Processed through Paypal
No account required.


Donate Bitcoin to this wallet:
1KkUMXvQ2ko3xcJkzitB7WYgoW6m79WFfm
Donate Ethereum to this wallet:
0x40E56922F43637224935CDC35e2c96E0392A8505
Donate Litecoin to this wallet:
LLYAFEyqjH69gkyCEpRjXNyedRCWrVChfL
​​Facebook​​Follow @GeekOnTheLoose


CLICK HERE TO SEARCH

 Home » OlderGeeks.com Freeware Downloads » Searching Files   
Search
Search Terms
Search Category Leave category selection blank to search within all categories.
Search Results
Files
  File Name Rating Downloads
Last Update/Developer
Kaspersky CapperKiller 1.0.12.0
Kaspersky CapperKiller 1.0.12.0 The CapperKiller utility is designed for treating the aftermaths of a Trojan-Banker.Win32.Capper infection. 1. Signs of infection The given piece of malware changes proxy settings in the following browsers (if installed on the host): Internet Explorer, Mozilla Firefox, Opera, Google Chrome (uses Internet Explorer settings). It adds a special URL to the Use automatic configuration script option in the Internet connection settings. A reboot may be required after the treatment. The CapperKiller utility performs the following: Detects and fixes proxy settings in all browsers. Detects and deletes malicious exec files.
5/5 915 Sep 29, 2017
Kaspersky Lab <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/CapperKiller_th.png"border="0">
Kaspersky FippKiller 1.0.2
There is a special utility for curing an active Worm.Win32.Fipp.a infection. Infection symptoms: Significantly increased RDP traffic (brute-force attack). Antivirus software performance degradation on many hosts in local network. Infected hosts attempt to access URLs like *.ppift.* How to disinfect an infected system: Download the FippKiller.exe file. Launch the FippKiller.exe file on the infected (or potentially infected) host. It is recommended not to reboot hosts after using the utility until the network has been successfully disinfected. Command line options to use with the utility: -p <path> - scan a particular host; -n – scan network volumes; -r - scan flash drives, and removable USB / FireWire hard disks; -y – close the window once the utility completes; -s – scan in silent mode (without displaying the console window); -l <file_name> - log file name; -v – create a detailed log file (should be used with -l); -m – system infection protection monitoring mode; -q – scan the system, activate monitoring mode once the scan completes.
5/5 3,803 Sep 29, 2017
Kaspersky
Kaspersky Free Antivirus 18.0.0.405
Kaspersky Free Antivirus 18.0.0.405 FREE AND FAST PROTECTION – FOR YOU AND YOUR PC Blocks dangerous files, sites &amp; more Blocks dangerous files, sites &amp; more Protects your personal information Protects your personal information Secures – without slowing you down Secures – without slowing you down Automatically blocks dangerous files, websites &amp; applications feature1 Our award-winning security automatically blocks dangerous downloads – and automatically warns you about malicious websites. Helps you keep your personal information… safe &amp; sound Every time you open an email or visit a website… we help keep you safe. All your emails are scanned… and phishing websites – that could try to steal your money or identity – are automatically blocked. Delivers rapid protection that fits in with your busy life feature3 Our security is designed to protect you – without getting in your way. With real-time data being fed directly from the cloud, your PC’s protected from the most common threats. For all devices: Internet connection required – for product activation, updates and access to some features Windows®-based desktops &amp; laptops Processor: 1 GHz or higher Memory (RAM): 1 GB (32-bit) or 2 GB (64-bit) 800 MB free space on the hard drive Microsoft® Internet Explorer® 81 or higher Microsoft .NET Framework 4 or higher Microsoft Windows 102 Home / Pro / Enterprise3 Microsoft Windows 8 &amp; 8.1 / Pro / Enterprise / ...
5/5 182 Sep 29, 2017
Kaspersky Labs <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/KasperskyFreeAntivirus2_th.png"border="0">
Kaspersky Password Manager 8.0.5.485
Kaspersky Password Manager 8.0.5.485 It’s unwise to use the same password for multiple accounts… but multiple passwords are difficult to remember. Kaspersky Password Manager securely stores all your passwords, addresses &amp; credit card details – and synchronizes them across your PC, Mac, Android phone &amp; tablet, iPhone &amp; iPad… so you only need to remember one master password – to access all your individual passwords &amp; data.
