Your download link is at the very bottom of the page... always.



Processed through Paypal
No account required.


Donate Bitcoin to this wallet:
1KkUMXvQ2ko3xcJkzitB7WYgoW6m79WFfm
Donate Ethereum to this wallet:
0x40E56922F43637224935CDC35e2c96E0392A8505
Donate Litecoin to this wallet:
LLYAFEyqjH69gkyCEpRjXNyedRCWrVChfL

Buy our over-priced crap to help keep things running.
Take No CrapwareOG Dad CapNo Password


Join our Facebook groupFollow us on TwitterFollow us on InstagramOur RSS FeedJoin us on TikTokJoin us on LinkedIn


 Home » OlderGeeks.com Freeware Downloads » Searching Files   
Search
Search Terms
Search Category Leave category selection blank to search within all categories.
Search Results
Files
  File Name Rating Downloads
Last Update/Developer
525 DOS Games From The 1980s
525 DOS Games From The 1980s One giant zip file containing all of the games in this list. Run on an old computer or in a DOS virtual machine. See Virtualization Software in our download section. 007 - Licence To Kill (1989) (Quixel) 10th Frame Bowling (1988) (Access) [v2] 20000 Leagues Under the Sea (1988) (Coktel Vision) 2400 A.D. (1988) (Origin Systems) 3-Demon (1983) (PC Research Inc) 4th and Inches (1987) (Accolade) 4x4 Off-Road Racing (1988) (Epyx) 8088 Othello (1985) (M.W. Bayley) A Mind Forever Voyaging (1985) (Infocom) A Nightmare on Elm Street (1989) (Westwood Studios) A-Maze (1989) (Wizard Games) A10 Tank Killer (1989) (Dynamix) Aaargh! (1988) (Arcadia) Ace (1987) (Cascade) Ace 2 (1987) (Cascade) Ace of Aces (1987) (Artech) Action Fighter (1989) (Core Design) Action in the North Atlantic (1989) (General Quarters) Adventure Construction Set (1987) (Electronic Arts) Adventures in Math (1983) (IBM) [v1.00] Adventures in Serenia (1986) (Sierra) African Raiders-01 (1986) (Tomahawk) Afterburner (1989) (Unlimited Software) Air Trax (1983) (Presearch Incorporated) Airball (1987) (MicroDeal) Airborne Ranger (1988) (MPS Labs) Aldo Again (1989) (David & Benjamin Ibach) Aldo's Adventure (1987) (David & Benjamin Ibach) Alf (1988) (Alien Productions) Alice in Wonderland (1989) (Robin Johnson) Alien Syndrome (1987) (Sega) Alley Cat (1984) (Synapse) Alter Ego - Female (1983) (Activision) Alter Ego - Male (1983) (Activision) Amazing Maze (1983) (Donovan W. Foster) [v1.2] Amnesia (1986) (Cognetics Corporation) Ancient Land of Ys (1989) (Kyodai) Andromeda Conquest (1982) (Avalon Hill) Annals of Rome (1986) (PSS) Antarctic Adventure (1984) (Friends Software) Anti-Ballistic-Missile (1982) (Davis Disk) AntiXonix (1985) (D. Pavlovsky) Apache Strike (1989) (Activision) Arcade Volleyball (1988) (Vladimir Zakharov) Archipelagos (1989) (Logotron) Archon (1984) (Mission Accomplished) Arctic Fox (1986) (Dynamix) Arkanoid (1988) (Taito) Arkanoid 2 - Revenge of Doh (1989) (Taito) Arnhem (1985) (Cases Computer Simulations) Aspar GP Master (1989) (Dinamic) Astro Blaster (1988) (Rolf Franzon) Astrotit (1987) (Rudeware) Autoduel (1988) (MicroMagic) Avoid the Noid (1989) (BlueSky Software) [cga] Avoid the Noid (1989) (BlueSky Software) [ega] Axe of Rage (1989) (Palace Software) Backgammon (1987) (ShareData) Bad Cat (1988) (Rainbow Arts) Bad Street Brawler (1987) (Beam Software) Ballyhoo (1986) (Infocom) Barbarian (1989) (Mastertronic) Barbarian 2 (1989) (Palace Software) Batalia (1986) (The Right Brothers) Batman - The Caped Crusader (1988) (Ocean) Battle ...
5/5 7,779 Oct 06, 2023
Various <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SilentService_th.png"border="0">
Bitburner v1.2.0
Bitburner v1.2.0 A free, online game that revolves around hacking and cyberpunk themes. What is Bitburner? Bitburner is a cyberpunk-themed incremental RPG where you, the player, take the role of an unknown hacker in a dark, dystopian world. When a mysterious hacker called jump3R messages you, he/she confirms your suspicions that there is something wrong with the world around you. Now, aided by jump3R, you embark on a quest to gain money and power by any means necessary, in the hopes that this will lead to to uncover the secrets that you’ve been searching for. Visit the Bitburner’s Documentation page to learn how to play. Visit the Bitburner Script page to download scripts. Click here to visit the author's website.
0/5 2,031 Dec 31, 2021
Daniel Xie <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Bitburner1_th.png"border="0">
BitDefender Antivirus Free Edition
BitDefender Antivirus Free Edition Antivirus protection for Windows. Absolutely free. Choose the only free antivirus software that keeps your computer running clean, fast and virus-free while shielding you from the latest e-threats. Free antivirus protection that stops even the fastest-evolving attacks Runs silently in the background and stays out of your way Impossibly light on CPU (won’t suck up your system resources) Live customer support included (unlike with other Free AVs!) By learning and monitoring the unique pattern of daily activity on your PC, Bitdefender Antivirus Free is able to instantly detect and isolate suspicious changes in real-time, no matter the source. So you’re shielded from known and emerging threats, including … Ransomware Financial extortion attacks that freeze PCs are on the rise, attacking everyone from individuals to global enterprises. Cryptojacking With cryptocurrency soaring in popularity, hijacking PC resources to mine for coins has become an all-too-common hazard. AI-powered “spearphishing” AIs like GPT-3 are now being exploited to write shockingly personalized emails that can dupe just about anyone. “Zero-day” exploits Every software update comes with flaws that need fixing. Until they’re detected, hackers use them as infection points. Rootkits and Trojans Notoriously hard to detect, these attack your PC’s central nervous system and use its credentials to steal and impersonate you. Malicious websites and files Malware can be embedded into almost anything you click on, including “next-gen” financial assets like NFTs. System Requirements Operating System: Windows 7 with Service Pack 1, Windows 8.1, Windows 10 or Windows 11 Memory (RAM): 2 GB Available free hard disk space: 2.5 GB free space *System performance may be affected on devices with old-generation CPUs Click here to visit the author's website.
