Tools 2015-2022 This is a single zip file we put together that contains the Bitdefender removal tools for the following products: Bitdefender Antivirus Plus 2021/2022 Bitdefender Internet Security 2021/2022 Bitdefender Total Security 2021/2022 Bitdefender Antivirus Plus 2020 Bitdefender Internet Security 2020 Bitdefender Total Security 2020 Bitdefender Antivirus Plus 2019 Bitdefender Internet Security 2019 Bitdefender Total Security 2019 Bitdefender Antivirus Plus 2018 Bitdefender Internet Security 2018 Bitdefender Total Security 2018 Bitdefender Antivirus Plus 2017 Bitdefender Internet Security 2017 Bitdefender Total Security 2017 Bitdefender Antivirus Plus 2016 Bitdefender Internet Security 2016 Bitdefender Total Security 2016 Bitdefender Antivirus Plus 2015 Bitdefender Internet Security 2015 Bitdefender Total Security 2015 Bitdefender Endpoint Security Tools (Windows) v6.6.x+ Read this first Bitdefender Endpoint Security Tools (Windows) up to v6.4.x Endpoint Security by Bitdefender v5.x For the following older versions you need to contact Bitdefender support: Bitdefender Endpoint Client v4 and Bitdefender Client Security 3.5 suite • Bitdefender Business Client • Bitdefender Management Agent • Bitdefender Management Server(console) 3.5 • Bitdefender Security for File Servers 3.5 • Bitdefender Security for Mail Servers 3.5 • Bitdefender Security for Sharepoint 3.5 Click here to visit the author's website. |
4,183 | Jan 05, 2022 BitDefender Labs <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/BitDefenderUninstaller1_th.png"border="0"> |
||
Angle Mouse v2.0.3 Angle Mouse v2.0.3 The Angle Mouse is a pointing facilitation technique that runs quietly in the background and improves the efficiency and ease of mouse pointing, especially for people with motor impairments. The Angle Mouse is a target-agnostic pointing facilitation technique that works by continually adjusting the control-display (C-D) gain based on how coherent (straight) or divergent (angular) the mouse movement is. When the mouse moves straight, the gain is kept high, but when the mouse corrects abruptly, often near targets, the gain is dropped, making targets bigger in motor-space. If you have any questions or comments, contact Jacob O. Wobbrock at wobbrock@uw.edu. The Angle Mouse requires the Microsoft .NET 2.0 Framework. Download it here. This software is distributed under the New BSD License agreement. Publications Wobbrock, J.O., Fogarty, J., Liu, S., Kimuro, S. and Harada, S. (2009). The Angle Mouse: Target-agnostic dynamic gain adjustment based on angular deviation. Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI '09). Boston, Massachusetts (April 4-9, 2009). New York: ACM Press, pp. 1401-1410. Acknowledgement This work was supported in part by Microsoft Research, Intel Labs, and the National Science Foundation under grants IIS-0811063 and IIS-0812590. Any opinions, findings, conclusions, or recommendations expressed in this work are those of the authors and do not necessarily reflect those of any supporter. Jacob O. Wobbrock James A. Fogarty Shih-Yen (Sean) Liu Shunichi Kimuro Susumu Harada Click here to visit the author's website. |
3,667 | Jan 31, 2020 Dr. Jacob O. Wobbrock <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/AngleMouse4_th.png"border="0"> |
||
AWE64D (CT4600) Win2000/XP Driver AWE64D (CT4600) Win2000/XP Driver. May work with other versions of Windows. |
8,917 | Nov 28, 2008 Creative Labs |
||
BitDefender Antivirus Free Edition v27.0.41.192 BitDefender Antivirus Free Edition v27.0.41.192 Antivirus protection for Windows. Absolutely free. Choose the only free antivirus software that keeps your computer running clean, fast and virus-free while shielding you from the latest e-threats. • Free antivirus protection that stops even the fastest-evolving attacks Runs silently in the background and stays out of your way • Impossibly light on CPU (won’t suck up your system resources) • Live customer support included (unlike with other Free AVs!) By learning and monitoring the unique pattern of daily activity on your PC, Bitdefender Antivirus Free is able to instantly detect and isolate suspicious changes in real-time, no matter the source. So you’re shielded from known and emerging threats, including … Ransomware Financial extortion attacks that freeze PCs are on the rise, attacking everyone from individuals to global enterprises. Cryptojacking With cryptocurrency soaring in popularity, hijacking PC resources to mine for coins has become an all-too-common hazard. AI-powered “spearphishing” AIs like GPT-3 are now being exploited to write shockingly personalized