5/5 160 Sep 29, 2017
Kaspersky Labs <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/Kaspersky Password Manager1_th.png"border="0">
Kaspersky PC Cleaner 1.0.1.150
Kaspersky PC Cleaner 1.0.1.150 Make your PC run smoothly &amp; effectively, by cleaning it from junk files &amp; temporary items - and tune up your digital privacy.
5/5 197 Sep 29, 2017
Kaspersky Labs <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/Kaspersky PC Cleaner_th.png"border="0">
Kaspersky Products Remover 1.0.1266
Kaspersky Products Remover 1.0.1266 If an error occurs when uninstalling a Kaspersky Lab product with Windows (Control Panel --> Programs and Features), then download and launch the free tool KAVremover. In order to fully remove the product, perform the following actions: 1: Download Kavremover. 2: Boot your computer in Safe Mode. 3: Run Kavremover. 4: Restart your computer after the utility completes. This utility deletes all activation data. You will need to activate your product after reinstalling.
5/5 1,465 Oct 04, 2017
Kaspersky Lab <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/kasperskyproductremover_th.png"border="0">
Kaspersky RakhniDecryptor 1.14.0.0
Kaspersky RakhniDecryptor 1.14.0.0 RakhniDecryptor utility for removing Trojan-Ransom.Win32.Rakhni malicious software (.oshit and others) The malicious programs Trojan-Ransom.Win32.Rakhni, Trojan-Ransom.Win32.Agent.iih, Trojan-Ransom.Win32.Aura, Trojan-Ransom.Win32.Autoit, and Trojan-Ransom.AndroidOS.Pletor are used by malefactors to encrypt files so that their extensions are changed as follows: <filename>.<original_extension>.<locked> <filename>.<original_extension>.<kraken> <filename>.<original_extension>.<darkness> <filename>.<original_extension>.<nochance> <filename>.<original_extension>.<oshit> <filename>.<original_extension>.<oplata@qq_com> <filename>.<original_extension>.<relock@qq_com> <filename>.<original_extension>.<crypto> <filename>.<original_extension>.<helpdecrypt@ukr.net> <filename>.<original_extension>.<pizda@qq_com> <filename>.<original_extension>.<dyatel@qq_com> <filename>.<original_extension>_crypt <filename>.<original_extension>.<nalog@qq_com> <filename>.<original_extension>.<chifrator@qq_com> <filename>.<original_extension>.<gruzin@qq_com> <filename>.<original_extension>.<troyancoder@qq_com> <filename>.<original_extension>.<encrypted> <filename>.<original_extension>.<cry> <filename>.<original_extension>.<AES256> <filename>.<original_extension>.<enc> <filename>.<original_extension>.<coderksu@gmail_com_id371> <filename>.<original_extension>.<coderksu@gmail_com_id372> <filename>.<original_extension>.<coderksu@gmail_com_id374> <filename>.<original_extension>.<coderksu@gmail_com_id375> <filename>.<original_extension>.<coderksu@gmail_com_id376> <filename>.<original_extension>.<coderksu@gmail_com_id392> <filename>.<original_extension>.<coderksu@gmail_com_id357> <filename>.<original_extension>.<coderksu@gmail_com_id356> <filename>.<original_extension>.<coderksu@gmail_com_id358> <filename>.<original_extension>.<coderksu@gmail_com_id359> <filename>.<original_extension>.<coderksu@gmail_com_id360> <filename>.<original_extension>.<coderksu@gmail_com_id20> <filename>.crypt@india.com.random_characters> <filename>.<original_extension>.<hb15> For example: Before: file.doc / After: file.doc.locked Before: 1.doc / After: 1.dochb15 To regain control over the files encrypted by Trojan-Ransom.Win32.Rakhni, Trojan-Ransom.Win32.Aura, Trojan-Ransom.Win32.Agent.iih, Trojan-Ransom.Win32.Autoit, and Trojan-Ransom.AndroidOS.Pletor, use the RakhniDecryptor utility developed by Kaspersky Lab specialists. 1. How to work with the utility IMPORTANT: Trojan-Ransom.Win32.Rakhni creates the exit.hhr.oshit file that contains an encrypted password to user's files. If this file remains on the computer, it will make decryption with the RakhniDecryptor utility faster. If the file has been removed, it can be recovered with file recovery utilities. After the file is recovered, put it into %APPDATA% and run the scan with the utility once again. The exit.hhr.oshit file has the following path: Windows XP: C:\Documents and Settings\<username>\Application Data Windows 7/8: C:\Users\<username>\AppData\Roaming To decrypt ...
