Your download link is at the very bottom of the page... always.



Processed through Paypal
No account required.


Donate Bitcoin to this wallet:
1KkUMXvQ2ko3xcJkzitB7WYgoW6m79WFfm
Donate Ethereum to this wallet:
0x40E56922F43637224935CDC35e2c96E0392A8505
Donate Litecoin to this wallet:
LLYAFEyqjH69gkyCEpRjXNyedRCWrVChfL

Buy our over-priced crap to help keep things running.
Take No CrapwareOG Dad CapNo Password


Join our Facebook groupFollow us on TwitterFollow us on InstagramOur RSS FeedJoin us on TikTokJoin us on LinkedIn


 Home » OlderGeeks.com Freeware Downloads » Searching Files   
Search
Search Terms
Search Category Leave category selection blank to search within all categories.
Search Results
Files
  File Name Rating Downloads
Last Update/Developer
525 DOS Games From The 1980s
525 DOS Games From The 1980s One giant zip file containing all of the games in this list. Run on an old computer or in a DOS virtual machine. See Virtualization Software in our download section. 007 - Licence To Kill (1989) (Quixel) 10th Frame Bowling (1988) (Access) [v2] 20000 Leagues Under the Sea (1988) (Coktel Vision) 2400 A.D. (1988) (Origin Systems) 3-Demon (1983) (PC Research Inc) 4th and Inches (1987) (Accolade) 4x4 Off-Road Racing (1988) (Epyx) 8088 Othello (1985) (M.W. Bayley) A Mind Forever Voyaging (1985) (Infocom) A Nightmare on Elm Street (1989) (Westwood Studios) A-Maze (1989) (Wizard Games) A10 Tank Killer (1989) (Dynamix) Aaargh! (1988) (Arcadia) Ace (1987) (Cascade) Ace 2 (1987) (Cascade) Ace of Aces (1987) (Artech) Action Fighter (1989) (Core Design) Action in the North Atlantic (1989) (General Quarters) Adventure Construction Set (1987) (Electronic Arts) Adventures in Math (1983) (IBM) [v1.00] Adventures in Serenia (1986) (Sierra) African Raiders-01 (1986) (Tomahawk) Afterburner (1989) (Unlimited Software) Air Trax (1983) (Presearch Incorporated) Airball (1987) (MicroDeal) Airborne Ranger (1988) (MPS Labs) Aldo Again (1989) (David & Benjamin Ibach) Aldo's Adventure (1987) (David & Benjamin Ibach) Alf (1988) (Alien Productions) Alice in Wonderland (1989) (Robin Johnson) Alien Syndrome (1987) (Sega) Alley Cat (1984) (Synapse) Alter Ego - Female (1983) (Activision) Alter Ego - Male (1983) (Activision) Amazing Maze (1983) (Donovan W. Foster) [v1.2] Amnesia (1986) (Cognetics Corporation) Ancient Land of Ys (1989) (Kyodai) Andromeda Conquest (1982) (Avalon Hill) Annals of Rome (1986) (PSS) Antarctic Adventure (1984) (Friends Software) Anti-Ballistic-Missile (1982) (Davis Disk) AntiXonix (1985) (D. Pavlovsky) Apache Strike (1989) (Activision) Arcade Volleyball (1988) (Vladimir Zakharov) Archipelagos (1989) (Logotron) Archon (1984) (Mission Accomplished) Arctic Fox (1986) (Dynamix) Arkanoid (1988) (Taito) Arkanoid 2 - Revenge of Doh (1989) (Taito) Arnhem (1985) (Cases Computer Simulations) Aspar GP Master (1989) (Dinamic) Astro Blaster (1988) (Rolf Franzon) Astrotit (1987) (Rudeware) Autoduel (1988) (MicroMagic) Avoid the Noid (1989) (BlueSky Software) [cga] Avoid the Noid (1989) (BlueSky Software) [ega] Axe of Rage (1989) (Palace Software) Backgammon (1987) (ShareData) Bad Cat (1988) (Rainbow Arts) Bad Street Brawler (1987) (Beam Software) Ballyhoo (1986) (Infocom) Barbarian (1989) (Mastertronic) Barbarian 2 (1989) (Palace Software) Batalia (1986) (The Right Brothers) Batman - The Caped Crusader (1988) (Ocean) Battle ...
5/5 7,765 Oct 06, 2023
Various <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SilentService_th.png"border="0">
All Bitdefender Uninstall Tools 2015-2022
All Bitdefender Uninstall Tools 2015-2022 This is a single zip file we put together that contains the Bitdefender removal tools for the following products: Bitdefender Antivirus Plus 2021/2022 Bitdefender Internet Security 2021/2022 Bitdefender Total Security 2021/2022 Bitdefender Antivirus Plus 2020 Bitdefender Internet Security 2020 Bitdefender Total Security 2020 Bitdefender Antivirus Plus 2019 Bitdefender Internet Security 2019 Bitdefender Total Security 2019 Bitdefender Antivirus Plus 2018 Bitdefender Internet Security 2018 Bitdefender Total Security 2018 Bitdefender Antivirus Plus 2017 Bitdefender Internet Security 2017 Bitdefender Total Security 2017 Bitdefender Antivirus Plus 2016 Bitdefender Internet Security 2016 Bitdefender Total Security 2016 Bitdefender Antivirus Plus 2015 Bitdefender Internet Security 2015 Bitdefender Total Security 2015 Bitdefender Endpoint Security Tools (Windows) v6.6.x+ Read this first Bitdefender Endpoint Security Tools (Windows) up to v6.4.x Endpoint Security by Bitdefender v5.x For the following older versions you need to contact Bitdefender support: Bitdefender Endpoint Client v4 and Bitdefender Client Security 3.5 suite • Bitdefender Business Client • Bitdefender Management Agent • Bitdefender Management Server(console) 3.5 • Bitdefender Security for File Servers 3.5 • Bitdefender Security for Mail Servers 3.5 • Bitdefender Security for Sharepoint 3.5 Click here to visit the author's website.