5/5 9,721 Dec 12, 2023
BitDefender Labs <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/BitDefenderFree1_th.png"border="0">
Bitdefender Home Scanner 1.0
Bitdefender Home Scanner 1.0 Scan for weaknesses and hidden backdoors into your home Bitdefender Home Scanner is a free tool that scans your Wi-Fi network, maps devices and identifies and highlights network security flaws. Bitdefender Home Scanner looks for weak passwords, as well as vulnerable or poorly encrypted communications. It correlates the information gathered from your connected devices with online vulnerability databases and gives you a thorough report so you can ensure maximum security for your network. Map your home network Scan open ports in the network Wi-Fi scanner: identify all connected devices and security risks Complementary to and compatible with all existing security tools Why use Bitdefender Home Scanner New software vulnerabilities are being discovered in many smart devices every day, and hackers are taking advantage of these security flaws to target homes and businesses. It is time to start thinking about the security of your smart devices. Recently, a mom who had installed a smart surveillance system in her home discovered that someone had hacked into a webcam and live-streamed her daughters’ room on the Internet. There have been numerous reports about light bulbs being hacked. In one case, a security company demonstrated that unauthorized persons could hack into a home network by posing as a new light bulb joining the system. This way the other light bulbs were tricked into giving away the username and password for the network. Moreover, hackers can take advantage of vulnerabilities to take control of vast numbers of smart devices and use them to launch massive attacks against commercial and government websites. Technical Details Minimum system requirements: Windows 7 SP 1, 8, 8.1, 10 CPU: Dual Core 1.6 GHz RAM: 1 GB HDD: 300 MB Recommended system requirements: Windows 7 SP ...
5/5 4,945 Nov 13, 2019
BitDefender Labs <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/BitDefenderHomeScanner1_th.png"border="0">
Cataclysm: Dark Days Ahead v0.D-8766 for Linux
Cataclysm: Dark Days Ahead v0.D-8766 for Linux Cataclysm: Dark Days Ahead is an open source apocalyptic survival roguelike with the ability to craft items, scavenge, forage, fight, and build both homes and vehicles. Originally created by Zachary "Whales" Jenkins, Cataclysm built up a decent following before the project was abandoned. The community never gave up on the game - a small group of dedicated modders, hackers, and contributors kept hacking a way at the code, even knowing it was never going to be mainlined, working instead on a myriad of mods played by the few players still lingering around slowly emptying forums. Eventually, they were contacted by a web developer with some space to spare, who was saddened by how a game with such great potential was dwindling, and saw an opportunity to truly breathe life back into the game. Darkling Wolf and Kevin Granade seized on the idea of spinning off a full-fledged branch project, as if they'd been waiting for the moment. The subtitle Dark Days Ahead was added to the end of the original name, a website was thrown together, and the word was sent out that, like the undead abominations that lurk it's street, Cataclysm was back on its feet and hungry for flesh blood. Since then, the team of active developers has grown. A number of developers have joined the project, and, with the aid of Let's Players like jefmajor, the fanbase has increased steadily, well past it's previous highs, and things are only looking up from here. There are some great new features in the pipeline, and the game is getting better every day. Hopefully, someday soon, Cataclysm: Dark Days Ahead will be as well known the giants of the genre, like Dungeon Crawl, ADOM and Unreal World. But we can't get there alone, so if ...
5/5 4,903 Apr 12, 2019
Darkling Wolf/Kevin Granade <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/CataclysmDarkDaysAhead1_th.png"border="0">
Cataclysm: Dark Days Ahead v0.D-8766 for Windows
Cataclysm: Dark Days Ahead v0.D-8766 for Windows Cataclysm: Dark Days Ahead is an open source apocalyptic survival roguelike with the ability to craft items, scavenge, forage, fight, and build both homes and vehicles. Originally created by Zachary "Whales" Jenkins, Cataclysm built up a decent following before the project was abandoned. The community never gave up on the game - a small group of dedicated modders, hackers, and contributors kept hacking a way at the code, even knowing it was never going to be mainlined, working instead on a myriad of mods played by the few players still lingering around slowly emptying forums. Eventually, they were contacted by a web developer with some space to spare, who was saddened by how a game with such great potential was dwindling, and saw an opportunity to truly breathe life back into the game. Darkling Wolf and Kevin Granade seized on the idea of spinning off a full-fledged branch project, as if they'd been waiting for the moment. The subtitle Dark Days Ahead was added to the end of the original name, a website was thrown together, and the word was sent out that, like the undead abominations that lurk it's street, Cataclysm was back on its feet and hungry for flesh blood. Since then, the team of active developers has grown. A number of developers have joined the project, and, with the aid of Let's Players like jefmajor, the fanbase has increased steadily, well past it's previous highs, and things are only looking up from here. There are some great new features in the pipeline, and the game is getting better every day. Hopefully, someday soon, Cataclysm: Dark Days Ahead will be as well known the giants of the genre, like Dungeon Crawl, ADOM and Unreal World. But we can't get there alone, so if ...
5/5 4,910 Apr 12, 2019
Darkling Wolf/Kevin Granade <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/CataclysmDarkDaysAhead1_th.png"border="0">
ChromePass v1.58
ChromePass v1.58 A small password recovery tool for Windows that allows you to view the user names and passwords stored by Google Chrome Web browser. For each password entry, the following information is displayed: Origin URL, Action URL, User Name Field, Password Field, User Name, Password, and Created Time. It allows you to get the passwords from your current running system, or from a user profile stored on external drive. You can select one or more items and then save them into text/html/xml file or copy them to the clipboard. Known Issues In the latest versions of Yandex Web browser, they changed the password encryption and it's now different from the password encryption of Chrome, so ChromePass cannot decrypt the passwords of Yandex anymore. Changes Version 1.58: Fixed to display the password if it's not encrypted (Like in the portable version of Brave). Using ChromePass ChromePass doesn't require any installation process or additional DLL files. In order to start using ChromePass, simply run the executable file - ChromePass.exe After running it, the main window will display all passwords that are currently stored in your Google Chrome browser. Reading ChromePass passwords from external drive Starting from version 1.05, you can also read the passwords stored by Chrome Web browser from an external profile in your current operating system or from another external drive (For example: from a dead system that cannot boot anymore). In order to use this feature, you must know the last logged-on password used for this profile, because the passwords are encrypted with the SHA hash of the log-on password, and without that hash, the passwords cannot be decrypted. You can use this feature from the UI, by selecting the 'Advanced Options' in the File menu, or from command-line, by using /external parameter. The user profile path should ...