5/5 3,840 Sep 29, 2017
Kaspersky Lab <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/RakhniDecryptor_th.png"border="0">
Kaspersky RannohDecryptor 1.8.0.0
Kaspersky RannohDecryptor 1.8.0.0 If the system is infected by a malicious program of the family Trojan-Ransom.Win32.Rannoh , Trojan-Ransom.Win32.AutoIt, Trojan-Ransom.Win32.Fury, or Trojan-Ransom.Win32.Cryakl, all files on the computer will be encrypted in the following way: In case of a Trojan-Ransom.Win32.Rannoh infection, file names and extensions will be changed according to the template locked-<original name>.<four random letters>. In case of a Trojan-Ransom.Win32.Cryakl infection, the tag {CRYPTENDBLACKDC} is added to the end of file names. In case of a Trojan-Ransom.Win32.AutoIt infection, extensions will be changed according to the template <original name>@<mail server>_.<random set of characters>. Example: ioblomov@india.com_RZWDTDIC. To decrypt files affected by Trojan-Ransom.Win32.Rannoh, Trojan-Ransom.Win32.AutoIt, Trojan-Ransom.Win32.Fury, Trojan-Ransom.Win32.Crybola or Trojan-Ransom.Win32.Cryakl, use the RannohDecryptor utility.
5/5 1,339 Sep 29, 2017
Kaspersky Lab <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/RannohDecryptor_th.png"border="0">
Kaspersky RectorDecryptor 2.6.35.0
Kaspersky RectorDecryptor 2.6.35.0 Cybercriminals use Trojan-Ransom.Win32.Rector for disrupting normal performance of computers and for unauthorized modification of data making it unusable. Once the data has been “taken hostage” (blocked), its owner (user) receives a ransom demand. The victim is supposed to deliver the ransom in exchange for pirate's promise to send a utility that would restore the data or repair the PC. Kaspersky Lab specialists have developed a special utility for decrypting the data encrypted by Trojan-Ransom.Win32.Rector. The utility has a GUI. Do the following to decrypt files encrypted by Trojan-Ransom.Win32.Rector: Download the utility RectorDecryptor.zip to an infected computer; Extract its content using an archiver (WinZip, e.g.); Run the file RectorDecryptor.exe; The utility starts working by clicking the button Start scan. It finds and decrypts encrypted files. Select the option Delete crypted files after decryption to delete copies of encrypted files with extensions .vscrypt, .infected, .bloc, .korrektor, etc. after successful decryption.
5/5 3,862 Sep 29, 2017
Kaspersky Lab <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/rectordecryptor_th.png.png"border="0">
Kaspersky Rescue Disk 11-24-17
Kaspersky Rescue Disk 11-24-17 Boot from the Kaspersky Rescue Disk to scan and remove threats from an infected computer without the risk of infecting other files or computers. If your computer is infected with the ransom malware, then use a special Kaspersky WindowsUnlocker utility. Ransom malware blocks access to data so that the user can no longer use it and prevents the computer from running correctly. Once the data has been blocked or encrypted, the user will receive a ransom demand. In order to disinfect the registry using Kaspersky WindowsUnlocker, perform the following actions: If you booted Kaspersky Rescue Disk in the graphic mode, click the button К ; in the bottom right corner of the screen and in the menu select Terminal. In the command prompt enter the command windowsunlocker and press Enter on the keyboard. Burn this ISO image to a CD, insert it into the infected system's CD-ROM drive, enter the PC's BIOS, set it to boot from the CD and reboot the computer. This lists the Gentoo-specific options, along with a few options that are built-in to the kernel, but that have been proven very useful to our users. Also, all options that start with "do" have a "no" inverse, that does the opposite. For example, "doscsi" enables SCSI support in the initial ramdisk boot, while "noscsi" disables it. Easily remove malicious objects from your computer without the risk of getting infected.
