Your download link is at the very bottom of the page... always.



Processed through Paypal
No account required.


Donate Bitcoin to this wallet:
1KkUMXvQ2ko3xcJkzitB7WYgoW6m79WFfm
Donate Ethereum to this wallet:
0x40E56922F43637224935CDC35e2c96E0392A8505
Donate Litecoin to this wallet:
LLYAFEyqjH69gkyCEpRjXNyedRCWrVChfL

Buy our over-priced crap to help keep things running.
Take No CrapwareOG Dad CapNo Password


Join our Facebook groupFollow us on TwitterFollow us on InstagramOur RSS FeedJoin us on TikTokJoin us on LinkedIn


 Home » OlderGeeks.com Freeware Downloads » Searching Files   
Search
Search Terms
Search Category Leave category selection blank to search within all categories.
Search Results
Files
  File Name Rating Downloads
Last Update/Developer
Pinned: Hiren’s BootCD PE x64 v1.0.8
Hiren’s BootCD PE x64 v1.0.8 Hiren’s BootCD PE (Preinstallation Environment) is a restored edition of Hiren’s BootCD based on Windows 11 PE x64. Hiren’s BootCD PE (Preinstallation Environment) is a restored edition of Hiren’s BootCD based on Windows 11 PE x64. Given the absence of official updates after November 2012, the PE version is currently under development by the fans of Hiren’s BootCD. It features a curated selection of the best free tools while being tailored for new-age computers, supporting UEFI booting and requiring a minimum of 4 GB RAM. Equipped with these invaluable tools, you can address various computer-related problems. Notably, it does not include any pirated software; instead, it exclusively contains free and legal software. If your computer does not support a regular Windows 11 installation, it will likely boot with the Windows 11 PE version, as Windows PE versions have significantly lower hardware requirements. For instance, if your computer boots with the Windows 10 PE version, it is highly probable that it will also boot with the Windows 11 PE version. Upon booting, the PE version attempts to install drivers for essential components such as graphics, sound, wireless and Ethernet cards for your hardware, facilitating connection to a WIFI or Ethernet network. If your WIFI or Ethernet card is not recognized by the PE version, kindly Contact Us with your hardware model. We will strive to incorporate the necessary drivers in upcoming releases. Hiren’s BootCD PE x64 (v1.0.7) - ISO Content BCD-MBR Tools • BootIce v1.3.3 • EasyBCD v2.3 Hard Disk Tools – Data Recovery • CheckDisk GUI v0.3.1 • Lazesoft Data Recovery v4.7 • Puran Data Recovery v1.2.1 • Puran File Recovery v1.2.1 • Recuva v1.53.2096 • DMDE v4.0.6 ...
5/5 20,513 Mar 18, 2024
hirensbootcd.org <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/HBCDPE1_th.png"border="0">
Pinned: Malwarebytes Anti-Malware v5.1.3.110
Malwarebytes Anti-Malware v5.1.3.110 Looking for free antivirus and malware removal? Scan and remove viruses and malware for free. Malwarebytes free antivirus includes multiple layers of malware-crushing tech. Our anti-malware finds and removes threats like viruses, ransomware, spyware, adware, and Trojans. This download begins as a 14 day trial of Malwarebytes Premium. After the trial you have the option to convert to the free version. Features • Multiple layers of malware-crushing tech, including virus protection. • Thorough malware, spyware, and virus removal. • Specialized ransomware protection. Secures your PC, files, and privacy 24/7 Real-Time Protection uses artificial intelligence and machine learning to keep you safe from online threats, even emerging threats that no one has ever seen before. Protects against online scammers Web Protection blocks online scams, infected sites, and malicious links. It also blocks phishing scams, which use fake sites to trick you into revealing private info like your bank details. Stops ransom Ransomware Protection uses proprietary tech to create a powerful defense against malware that locks down your PC and takes your files and photos hostage. Respects your space Scans now use 50 percent less CPU resources than before, and with Play Mode, you can even turn off notifications and updates while you game or watch movies. Makes your security simple Our all-new user interface makes it easier than ever to customize your protection. Schedule scans, adjust protection layers, and choose from three scan modes. Malwarebytes Katana Engine Our all-new detection engine finds more threats, in less time, with less performance impact than ever before. It also tells you more about threats it finds, like their type and behavior, so you can make smarter security decisions. For example, instead of seeing a generic threat name like “Malware123,” you'll see a name like “Spyware.PasswordStealer,” along with a link to information about that specific threat. Note: ...