5/5 9,630 Feb 06, 2024
Nir Sofer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/chromepass_th.png"border="0">
CustomizerGod v1.7.6
CustomizerGod v1.7.6 CustomizerGod is the ultimate tool for customizing Windows. It lets you customize almost any part of Windows according to your taste. If you are inexperienced with customization and have a fear of messing up Windows, fear not as CustomizerGod is the safest and easiest customization tool you'll ever use. CustomizerGod is the perfect Resource Hacker alternative for editing image resources. If you are using Windows 7 or earlier, you'll have to install .NET Framework 4.5 first. Click here to visit the author's website.
5/5 6,508 Jul 21, 2019
door2windows <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/CustomizerGod1_th.png"border="0">
DDNS Updater v0.1.3
DDNS Updater v0.1.3 DDNS Updater checks for changes to the external IP address of a Microsoft Windows computer, and updates a dynamic DNS (DDNS) service whenever a change is detected. DDNS Updater has the following features: Compatible with a large number of DDNS services, thanks to a configurable HTTP API Minimizes API calls, e.g. by persistent caching of the IP address and local IP matching Configurable check and update intervals Works with IPv4 and IPv6 (including dual-stack) Able to send email when the detected IP address changes Runs as a Windows service, so that updating occurs even when no-one is logged in Completely free of charge with no adware or spyware No transmission/collection of data Dynamic DNS API Logging Email notification Changes: Version 0.1.3 adds an 'Apply' button so that updates can be forced manually. Timer behavior is changed so that an update is performed sooner when the service starts. Updated OpenSSL so that HTTPS SNI is supported, and %IP% variable is supported in the check URL in addition to the update URL. MD5: 2453eafae7644878abf45cbc098ee813 Installation Download and run the .msi file to install DDNS Updater. After installation, you're presented with the option to configure DDNS Updater. At its simplest, you only need to enter a value for the IPv4 (or IPv6) update URL and save the settings, then DDNS Updater should work. DDNS API External check URL DDNS Updater polls a URL to check whether your external IP address has changed. Any URL which returns your current IP address should work. To do an IPv6 check, enclose the host in square brackets, e.g. http://[checkip.dyndns.org]. If blank, DDNS Updater will cycle through a built-in list of URLs to find one ...
5/5 3,605 Sep 12, 2019
Wombat Holdings, Inc. <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/ddns_updater1_th.png"border="0">
DeSmuME 0.9.11
DeSmuME 0.9.11 DeSmuME is the most seasoned open source Nintendo DS emulator. It sports tools designed for hackers, speedrunners, youtubers, and casual gamers. Homebrew programs are supported and can even be debugged through GDB. The Windows and OSX versions are both relatively feature rich, and there is a small universe of forks and mods that add even more features for casual gaming. DeSmuME is the origin of RetroArch and OpenEmu Nintendo DS support and is used by several mobile Nintendo DS emulators, with the notable exception of DraStic. DeSmuME 0.9.11 released! April 15th, 2015 In this version, we have focused on the Cocoa frontend, but there have been some good core fixes over so long. Notably, the save-related issues resulting in the advice “dont use 0.9.10″ have been resolved.
5/5 5,143 Sep 15, 2016
DeSmuME Team <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/DeSmuME2_th.png"border="0">
Free Hide IP 4.1.8.8
Free Hide IP 4.1.8.8 Free Hide IP - The best free privacy protection software. Free Hide IP the best way is to keep your IP address from being shown to others. Hackers and identity thieves are becoming more and more rampant in today's society. They may break into anyone's computer and monitor one's activity or steal one's identity or other personal information. To stay safe online, the best way is to keep your IP address from being shown to others. Now we provide you a FREE solution to hide your IP address. Use Free Hide IP to hide your real IP address for free, anonymize your web surfing, keep your computer safe from hacker attacks and other risks, all with a single click.
5/5 8,699 Jun 07, 2017
Free Hide IP <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/free-hide-ip_th.png"border="0">
EXE Hacker
Hacker Hack your way through the security softwares and defeat your enemies! In Hacker you will control various programs that have different abilites. Your goal is to advance from node to node and try to defeat all the security programs that include guards, scanners and firewalls. Use your credits to buy more programs from shops around the map and fuse them together to create even more powerful versions. Take control of every server you get your hands on and shut down the national defense core! Play the arena mode and try to defeat as many waves of enemy programs as possible. The game was greatly inspired by an old flash game called The Nightfall Incident. You should go check that out too. controls: WASD to move around in the map menu LMB to do stuff
4/5 6,056 Sep 28, 2016
Pixel Melody <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/Hacker92464_th.png"border="0">
Network Password Recovery v1.57
Network Password Recovery v1.57 This utility recovers all network passwords stored on your system for the current logged-on user. When you connect to a network share on your LAN or to your .NET Passport account, Windows allows you to save your password in order to use it in each time that you connect the remote server. This utility recovers all network passwords stored on your system for the current logged-on user. It can also recover the passwords stored in Credentials file of external drive, as long as you know the last log-on password. Which passwords this utility can recover? Login passwords of remote computers on your LAN. Passwords of mail accounts on exchange server (stored by Microsoft Outlook) Password of MSN Messenger / Windows Messenger accounts Internet Explorer 7.x and 8.x: passwords of password-protected Web sites ("Basic Authentication" or "Digest Access Authentication") The item name of IE7 passwords always begin with "Microsoft_WinInet" prefix. The passwords stored by Remote Desktop 6. System Requirements This utility works properly on Windows XP, Windows 2003, Windows Vista, Windows 2008, Windows 7, Windows 8, Windows 10 and Windows 11 - only when you logged on as user with Administrator privileges. You can also use this utility for recovering network passwords under Windows 98/ME. Windows 2000 is not supported, because this version of operating system doesn't save the network passwords. Notice from The OlderGeeks: Even though these zip files are password protected, Windows Defender or other antivirus programs may not allow this download. It's not a false positive. This IS a hacking tool and there for dangerous. But in this case, YOU are the hacker trying to get your own passwords back. If you want to download it, you ...