emails that can dupe just about anyone. “Zero-day” exploits Every software update comes with flaws that need fixing. Until they’re detected, hackers use them as infection points. Rootkits and Trojans Notoriously hard to detect, these attack your PC’s central nervous system and use its credentials to steal and impersonate you. Malicious websites and files Malware can be embedded into almost anything you click on, including “next-gen” financial assets like NFTs. System Requirements Operating System: Windows 7 with Service Pack 1, Windows 8.1, Windows 10 or Windows 11 Memory (RAM): 2 GB Available free hard disk space: 2.5 GB free space *System performance may be affected on devices with old-generation CPUs Click here to visit the author's website. |
10,234 | Aug 29, 2024 BitDefender Labs <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/BitDefenderFree1_th.png"border="0"> |
||
Bitdefender Home Scanner 1.0 Bitdefender Home Scanner 1.0 Scan for weaknesses and hidden backdoors into your home Bitdefender Home Scanner is a free tool that scans your Wi-Fi network, maps devices and identifies and highlights network security flaws. Bitdefender Home Scanner looks for weak passwords, as well as vulnerable or poorly encrypted communications. It correlates the information gathered from your connected devices with online vulnerability databases and gives you a thorough report so you can ensure maximum security for your network. Map your home network Scan open ports in the network Wi-Fi scanner: identify all connected devices and security risks Complementary to and compatible with all existing security tools Why use Bitdefender Home Scanner New software vulnerabilities are being discovered in many smart devices every day, and hackers are taking advantage of these security flaws to target homes and businesses. It is time to start thinking about the security of your smart devices. Recently, a mom who had installed a smart surveillance system in her home discovered that someone had hacked into a webcam and live-streamed her daughters’ room on the Internet. There have been numerous reports about light bulbs being hacked. In one case, a security company demonstrated that unauthorized persons could hack into a home network by posing as a new light bulb joining the system. This way the other light bulbs were tricked into giving away the username and password for the network. Moreover, hackers can take advantage of vulnerabilities to take control of vast numbers of smart devices and use them to launch massive attacks against commercial and government websites. Technical Details Minimum system requirements: Windows 7 SP 1, 8, 8.1, 10 CPU: Dual Core 1.6 GHz RAM: 1 GB HDD: 300 MB Recommended system requirements: Windows 7 SP ... |
5,316 | Nov 13, 2019 BitDefender Labs <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/BitDefenderHomeScanner1_th.png"border="0"> |
||
Bitdefender Ransomware Recognition Tool v1.0.0.2 Bitdefender Ransomware Recognition Tool v1.0.0.2 A tool to help ransomware victims find which family and sub-version of ransomware has encrypted their data and then get the appropriate decryption tool, if it exists. Ransomware has grabbed the headlines ever since 2014. While most ransomware attacks can’t be defeated, Bitdefender constantly creates and updates ransomware decryption tools for families that have either vulnerable encryption algorithms or for which a master decryption key has been leaked. This tool analyzes both the ransom note and the encrypted file samples to identify the strain of ransomware and suggest a decryption tool for the identified family, if such a tool is available. Step 1 Download the BRR tool and save it somewhere on your computer. The latest version is always available here. This tool requires an active internet connection. Step 2 Run the BDRansomRecognitionTool.exe and allow it to execute if prompted by an UAC alert. Step 3 Read and agree to the End User License Agreement Step 4 The application has two fields to fill in: Choose the path to the ransom note file or the path to a folder containing encrypted files. You can choose either option, but the tool needs at least one of the pieces of information to detect which strain of ransomware has encrypted your information. If none of the fields are filled in, you cannot proceed any further Step 5 Press Scan. The application gives a warning if the ransom-note path is not filled in, as the detection accuracy is slightly lower in this case. The content of the ransom note is submitted for analysis to Bitdefender cloud. If the user provides any encrypted file, NO file content will be submitted to our cloud, as the tool only analyzes the filename and its extension. If the ransomware family cannot be identified, the user is informed about this. In some cases, multiple families of ransomware display similar features. ... |