5/5 21,603 Apr 22, 2024
Malwarebytes.com <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/malwarebytes1a_th.png"border="0">
ADATA SSD ToolBox v4.0.2
ADATA SSD ToolBox v4.0.2 ADATA SSD ToolBox provides multiple ways for users to obtain disk information, and change settings easily. Additionally, it can speed up your SSD and improve its lifespan. Applicable products: ADATA Solid State Drives series products Features Drive Info Get assigned drive information including capacity, used space on drive,drive temperature, drive health, and lifespan of drive. Diagnostics Two options: Quick Diagnostics, which will run basic tests on free space of the selected drive, and Full Diagnostics, whick runs a read test on all used space of the selected drive. Utilities SSD utilities include Security Erase, Firmware update, SSD Toolbox upgrade, and export log. System Optimization SSD Optimization provides TRIM service on free space of drive. OS Optimization provides simple settings SSD optimization. System Info Displays current system information. ADATA SSD Toolbox Manual Click here to visit the author's website.
5/5 3,285 Feb 24, 2021
ADATA Technology Co., Ltd. <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/adataSSDToolbox1_th.png"border="0">
Advanced Mobile Care for Android 3.3
Advanced Mobile Care for Android 3.3 Advanced Mobile Care is an all-in-one Android security and performance optimization app that performs real-time virus scans while also featuring a brand new Anti-theft, powerful Game Speeder, Battery Saver, App Manager, Task Killer, Privacy Locker, Privacy Advisor and Cloud Backup. With its sleek design and powerful features, Advanced Mobile Care gives Android users an excellent way to protect their smartphones from Android security and performance problems. With Advanced Mobile Care, your device will receive automated protection and system tune-ups like Malware Removal, Privacy Protection, and Operating System Cleaning in addition to an extensive toolbox of system utilities. Features: Mobile Anti-virus: One touch anti-virus scan can protect your device from viruses, malware, spyware, suspicious apps and provides real-time protection from virus attacks when downloading a new app or unknown file System Tuneup: One touch scan to clean memory, cache and junk files to boost your phone's operating speed Game Speeder: Launch games with Game Speeder to make games run smoothly and without lag or game-play disturbance. Battery Saver: Provides 3 battery saving modes to extend battery life as well as inform users about which apps consume the most battery power App Manager: App Manager includes batch delete APK files, move app to SD card, batch uninstall apps. It can sort all apps by name, size or use frequency to identify large or unnecessary apps for removal Task Killer: Quickly shut off memory intensive and battery hogging apps with one touch Privacy Locker: Hide, lock, and protect your private photos, videos and files with a password Privacy Advisor: Scans and displays all apps that access your personal information, such as personal data, contacts, locations, and SMS Cloud Backup &amp; Restore: Backup and restore all your contacts and call logs from your previous device to a new one Widget: Perform quick scans directly from your Android desktop. Quick check ...
0/5 10,043 Nov 01, 2013
Iobit
AdvancedRun v1.42
AdvancedRun v1.42 A simple tool for Windows that allows you to run a program with different settings that you choose, including - low or high priority, start directory, main window state (Minimized/Maximized), run the program with different user or permissions, Operating system compatibility settings, and environment variables. You can also save the desired settings into a configuration file and then run the program automatically from command-line with the desired settings. Examples of what you can do with AdvancedRun Run the RegEdit of Windows as normal user on Windows 10/8/7/Vista, without elevation. In this mode, you'll not be able to access or modify Registry keys that require admin rights. Run the RegEdit of Windows as SYSTEM user on Windows 10/8/7/Vista. In this mode, you'll be able to access the HKEY_LOCAL_MACHINE\SECURITY key. Run a program with a user of another running process. Run a program in high priority. Run a specific instance of program in Windows XP compatibility mode, without making global changes in the Registry. Run a specific instance of program with different PATH environment string, but without modifying the PATH string of the entire system and without using batch files or command prompt window. Run a program with a full set of environment variables you choose, ignoring the system environment variables completely. System Requirements This utility works on any version of Windows, starting from Windows XP and up to Windows 10. Both 32-bit and 64-bit systems are supported. Some of the features, like 'Run As SYSTEM User' and 'Run As user of selected process' are not supported on Windows XP. Versions History Version 1.42 When the 'Use search path to find the program location if the full path is ...