5/5 4,190 Nov 24, 2017
Kaspersky <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/kasperskyrescuedisk45_th.png"border="0">
Kaspersky ScatterDecryptor 1.0.0.0
Kaspersky ScatterDecryptor 1.0.0.0 If your computer is infected with Trojan-Ransom.BAT.Scatter, use the ScatterDecryptor utility for restoring encrypted files. Trojan-Ransom.BAT.Scatter encrypts user files with a public key and changes their extensions. The files can only be decrypted with a unique secret key. ScatterDecryptor restores the files only if the utility contains a certain Trojan-Ransom.BAT.Scatter modification's secret key.
5/5 2,464 Sep 29, 2017
Kaspersky Labs International Ltd.
Kaspersky ScraperDecryptor 1.0.0.0
Kaspersky ScraperDecryptor 1.0.0.0 The malicious program Trojan-Ransom.Win32.Scraper encrypts user files to block access to them. After the data has been blocked, the user is required to pay a ransom. To decrypt files affected by Trojan-Ransom.Win32.Scraper, use the ScraperDecryptor utility developed by Kaspersky Lab engineers.
5/5 1,547 Sep 29, 2017
Kaspersky Lab
Kaspersky TDSSKiller 3.1.0.16
Kaspersky TDSSKiller 3.1.0.16 A rootkit is a program or a program kit that hides the presence of malware in the system. A rootkit for Windows systems is a program that penetrates into the system and intercepts the system functions (Windows API). It can effectively hide its presence by intercepting and modifying low-level API functions. Moreover it can hide the presence of particular processes, folders, files and registry keys. Some rootkits install its own drivers and services in the system (they also remain “invisible”). Kaspersky Lab has developed the TDSSKiller utility that allows removing rootkits. The utility supports 32-bit and 64-bit operation systems. The utility can be run in Normal Mode and Safe Mode. List of malicious programs the utility fights The TDSSKiller utility fights malware family Rootkit.Win32.TDSS, bootkits and rootkits: Backdoor.Win32.Phanta.a,b Backdoor.Win32.Sinowal.knf,kmy Backdoor.Win32.Trup.a,b Rootkit.Boot.Aeon.a Rootkit.Boot.Adrasteia.a Rootkit.Boot.Backboot.a Rootkit.Boot.Backboot.c Rootkit.Boot.Batan.a Rootkit.Boot.Bootkor.a Rootkit.Boot.Clones.a Rootkit.Boot.CPD.a,b Rootkit.Boot.Fisp.a Rootkit.Boot.Geth.a Rootkit.Boot.Goodkit.a Rootkit.Boot.Harbinger.a Rootkit.Boot.Krogan.a Rootkit.Boot.Lapka.a Rootkit.Boot.Mebusta.a Rootkit.Boot.MyBios.b Rootkit.Boot.Nimnul.a Rootkit.Boot.Nix.a Rootkit.Boot.Pihar.a,b,c Rootkit.Boot.Plite.a Rootkit.Boot.Prothean.a Rootkit.Boot.Qvod.a Rootkit.Boot.Sawlam.a Rootkit.Boot.Smitnyl.a Rootkit.Boot.SST.a,b Rootkit.Boot.SST.b Rootkit.Boot.Wistler.a Rootkit.Boot.Xpaj.a Rootkit.Boot.Yurn.a Rootkit.Win32.PMax.gen Rootkit.Win32.Stoned.d Rootkit.Win32.TDSS Rootkit.Win32.TDSS.mbr Rootkit.Win32.ZAccess.aml,c,e,f,g,h,i,j,k Trojan-Clicker.Win32.Wistler.a,b,c Trojan-Dropper.Boot.Niwa.a Trojan-Ransom.Boot.Mbro.d,e Trojan-Ransom.Boot.Mbro.f Trojan-Ransom.Boot.Siob.a Trojan-Spy.Win32.ZBot Virus.Win32.Cmoser.a ...