5/5 9,028 Jan 17, 2024
Nirsoft <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/netpass_th.png"border="0">
Network Spy Monitoring Software 1.0
Network Spy Monitoring Software 1.0 IMPORTANT: The zip file will ask you to enter a password. Just leave it blank. Network Spy Monitoring Software main use is to Monitor Network activities on authorized LAN Networks in real-time with a very fast ping scan. rogram Features: 1. Fast Ping Scan! 2. No PayPal Donations SPAM! 3. Easy To Use 4. 100% FREEWARE 5. 100% Spyware Free 6. Compatible With Windows 8 7. Very Lightweight 8. User Elevation 9. Newer Interface 10. Background Scan 11. Open Computer via Explorer etc. 12. VNC Remote Desktop Monitoring 13. User Interface Update - New Feature!
5/5 6,395 Oct 11, 2016
Blackbox HACKER <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/NetworkSpyMonitor1_th.png"border="0">
APK NewPipe v0.21.15
NewPipe v0.21.15 The lightweight YouTube experience for Android. Do you like watching videos on YouTube but want an intuitive, feature-rich and privacy friendly app for that? NewPipe has been created with the purpose of getting the original YouTube experience on your smartphone without annoying ads and questionable permissions. Supported services YouTube YouTube is one of the most popular video and live streaming platforms, including music, news, gaming and much more. PeerTube PeerTube is a decentralized video platform. Any PeerTube instance can be added to NewPipe. SoundCloud SoundCloud is a streaming platform for music. Bandcamp Bandcamp is an artist-friendly platform for sharing music. It offers user-friendly DRM-free downloads. media.ccc.de media.ccc.de is the video archive and live streaming platform of the German hacker and information security activist group Chaos Computer Club. And more to come! Special instructions to use .apk files in Android Allow app installations from unknown sources in Android. We found a great article on how to do this HERE. Features and screenshots Advanced search with filters Customizable downloads Play downloads Normal player Popup player Background player View channels Trending page Subscriptions Custom feed History Enhanced playback settings Playlist support This download is for the Android 4.4 or higher version. If you need the Android 4.1-4.3 version, download here. Click here to visit the author's website.
5/5 1,830 Dec 31, 2021
Team NewPipe <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/NewPipe1_th.png"border="0">
Nmap Security Scanner v7.94
Nmap Security Scanner v7.94 A free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), a utility for comparing scan results (Ndiff), and a packet generation and response analysis tool (Nping). Features: Flexible: Supports dozens of advanced techniques for mapping out networks filled with IP filters, firewalls, routers, and other obstacles. This includes many port scanning mechanisms (both TCP &amp; UDP), OS detection, version detection, ping sweeps, and more. See the documentation page. Powerful: Nmap has been used to scan huge networks of literally hundreds of thousands of machines. Portable: Most operating systems are supported, including Linux, Microsoft Windows, FreeBSD, OpenBSD, Solaris, IRIX, Mac OS X, HP-UX, NetBSD, Sun OS, Amiga, and more. Easy: While Nmap offers a rich set of advanced features for power users, you can start out as simply as "nmap -v -A targethost". Both traditional command line and graphical (GUI) versions are available to suit your preference. Binaries are available for those who do not wish to compile Nmap from source. Free: The primary ...
5/5 9,281 Nov 21, 2023
Nmap <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/nmap4_th.png"border="0">
No Crappy Passwords v11.39
No Crappy Passwords v11.39 Takes your crappy password and makes it non-crappy Hashes, encrypts, and encodes lousy passwords based information from initial hashes, combined with user provided offsets. Creating easy to memorize systems of passwords and offsets, the possibilities are endless, with never a need to file your passwords to disc or entrust them to a password manager. Features Takes five seconds to figure out "No Crappy Passwords will take an input, presumably a crappy password, hash the crap out of it, and return an eighty five character password. It takes little imagination to come up with a system of easy to remember passwords and offsets that will produce these unbreakable final passwords." 'When you send a password to a website or database or other software which requires it, your password is not actually stored on the remote server, a _hash_ of your password is stored. A hash is like one way encryption, any string of text (or a file for that matter) will produce the exact same hash every time. However, you cannot determine what the string of text was that actually produced the hash in the first place, which is why companies store the hash of the users' passwords, it's much more secure, because while they can compare the hash created by your password to the hash on file, they don't know your actual password." "Wannabe hackers that brute force sites can send thousands of common passwords in attempts find crappy ones, and if the server in question isn't salting, or is improperly salting passwords, that can be a problem." "No Crappy Passwords eliminates this possibility by simply turning your crappy password into a ridiculously long and random password through hashing. Additionally, no two crappy passwords will be hashed in the same way, as the script doesn't determine how many ...
5/5 1,932 Sep 19, 2023
Dana Booth <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/ncpw1_th.png"border="0">
Oxynger KeyShield v2.2
Oxynger KeyShield v2.2 Private and Secure Virtual Keyboard Anti-Spyware Virtual Keyboard Oxynger KeyShield is a secure virtual keyboard for Windows to enter passwords and other confidential information to get protection from malicious programs known as keyloggers. Oxynger KeyShield protects its keystrokes from keystroke logging, screen logging, mouse logging, clipboard logging and shoulder surfing. Oxynger KeyShield is an essential security tool for protecting high-stakes passwords such as master password, online bank password or cryptocurrency wallet password. Keystroke Logging Protection Oxynger KeyShield provides the world's best protection from keylogging. It is 100% protected against hook based, API based, kernel/driver based and hardware keyloggers. Ordinary anti-keyloggers only protect from some type software keyloggers. But Oxynger KeyShield protect its keystrokes from software and hardware keyloggers. Most virtual keyboards (such as the virtual keyboard that comes with Windows) send normal keyboard event messages to the target program to type text. Almost every software keylogger can record these typed characters. Oxynger KeyShield do not use ordinary methods to send keystrokes to target application. Instead it uses a very secure communication channel for sending keystrokes to target application. Keyloggers will not be able to record keystrokes send through this channel. Screen Capture Protection Oxynger KeyShield is protected from making its screenshots or video. Many modern keyloggers are able to capture screens while entering passwords using a virtual keyboard. Screen capture protection of Oxynger KeyShield is currently the world's best. It prevents taking its screenshot using screen capture programs. It is also protected from video recording programs. Mouse Logging Protection Oxynger KeyShield provides superior protection from mouse logging. Protection from mouse logging is accomplished by not using the common QWERTY layout for positioning keys in Oxynger KeyShield. If mouse logging protection is turned on then it uses a random key layout. Thus hackers won’t get any idea of the key layout of Oxynger KeyShield in a ...