5/5 4,601 Oct 13, 2021
Nir Sofer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/advancedrun1_th.png"border="0">
All Bitdefender Uninstall Tools 2015-2022
All Bitdefender Uninstall Tools 2015-2022 This is a single zip file we put together that contains the Bitdefender removal tools for the following products: Bitdefender Antivirus Plus 2021/2022 Bitdefender Internet Security 2021/2022 Bitdefender Total Security 2021/2022 Bitdefender Antivirus Plus 2020 Bitdefender Internet Security 2020 Bitdefender Total Security 2020 Bitdefender Antivirus Plus 2019 Bitdefender Internet Security 2019 Bitdefender Total Security 2019 Bitdefender Antivirus Plus 2018 Bitdefender Internet Security 2018 Bitdefender Total Security 2018 Bitdefender Antivirus Plus 2017 Bitdefender Internet Security 2017 Bitdefender Total Security 2017 Bitdefender Antivirus Plus 2016 Bitdefender Internet Security 2016 Bitdefender Total Security 2016 Bitdefender Antivirus Plus 2015 Bitdefender Internet Security 2015 Bitdefender Total Security 2015 Bitdefender Endpoint Security Tools (Windows) v6.6.x+ Read this first Bitdefender Endpoint Security Tools (Windows) up to v6.4.x Endpoint Security by Bitdefender v5.x For the following older versions you need to contact Bitdefender support: Bitdefender Endpoint Client v4 and Bitdefender Client Security 3.5 suite • Bitdefender Business Client • Bitdefender Management Agent • Bitdefender Management Server(console) 3.5 • Bitdefender Security for File Servers 3.5 • Bitdefender Security for Mail Servers 3.5 • Bitdefender Security for Sharepoint 3.5 Click here to visit the author's website.
5/5 3,825 Jan 05, 2022
BitDefender Labs <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/BitDefenderUninstaller1_th.png"border="0">
Altap Salamander v4.0
Altap Salamander v4.0 Altap Salamander is a fast and reliable two-panel file manager for Windows. It has an intuitive interface, offers viewers for all popular file formats as well as support for common archives, and has built-in FTP and SFTP clients. Thanks to the merge Altap with Fine company now free of charge. This is for 64bit Windows only. Performance Altap Salamander is designed to be as fast as possible: quick navigation among directories, fast directories reading, fast and smooth painting of panels. Viewers Built-in viewers will instantly display content of most popular file formats. Text and binary files, bitmap images, or database files. Archivers Work with your files even if they are stored in archives. All major formats as ZIP, RAR, 7-Zip, or ISO/UDF image are supported. Connectivity Most popular network protocols such as FTP, FTPS, SCP, or SFTP are supported. Security and Privacy Full control over your recent history lists, seamlessly integrated Password Manager, or option to protect your sensitive files with strong encryption algorithms. Extensibility Open architecture allows to extend Altap Salamander with custom plugins or automate common tasks using scripts written in any language supported by the Windows Script Host such as JScript or VBScript. Much much more Altap Salamander has much more useful features built in, including File Comparator, Undelete plugin for deleted files recovery, or powerful Renamer plugin. Basic Operations Altap Salamander supports basic file manager operations such as Rename, View, Edit, Copy, Move, Delete, create file or directory, archive packing and extracting, or emailing files. Operations run on background from the start, there is option to process operations in queue, pause or resume operation. Advanced Operations Beyond basic operations, compare directories, change case of names, change attributes, date, and time, or convert files encoding or end of lines. Calculate physical space occupied by your files, show directory sizes in panel or show detailed drive information. Easily execute external command ...
5/5 3,867 Jul 02, 2020
ALTAP <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/altapsalamander1_th.png"border="0">
Alternate Password Generator v1.100
Alternate Password Generator v1.100 A program for password generation and checking them against a free customizable password dictionary and/or a brute-force method which also may be customized. This application is freeware and requires the .NET-framework 2.0 (already included in operation system since Windows Vista). IMPORTANT NOTE: This program cannot guarantee the security for any kind of password (which might not exist at all), it is intended as simulation. Changes in this version: - French translation updated MD5 value: ecbdbc1e47f335be56ace11f1c8d81b5 Supported operating systems: Windows 98, Me, 2000, XP, Server 2003, Vista, Server 2008, 7, 8, 8.1, 10 Languages included: English, German, French, Japanese, Greek Click here to visit the author's website.