5/5 3,830 Jan 05, 2022
BitDefender Labs <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/BitDefenderUninstaller1_th.png"border="0">
Angle Mouse v2.0.3
Angle Mouse v2.0.3 The Angle Mouse is a pointing facilitation technique that runs quietly in the background and improves the efficiency and ease of mouse pointing, especially for people with motor impairments. The Angle Mouse is a target-agnostic pointing facilitation technique that works by continually adjusting the control-display (C-D) gain based on how coherent (straight) or divergent (angular) the mouse movement is. When the mouse moves straight, the gain is kept high, but when the mouse corrects abruptly, often near targets, the gain is dropped, making targets bigger in motor-space. If you have any questions or comments, contact Jacob O. Wobbrock at wobbrock@uw.edu. The Angle Mouse requires the Microsoft .NET 2.0 Framework. Download it here. This software is distributed under the New BSD License agreement. Publications Wobbrock, J.O., Fogarty, J., Liu, S., Kimuro, S. and Harada, S. (2009). The Angle Mouse: Target-agnostic dynamic gain adjustment based on angular deviation. Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI '09). Boston, Massachusetts (April 4-9, 2009). New York: ACM Press, pp. 1401-1410. Acknowledgement This work was supported in part by Microsoft Research, Intel Labs, and the National Science Foundation under grants IIS-0811063 and IIS-0812590. Any opinions, findings, conclusions, or recommendations expressed in this work are those of the authors and do not necessarily reflect those of any supporter. Jacob O. Wobbrock James A. Fogarty Shih-Yen (Sean) Liu Shunichi Kimuro Susumu Harada Click here to visit the author's website.
5/5 3,306 Jan 31, 2020
Dr. Jacob O. Wobbrock <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/AngleMouse4_th.png"border="0">
AWE64D (CT4600) Win2000/XP Driver
AWE64D (CT4600) Win2000/XP Driver. May work with other versions of Windows.
0/5 8,514 Nov 28, 2008
Creative Labs
BitDefender Antivirus Free Edition
BitDefender Antivirus Free Edition Antivirus protection for Windows. Absolutely free. Choose the only free antivirus software that keeps your computer running clean, fast and virus-free while shielding you from the latest e-threats. Free antivirus protection that stops even the fastest-evolving attacks Runs silently in the background and stays out of your way Impossibly light on CPU (won’t suck up your system resources) Live customer support included (unlike with other Free AVs!) By learning and monitoring the unique pattern of daily activity on your PC, Bitdefender Antivirus Free is able to instantly detect and isolate suspicious changes in real-time, no matter the source. So you’re shielded from known and emerging threats, including … Ransomware Financial extortion attacks that freeze PCs are on the rise, attacking everyone from individuals to global enterprises. Cryptojacking With cryptocurrency soaring in popularity, hijacking PC resources to mine for coins has become an all-too-common hazard. AI-powered “spearphishing” AIs like GPT-3 are now being exploited to write shockingly personalized emails that can dupe just about anyone. “Zero-day” exploits Every software update comes with flaws that need fixing. Until they’re detected, hackers use them as infection points. Rootkits and Trojans Notoriously hard to detect, these attack your PC’s central nervous system and use its credentials to steal and impersonate you. Malicious websites and files Malware can be embedded into almost anything you click on, including “next-gen” financial assets like NFTs. System Requirements Operating System: Windows 7 with Service Pack 1, Windows 8.1, Windows 10 or Windows 11 Memory (RAM): 2 GB Available free hard disk space: 2.5 GB free space *System performance may be affected on devices with old-generation CPUs Click here to visit the author's website.
5/5 9,707 Dec 12, 2023
BitDefender Labs <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/BitDefenderFree1_th.png"border="0">
Bitdefender Home Scanner 1.0
Bitdefender Home Scanner 1.0 Scan for weaknesses and hidden backdoors into your home Bitdefender Home Scanner is a free tool that scans your Wi-Fi network, maps devices and identifies and highlights network security flaws. Bitdefender Home Scanner looks for weak passwords, as well as vulnerable or poorly encrypted communications. It correlates the information gathered from your connected devices with online vulnerability databases and gives you a thorough report so you can ensure maximum security for your network. Map your home network Scan open ports in the network Wi-Fi scanner: identify all connected devices and security risks Complementary to and compatible with all existing security tools Why use Bitdefender Home Scanner New software vulnerabilities are being discovered in many smart devices every day, and hackers are taking advantage of these security flaws to target homes and businesses. It is time to start thinking about the security of your smart devices. Recently, a mom who had installed a smart surveillance system in her home discovered that someone had hacked into a webcam and live-streamed her daughters’ room on the Internet. There have been numerous reports about light bulbs being hacked. In one case, a security company demonstrated that unauthorized persons could hack into a home network by posing as a new light bulb joining the system. This way the other light bulbs were tricked into giving away the username and password for the network. Moreover, hackers can take advantage of vulnerabilities to take control of vast numbers of smart devices and use them to launch massive attacks against commercial and government websites. Technical Details Minimum system requirements: Windows 7 SP 1, 8, 8.1, 10 CPU: Dual Core 1.6 GHz RAM: 1 GB HDD: 300 MB Recommended system requirements: Windows 7 SP ...