5/5 1,964 Dec 08, 2021
Oxynger Technologies <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Oxynger4_th.png"border="0">
PasswordFox v1.70
PasswordFox v1.70 PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename. System Requirements This utility works under Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows 7, Windows 8, and Windows 10. Firefox should also be installed on your system in order to use this utility. Be aware that for Firefox 64-bit, you must use the 64-bit version of this tool and for Firefox 32-bit, you must use the 32-bit version of this tool. Known Problems False Alert Problems: Some Antivirus programs detect PasswordFox utility as infected with Trojan/Virus. As with any program that recovers passwords, many antivirus programs detect this as malicious because they think you are your own hacker. To allow you to be able to download it and for us to be able to host it, this zip file has a password. The password is: nspsfx403! Versions History Version 1.70 Added new file type to save the passwords list: 'Firefox import/export csv file'. When you save the passwords in this file type, you can use the import feature of Firefox to import the saved passwords into Firefox: Import login data from a file In order to save the passwords as 'Firefox import/export csv file', simply select the items you want to save (or press Ctrl+A to select all passwords), press Ctrl+S (Save Selected Items), choose 'Firefox import/export csv file' from the file type combo-box, type the filename to ...
5/5 8,871 Apr 24, 2021
Nir Sofer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/passwordfox_th.png"border="0">
Patch My PC Home Updater v4.2.0.0
Patch My PC Home Updater v4.2.0.0 Patch My PC Updater is a free, easy-to-use program that keeps over 300 apps up-to-date on your computer. It is an easy way to update or install any of these programs on to your computer. A key component of staying safe online is keeping your computer up-to-date. Hackers and virus writers love targetting outdated software. Outdated software often contains security vulnerability’s, bugs, and performance issues that are often resolved in the latest version. These are some of the reasons why it’s essential to keep the apps updated (or “patched”). When you open Patch My PC Updater, it will scan your system for outdated programs. Programs that are outdated will be shown in – Red Programs that are updated will be shown in – Green Programs that are not installed will be shown in – Black Whether you are a computer novice, semi-tech savvy, the go-to tech person for your family and friends, or an IT professional, Patch My PC Updater will make patching your PC easy. Quick Start Guide Download Patch My PC Home Updater Patch My PC Home Updater Documentation Patch My PC Home Updater Features Updates over 300 common apps including portable Ability to cache updates for use on multiple machines No bloatware during installations Applications install/update silently by default no install wizard needed Optionally, disable silent install to perform a manual custom install Easy to use user interface Installs 64-bit apps by default on 64-bit windows Optionally choose to install 32-bit apps on 64-bit Windows Change updated and outdated apps color for color blindness Option to automatically kill programs ...
5/5 9,360 Sep 29, 2020
PatchMyPC.net <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/PatchMyPCUpdater_th.png"border="0">
Phrozen ADS (Alternate Data Stream) Revealer v1.0.5642
Phrozen ADS (Alternate Data Stream) Revealer v1.0.5642 Phrozen ADS (Alternate Data Stream) Revealer is a Microsoft Windows program, especially designed to reveal possible malicious ADS files in your file system. Since the Alternate Data Stream functionality is only available for NTFS (New Technology File System), the program is able to scan and detect this kind of files only for this type of file system (Physical Hard Drive/Virtual Hard Drive/Physical Removable Device/Virtual Removable Device). If some ADS Files are detected during the scan you then can decide wether or not you want to keep them or to back them up. You can also have a content preview to detect in one glance if it looks legitemate or not. Phrozen ADS Revealer is the perfect tool to sanitize your NTFS file systems against bloated content or hidden malwares. Another great tool to put in your collection and 100% free. What are Alternate Data Stream Alternate data streams allow more than one data stream to be associated with a filename, using the format "filename:streamname" (e.g., "text.txt:extrastream"). NTFS Streams were introduced in Windows NT 3.1, to enable Services for Macintosh (SFM) to store resource forks. Although current versions of Windows Server no longer include SFM, third-party Apple Filing Protocol (AFP) products (such as GroupLogic's ExtremeZ-IP) still use this feature of the file system. Very small ADS (called Zone.Identifier) are added by Internet Explorer and recently by other browsers to mark files downloaded from external sites as possibly unsafe to run; the local shell would then require user confirmation before opening them.[21] When the user indicates that they no longer want this confirmation dialog, this ADS is deleted. Alternate streams are not listed in Windows Explorer, and their size is not included in the file's size. They are ignored when the file is copied or moved ...
5/5 5,695 Nov 15, 2019
PHROZEN SAS <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/adsrevealer1_th.png"border="0">
Process Hacker v3.0.4706
Process Hacker v3.0.4706 A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. Graphs and statistics allow you quickly to track down resource hogs and runaway processes. Use Ctrl+I to view system performance information. Move your cursor over a graph to get a tooltip with information about the data point under your cursor. You can double-click the graph to see information about the process at that data point, even if the process is no longer running. Can't edit or delete a file? Discover which processes are using that file. Use Ctrl+F to search for a handle or DLL. If all else fails, you can right-click an entry and close the handle associated with the file. However, this should only be used as a last resort and can lead to data loss and corruption. See what programs have active network connections, and close them if necessary. Use Ctrl+I to view system performance information. Move your cursor over a graph to get a tooltip with information about the data point under your cursor. You can double-click the graph to see information about the process at that data point, even if the process is no longer running. See a hightly detailed overview of system activity with highlighting. Add extra columns to show even more system activity and information! Get real-time information on disk access. This may look very similar to the Disk Activity feature in Resource Monitor, but Process Hacker has a few more features! Get real-time information on disk usage. Enable disk statistics for detailed disk usage information. View detailed stack traces with kernel-mode, WOW64 and .NET support. Hover your cursor over the first column (with the numbers) to view parameter and line number information when available. Get real-time information on network usage. Enable network adapter statistics for detailed information network usage information. Go beyond services.msc: create, edit and control services. By default, ...