5/5 2,963 Feb 16, 2021
Alternate Tools <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/AltPasswordGen2_th.png"border="0">
AskAdmin v1.9
AskAdmin v1.9 Free tool designed to restrict an Application a Folder or a File. Ideal for those who have small children or for a computer used in business. In a few seconds and in a simple way you can block any program installed on your computer such as Microsoft Store , Microsoft EDGE , Google Chrome , Build-in Apps (UWP) , Skype or Files like bat,cmd,reg data…etc , The program have a password to prevent blocked programs are easily unlocked by any user . AskAdmin is a Portable Application. How to use it There are two ways to create a block list: 1. The easiest way is to drag and drop Application/s, a Folder/s or a File/s you wish to block to the AskAdmin interface. If you wish, you can drag several applications on GUI at once. 2. Click the ‘Add File’ button (Plus icon) browse to the application you wish to block. How to block an Application a Folder or a File if an Application , Folder or File name is on the list , mean: it is Automotically blocked (Folder inhalt will be blocked not folder itself) , but on some cases you should use the “Restart” buton (Guarantee) , if you accidentally block any windows System file this can cause system crash therefore we have tried to prevent it,after that you can use the safe mode to unblock the file How to unblock an application , a Folder or a File You can unblock a single application/Folder/File, or you can simultaneously unblock all of them a) Untick an Application , a Folder or a File name b) Delete the Application , Folder or File name (Edit > Delete or Right click > Delete) If the block does not seem to be work, you may need to restart Windows Explorer. To do so, click the Options menu, then ...
5/5 4,022 Jan 02, 2023
Sordum.org <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Askadmin1_th.png"border="0">
Atelier Web IP Locator (AWIPLOC) v4.0
Atelier Web IP Locator (AWIPLOC) v4.0 Atelier Web IP Locator (AWIPLOC) is an invaluable network tool that everyone must keep handy in these days when knowing as much as possible about an internet connection can only help in every security or marketing related aspect. AWIPLOC allows you to access the World’s biggest IP geolocation database straight from your desktop or your windows website and know in instants where a certain IP address belongs. AWIPLOC is free for occasional private use, no time deadlines and no functionality limitation. You are automatically attributed a quota of 200 IP search credits that is automatically renewed periodically. This quota is enough for an occasional private use of the software. AWIPLOC includes a full featured freely distributable Automation Server that allows you to easily perform IP location searches from your website or from your own applications. It includes, as well, a freely distributable .Net engine with equivalent functionality. We have include samples for .ASP, ASP.Net, Visual Basic, VB .Net, Delphi and MFC C++, but you can use it from virtually any .Net or COM aware environment. IP Locator What’s New Release 4.0 Resolves both IPv4 and Ipv6 addresses to Country/City/region and ISP. Queries run much faster in the new optimized server, averaging 300 to 400 IP searches per second. Now, History is locally saved in a Sqlite database. This will allow customized data mining by power users.
5/5 5,590 Aug 13, 2019
AtelierWeb Software <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/IPLocator1_th.png"border="0">
Attack Surface Analyzer v2.3.299
Attack Surface Analyzer v2.3.299 A Microsoft developed open source security tool that analyzes the attack surface of a target system and reports on potential security vulnerabilities introduced during the installation of software or system misconfiguration. Attack Surface Analyzer 1.0 from Microsoft was released in 2012 and is no longer available. Attack Surface Analyzer 1.0 has been valuable to software developers and IT security personnel for years in helping detect key system changes that may occur from software installation. Attack Surface Analyzer 2 is a rewrite from the ground up on .NET Core and is an Open Source project managed by Microsoft. Scenarios 1) Attack Surface Analyzer can help identify potential security risks exposed through changes to services, user accounts, files, network ports, certificate stores, and the system registry. It also includes some support for “live” monitoring of certain system changes (i.e. file system and registry). 2) Another key use for the tool is in ensuring your software development process and products are following best practices for least privilege and reducing the attack surface for your customers by providing evidence, to your security and release teams, that your code does only what it claims. Maintaining customer trust is one reason why it is recommended from the Microsoft SDL Practices. Typical users of ASA: -DevOps Engineers - View changes to the system attack surface introduced when your software is installed. -IT Security Auditors - Evaluate risk presented when third-party software is installed. See How to Run Attack Surface Analyzer. System Requirements Operating System Support ASA is tested on Windows 11, Linux and MacOS systems. No installed pre-requisites or redistributables are required, beyond those of .NET Core. Additional OS compatibility for .NET Core is located here https://github.com/dotnet/core/blob/master/release-notes/3.1/3.1-supported-os.md. This download is for the Windows version. All other download assets are below: MacOS: ASA_macos_2.3.299.zip Linux: ASA_linux_2.3.299.zip NetCore: ASA_netcoreapp_2.3.299.zip Click here ...