5,314 | Nov 13, 2019 BitDefender Labs <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/BitDefenderRecognitionTool_th.png"border="0"> |
||
Bitdefender Rootkit Remover 32bit 3.0.2.1 Bitdefender Rootkit Remover 32bit 3.0.2.1 The Bitdefender Rootkit Remover deals with known rootkits quickly and effectively making use of award-winning Bitdefender malware removal technology. Unlike other similar tools, Bitdefender Rootkit Remover can be launched immediately, without the need to reboot into safe mode first (although a reboot may be required for complete cleanup). Rootkit Remover deals easily with Mebroot, all TDL families (TDL/SST/Pihar), Mayachok, Mybios, Plite, XPaj, Whistler, Alipop, Cpd, Fengd, Fips, Guntior, MBR Locker, Mebratix, Niwa, Ponreb, Ramnit, Stoned, Yoddos, Yurn, Zegost and also cleans infections with Necurs (the last rootkit standing). Please note that the list is a bit outdated - new rootkit families are added as they become known. |
8,252 | Nov 13, 2019 BitDefender Labs <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/bitdefenderrootkitremover_th.png"border="0"> |
||
Bitdefender Rootkit Remover 64bit 3.0.2.1 Bitdefender Rootkit Remover 64bit 3.0.2.1 The Bitdefender Rootkit Remover deals with known rootkits quickly and effectively making use of award-winning Bitdefender malware removal technology. Unlike other similar tools, Bitdefender Rootkit Remover can be launched immediately, without the need to reboot into safe mode first (although a reboot may be required for complete cleanup). Rootkit Remover deals easily with Mebroot, all TDL families (TDL/SST/Pihar), Mayachok, Mybios, Plite, XPaj, Whistler, Alipop, Cpd, Fengd, Fips, Guntior, MBR Locker, Mebratix, Niwa, Ponreb, Ramnit, Stoned, Yoddos, Yurn, Zegost and also cleans infections with Necurs (the last rootkit standing). Please note that the list is a bit outdated - new rootkit families are added as they become known. |
8,495 | Nov 13, 2019 BitDefender Labs <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/bitdefenderrootkitremover_th.png"border="0"> |
||
Bopup Scanner 2.1.9 Bopup Scanner 2.1.9 This freeware network scanner displays active computers with logged user names (NetBIOS), MAC and IP addresses. Bopup Scanner also recognizes and shows HTTP (Web) servers running on remote computers (TCP ports 80, 8080), quickly detects online computers, allows to browse shared resources of a remote computer and save results to a text file. Advanced users can enter IP range to scan, change a timeout to resolve a remote host and run the program from a command line interface. Portable software Bopup Scanner is a fully portable software. It requires no any setup and installation on a destination computer and can be easily copied to a USB flash drive to move to another PC. Browsing Shared Resources on Remote Computers Bopup Scanner allows to open shared folders on remote computers in Windows Explorer. Right-click on a computer and then select "Browse..." from the pop-up menu. Exploring HTTP Servers Bopup Scanner recognizes HTTP (Web) servers running on remote computers (TCP ports 80, 8080) and shows "Running" label in the "HTTP server" column. Command line support The program can be executed with the command line paramaters in order to specify pre-defined options, such as IP range to scan (start and end IP addresses), a path of the file where to save results. So the scanner can be used in batch files as a tool for an automated monitoring. To see the available command line options run the scanner.exe file with the /? or /h parameters or click More infomation... button in the About dialog. Logging Results Results can be saved to a text file. Just select "Actions\Save list..." and type a file name to save. Changing IP Range to Scan Administrators can enter IP range to scan and timeout to resolve a remote computer. Latest version is 2.1.9 Released on October 29, 2016 Supports Windows® 95/98/Me/NT 4.0/2000/XP/2003/Vista/2008/7/8/2012/10 |
5,556 | Nov 24, 2016 B Labs <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/Bopup Scanner1_th.png"border="0"> |
||