5/5 5,673 Jan 25, 2018
Kaspersky Lab <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/kasperskytdsskiller_th.png"border="0">
Kaspersky Virus Removal Tool 2018.01.14
Kaspersky Virus Removal Tool 2018.01.14 Kaspersky Virus Removal Tool is a utility designed to remove all types of threats from computers. Kaspersky Virus Removal Tool uses the effective detection algorithms realized in Kaspersky Anti-Virus and AVZ. Kaspersky Virus Removal Tool does not provide resident protection for your computer. After disinfecting a computer, you are supposed to remove the tool and install a full version of antivirus software. Advantages: Simplified interface. Can be installed to an infected computer (Safe Mode supported). Composite scan and disinfection system: signature detection and heuristic analyzer. Gathering system information and interactive creation of scripts for disinfection. General functions: Automatic and manual removal of virus, Trojans and worms. Automatic and manual removal of Spyware and Adware modules. Automatic and manual removal of all types of rootkits. Known issues: System memory scan is unavailable in x64 versions of Windows XP / Vista / 7 due to specific features of application system drivers. Impossible to rename application folder if User Account Control is enabled in Windows Vista settings and application Self-Defence disabled. Support rules for Kaspersky Virus Removal Tool: Technical support is provided only for users of Kaspersky Anti-Virus and Kaspersky Internet Security. If you are not a user of a Kaspersky Lab product, then in order to get technical support available for the tool, visit Kaspersky Lab The tool should be used for disinfection purpose under expert guidance via the service http://kaspersky-911.com. Unguided creation of scripts can result in a data loss or crippled computer. Having virus on your computer is always a risk of crippling it or losing data. Kaspersky Lab does not take any responsibility for the possible harm inflicted by virus during disinfection.
5/5 4,285 Jan 15, 2018
Kaspersky Lab <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/kvr2_th.png"border="0">
Kaspersky XoristDecryptor 2.3.45.0
Kaspersky XoristDecryptor 2.3.45.0 Malware of the family Trojan-Ransom.Win32.Xorist is designed for unauthorized modification of data on a victim computer. It makes computers uncontrollable or blocks its normal performance. After taking the data as a “hostage” (blocking it), a ransom is demanded from the user. The victim is supposed to deliver the ransom to the pirate, who is promising to send in return a program which would release the data or restore normal performance of the computer. There is a utility to confront malware of the family Trojan-Ransom.Win32.Xorist - XoristDecryptor.exe. The utility XoristDecryptor.exe is provided with a GUI. Disinfection of an infected system: Download the XoristDecryptor.zip to an infected computer. Extract the utility using an archiver program, WinZip for example. Run the XoristDecryptor.exe file. Click the Start scan button to execute the utility . The utility will prompt you to enter path of at least one encrypted file to begin the decryption process. The trojan program encrypts all files with the following extensions: doc, xls, docx, xlsx, db, mp3, waw, jpg, jpeg, txt, rtf, pdf, rar, zip, psd, msi, tif, wma, lnk, gif, bmp, ppt, pptx, docm, xlsm, pps, ppsx, ppd, tiff, eps, png, ace, djvu, xml, cdr, max, wmv, avi, wav, mp4, pdd, html, css, php, aac, ac3, amf, amr, mid, midi, mmf, mod, mp1, mpa, mpga, mpu, nrt, oga, ogg, pbf, ra, ram, raw, saf, val, wave, wow, wpk, 3g2, 3gp, 3gp2, 3mm, amx, avs, bik, bin, dir, divx, dvx, evo, flv, qtq, tch, rts, rum, rv, scn, srt, stx, svi, swf, trp, vdo, wm, wmd, wmmp, wmx, wvx, xvid, 3d, 3d4, 3df8, pbs, adi, ais, amu, arr, bmc, bmf, cag, cam, dng, ink, jif, jiff, jpc, jpf, jpw, mag, mic, mip, msp, nav, ncd, odc, odi, opf, qif, qtiq, srf, xwd, abw, act, adt, aim, ans, asc, ase, bdp, bdr, bib, boc, crd, diz, dot, dotm, dotx, dvi, ...