5/5 4,439 Jul 11, 2023
Microsoft Corp. <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/AttackSurfaceAnalyzer1_th.png"border="0">
AVG Antivirus Free for Android
AVG Antivirus Free for Android AVG Antivirus for Smartphones &amp; Tablets automatically detects harmful Apps &amp; SMS AVG Mobilation is a free security solution that protects your phone from viruses, malware, spyware &amp; online exploitation in real-time. Features: Scan apps, settings, files, and media in real time Find/locate your lost or stolen phone via Google maps Lock and wipe your device to protect your privacy Kill tasks that slow your phone down Browse the web safely and securely AVG Antivirus Free – security software for Android™. Keep your device safe with just one click. A closer look at AVG Mobilation suite: AVG Mobilation protects you from threats to your security, privacy and online identity by focusing specifically on the mobile environment. With AVG’s free antivirus for Android you’ll receive effective, easy-to-use virus and malware protection, as well as a real-time scanner, phone locator, task killer, app locker and local device wipe. Real-time security scanner protection Keeps you protected no matter how you download your apps or games AntiVirus Free also: Protects against malicious apps from viruses, malware and spyware Identifies unsecure device settings and advises on how to fix them. Ensures contacts, bookmarks and text messages are secure and safe Checks media files for malicious software and security threats Protects you from phishing attacks Can be run daily, weekly, or on demand Anti-theft protection and Phone Location: Locate your lost or stolen mobile phone and get help with finding it via Google maps Turn your phone GPS on remotely and have the device send its location using GPS Lock your phone remotely via our Mobile Control Panel or by sending SMS to your phone to protect your data Set a lock screen message to help the locator find you Make your device ring even if your phone is on silent mode Safe Web Surfing: Stay safe and secure from phishing and malware while surfing the web! Task killer: Kill tasks that slow down or freeze up your device. App locker and mobile ...
0/5 9,961 Nov 02, 2013
AVG Mobilation
Batch Scripting Pack v1.0
Batch Scripting Pack v1.0 Collection of Open Source programs written in Batch Scripting Language Do you like to write scripts in Batch Scripting Language? If yes, then this project is dedicated to you. This pack contains source codes of utilities programmed in the Batch Programming Language which are now available for you so that you can improve and learn from them. v1.0 | Open Source | Supports all Windows Versions Batch Scripting Pack v1.0 contains the following programs: RAR Cracker This utility was coded by me to perform brute force attacks against the password protected RAR archives. The code is simple and easy to learn. This utility was never completed because of some limitations. This utility at this time can only crack numerical passwords. You can upgrade it to use a word list for finding right password. Drive Fixer Drive fixer was developed to check &amp; fix file system errors. It uses Windows built in utility "CheckDisk" to perform this task. It can be used to learn how to use Windows utilities in your program. Hiber Plus Hiber Plus was a small utility developed to enable and disable hibernation feature of Windows. It has only a few lines of code and will teach you how to use the Windows Command Prompt commands in the program. Holes Patcher A security utility developed to make the installed Windows OS more secure. Modifies Windows settings like services and features in such a way that the OS becomes difficult to hack. Its not the most complete project but, it works. I hope you can improve it. Processor Changer Processor Changer was a small tool I wrote just for fun with my college buddies. It can change the processor name, etc by some registry ...