Camera Mouse 2018 v1.1 Camera Mouse 2018 v1.1 Camera Mouse is a free program that allows you to control the mouse pointer on a Windows computer just by moving your head. Clicking can be done by making the mouse pointer dwell over a spot on the screen (after first turning Clicking on in Settings). The program was developed at Boston College to help people with disabilities use the computer. The main audience for this program is people who do not have reliable control of a hand but who can move their head. People with Cerebral Palsy, Spinal Muscular Atrophy, ALS, Multiple Sclerosis, Traumatic Brain Injury, various neurological disorders use this program and its predecessors to run all types of computer software. Camera Mouse works as a mouse replacement system for Windows computers and tablets so it should work with just about any application program. For example people use Camera Mouse with entertainment programs, education programs, communication programs, web browsers, and so on. (See the Downloads page for some of the programs and websites that we have used with Camera Mouse.) Camera Mouse works best with application programs that require only a mouse and a left click and that do not have tiny targets. It's easier to use Camera Mouse with application programs that do not require extreme accuracy. What equipment is required? A Windows 10, 8.1, 8, 7, Vista, or XP computer or tablet and a built-in camera or standard USB webcam. We do our development work with a Microsoft LifeCam Studio and a Logitech HD Pro Webcam C920. However the much less expensive Microsoft LifeCam HD-3000 and Logitech HD C270 work well also. Camera Mouse should work with any built-in camera or USB webcam. This program is available for free download. Support for our work has come from the Philanthropy Committee of Mitsubishi Electronic Research Labs ... |
5,401 | Jul 02, 2020 Trustees of Boston College <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Camera Mouse2_th.png"border="0"> |
||
Creative Labs CT4750 Win 9x Driver Creative Labs CT4750 Win 9x Driver. This is for the OEM version of the SB128 called the vibra. Drivers are for Win95/98 but may work with other versions of Windows. |
8,870 | Nov 28, 2008 Creative Labs |
||
Creative labs Modem Blaster Di3635/5655 5651/3631 Creative labs Modem Blaster Di3635/5655 5651/3631 3635019x.exe Windows 95, Windows 98, Windows ME Supported Models DI3635-1/5655 Voice Modem Serial Wave Device DSI Modem Device Manager DSI D-F-V V.90 DI3635 Digicom D-F-V V.90 DI3635 DSI PCI Modem Enumerator Digicom Modem Serial Wave Device |
9,060 | Mar 24, 2010 Creative Labs |
||
Dubbing AI v1.1.1 Dubbing AI v1.1.1 Free Real-Time AI Voice Changer What makes Dubbing stand out among other AI voice generators is the fact that as a real-time voice changer, it converts any voice into quality and cloned voices in less than 300 milliseconds. From gamers to live-streamers and content creators. Everybody can generate realistic-sounding voiceovers across different ages, languages, and accents using Dubbing AI. Its easy-to-use interface, low-usage, and high-end features make it a must-have tool for someone who wants to own a good voice when communicating online. Convert into Anyone in Real-Time, and it's FREE. Leveraging advanced AI algorithms and deep learning. The realistic real-time voice changer catches the precise tone and picks up even the smallest expression in the human voice and converts it into any voice you wish. Dubbing creates life-like synthetic voices that mimic the tonalities and prosodies of human voices. Dubbing AI is the perfect tool for gamers and streamers looking to enhance their game experience and content quality. When compared to similar AI voice changers such as Voicemod, MorphVox, and Voice.ai, Dubbing provides more iconic character voices that allow gamers to explore their voice avatar as they immerse in the game. With over 1000 tones of voice free to use, and updates on a weekly basis. Dubbing AI allows you to explore voices from the latest trending game and anime characters to famous celebrities. Most importantly, Dubbing AI is FREE. Low-Latency and Usage. Dubbing AI’s cutting-edge algorithm supports Dubbing to do all these amazing features in extremely low usage, Dubbing only runs in your CPU and only uses 2-3%, while compared to RVC which runs around 25-50% of your CPU and 15% of your GPU. Dubbing also minimized memory storage to around 300M. We want to ensure that Dubbing AI will not be a burden while you play your favorite game ... |
1,616 | Dec 08, 2023 HALO INTERACTIVE PTE. LTD. <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/DubbingAI1_th.png"border="0"> |
||