5/5 4,931 Nov 13, 2019
BitDefender Labs <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/BitDefenderHomeScanner1_th.png"border="0">
Bitdefender Ransomware Recognition Tool v1.0.0.2
Bitdefender Ransomware Recognition Tool v1.0.0.2 A tool to help ransomware victims find which family and sub-version of ransomware has encrypted their data and then get the appropriate decryption tool, if it exists. Ransomware has grabbed the headlines ever since 2014. While most ransomware attacks can’t be defeated, Bitdefender constantly creates and updates ransomware decryption tools for families that have either vulnerable encryption algorithms or for which a master decryption key has been leaked. This tool analyzes both the ransom note and the encrypted file samples to identify the strain of ransomware and suggest a decryption tool for the identified family, if such a tool is available. Step 1 Download the BRR tool and save it somewhere on your computer. The latest version is always available here. This tool requires an active internet connection. Step 2 Run the BDRansomRecognitionTool.exe and allow it to execute if prompted by an UAC alert. Step 3 Read and agree to the End User License Agreement Step 4 The application has two fields to fill in: Choose the path to the ransom note file or the path to a folder containing encrypted files. You can choose either option, but the tool needs at least one of the pieces of information to detect which strain of ransomware has encrypted your information. If none of the fields are filled in, you cannot proceed any further Step 5 Press Scan. The application gives a warning if the ransom-note path is not filled in, as the detection accuracy is slightly lower in this case. The content of the ransom note is submitted for analysis to Bitdefender cloud. If the user provides any encrypted file, NO file content will be submitted to our cloud, as the tool only analyzes the filename and its extension. If the ransomware family cannot be identified, the user is informed about this. In some cases, multiple families of ransomware display similar features. ...
5/5 4,957 Nov 13, 2019
BitDefender Labs <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/BitDefenderRecognitionTool_th.png"border="0">
Bitdefender Rootkit Remover 32bit 3.0.2.1
Bitdefender Rootkit Remover 32bit 3.0.2.1 The Bitdefender Rootkit Remover deals with known rootkits quickly and effectively making use of award-winning Bitdefender malware removal technology. Unlike other similar tools, Bitdefender Rootkit Remover can be launched immediately, without the need to reboot into safe mode first (although a reboot may be required for complete cleanup). Rootkit Remover deals easily with Mebroot, all TDL families (TDL/SST/Pihar), Mayachok, Mybios, Plite, XPaj, Whistler, Alipop, Cpd, Fengd, Fips, Guntior, MBR Locker, Mebratix, Niwa, Ponreb, Ramnit, Stoned, Yoddos, Yurn, Zegost and also cleans infections with Necurs (the last rootkit standing). Please note that the list is a bit outdated - new rootkit families are added as they become known.
5/5 7,810 Nov 13, 2019
BitDefender Labs <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/bitdefenderrootkitremover_th.png"border="0">
Bitdefender Rootkit Remover 64bit 3.0.2.1
Bitdefender Rootkit Remover 64bit 3.0.2.1 The Bitdefender Rootkit Remover deals with known rootkits quickly and effectively making use of award-winning Bitdefender malware removal technology. Unlike other similar tools, Bitdefender Rootkit Remover can be launched immediately, without the need to reboot into safe mode first (although a reboot may be required for complete cleanup). Rootkit Remover deals easily with Mebroot, all TDL families (TDL/SST/Pihar), Mayachok, Mybios, Plite, XPaj, Whistler, Alipop, Cpd, Fengd, Fips, Guntior, MBR Locker, Mebratix, Niwa, Ponreb, Ramnit, Stoned, Yoddos, Yurn, Zegost and also cleans infections with Necurs (the last rootkit standing). Please note that the list is a bit outdated - new rootkit families are added as they become known.