5/5 2,979 Mar 24, 2022
Wen Jia Liu <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/ProcessHacker1_th.png"border="0">
RegistryChangesView v1.30
RegistryChangesView v1.30 A tool for Windows that allows you to take a snapshot of Windows Registry and later compare it with another Registry snapshots, with the current Registry or with Registry files stored in a shadow copy created by Windows. When comparing 2 Registry snapshots, you can see the exact changes made in the Registry between the 2 snapshots, and optionally export the Registry changes into a standard .reg file of RegEdit. System Requirements This utility works on any version of Windows, starting from Windows XP and up to Windows 11. Both 32-bit and 64-bit systems are supported. Changes Version 1.30: Added option to change the sorting column from the menu (View -> Sort By). Like the column header click sorting, if you click again the same sorting menu item, it'll switch between ascending and descending order. Also, if you hold down the shift key while choosing the sort menu item, you'll get a secondary sorting. Added 'Sort By' toolbar button Examples for useful things you can do with this tool You can create a Registry snapshot before installing a new software and then after the installation is completed, compare this Registry snapshot with the current Registry and see all Registry changes made by the installer (Be aware that you'll also see some changes made by Windows or other programs in the same time). If there are Registry changes that you don't like, you can generate a .reg file to revert back the changes. If you make a change in Windows configuration from the GUI of Windows and you want to see how to make this change in the Registry, simply create a Registry snapshot before making the config change and then after the configuration change, compare this Registry snapshot with ...
5/5 5,241 Sep 28, 2023
Nir Sofer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/registrychangesview_th.png"border="0">
Resource Hacker v5.2.4
Resource Hacker v5.2.4 A freeware resource compiler and decompiler for Windows applications. Resource Hacker is a resource editor for 32bit and 64bit Windows® applications. It's both a resource compiler (for *.rc files), and a decompiler - enabling viewing and editing of resources in executables (*.exe; *.dll; *.scr; etc) and compiled resource libraries (*.res, *.mui). While Resource Hacker is primarily a GUI application, it also provides many options for compiling and decompiling resources from the command-line. Compiling: Compiling can be initiated either by opening an existing resource script file, or by creating one from scratch using Resource Hacker's editor. A complete list of Resource-Definition Statements can be found here. Additional features of Resource Hacker's compiler include: The #INCLUDE directive (to access definition statements in header files etc) can be nested to multiple levels, as can the #IF, and #IFDEF directives. #DEFINE, #UNDEF, #IF, #ELIF, #ELSE, #IFDEF, #IFNDEF, #INCLUDE, and #PRAGMA directives are all supported. Strings, between double-quote (") characters, may contain typical 'C' style backslashed 'escaped' characters \t , , \\ , \" , \x, \u and \377 (octal). A double-quote within a string must be 'escaped' using either a preceding backslash or with another double-quote. Script comments are preceded either by double forward-slashes (//) or by a semi-colon (;). Filenames with relative paths are allowed. Filenames that contain spaces must be enclosed within double-quote characters. Compiler error messages are reported, even errors nested within INCLUDE statements... Viewing and Editing Resources: Once a resource file has been opened, its resources will generally be displayed as either an image (or group of images) or as decompiled text. Binary resources, usually images, can't be edited directly with Resource Hacker, but they can still be very easily exported and imported once they've been modified by an external image editor. (I see no benefit in duplicating what third-party image editors ...
5/5 5,261 Oct 31, 2023
Angus Johnson <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Resource Hacker1_th.png"border="0">
RunPE Detector v2.0
RunPE Detector v2.0 Phrozen RunPE Detector is a security program, especially designed to detect and defeat some suspicious processes using a generic method. We at Phrozen Software do things differently, more creatively. So, when we set ourselves the task of creating a novel way of detecting, disabling and removing RATs, we didn't want to take the route every other anti-virus company has done before us. Phrozen Software studied the behaviour of RATs and discovered that hackers virtually always use a technique called RunPE. This technique spawns a legitimate process – often the default browser or a Microsoft system process – and replace it with a malicious program code directly in memory. Your computer is thus tricked and treats the malicious code as a legitimate process. The user and his anti-virus program have no idea that his default browser is effectively turned into a virus. RunPE is a technique that is used in several malicious ways. The two most common are : [1] FWB (Firewall Bypass): As its name suggests, this technique is implemented to bypass or disable the Application Firewall or the Firewall rules. Since most malware needs to connect to a remote Command-and-Control (C&amp;C) Server, it needs to connect to the Internet via the Firewall. Since most users are connected to the Internet at home, normally the installed Firewall would prevent the malware from connecting to the Internet. Using the RunPE technique to hijack a legitimate process that is authorized to reach Internet, any malware could subsequently connect to the C&amp;C without being detected by the Firewall. [2] Malware Packer or Crypter: Generally script kiddies – immature hackers - use a well-known type of malware that is already detected by most anti-virus programs. They then try the obfuscate this malware to evade ...
5/5 5,845 Nov 15, 2019
PHROZEN SAS <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/RunPE Detector1_th.png"border="0">
Sordum Random Password Generator v1.0
Sordum Random Password Generator v1.0 Your password is your metaphorical ‘key’ to unlocking you online ‘front door’. You wouldn’t hand your home key to just anyone, would you? Cybersecurity experts continually recommend to use of strong, unique passwords for several reasons , cyber-criminals compromise websites and online accounts, and post lists of usernames, email addresses, and passwords online. A criminal can look for other online shopping, social media or financial accounts for that same person. When the criminal finds those accounts they can try logging in with the exposed password. If the password is reused, they can gain access to further accounts. This is why unique passwords are so important. The use of strong passwords can slow or often defeat the various attack methods of compromising a terminal’s security. Passwords are the first line of defense against unwanted access to your accounts. The stronger a password, the better protected accounts. Your enemy isn’t some guy in a ski mask trying to guess your password one try at a time. It’s a program that automatically runs through massive databases of common passwords or random combinations of characters . Hackers use a technique called brute forcing. This is a technique where they try every possible character combination until the correct password is identified.The stronger the password the less likely brute forcing will be successful.To Create a Strong Password ; Choose a password that no one will easily guess , Do not share passwords , Make sure your password is long, Use at least one letter, number and special character in your password, Remember to update and vary passwords. How to use Sordum Random Password Generator. We have developed a free and portable software (Sordum Random Password Generator) to create random secure passwords. Download , Unzip it and run the “RandomPW.exe” file Sordum Random Password Generator has ...