5/5 3,812 Sep 29, 2017
Kaspersky Lab <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/kasperskyxoristdecryptor_th.png"border="0">
RunPE Detector 2.0
RunPE Detector 2.0 Phrozen RunPE Detector is a security program, especially designed to detect and defeat some suspicious processes using a generic method. We at Phrozen Software do things differently, more creatively. So, when we set ourselves the task of creating a novel way of detecting, disabling and removing RATs, we didn't want to take the route every other anti-virus company has done before us. Phrozen Software studied the behaviour of RATs and discovered that hackers virtually always use a technique called RunPE. This technique spawns a legitimate process – often the default browser or a Microsoft system process – and replace it with a malicious program code directly in memory. Your computer is thus tricked and treats the malicious code as a legitimate process. The user and his anti-virus program have no idea that his default browser is effectively turned into a virus. RunPE is a technique that is used in several malicious ways. The two most common are : [1] FWB (Firewall Bypass): As its name suggests, this technique is implemented to bypass or disable the Application Firewall or the Firewall rules. Since most malware needs to connect to a remote Command-and-Control (C&amp;C) Server, it needs to connect to the Internet via the Firewall. Since most users are connected to the Internet at home, normally the installed Firewall would prevent the malware from connecting to the Internet. Using the RunPE technique to hijack a legitimate process that is authorized to reach Internet, any malware could subsequently connect to the C&amp;C without being detected by the Firewall. [2] Malware Packer or Crypter: Generally script kiddies – immature hackers - use a well-known type of malware that is already detected by most anti-virus programs. They then try the obfuscate this malware to evade ...
5/5 893 Jun 22, 2017
PHROZEN SAS <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/RunPE Detector1_th.png"border="0">
Tron 10.5.0
Tron 10.5.0 Tron is a glorified collection of batch files that automate the process of disinfecting and cleaning up Windows systems. It is built with heavy reliance on community input and updated regularly. Tron supports all versions of Windows from XP to 10 (server variants included). What is "Tron Script"? Tron is a script that "fights for the User". It's basically a glorified collection of Windows batch files that automate a bunch of scanning/disinfection/cleanup tools on a Windows system. I got tired of running the utilities manually and decided to just automate everything. I hope this helps other techs, admins, and users in general. Tron's goal is to take a badly-running Windows system (bloated, infected, etc) and automate ~85% of the work involved in disinfecting it, removing bloatware, and basically cleaning everything up to get it running well again. That's pretty much it. At this point it seems to accomplish that goal pretty well on most systems. The whole project is built with heavy reliance on community input and updated regularly. Stages of Tron: Prep: rkill, ProcessKiller, TDSSKiller, Stinger, registry backup, WMI repair, sysrestore clean, oldest VSS set purge, create pre-run System Restore point, SMART disk check, NTP time sync Tempclean: TempFileCleanup, CCLeaner, BleachBit, backup &amp; clear event logs, Windows Update cache cleanup, Internet Explorer cleanup, USB device cleanup De-bloat: remove OEM bloatware; customizable list is in esources\stage_2_de-bloat\oem\; Metro OEM debloat (Win8/8.1/2012 only) Disinfect: Kaspersky Virus Removal Tool, Sophos Virus Removal Tool, Malwarebytes Anti-Malware, DISM image check (Win8/2012 only) Repair: Registry permissions reset, Filesystem permissions reset, SFC /scannow, chkdsk (if necessary) Patch: Updates 7-Zip, Java, and Adobe Flash/Reader and disables nag/update screens (uses some of our PDQ packs); then installs any pending Windows updates Optimize: ...
5/5 219 Apr 05, 2018
vocatus <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/Tron Script1_th.png"border="0">
UNetbootin 6.57 for Mac
UNetbootin 6.57 for Mac UNetbootin allows you to create bootable Live USB drives for Ubuntu, Fedora, and other Linux distributions without burning a CD. It runs on Windows, Linux, and Mac OS X. You can either let UNetbootin download one of the many distributions supported out-of-the-box for you, or supply your own Linux .iso file. Features The current version has built-in support for automatically downloading and loading the following distributions, though installing other distributions are also supported: Ubuntu (and official derivatives) Debian Linux Mint openSUSE Arch Linux And many more If you used the "USB Drive" install mode: After rebooting, boot from the USB drive. Note that Live USB drives are bootable only on PCs (not on Macs). If you used the "Hard Disk" install mode: After rebooting, select the UNetbootin entry from the Windows Boot Menu. Supported Distributions Supported Distributions UNetbootin has built-in support for automatically downloading and loading the following distributions, though installing other distributions is also supported: Ubuntu Kubuntu Xubuntu Lubuntu Debian openSUSE Arch Linux Damn Small Linux SliTaz Linux Mint Zenwalk Slax Elive CentOS FreeBSD NetBSD Fedora PCLinuxOS Sabayon Linux Gentoo MEPIS LinuxConsole Frugalware Linux xPUD Puppy Linux UNetbootin can also be used to load various system utilities, including: Parted Magic ...