5/5 5,212 Nov 15, 2019
Malik Usman Aura <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/batch-scripting-pack1_th.png"border="0">
Batch WORD to JPG Converter v1.1
Batch WORD to JPG Converter v1.1 Converting Word Doc/Docx files to JPG images is a good choice to make documents be transferred and read easily on the web. Batch Word to JPG Converter is such a great free software program that enables you to convert MS Word doc and docx files to JPG and more image formats on Windows. With this tool, you can save Word files into JPG, PNG, BMP, TIF, GIF, PCX and TGA pictures without installing MS Office and Word suite. You can add hundreds or thousands of Word files to convert at once. In addition to those image formats, Word to JPG converter also supports converting Word files to PDF format, so you can batch create PDF documents from Word files to transfer your documents on the internet with a much smaller file size than images. Besides *.Doc and *.Docx formats, Word to JPG converter also supports to convert rich text RTF formats, HTML and HTM web page formats, and Open Document Format (ODT) into various image formats. Word to JPG Converter also allows you to set the output image size. You can simply set the DPI value (such as 200, 300, 500) to get better output image size and quality. Easily convert, save and split Word pages into JPG and more picture formats. Download the Word to JPG converter now and start converting! OS: Windows 10/Win 8/Win 7/Vista/XP or later (32/64 bit) &amp; Windows Server Features and Benefits of Batch WORD to JPG Converter * Convert Word Doc/Docx Files to JPG Format in Bulk * Support DOC, DOCX, RTF, HTML/HTM and ODT(Open Document Format) to Images * Multiple Image Formats Output: JPG PNG BMP TIF GIF PCX TGA * Convert Documents to PDF format * MS Office and Word are not Required * Customize Converted Image Size and DPI * Split Word Pages to JPG * Multi-language Languages Supported: English, ...
5/5 3,515 Dec 08, 2019
PDFZilla <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/BatchWordJPGConv1_th.png"border="0">
BeeBEEP v5.8.4
BeeBEEP v5.8.4 A secure (encryption based on Rijndael Algorithm, AES) peer to peer office messenger. You can talk and send files with all your colleagues inside a local area network such of an office, home or internet cafe without a server. BeeBEEP works also with VPNs. This serverless application is indispensable in all those places where privacy and security an essential requirement. Features Easy to use (no server required) Secure peer to peer chat Groups File and Folder Transfer (with resume feature) Message history (all messages can be saved) Offline messages BeeBOX (a shared folder as DropBox but in your computer) BeeSHARE (share your file and folders like p2p software) Desktop sharing Voice messages This download is for the Windows version. If you need the MacOS version, download here. Click here to visit the author's website.
5/5 5,948 Oct 28, 2021
Marco Mastroddi <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/beebeep1_th.png"border="0">
Belarc Advisor v12.0
Belarc Advisor v12.0 Builds a detailed profile of your installed software and hardware, network inventory, missing Microsoft hotfixes, anti-virus status, security benchmarks, and displays the results in your Web browser. All of your PC profile information is kept private on your PC and is not sent to any web server. Belarc has been offering the Advisor free of charge to home users for over two decades. License: The license associated with this product allows for free personal use only. System Requirements Operating Systems: Runs on Windows 11, 2022, 2019, 10, 2016, 8.1, 2012 R2, 8, 2012, 7, 2008 R2, Vista, 2008. Both 32-bit and 64-bit Windows are supported. Our commercial products also run on all other versions of Windows and on the Apple macOS, Linux, and Solaris operating systems. Browsers: Runs on Internet Explorer, Google Chrome, Microsoft Edge, Firefox, Safari, Opera, and many others. Click here to visit the author's website.
5/5 9,464 Jul 03, 2023
Belarc, Inc. <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Belarc Advisor1_th.png"border="0">
BiblioteQ v2023.12.30
BiblioteQ v2023.12.30 Open-source archival and library software. BiblioteQ strives to be a professional archiving, cataloging, and library management suite, utilizing a Qt interface and providing connectivity to PostgreSQL and SQLite. The Open Library, SRU, and Z39.50 protocols are used for retrieving data for books, journals, and magazines. The software is available for all major operating systems and should be compatible with any system that supports Qt. BiblioteQ is distributed under a BSD license. Summary • ARM architecture support. • Administrator roles. • Alpha architecture support. • Android! • Archive important documents. • Bar scanners supported indirectly. • Cataloging of books, dvds, grey literature, journals, magazines, music cds, photograph collections, and video games. • Cover images with drag and drop support. • Customized displays. • Customized item data, pricing information, and currencies. • Documentation. • Embedded hyperlinks for localized searches of similar items. • Exporting of views to CSV files. • Files browser. • Free and Open Source technology. • FreeBSD, Linux, Mac, OS/2, OpenBSD, Windows, etc. • Front cover image retrieval via Amazon and Open Library. • Importing of books from CSV files. • Internationalization (translation) support. BiblioteQ currently supports Arabic, Czech, Dutch, English, French, German, Greek, Hungarian, Polish, Portuguese, Russian, and Spanish. • Item file attachments. • Item reservation. • Listings of overdue items, requested items, and reserved items. • MARC21 and UNIMARC record syntaxes. • ...