5/5 8,062 Nov 13, 2019
BitDefender Labs <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/bitdefenderrootkitremover_th.png"border="0">
Bopup Scanner 2.1.9
Bopup Scanner 2.1.9 This freeware network scanner displays active computers with logged user names (NetBIOS), MAC and IP addresses. Bopup Scanner also recognizes and shows HTTP (Web) servers running on remote computers (TCP ports 80, 8080), quickly detects online computers, allows to browse shared resources of a remote computer and save results to a text file. Advanced users can enter IP range to scan, change a timeout to resolve a remote host and run the program from a command line interface. Portable software Bopup Scanner is a fully portable software. It requires no any setup and installation on a destination computer and can be easily copied to a USB flash drive to move to another PC. Browsing Shared Resources on Remote Computers Bopup Scanner allows to open shared folders on remote computers in Windows Explorer. Right-click on a computer and then select "Browse..." from the pop-up menu. Exploring HTTP Servers Bopup Scanner recognizes HTTP (Web) servers running on remote computers (TCP ports 80, 8080) and shows "Running" label in the "HTTP server" column. Command line support The program can be executed with the command line paramaters in order to specify pre-defined options, such as IP range to scan (start and end IP addresses), a path of the file where to save results. So the scanner can be used in batch files as a tool for an automated monitoring. To see the available command line options run the scanner.exe file with the /? or /h parameters or click More infomation... button in the About dialog. Logging Results Results can be saved to a text file. Just select "Actions\Save list..." and type a file name to save. Changing IP Range to Scan Administrators can enter IP range to scan and timeout to resolve a remote computer. Latest version is 2.1.9 Released on October 29, 2016 Supports Windows® 95/98/Me/NT 4.0/2000/XP/2003/Vista/2008/7/8/2012/10
5/5 5,117 Nov 24, 2016
B Labs <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/Bopup Scanner1_th.png"border="0">
Camera Mouse 2018 v1.1
Camera Mouse 2018 v1.1 Camera Mouse is a free program that allows you to control the mouse pointer on a Windows computer just by moving your head. Clicking can be done by making the mouse pointer dwell over a spot on the screen (after first turning Clicking on in Settings). The program was developed at Boston College to help people with disabilities use the computer. The main audience for this program is people who do not have reliable control of a hand but who can move their head. People with Cerebral Palsy, Spinal Muscular Atrophy, ALS, Multiple Sclerosis, Traumatic Brain Injury, various neurological disorders use this program and its predecessors to run all types of computer software. Camera Mouse works as a mouse replacement system for Windows computers and tablets so it should work with just about any application program. For example people use Camera Mouse with entertainment programs, education programs, communication programs, web browsers, and so on. (See the Downloads page for some of the programs and websites that we have used with Camera Mouse.) Camera Mouse works best with application programs that require only a mouse and a left click and that do not have tiny targets. It's easier to use Camera Mouse with application programs that do not require extreme accuracy. What equipment is required? A Windows 10, 8.1, 8, 7, Vista, or XP computer or tablet and a built-in camera or standard USB webcam. We do our development work with a Microsoft LifeCam Studio and a Logitech HD Pro Webcam C920. However the much less expensive Microsoft LifeCam HD-3000 and Logitech HD C270 work well also. Camera Mouse should work with any built-in camera or USB webcam. This program is available for free download. Support for our work has come from the Philanthropy Committee of Mitsubishi Electronic Research Labs ...
5/5 4,953 Jul 02, 2020
Trustees of Boston College <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Camera Mouse2_th.png"border="0">
Chainsaw v2.5.0
Chainsaw v2.5.0 Rapidly Search and Hunt through Windows Event Logs Chainsaw provides a powerful ‘first-response’ capability to quickly identify threats within Windows event logs. It offers a generic and fast method of searching through event logs for keywords, and by identifying threats using built-in detection logic and via support for Sigma detection rules. Features 🔍 Search and extract event log records by event IDs, string matching, and regex patterns 🎯 Hunt for threats using Sigma detection rules and custom built-in detection logic ⚡ Lightning fast, written in rust, wrapping the EVTX parser library by @OBenamram 🔥 Document tagging (detection logic matching) provided by the TAU Engine Library 📑 Output in an ASCII table format, CSV format, or JSON format Hunting Logic Sigma Rule Matching Using the --rules and --mapping parameters you can specify a directory containing a subset of SIGMA detection rules (or just the entire SIGMA git repo) and chainsaw will automatically load, convert and run these rules against the provided event logs. The mapping file tells chainsaw what event IDs to run the detection rules against, and what fields are relevant. By default the following event IDs are supported: Built-In Logic Extraction and parsing of Windows Defender, F-Secure, Sophos, and Kaspersky AV alerts Detection of key event logs being cleared, or the event log service being stopped Users being created or added to sensitive user groups Brute-force of local user accounts RDP Logins You can specify the --lateral-all flag to chainsaw to also parse and extract additional 4624 logon types (network logons, service, batch etc.) relating to potential lateral movement that may be interesting for investigations. Getting Started You can use the pre-compiled versions of chainsaw ...
5/5 2,065 Mar 17, 2023
F-Secure Countercept <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Chainsaw5_th.png"border="0">
Creative Labs CT4750 Win 9x Driver
Creative Labs CT4750 Win 9x Driver. This is for the OEM version of the SB128 called the vibra. Drivers are for Win95/98 but may work with other versions of Windows.