FMSLogo v8.3.0 FMSLogo v8.3.0 A programming environment based on Logo for kids 6 years of age and up. FMSLogo is a free implementation of a computing environment called Logo, which is an interactive programming language that is simple, powerful, and best of all fun. FMSLogo includes support for: "Standard" Logo parsing Turtle Graphics Exception handling TCP/IP networking Text in all available system fonts Multiple independent turtles Bitmapped turtles MIDI devices Direct I/O for controlling external hardware (must be admin) Serial and parallel port communications Saving and loading images in BMP format Calling into native DLLs Creating windows dialog boxes Event driven programming (mouse, keyboard, timer) Controlling multimedia devices (WAV sound files, CD-ROM control, etc.) 3D Perspective drawing (wire-frame and solids) Creating animated GIFs Why FMSLogo? FMSLogo has a simple GUI that encourages learning. FMSLogo provides support for exploring diverse disciplines, including mathematics, engineering, art, music, and robotics. FMSLogo runs fine on computers that are 10 years old. FMSLogo has a strong, international user community with over a decade of classroom experience. Because of this, FMSLogo is ideal for elementary school computer labs. To get started, visit the Logo Workshop and watch the video below. Your browser does not support the video tag. Changes v8.3.0 2022-01-17 Reduce the size of the back buffer that is used to remove flicker when using rotating bitmapped turtles. This reduces memory usage. Implement feature request #131; MACHINE output now ... |
3,132 | Feb 03, 2022 David Costanzo <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/FMSLogo3_th.png"border="0"> |
||
IPFire v2.27 core172 IPFire v2.27 core172 The Open Source Firewall Secure your network with IPFire IPFire is a hardened, versatile, state-of-the-art Open Source firewall based on Linux. Its ease of use, high performance in any scenario and extensibility make it usable for everyone. Security Security is the highest priority in IPFire. It is hardened to protect itself from attacks from the Internet and prevents attacks on your network. Firewall Its powerful firewall engine and Intrusion Prevention System protects your network against attacks from the Internet and Denial-of-Service attacks. Open Source IPFire is free software and developed by an open community and trusted by hundreds of thousands of users from all around the world. Features Security The primary objective of IPFire is security. Its easy to configure firewall engine and Intrusion Prevention System stops any attackers from breaking into your network. In the default configuration, the network is split into various zones with different security policies such as a LAN and DMZ to manage risks inside the network and have custom configuration for the specific needs of each segment of the network. But even the firewall needs to protect itself. IPFire is built from scratch and not based on any other distribution. This allows the developers to harden IPFire better than any other server operating system and build all components specifically for use as a firewall. Frequent updates keep IPFire strong against security vulnerabilities and new attack vectors. Firewall IPFire employs a Stateful Packet Inspection (SPI) firewall, which is built on top of Netfilter, the Linux packet filtering framework. It filters packets fast and achieves throughputs of up to multiple tens of Gigabit per second. Its intuitive web user interface allows to create groups of hosts and networks which can be used to keep large set of rules short and tidy - something very important in complex environments with strict access control. Logging and graphical reports give great insight. Various ... |
1,818 | Feb 10, 2023 Lightning Wire Labs GmbH <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/IPFire1_th.png"border="0"> |
||
Kaspersky Password Manager 8.0.5.485 Kaspersky Password Manager 8.0.5.485 It’s unwise to use the same password for multiple accounts… but multiple passwords are difficult to remember. Kaspersky Password Manager securely stores all your passwords, addresses & credit card details – and synchronizes them across your PC, Mac, Android phone & tablet, iPhone & iPad… so you only need to remember one master password – to access all your individual passwords & data. |
5,218 | Sep 29, 2017 Kaspersky Labs <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/Kaspersky Password Manager1_th.png"border="0"> |
||
Kaspersky PC Cleaner 1.0.1.150 Kaspersky PC Cleaner 1.0.1.150 Make your PC run smoothly & effectively, by cleaning it from junk files & temporary items - and tune up your digital privacy. |
5,411 | Sep 29, 2017 Kaspersky Labs <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/Kaspersky PC Cleaner_th.png"border="0"> |
||