5/5 1,355 Mar 25, 2024
textbrowser <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/biblioteq1_th.png"border="0">
BiglyBT v2.8
BiglyBT v2.8 A feature filled, open source, ad-free, bittorrent client for Windows, MacOS and Linux. From the authors: Since 2003, BiglyBT's team has worked hard to bring you the best open source torrent product in the market. Unlike our competitors, our client is ad-free and our installer contains no third party offers. We provide migration tools for several popular bittorent clients. Switching to BiglyBT from projects using the same source is simple and requires no interactions beyond the initial migration approval. Your settings, downloads, and plugins will all be there and ready to use. In addition to the standard Bittorrent Client Features, BiglyBT also offers: Downloading Features Swarm Merging to complete torrents that do not have all the available bits, and to speed up downloading Rate limiting globally, by download, by tag, by peer-set (e.g. peers from a given country), by network (public/I2P) and even by peer. Overall capacity limits are also supported to work with ISP limits. Limits can also be scheduled by time of day etc. WebTorrent support - BiglyBT can download and seed to WebTorrent peers. There is also a built-in WebTorrent tracker. Control Features Robust settings. If you want to control it, there’s probably a setting for it! Remote controlling via Android app (any android app that supports the Transmission RPC will do, but we recommend ). Organization, Discovery &amp; Social Features Tags and Categories. Allows you also to set share ratios, file locations, speed limits, etc for a group of torrents. Meta-search, with the ability to add and create custom site templates Swarm Discoveries which lists torrents that other people have downloaded along with the torrents you download. Tag Discovery to discover ...
5/5 3,900 Nov 17, 2021
Bigly Software <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/BiglyBT4_th.png"border="0">
Bitdefender Antivirus Free for Android
Bitdefender Antivirus Free for Android Take Bitdefender’s award-winning antivirus protection with you! Bitdefender's Antivirus Free is a powerful and fast solution that uses in-the-cloud scanning technology to arm your Android device with the very latest industry leading virus detection. Without slowing down your Android or draining your battery. Simply install on your Android and it’s ready to go—nothing to configure. Unparalleled Detection Autopilot automatically scans any new apps that are downloaded to your Android device for viruses. Antivirus Free uses the same scanning engines as Bitdefender Mobile Security-our flagship mobile security app that has been independently certified to catch more than 99% of all viruses targeted at Android devices. This powerful scanner keeps you protected 24/7 against malicious activities. Feather-Light Performance Instead of downloading and storing virus signatures directly to Android devices, Antivirus Free uses in-the-cloud services to check online for the latest safeguards to outbreaks. This not only results in super-fast scans, but in close to zero impact on battery life and device performance. Hassle-Free Operation Don't worry. Ever. You can sleep but Autopilot, a smart on-install scanner that checks all apps for suspicious activity, won't. Threats and viruses are blocked before any damage is done. Zero Configuration Bitdefender Antivirus Free offers you essential antivirus protection against all Android threats. It is ready to go right after installation, acting as an effective guardian against mobile malware. Moreover, the Autopilot automatically scans any new apps you install. Click here to visit the author's website.
5/5 22,461 Dec 12, 2023
Bitdefender
Bitdefender Home Scanner 1.0
Bitdefender Home Scanner 1.0 Scan for weaknesses and hidden backdoors into your home Bitdefender Home Scanner is a free tool that scans your Wi-Fi network, maps devices and identifies and highlights network security flaws. Bitdefender Home Scanner looks for weak passwords, as well as vulnerable or poorly encrypted communications. It correlates the information gathered from your connected devices with online vulnerability databases and gives you a thorough report so you can ensure maximum security for your network. Map your home network Scan open ports in the network Wi-Fi scanner: identify all connected devices and security risks Complementary to and compatible with all existing security tools Why use Bitdefender Home Scanner New software vulnerabilities are being discovered in many smart devices every day, and hackers are taking advantage of these security flaws to target homes and businesses. It is time to start thinking about the security of your smart devices. Recently, a mom who had installed a smart surveillance system in her home discovered that someone had hacked into a webcam and live-streamed her daughters’ room on the Internet. There have been numerous reports about light bulbs being hacked. In one case, a security company demonstrated that unauthorized persons could hack into a home network by posing as a new light bulb joining the system. This way the other light bulbs were tricked into giving away the username and password for the network. Moreover, hackers can take advantage of vulnerabilities to take control of vast numbers of smart devices and use them to launch massive attacks against commercial and government websites. Technical Details Minimum system requirements: Windows 7 SP 1, 8, 8.1, 10 CPU: Dual Core 1.6 GHz RAM: 1 GB HDD: 300 MB Recommended system requirements: Windows 7 SP ...