0/5 8,538 Nov 28, 2008
Creative Labs
Creative labs Modem Blaster Di3635/5655 5651/3631
Creative labs Modem Blaster Di3635/5655 5651/3631 3635019x.exe Windows 95, Windows 98, Windows ME Supported Models DI3635-1/5655 Voice Modem Serial Wave Device DSI Modem Device Manager DSI D-F-V V.90 DI3635 Digicom D-F-V V.90 DI3635 DSI PCI Modem Enumerator Digicom Modem Serial Wave Device
1/5 8,700 Mar 24, 2010
Creative Labs
Dubbing AI v1.1.1
Dubbing AI v1.1.1 Free Real-Time AI Voice Changer What makes Dubbing stand out among other AI voice generators is the fact that as a real-time voice changer, it converts any voice into quality and cloned voices in less than 300 milliseconds. From gamers to live-streamers and content creators. Everybody can generate realistic-sounding voiceovers across different ages, languages, and accents using Dubbing AI. Its easy-to-use interface, low-usage, and high-end features make it a must-have tool for someone who wants to own a good voice when communicating online. Convert into Anyone in Real-Time, and it's FREE. Leveraging advanced AI algorithms and deep learning. The realistic real-time voice changer catches the precise tone and picks up even the smallest expression in the human voice and converts it into any voice you wish. Dubbing creates life-like synthetic voices that mimic the tonalities and prosodies of human voices. Dubbing AI is the perfect tool for gamers and streamers looking to enhance their game experience and content quality. When compared to similar AI voice changers such as Voicemod, MorphVox, and Voice.ai, Dubbing provides more iconic character voices that allow gamers to explore their voice avatar as they immerse in the game. With over 1000 tones of voice free to use, and updates on a weekly basis. Dubbing AI allows you to explore voices from the latest trending game and anime characters to famous celebrities. Most importantly, Dubbing AI is FREE. Low-Latency and Usage. Dubbing AI’s cutting-edge algorithm supports Dubbing to do all these amazing features in extremely low usage, Dubbing only runs in your CPU and only uses 2-3%, while compared to RVC which runs around 25-50% of your CPU and 15% of your GPU. Dubbing also minimized memory storage to around 300M. We want to ensure that Dubbing AI will not be a burden while you play your favorite game ...
5/5 690 Dec 08, 2023
HALO INTERACTIVE PTE. LTD. <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/DubbingAI1_th.png"border="0">
FMSLogo v8.3.0
FMSLogo v8.3.0 A programming environment based on Logo for kids 6 years of age and up. FMSLogo is a free implementation of a computing environment called Logo, which is an interactive programming language that is simple, powerful, and best of all fun. FMSLogo includes support for: "Standard" Logo parsing Turtle Graphics Exception handling TCP/IP networking Text in all available system fonts Multiple independent turtles Bitmapped turtles MIDI devices Direct I/O for controlling external hardware (must be admin) Serial and parallel port communications Saving and loading images in BMP format Calling into native DLLs Creating windows dialog boxes Event driven programming (mouse, keyboard, timer) Controlling multimedia devices (WAV sound files, CD-ROM control, etc.) 3D Perspective drawing (wire-frame and solids) Creating animated GIFs Why FMSLogo? FMSLogo has a simple GUI that encourages learning. FMSLogo provides support for exploring diverse disciplines, including mathematics, engineering, art, music, and robotics. FMSLogo runs fine on computers that are 10 years old. FMSLogo has a strong, international user community with over a decade of classroom experience. Because of this, FMSLogo is ideal for elementary school computer labs. To get started, visit the Logo Workshop and watch the video below. Your browser does not support the video tag. Changes v8.3.0 2022-01-17 Reduce the size of the back buffer that is used to remove flicker when using rotating bitmapped turtles. This reduces memory usage. Implement feature request #131; MACHINE output now ...
5/5 2,725 Feb 03, 2022
David Costanzo <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/FMSLogo3_th.png"border="0">
ISO IPFire v2.27 core172
IPFire v2.27 core172 The Open Source Firewall Secure your network with IPFire IPFire is a hardened, versatile, state-of-the-art Open Source firewall based on Linux. Its ease of use, high performance in any scenario and extensibility make it usable for everyone. Security Security is the highest priority in IPFire. It is hardened to protect itself from attacks from the Internet and prevents attacks on your network. Firewall Its powerful firewall engine and Intrusion Prevention System protects your network against attacks from the Internet and Denial-of-Service attacks. Open Source IPFire is free software and developed by an open community and trusted by hundreds of thousands of users from all around the world. Features Security The primary objective of IPFire is security. Its easy to configure firewall engine and Intrusion Prevention System stops any attackers from breaking into your network. In the default configuration, the network is split into various zones with different security policies such as a LAN and DMZ to manage risks inside the network and have custom configuration for the specific needs of each segment of the network. But even the firewall needs to protect itself. IPFire is built from scratch and not based on any other distribution. This allows the developers to harden IPFire better than any other server operating system and build all components specifically for use as a firewall. Frequent updates keep IPFire strong against security vulnerabilities and new attack vectors. Firewall IPFire employs a Stateful Packet Inspection (SPI) firewall, which is built on top of Netfilter, the Linux packet filtering framework. It filters packets fast and achieves throughputs of up to multiple tens of Gigabit per second. Its intuitive web user interface allows to create groups of hosts and networks which can be used to keep large set of rules short and tidy - something very important in complex environments with strict access control. Logging and graphical reports give great insight. Various ...
5/5 1,490 Feb 10, 2023
Lightning Wire Labs GmbH <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/IPFire1_th.png"border="0">
Kaspersky Password Manager 8.0.5.485
Kaspersky Password Manager 8.0.5.485 It’s unwise to use the same password for multiple accounts… but multiple passwords are difficult to remember. Kaspersky Password Manager securely stores all your passwords, addresses &amp; credit card details – and synchronizes them across your PC, Mac, Android phone &amp; tablet, iPhone &amp; iPad… so you only need to remember one master password – to access all your individual passwords &amp; data.