KIT Scenarist v0.7.2 KIT Scenarist v0.7.2 Simple and powerful application for CREATING SCREENPLAYS KIT Scenarist is a program for creating screenplays which oriented at international standards in the field of film production. The program is a full-featured studio for creating stories from the birth of the idea and before the transfer of the script to production. 10000 Authors More than 10000 screenwriters already use KIT Scenarist in daily work 70 Releases Issued more than 70 versions of the program. Updates come out every month. 5 Platforms There are versions for Windows, Mac OS X, Linux, iOS, and Android. Research Project materials are always at hand Research module of the program is designed so that you can collect all the necessary materials for the project in one place. In it, you can save basic information about the script, such as its name, logline, synopsis, and also fill in the title page of the script. Here you can manage lists of characters and locations. Create new ones, add descriptions, photos, rename and organize them. And, in this section you can store a variety of materials (text documents, images, links to web pages and mind maps) associated with your project, organizing them in a convenient manner. Cards Build an ideal story structure Corkboard The card module allows you to look at the script in the form of cards spread out on the board, thus providing a visual way to work with the structure. You can arrange the cards on the board in rows, or in columns. You can color them, make notes, group and lay out the acts, and all changes will instantly appear in the text of the script and vice versa. And if you are tired of sitting at the computer, you can print out the cards and work with the analog version of your story. Screenplay Make art and don't worry about formalities The script editor will allow you to think only about the ... |
3,205 | Oct 21, 2020 DimkaNovikov labs <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/KITScenarist2_th.png"border="0"> |
||
McAfee Rootkit Remover 0.8.9.209 McAfee Rootkit Remover 0.8.9.209 McAfee Rootkit Remover is a stand-alone utility used to detect and remove complex rootkits and associated malware. Currently it can detect and remove ZeroAccess, Necurs and TDSS family of rootkits. McAfee Labs plans to add coverage for more rootkit families in future versions of the tool. How do you use RootkitRemover? Download the latest version of RootkitRemover When prompted, choose to save the file to a convenient location on your hard disk, such as your Desktop folder. When the download is complete, navigate to the folder that contains the downloaded RootkitRemover file, and run it. It is best to run the tool in Administrator mode. The tool then runs a window which shows the status of the process. The various stages are: Initializing Scanning Cleaning When the process is completed, it prompts the user to press any key to exit the tool. It is recommended to reboot the system and perform a full scan with the McAfee VirusScan to remove remnants of the infection that might still be left on the system. Frequently Asked Questions Q: What is the need for the RootkitRemover tool? A: RootkitRemover is not a substitute for a full anti-virus scanner. It is designed to detect and remove specific rootkit infections. Q: How to use the RootkitRemover tool? A: The tool can be run by either double clicking it or through the command-line. It is advisable to run a full system scan using McAfee VirusScan after removing any infection with the tool. Q: How do I save the scan results to a log file? A: The tool is designed to automatically save the report in the same folder as the tool is placed. Q: Why do I need to rescan with McAfee VirusScan? Would I need ... |
6,397 | Nov 13, 2019 McAfee Labs <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/RR1_th.png"border="0"> |
||
MegaMek v0.49.18 MegaMek v0.49.18 A networked Java clone of BattleTech, a turn-based sci-fi boardgame for 2+ players. Fight using giant robots, tanks, and/or infantry on a hex-based map. The MegaMek organization maintains a series of programs that try to implement the published rules for the tabletop BattleTech game published by Catalyst Game Labs as faithfully as is practical. These programs are designed with the idea of being accessible, both in portability across various operating systems and across various hardware configurations. All programs are open source and distributed under the GPL. The MegaMek suite of programs allow you to play out tactical turn-based battles and military campaigns in the BattleTech Universe, with tanks, infantry, battle armor, aerospace fighters, WarShips, and most importantly, the mighty BattleMech™ -- king of the