Processed through Paypal
No account required.


Donate Bitcoin to this wallet:
1KkUMXvQ2ko3xcJkzitB7WYgoW6m79WFfm
Donate Ethereum to this wallet:
0x40E56922F43637224935CDC35e2c96E0392A8505
Donate Litecoin to this wallet:
LLYAFEyqjH69gkyCEpRjXNyedRCWrVChfL
​​Facebook​​Follow @GeekOnTheLoose


CLICK HERE TO SEARCH

 Home » OlderGeeks.com Freeware Downloads » Searching Files   
Search
Search Terms
Search Category Leave category selection blank to search within all categories.
Search Results
Files
  File Name Rating Downloads
Last Update/Developer
Phrozen ADS (Alternate Data Stream) Revealer 1.0.5642
Phrozen ADS (Alternate Data Stream) Revealer 1.0.5642 Phrozen ADS (Alternate Data Stream) Revealer is a Microsoft Windows program, especially designed to reveal possible malicious ADS files in your file system. Since the Alternate Data Stream functionality is only available for NTFS (New Technology File System), the program is able to scan and detect this kind of files only for this type of file system (Physical Hard Drive/Virtual Hard Drive/Physical Removable Device/Virtual Removable Device). If some ADS Files are detected during the scan you then can decide wether or not you want to keep them or to back them up. You can also have a content preview to detect in one glance if it looks legitemate or not. Phrozen ADS Revealer is the perfect tool to sanitize your NTFS file systems against bloated content or hidden malwares. Another great tool to put in your collection and 100% free. What are Alternate Data Stream Alternate data streams allow more than one data stream to be associated with a filename, using the format "filename:streamname" (e.g., "text.txt:extrastream"). NTFS Streams were introduced in Windows NT 3.1, to enable Services for Macintosh (SFM) to store resource forks. Although current versions of Windows Server no longer include SFM, third-party Apple Filing Protocol (AFP) products (such as GroupLogic's ExtremeZ-IP) still use this feature of the file system. Very small ADS (called Zone.Identifier) are added by Internet Explorer and recently by other browsers to mark files downloaded from external sites as possibly unsafe to run; the local shell would then require user confirmation before opening them.[21] When the user indicates that they no longer want this confirmation dialog, this ADS is deleted. Alternate streams are not listed in Windows Explorer, and their size is not included in the file's size. They are ignored when the file is copied or moved ...
5/5 712 Jan 16, 2016
PHROZEN SAS <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/adsrevealer1_th.png"border="0">
RunPE Detector 2.0
RunPE Detector 2.0 Phrozen RunPE Detector is a security program, especially designed to detect and defeat some suspicious processes using a generic method. We at Phrozen Software do things differently, more creatively. So, when we set ourselves the task of creating a novel way of detecting, disabling and removing RATs, we didn't want to take the route every other anti-virus company has done before us. Phrozen Software studied the behaviour of RATs and discovered that hackers virtually always use a technique called RunPE. This technique spawns a legitimate process – often the default browser or a Microsoft system process – and replace it with a malicious program code directly in memory. Your computer is thus tricked and treats the malicious code as a legitimate process. The user and his anti-virus program have no idea that his default browser is effectively turned into a virus. RunPE is a technique that is used in several malicious ways. The two most common are : [1] FWB (Firewall Bypass): As its name suggests, this technique is implemented to bypass or disable the Application Firewall or the Firewall rules. Since most malware needs to connect to a remote Command-and-Control (C&amp;C) Server, it needs to connect to the Internet via the Firewall. Since most users are connected to the Internet at home, normally the installed Firewall would prevent the malware from connecting to the Internet. Using the RunPE technique to hijack a legitimate process that is authorized to reach Internet, any malware could subsequently connect to the C&amp;C without being detected by the Firewall. [2] Malware Packer or Crypter: Generally script kiddies – immature hackers - use a well-known type of malware that is already detected by most anti-virus programs. They then try the obfuscate this malware to evade ...
5/5 748 Jun 22, 2017
PHROZEN SAS <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/RunPE Detector1_th.png"border="0">
Terminal Wings 2.0
Terminal Wings 2.0 Give wings to your insipid Windows Terminal. Have you ever been dreaming about having a marvelous Microsoft Windows Terminal, something that's at the same time beautiful, time saving and better to organize when you need to work on several terminals at the same time. Don’t search furthermore: Terminal Wings is the application you were searching for. Already in its very first version it's very complete and powerful. Imagine what power you could harness in the near future. How does it work? Contrary to other applications which simply try to replicate the same efficiency of the embedded Windows Terminal coded by Microsoft, our Terminal Wings is not such an emulator which “Hooks” the process of a real terminal to 'copy/paste' the screen buffer and display its contents to the custom application frame. It also doesn't create virtual pipes to redirect output/input buffers (stdout ; stdin ; stderror) to capture send and capture terminal commands. The reason we don’t use both above methods is due to the instability of such methods. When you execute regular commands it works pretty fine, but when it comes to use more complex console programs it become quite unstable (depending of the emulator you use). So , what is our solution? Very basically, we do not emulate the Windows Terminal at all, but we use the real one. We Patch the window and associated messages and embed it into our own frame. Well, this might sound very easy, but in effect it is quite complex to code if you want to make it appear very smoothly. Important Notice: At this moment in time, the application is only available for Microsoft Windows 10. Depending on the initial success of this program, we might be tempted to support other Windows versions too. Current Functions Available Multi Tabs : Organise your terminals using ...
5/5 40 Jan 28, 2017
Phrozen Software <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/Terminal Wings1_th.png"border="0">
Who Stalks My Cam V2.0
Who Stalks My Cam V2.0 It Is No Secret; You Are At The Mercy Of Hackers! Who does not fear about the possibility of being spied upon your Webcam without your knowledge? Have you thought of this frightening threat to your online security? Well, it is no longer a fear but a reality. It is no longer an imagination, or something you can assume. It is happening, and the most worrying thing is that it is very prevalent. Nowadays, hackers have managed to achieve great success in spying on innocent internet users by use different kinds of Malware.One of such malware is the infamous DarkComet RAT. DarkComet RAT is a Remote Access Trojan targeting Microsoft Windows Machines world wide. This dangerous malware opens huge remote possibilities to Hackers, such as Keystroke logging, Listening on your conversations on the Microphone, Recovering passwords, Watching your desktop using your webcam etc. A very huge amount of such Malware exists and represents millions of computers infected world wide. Other techniques exists to spy on you through the webcam, using malicious Website scripts, for example, using your Webcam device, tricking on you to allow Webcam to be broadcasted. At Phrozen Software™, we are aware of your concern about this cyber threat. Definitely, no one wants to be spied upon; No one wants to feel insecure while doing their online activities, and you are no exception. As you may already be aware, at Phrozen Software™ we design different security programs to provide you with the ultimate solution to the problem. Our software are designed differently, not like the regular Antivirus programs. We do not claim to replace an existing antivirus program; All we do is enhance them using generic techniques to avoid yet to be known viruses from impacting on your security until your antivirus is able to get ...
5/5 749 Mar 07, 2017
PHROZEN SAS <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/Who Stalks My Cam2_th.png"border="0">
   
Showing rows 1 to 4 of 4 Showing Page 1 of 1  1 

Search - Statistics & RSS - Contact Admin - -
PHCDownload 1.1.2 - Copyright (c) 2005 - 2018 - 0.0169 seconds


Tweets by @GeekOnTheLoose