5/5 4,834 Sep 29, 2017
Kaspersky Labs <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/Kaspersky Password Manager1_th.png"border="0">
Kaspersky PC Cleaner 1.0.1.150
Kaspersky PC Cleaner 1.0.1.150 Make your PC run smoothly &amp; effectively, by cleaning it from junk files &amp; temporary items - and tune up your digital privacy.
5/5 4,979 Sep 29, 2017
Kaspersky Labs <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/Kaspersky PC Cleaner_th.png"border="0">
Kaspersky Products Remover v1.0.4000
Kaspersky Products Remover v1.0.4000 Removes any Kaspersky product completely. If an error occurs when uninstalling a Kaspersky Lab product with Windows (Control Panel --> Programs and Features), then download and launch the free tool KAVremover. In order to fully remove the product, perform the following actions: 1: Download Kavremover. 2: Boot your computer in Safe Mode. 3: Run Kavremover. 4: Restart your computer after the utility completes. This utility deletes all activation data. Click here to Protect Children in Ukraine
5/5 6,612 Oct 23, 2023
Kaspersky Lab <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/kasperskyproductremover_th.png"border="0">
ZIP KIT Scenarist v0.7.2
KIT Scenarist v0.7.2 Simple and powerful application for CREATING SCREENPLAYS KIT Scenarist is a program for creating screenplays which oriented at international standards in the field of film production. The program is a full-featured studio for creating stories from the birth of the idea and before the transfer of the script to production. 10000 Authors More than 10000 screenwriters already use KIT Scenarist in daily work 70 Releases Issued more than 70 versions of the program. Updates come out every month. 5 Platforms There are versions for Windows, Mac OS X, Linux, iOS, and Android. Research Project materials are always at hand Research module of the program is designed so that you can collect all the necessary materials for the project in one place. In it, you can save basic information about the script, such as its name, logline, synopsis, and also fill in the title page of the script. Here you can manage lists of characters and locations. Create new ones, add descriptions, photos, rename and organize them. And, in this section you can store a variety of materials (text documents, images, links to web pages and mind maps) associated with your project, organizing them in a convenient manner. Cards Build an ideal story structure Corkboard The card module allows you to look at the script in the form of cards spread out on the board, thus providing a visual way to work with the structure. You can arrange the cards on the board in rows, or in columns. You can color them, make notes, group and lay out the acts, and all changes will instantly appear in the text of the script and vice versa. And if you are tired of sitting at the computer, you can print out the cards and work with the analog version of your story. Screenplay Make art and don't worry about formalities The script editor will allow you to think only about the ...
5/5 2,808 Oct 21, 2020
DimkaNovikov labs <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/KITScenarist2_th.png"border="0">
McAfee Rootkit Remover 0.8.9.209
McAfee Rootkit Remover 0.8.9.209 McAfee Rootkit Remover is a stand-alone utility used to detect and remove complex rootkits and associated malware. Currently it can detect and remove ZeroAccess, Necurs and TDSS family of rootkits. McAfee Labs plans to add coverage for more rootkit families in future versions of the tool. How do you use RootkitRemover? Download the latest version of RootkitRemover When prompted, choose to save the file to a convenient location on your hard disk, such as your Desktop folder. When the download is complete, navigate to the folder that contains the downloaded RootkitRemover file, and run it. It is best to run the tool in Administrator mode. The tool then runs a window which shows the status of the process. The various stages are: Initializing Scanning Cleaning When the process is completed, it prompts the user to press any key to exit the tool. It is recommended to reboot the system and perform a full scan with the McAfee VirusScan to remove remnants of the infection that might still be left on the system. Frequently Asked Questions Q: What is the need for the RootkitRemover tool? A: RootkitRemover is not a substitute for a full anti-virus scanner. It is designed to detect and remove specific rootkit infections. Q: How to use the RootkitRemover tool? A: The tool can be run by either double clicking it or through the command-line. It is advisable to run a full system scan using McAfee VirusScan after removing any infection with the tool. Q: How do I save the scan results to a log file? A: The tool is designed to automatically save the report in the same folder as the tool is placed. Q: Why do I need to rescan with McAfee VirusScan? Would I need ...
5/5 5,932 Nov 13, 2019
McAfee Labs <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/RR1_th.png"border="0">
MegaMek v0.49.18
MegaMek v0.49.18 A networked Java clone of BattleTech, a turn-based sci-fi boardgame for 2+ players. Fight using giant robots, tanks, and/or infantry on a hex-based map. The MegaMek organization maintains a series of programs that try to implement the published rules for the tabletop BattleTech game published by Catalyst Game Labs as faithfully as is practical. These programs are designed with the idea of being accessible, both in portability across various operating systems and across various hardware configurations. All programs are open source and distributed under the GPL. The MegaMek suite of programs allow you to play out tactical turn-based battles and military campaigns in the BattleTech Universe, with tanks, infantry, battle armor, aerospace fighters, WarShips, and most importantly, the mighty BattleMech™ -- king of the battlefield. The programs provide a modern, computerized version of the BattleTech tabletop game, as well as a variety of features for running campaigns and customizing units. Features -Network/hotseat play for two or more players, including a somewhat cunning AI opponent. -Choice of ground, atmosphere, or space combat, along with atmospheric battles on ground maps. -Hundreds* of official and unofficial options for deep customization. -Map board editing with hundreds of official and custom maps. -Over 6000 official units! -Campaign creation and management for out of combat actions, including repairs, force organization, personnel management, and so much more! -Integrated interstellar map with up-to-date data for multiple time periods. -Can create custom units for most unit types. MegaMek Play out BattleTech games online against human opponents, or against the built-in AI. MegaMek is packed full of customizable options that allow you to play the game your way. MekHQ Generate your ...