5/5 4,474 Nov 26, 2019
Sordum.org <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/sordumrandompassgenerator2_th.png"border="0">
Spybot Identity Monitor v3.4
Spybot Identity Monitor v3.4 You’ve got the right to know! You’ve probably registered on dozens of websites (or more) over the years, giving them your email address, personal data like birth dates and street addresses, and passwords. Spybot Identity Monitor gives you a tool that allows you to check if your information already is in the hand of hackers. It’s your data – you deserve to know! What to do if…? If Spybot Identity Monitor tells you that a service has leaked your data, you should: Change your password at that service at once. Change your password on all other services where you might have used the same password. Start using a password manager to make sure all those passwords are stored safely. Start using Two Factor Authentication where possible. Spybot Identity Monitor Main View Once started, the program immediately shows an overview of known sources and breaches for the accounts set up. Spybot Identity Monitor Account Details By viewing account details you can get an overview where the account - in this example it's a dummy email address example@example.com - was leaked. Spybot Identity Monitor Breach Details You can view all details of a breach of your data. In this example you'll see that for example@example.com, even phone numbers and employers were leaked. Tutorial Watch how Rob from Team Spybot explains how Spybot Identity Monitor is used! Supports: Windows 7 to 10 Changes: Version 3.4 November 4th, 2019 Spybot Identity Monitor 3.4 is a mandatory update that fixes a breaking change in Have I Been Pawned support and adds our own data sources for even more! Fixed Have I Been Pwned support. Added own additional sources. Contacts only Safer-Networking servers now (additional privacy). Click here to visit the author's website.
5/5 4,545 Jan 07, 2021
Safer-Networking Ltd. <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SpyBotIDMonitor1_th.png"border="0">
Telegram Desktop v4.15.0
Telegram Desktop v4.15.0 A new era of messaging. Telegram is a messaging app with a focus on speed and security, it’s super-fast, simple and free. You can use Telegram on all your devices at the same time — your messages sync seamlessly across any number of your phones, tablets or computers. With Telegram, you can send messages, photos, videos and files of any type (doc, zip, mp3, etc), as well as create groups for up to 100,000 people or channels for broadcasting to unlimited audiences. You can write to your phone contacts and find people by their usernames. As a result, Telegram is like SMS and email combined — and can take care of all your personal or business messaging needs. In addition to this, we support end-to-end encrypted voice calls. Who is Telegram for? Telegram is for everyone who wants fast and reliable messaging and calls. Business users and small teams may like the large groups, usernames, desktop apps and powerful file sharing options. Since Telegram groups can have up to 100,000 members, we support replies, mentions and hashtags that help maintain order and keep communication in large communities efficient. You can appoint admins with advanced tools to help these communities prosper in peace. Public groups can be joined by anyone and are powerful platforms for discussions and collecting feedback. In case you're more into pictures, Telegram has animated gif search, a state of the art photo editor, and an open sticker platform (find some cool stickers here or here). What‘s more, there is no need to worry about disk space on your device. With Telegram’s cloud support and cache management options, Telegram can take up nearly zero space on your phone. Those looking for extra privacy should check out our advanced settings and rather revolutionary policy. And if you want secrecy, try our device-specific Secret ...
5/5 8,379 Mar 07, 2024
telegram.org <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Telegram Desktop1_th.png"border="0">
Universal Radio Hacker v2.9.1
Universal Radio Hacker v2.9.1 The Universal Radio Hacker (URH) is a complete suite for wireless protocol investigation with native support for many common Software Defined Radios. URH allows easy demodulation of signals combined with an automatic detection of modulation parameters making it a breeze to identify the bits and bytes that fly over the air. As data often gets encoded before transmission, URH offers customizable decodings to crack even sophisticated encodings like CC1101 data whitening. When it comes to protocol reverse-engineering, URH is helpful in two ways. You can either manually assign protocol fields and message types or let URH automatically infer protocol fields with a rule-based intelligence. Finally, URH entails a fuzzing component aimed at stateless protocols and a simulation environment for stateful attacks. Download user guide here. Instructional Video: This download is for the Windows 64bit version. If you need the Windows 32bit version, download here. If you need the MacOS version, download here. If you need the Linux version, download here. Changes: v2.9.1 Dec 30, 2020 0c8f383 use *.wav format for demodulated signal export 8af7da3 change separation colors to green and magenta a3eceba fix disappearing separation area in demod view 6a7048c fix #829 7d2e41b fix overflow in AutoInterpretation for certain signals Click here to visit the author's website.
5/5 4,862 Feb 11, 2021
Dr. Johannes Pohl <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Universal Radio Hacker1_th.png"border="0">
WebCam On-Off v1.4
WebCam On-Off v1.4 Webcams allow us to stay in touch with family and friends, or perhaps record and stream video from your computer to the internet or to a file. When not in use , you may wish to disable your webcam to ensure it is not making unwanted recordings. Malware can take over webcams, so there is potential for spying. Hackers can utilize trojan-horse attacks, enabling them to take control of your webcam, allowing them to record you or take pictures of you without your knowledge. If you’re a parent, you may also wish to disable your webcam for safety reasons. Instant messengers and websites that utilize video aren’t always safe for children, thus disabling your webcam may be the best course of action. If the camera is external, you could always unplug it and hide it, but this can become tiresome if you are frequently in need of it. And what if, as on most laptops, you have a built in camera? The Washington Post highlighted an unnerving study published at Johns Hopkins University which found that a laptop webcam can function in relative secrecy – a slightly more subtle Eye of Sauron, if you will. Webcam spying, particularly the variant that involves disabling LED indicator lights, takes quite a bit of effort, but the practice isn’t limited to the realm of academics. The FBI has publicly acknowledged its ability to employ such techniques when investigating criminal activity. As you can see, disabling your webcam completely is the safest way to protect your privacy. Because of this, we have created “Webcam On-Off” which is both portable and freeware. With it you can easily disable or enable your webcam. Don’t let your home become someone else’s reality TV! What is new on version 1.4 (Friday 4 December 2020) 1.[Fixed] – WebCam On-Off Doesn’t Work on ...