battlefield. The programs provide a modern, computerized version of the BattleTech tabletop game, as well as a variety of features for running campaigns and customizing units. Features -Network/hotseat play for two or more players, including a somewhat cunning AI opponent. -Choice of ground, atmosphere, or space combat, along with atmospheric battles on ground maps. -Hundreds* of official and unofficial options for deep customization. -Map board editing with hundreds of official and custom maps. -Over 6000 official units! -Campaign creation and management for out of combat actions, including repairs, force organization, personnel management, and so much more! -Integrated interstellar map with up-to-date data for multiple time periods. -Can create custom units for most unit types. MegaMek Play out BattleTech games online against human opponents, or against the built-in AI. MegaMek is packed full of customizable options that allow you to play the game your way. MekHQ Generate your ... |
1,804 | Mar 04, 2024 MegaMek <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/MegaMek_th.png"border="0"> |
||
RapidTyping v5.4 RapidTyping v5.4 A free, convenient and easy-to-use keyboard trainer that will help you improve your typing speed and reduce typos. With its lessons organized for various student level, RapidTyping will teach you touch typing or enhance existing skills. Features: • Typing tutor • Touch typing • Virtual keyboard • Moving hands • Lesson editor • Progress tracking • Export of training outcomes • Classroom use • Multi-language interface • Correct position of the hands and body This download is for the 64bit portable version. If you need the 32bit portable version, download here. If you need the 64bit installer version, download here. If you need the 32bit installer version, download here. Click here to visit the author's website. |
3,950 | May 23, 2023 Typing Tutor Labs <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/RapidTyping1_th.png"border="0"> |
||
Sound Blaster Vibra 16s, 16c, 16x (also ct2890) Driver Sound Blaster Vibra 16s, 16c, 16x (also ct2890) driver for Windows 8x. |
9,041 | Nov 28, 2008 Creative Labs |
||
Soundblaster Pro CT1330A DOS/Win95 Driver Soundblaster Pro CT1330A DOS/Win95 Driver. Only drivers ever released for the CT1330A. May work with other versions of Windows. |
8,842 | Nov 28, 2008 Creative Labs |
||
Sugar on a Stick v0.118 Sugar on a Stick v0.118 A Fedora® Spin operating system to create a live (bootable) flash drive featuring the award-winning Sugar Learning Platform for kids. What is Sugar? Sugar is a learning platform that reinvents how computers are used for education. Collaboration, reflection, and discovery are integrated directly into the user interface. Sugar promotes "studio thinking" and "reflective practice". Through Sugar's clarity of design, children and teachers have the opportunity to use computers on their own terms. Students can reshape, reinvent, and reapply both software and content into powerful learning activities. Sugar's focus on sharing, criticism, and exploration is grounded in the culture of free software (FLOSS). About the Sugar pedagogy Information is about nouns; learning is about verbs. The Sugar interface, in its departure from the desktop metaphor for computing, is the first serious attempt to create a user interface that is based on both cognitive and social constructivism: learners should engage in authentic exploration and collaboration. It is based on three very simple principles about what makes us human: 1) everyone is a teacher and a learner; 2) humans by their nature are social beings; and 3) humans by their nature are expressive. These are the pillars of a user experience for learning. Sugar also considers two aphorisms: 1) you learn through doing, so if you want more learning you want more doing; and 2) love is a better master than duty—you want people to engage in things that are authentic to them, things that they love. About the Sugar Learning Platform The Sugar Learning Platform is an alternative to the ubiquitous computer desktop metaphor that has dominated computing since its invention at Xerox PARC (Palo Alto Research Center) in the 1970s. (Children are not office workers, nor does ... |
1,996 | Nov 10, 2023 Sugar Labs <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SugaronaStick5_th.png"border="0"> |
||
Vibra 16c Sound Card with Radio (CT 2505 - TDQ2) Driver Vibra 16c Sound Card with Radio Driver. (CT 2505 - TDQ2) For Windows 95/98/NT |
9,590 | Nov 28, 2008 Creative Labs |
Showing rows 1 to 26 of 26 | Showing Page 1 of 1 | 1 |
OlderGeeks.com Copyright (c) 2024