5/5 1,349 Mar 04, 2024
MegaMek <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/MegaMek_th.png"border="0">
RapidTyping v5.4
RapidTyping v5.4 A free, convenient and easy-to-use keyboard trainer that will help you improve your typing speed and reduce typos. With its lessons organized for various student level, RapidTyping will teach you touch typing or enhance existing skills. Features: • Typing tutor • Touch typing • Virtual keyboard • Moving hands • Lesson editor • Progress tracking • Export of training outcomes • Classroom use • Multi-language interface • Correct position of the hands and body This download is for the 64bit portable version. If you need the 32bit portable version, download here. If you need the 64bit installer version, download here. If you need the 32bit installer version, download here. Click here to visit the author's website.
5/5 3,579 May 23, 2023
Typing Tutor Labs <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/RapidTyping1_th.png"border="0">
RunPE Detector v2.0
RunPE Detector v2.0 Phrozen RunPE Detector is a security program, especially designed to detect and defeat some suspicious processes using a generic method. We at Phrozen Software do things differently, more creatively. So, when we set ourselves the task of creating a novel way of detecting, disabling and removing RATs, we didn't want to take the route every other anti-virus company has done before us. Phrozen Software studied the behaviour of RATs and discovered that hackers virtually always use a technique called RunPE. This technique spawns a legitimate process – often the default browser or a Microsoft system process – and replace it with a malicious program code directly in memory. Your computer is thus tricked and treats the malicious code as a legitimate process. The user and his anti-virus program have no idea that his default browser is effectively turned into a virus. RunPE is a technique that is used in several malicious ways. The two most common are : [1] FWB (Firewall Bypass): As its name suggests, this technique is implemented to bypass or disable the Application Firewall or the Firewall rules. Since most malware needs to connect to a remote Command-and-Control (C&amp;C) Server, it needs to connect to the Internet via the Firewall. Since most users are connected to the Internet at home, normally the installed Firewall would prevent the malware from connecting to the Internet. Using the RunPE technique to hijack a legitimate process that is authorized to reach Internet, any malware could subsequently connect to the C&amp;C without being detected by the Firewall. [2] Malware Packer or Crypter: Generally script kiddies – immature hackers - use a well-known type of malware that is already detected by most anti-virus programs. They then try the obfuscate this malware to evade ...
5/5 5,832 Nov 15, 2019
PHROZEN SAS <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/RunPE Detector1_th.png"border="0">
Sound Blaster Vibra 16s, 16c, 16x (also ct2890) Driver
Sound Blaster Vibra 16s, 16c, 16x (also ct2890) driver for Windows 8x.
0/5 8,644 Nov 28, 2008
Creative Labs
Soundblaster Pro CT1330A DOS/Win95 Driver
Soundblaster Pro CT1330A DOS/Win95 Driver. Only drivers ever released for the CT1330A. May work with other versions of Windows.
0/5 8,401 Nov 28, 2008
Creative Labs
Sugar on a Stick v0.118
Sugar on a Stick v0.118 A Fedora® Spin operating system to create a live (bootable) flash drive featuring the award-winning Sugar Learning Platform for kids. What is Sugar? Sugar is a learning platform that reinvents how computers are used for education. Collaboration, reflection, and discovery are integrated directly into the user interface. Sugar promotes "studio thinking" and "reflective practice". Through Sugar's clarity of design, children and teachers have the opportunity to use computers on their own terms. Students can reshape, reinvent, and reapply both software and content into powerful learning activities. Sugar's focus on sharing, criticism, and exploration is grounded in the culture of free software (FLOSS). About the Sugar pedagogy Information is about nouns; learning is about verbs. The Sugar interface, in its departure from the desktop metaphor for computing, is the first serious attempt to create a user interface that is based on both cognitive and social constructivism: learners should engage in authentic exploration and collaboration. It is based on three very simple principles about what makes us human: 1) everyone is a teacher and a learner; 2) humans by their nature are social beings; and 3) humans by their nature are expressive. These are the pillars of a user experience for learning. Sugar also considers two aphorisms: 1) you learn through doing, so if you want more learning you want more doing; and 2) love is a better master than duty—you want people to engage in things that are authentic to them, things that they love. About the Sugar Learning Platform The Sugar Learning Platform is an alternative to the ubiquitous computer desktop metaphor that has dominated computing since its invention at Xerox PARC (Palo Alto Research Center) in the 1970s. (Children are not office workers, nor does ...