5/5 621 Nov 06, 2017
UNetbootin <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/UNetbootin1_th.png"border="0">
UNetbootin 6.57 for Windows
UNetbootin 6.57 for Windows UNetbootin allows you to create bootable Live USB drives for Ubuntu, Fedora, and other Linux distributions without burning a CD. It runs on Windows, Linux, and Mac OS X. You can either let UNetbootin download one of the many distributions supported out-of-the-box for you, or supply your own Linux .iso file. Features The current version has built-in support for automatically downloading and loading the following distributions, though installing other distributions are also supported: Ubuntu (and official derivatives) Debian Linux Mint openSUSE Arch Linux And many more If you used the "USB Drive" install mode: After rebooting, boot from the USB drive. Note that Live USB drives are bootable only on PCs (not on Macs). If you used the "Hard Disk" install mode: After rebooting, select the UNetbootin entry from the Windows Boot Menu. Supported Distributions Supported Distributions UNetbootin has built-in support for automatically downloading and loading the following distributions, though installing other distributions is also supported: Ubuntu Kubuntu Xubuntu Lubuntu Debian openSUSE Arch Linux Damn Small Linux SliTaz Linux Mint Zenwalk Slax Elive CentOS FreeBSD NetBSD Fedora PCLinuxOS Sabayon Linux Gentoo MEPIS LinuxConsole Frugalware Linux xPUD Puppy Linux UNetbootin can also be used to load various system utilities, including: Parted Magic ...
5/5 706 Nov 06, 2017
UNetbootin <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/UNetbootin1_th.png"border="0">
WinSetupFromUSB 1.8
WinSetupFromUSB 1.8 WinSetupFromUSB is a Windows program, which prepares multiboot USB flash or fixed disk to install any Windows versions since 2000/XP, boot various Linux and *BSD flavors, as well as many Windows, Linux, DOS based and other utilities. Since version 1.1 program can create USB disk with Windows versions which support (U)EFI (Vista x64 SP1 and later x64 versions), which USB disk can be used in both (U)EFI and Legacy BIOS modes. The install Windows from USB project started as a challenge back in 2006 at the msfn.org forum. With the invaluable contribution of several forum members, it was the first method to have regular XP setup run from a USB disk, just like if started from a CD media. WinSetupFromUSB program was made later on to offer graphical interface, and program functionality was slowly extended to allow many other sources in a multiboot USB disk. What can be added to the USB disk using WinSetupFromUSB: Multiple sets of Windows setup files- XP, 2000, 2003, Vista, WIndows 7, Server 2008, Windows 8, Server 2012, both 32 and 64 bit versions are supported. As of version 1.1 program allows to create a USB disk which can boot both in BIOS and (U)EFI mode. Multiple WinPE2 (Vista and above) based sources from ISO files such as Windows Defender Offline, recent Norton Ghost versions and PE (preinstallation environment) based PC manufacturers recovery disks. Single WinPE1 source, such as BartPE, UBCD4Win, LiveXP and similar WinBuilder projects, WinFLPC etc. Multiple Linux-based distributions and utilities from ISO files- Debian, Ubuntu, Fedora, CentOS to name a few, this includes most Antivirus Rescue Disks Many other ISO images as long as they are compatible with grub4dos CD emulation, such as Ultimate Boot CD, most DOS ...
5/5 179 Dec 12, 2017
WinSetupFromUSB.com <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/WinSetupFromUSB1_th.png"border="0">
   
Showing rows 1 to 20 of 20 Showing Page 1 of 1  1 

Search - Statistics & RSS - Contact Admin - -
PHCDownload 1.1.2 - Copyright (c) 2005 - 2018 - 0.0226 seconds


Tweets by @GeekOnTheLoose