5/5 6,004 Dec 07, 2020
Sordum.org <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/webcamonoff1_th.png"border="0">
WebESC v18.12
WebESC v18.12 WebESC detects changes in your list of local or web files. It is intended mostly for advanced computer users. It is very fast. List for scanning, in FLS file, is created by WebESC initial scan, or by your application if any, or manually by you. The FLS data reflects the current state of scanned files so when comparing to one taken previously at another time, WebESC will provide discrepancies between the two. You can compare your local or web files for any changes, e.g. by a virus or hacker or legally by some application. WebESC will not remove a virus but it can detect a file change that many of antivirus programs omit, so it would be best to run them both. WebESC in local mode helps you to track the file changes on your computer. For example, list of hard disk files, or your storage on CD/DVD (if burning was reliable or there was a media damage), or USB memory. You can also compare two different folders by using the relative paths, meaning you can check your backups. WebESC in web mode can verify that web links exist, and also changes in sizes of web files, without need of downloading the binary web files. You can compare your web pages stored locally on your disk to those on your web site, i.e. you can verify that all the files are succesfully uploaded or have been changed by any. If you have the web links to other web sites you can check the broken links and file version changes. Click here to visit the author's website.
5/5 2,255 Jun 11, 2021
Drazen <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/WebESC1_th.png"border="0">
Who Stalks My Cam V2.0
Who Stalks My Cam V2.0 It Is No Secret; You Are At The Mercy Of Hackers! Who does not fear about the possibility of being spied upon your Webcam without your knowledge? Have you thought of this frightening threat to your online security? Well, it is no longer a fear but a reality. It is no longer an imagination, or something you can assume. It is happening, and the most worrying thing is that it is very prevalent. Nowadays, hackers have managed to achieve great success in spying on innocent internet users by use different kinds of Malware.One of such malware is the infamous DarkComet RAT. DarkComet RAT is a Remote Access Trojan targeting Microsoft Windows Machines world wide. This dangerous malware opens huge remote possibilities to Hackers, such as Keystroke logging, Listening on your conversations on the Microphone, Recovering passwords, Watching your desktop using your webcam etc. A very huge amount of such Malware exists and represents millions of computers infected world wide. Other techniques exists to spy on you through the webcam, using malicious Website scripts, for example, using your Webcam device, tricking on you to allow Webcam to be broadcasted. At Phrozen Software™, we are aware of your concern about this cyber threat. Definitely, no one wants to be spied upon; No one wants to feel insecure while doing their online activities, and you are no exception. As you may already be aware, at Phrozen Software™ we design different security programs to provide you with the ultimate solution to the problem. Our software are designed differently, not like the regular Antivirus programs. We do not claim to replace an existing antivirus program; All we do is enhance them using generic techniques to avoid yet to be known viruses from impacting on your security until your antivirus is able to get ...
5/5 5,624 Mar 07, 2017
PHROZEN SAS <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/Who Stalks My Cam2_th.png"border="0">
WinGuggle 2.5
WinGuggle 2.5 Get your Windows 7/8/10, Vista, XP and Office Product Key easily, System Information and Customizes OEM Information Completely. If you've lost your product key, this is very difficult to recover if you will just look for it at your registry. The program also provides System Summary of your PC and Customizes your Windows 7, Vista and XP's Logo and Information easily. WinGuggle is a small application that can Set, Change and Backup your Original Equipment Manufacturer's Information. It can also get your Windows 7/8/10/Vista/XP and Office Product Key for Backup easily. How? No Installation is needed, Just unzip the archive and launch the application. Many antivirus programs will flag this as a "hacking tool". Why? Because it IS a hacking tool. You are the hacker, hacking your computer. The file is safe. Changelog: WinGuggle 2.5 added dxdiag and msinfo32 functionality for Windows 10 (at least .net 2.0 is needed) Office Product Key Recovery for future versions was added other Bug fixes Click here to visit the author's website.
5/5 5,838 Aug 15, 2021
UnlockForUs <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/WinGuggle1_th.png"border="0">
WinReducer 7.0 4.2.0.0
WinReducer 7.0 4.2.0.0 WinReducer makes a custom ISO with up to 825 different combinations to customize, integrate or reduce your personal Windows installation. Features: Customize Windows (Integrate cursors, themes, wallpapers or change files to improve Windows 7 appearance) Help Tips available for each components (and all components help tips could be translated in your language) Integrate (Applications, Drivers, Net Framework 3.5, Unattended Files or Updates to your customized Windows 7 ISO) Load Language Files (Translate WinReducer 7.0 in your language) Load WinReducer GUI Theme (Improve WinReducer 7.0 Graphical User Interface) Remove Windows Components (Make your choice to reduce and adapt Windows 7 to your needs) Use WinReducer Custom Configuration File (Load or Save Presets files, also know as wccf file, to restore or save your settings) "All in One" ISO support with up to 50 Windows Editions Changelog: v4.2.0.0 (03 June 2015) : - UPDATE : Various minor improvements - FIX : "Resource Hacker" installation trouble which prevented using WinReducer
0/5 6,506 Jun 03, 2015
WinReducer <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/4084141_orig_th.png"border="0">
WirelessKeyView v2.23
WirelessKeyView v2.23 Recover lost wireless network key. WirelessKeyView recovers all wireless network security keys/passwords (WEP/WPA) stored in your computer by the 'Wireless Zero Configuration' service of Windows XP or by the 'WLAN AutoConfig' service of Windows Vista, Windows 7, Windows 8, Windows 10, Windows 11 and Windows Server 2008+. It allows you to easily save all keys to text/html/xml file, or copy a single key to the clipboard. You can also export your wireless keys into a file and import these keys into another computer. License This utility is released as freeware. You are allowed to freely distribute this utility via floppy disk, CD-ROM, Internet, or in any other way, as long as you don't charge anything for this and you don't sell it or distribute it as a part of commercial product. If you distribute this utility, you must include all files in the distribution package, without any modification. Disclaimer The software is provided "AS IS" without any warranty, either expressed or implied, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. The author will not be liable for any special, incidental, consequential or indirect damages due to loss of data or any other reason. Known Problems False Alert Problems: Some Antivirus programs detect WirelessKeyView utility as infected with Trojan/Virus. The file is clean. Because of this, you will need to use a password to open this file. The password is: WKey4567# System Requirement • Any version of Windows starting from Windows XP with SP1 and up to Windows 11. • You must login to windows with admin user. • In order to extract wireless keys from external drive of Windows 10/7/8/Vista, the minimum requirement is Windows XP with SP3. Please take note: Due to antivirus programs detecting this ...
5/5 4,454 Nov 27, 2023
Nir Sofer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/wireless_key_view_screenshot_th.png"border="0">
   
Showing rows 1 to 35 of 35 Showing Page 1 of 1  1 


OlderGeeks.com Copyright (c) 2024