0/5 1,628 Nov 10, 2023
Sugar Labs <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SugaronaStick5_th.png"border="0">
UNetbootin v7.02
UNetbootin v7.02 UNetbootin allows you to create bootable Live USB drives for Ubuntu and other Linux distributions without burning a CD. Features UNetbootin can create a bootable Live USB drive It loads distributions either by downloading a ISO (CD image) files for you, or by using an ISO file you've already downloaded. Using Unetbootin Select an ISO file or a distribution to download, select a target drive (USB Drive or Hard Disk), then reboot once done. If your USB drive doesn't show up, reformat it as FAT32. Using Unetbootin If you used the "USB Drive" install mode: After rebooting, boot from the USB drive. On PCs, this usually involves pressing a button such as Esc or F12 immediately after you turn on your computer, while on Macs, you should hold the Option key before OSX boots. If you used the "Hard Disk" install mode: After rebooting, select the UNetbootin entry from the Windows Boot Menu. Supported Distributions UNetbootin has built-in support for automatically downloading and loading the following distributions, though installing other distributions is also supported: Ubuntu Kubuntu Xubuntu Lubuntu Debian openSUSE Arch Linux Damn Small Linux SliTaz Linux Mint Zenwalk Slax Elive CentOS FreeBSD NetBSD 3CX Fedora PCLinuxOS Sabayon Linux Gentoo MEPIS LinuxConsole Frugalware Linux xPUD Puppy Linux UNetbootin can also be used to load various system utilities, including: Parted Magic SystemRescueCD Super ...
5/5 6,379 Feb 08, 2021
UNetbootin <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/UNetbootin1_th.png"border="0">
Universal USB Installer v2.0.2.0
Universal USB Installer v2.0.2.0 A live Linux bootable USB creator that allows you to choose from a selection of Linux distributions to put on your USB flash drive and boot live or install. Universal USB Installer (Imager) aka UUI is a Live Linux Bootable USB Creator Software. This ISO to USB imaging tool allows users to easily Boot from USB. Make a flash drive boot from a Live Linux distribution, Windows Installer, or fully Install and Run Windows 10 or 11 from USB using Windows to Go methods. Popular Antivirus Scanners, Disk Cloning software or other System tools can also easily be made to run from the removable media. The software is as easy as 1,2,3 to use. Simply choose your distribution from the list, browse to the ISO file, select your target flash drive, and then click Create. Once finished, you should have a ready to run Live USB containing the Live Operating System, Windows Installer, or System Diagnostics utility you previously selected. Unlike tools which simply use the DD (Copy and Convert) command to directly burn an ISO to a USB flash drive, UUI includes several other methods that natively allow you to continue using your removable device for storage purposes, whilst including a “Try via DD” option. The DD method of copying, also known as Data Destroyer works by overwriting the entire file system, making the device appear as a CD/DVD which is limited to the size of the ISO file. However, it may be possible to recover lost drive space and then create an exFAT partition for continued storage purposes. Another key feature of UUI is the use of persistent storage, where available. This persistence feature allows you to save some changes and then restore them on subsequent boots. Ubuntu based Casper persistence works with FAT32 or NTFS formatted drives. An option ...
5/5 10,350 Oct 22, 2023
Pen Drive Linux <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Universal-USB-Installer_th.png"border="0">
Vibra 16c Sound Card with Radio (CT 2505 - TDQ2) Driver
Vibra 16c Sound Card with Radio Driver. (CT 2505 - TDQ2) For Windows 95/98/NT
1/5 9,146 Nov 28, 2008
Creative Labs
WinSetupFromUSB v1.8
WinSetupFromUSB v1.8 WinSetupFromUSB is a Windows program, which prepares multiboot USB flash or fixed disk to install any Windows versions since 2000/XP, boot various Linux and *BSD flavors, as well as many Windows, Linux, DOS based and other utilities. Since version 1.1 program can create USB disk with Windows versions which support (U)EFI (Vista x64 SP1 and later x64 versions), which USB disk can be used in both (U)EFI and Legacy BIOS modes. The install Windows from USB project started as a challenge back in 2006 at the msfn.org forum. With the invaluable contribution of several forum members, it was the first method to have regular XP setup run from a USB disk, just like if started from a CD media. WinSetupFromUSB program was made later on to offer graphical interface, and program functionality was slowly extended to allow many other sources in a multiboot USB disk. What can be added to the USB disk using WinSetupFromUSB: Multiple sets of Windows setup files- XP, 2000, 2003, Vista, WIndows 7, Server 2008, Windows 8, Server 2012, both 32 and 64 bit versions are supported. As of version 1.1 program allows to create a USB disk which can boot both in BIOS and (U)EFI mode. Multiple WinPE2 (Vista and above) based sources from ISO files such as Windows Defender Offline, recent Norton Ghost versions and PE (preinstallation environment) based PC manufacturers recovery disks. Single WinPE1 source, such as BartPE, UBCD4Win, LiveXP and similar WinBuilder projects, WinFLPC etc. Multiple Linux-based distributions and utilities from ISO files- Debian, Ubuntu, Fedora, CentOS to name a few, this includes most Antivirus Rescue Disks Many other ISO images as long as they are compatible with grub4dos CD emulation, such as Ultimate Boot CD, most DOS ...
5/5 5,974 Mar 24, 2019
WinSetupFromUSB.com <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/WinSetupFromUSB1_th.png"border="0">
   
Showing rows 1 to 32 of 32 Showing Page 1 of 1  1 


OlderGeeks.com Copyright (c) 2024