5/5 4,926 Nov 13, 2019
BitDefender Labs <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/BitDefenderHomeScanner1_th.png"border="0">
Bitvise SSH Client v8.38
Bitvise SSH Client v8.38 Free SSH file transfer, terminal and tunneling. Bitvise SSH Client is free for use of all types, including in organizations. Bitvise SSH Client SSH and SFTP client for Windows incorporates: One of the most advanced graphical SFTP clients. Single-click Remote Desktop forwarding. State-of-the-art terminal emulation with support for the bvterm, xterm, and vt100 protocols. Support for corporation-wide single sign-on using SSPI (GSSAPI) Kerberos 5 and NTLM user authentication, as well as Kerberos 5 host authentication. Support for ECDSA, RSA and DSA public key authentication with comprehensive user keypair management. Encryption and security: Provides state-of-the-art encryption and security measures suitable as part of a standards-compliant solution meeting the requirements of PCI, HIPAA, or FIPS 140-2 validation. Obfuscated SSH with an optional keyword. When supported and enabled in both the client and server, obfuscation makes it more difficult for an observer to detect that the protocol being used is SSH. (Protocol; OpenSSH patches) Powerful SSH port forwarding capabilities, including dynamic forwarding through integrated SOCKS and HTTP CONNECT proxy. Powerful command-line parameters which make the SSH client highly customizable and suitable for use in specific situations and controlled environments. An FTP-to-SFTP bridge allowing you to connect to an SFTP server using legacy FTP applications. An advanced, scriptable command-line SFTP client, sftpc. A scriptable command-line remote execution client, sexec, and a command-line terminal console client, stermc. A scriptable command-line tunneling client, stnlc, with support for static port forwarding rules, dynamic SOCKS-based tunneling, and FTP-to-SFTP bridge. Our .NET SSH library, FlowSshNet, with example PowerShell scripts showing how to use the SSH ...
5/5 4,484 Jan 13, 2020
Bitvise Limited <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/BvSshClient2_th.png"border="0">
BleachBit v4.6.0
BleachBit v4.6.0 Clean Your System and Free Disk Space When your computer is getting full, BleachBit quickly frees disk space. When your information is only your business, BleachBit guards your privacy. With BleachBit you can free cache, delete cookies, clear Internet history, shred temporary files, delete logs, and discard junk you didn't know was there. Designed for Linux and Windows systems, it wipes clean thousands of applications including Firefox, Internet Explorer, Adobe Flash, Google Chrome, Opera, Safari,and more. Beyond simply deleting files, BleachBit includes advanced features such as shredding files to prevent recovery, wiping free disk space to hide traces of files deleted by other applications, and vacuuming Firefox to make it faster. Better than free, BleachBit is open source. Features • Delete your private files so completely that "even God can't read them" according to South Carolina Representative Trey Gowdy. • Simple operation: read the descriptions, check the boxes you want, click preview, and click delete. • Multi-platform: Linux and Windows • Free of charge and no money trail • Free to share, learn, and modify (open source) • No adware, spyware, malware, backdoors, browser toolbars, or "value-added software" • Translated to 64 languages besides American English • Shred files to hide their contents and prevent data recovery • Shred any file (such as a spreadsheet on your desktop) • Overwrite free disk space to hide previously deleted files • Portable app for Windows: run without installation • Command line interface for scripting and automation • CleanerML allows anyone to write a new cleaner using XML • Automatically ...
5/5 5,680 Dec 07, 2023
Andrew Ziem <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/BleachBit1_th.png"border="0">
BootRacer v8.60
BootRacer v8.60 A light-weight, easy to use and convenient tool for monitoring the Windows PC boot time and controlling over startup programs. The main approach of BootRacer is an ability to exclude a user password timeout time from the calculated total. How does BootRacer save my time and my life? BootRacer calculates the clear Windows boot-up time (without password timeout). It monitors your PC's boot time and notifies you about any speed degradation. BootRacer measures Total Time used by startup programs at every boot. You will know which programs slow down Windows boot-up. You can easily disable slow down programs from Windows startup. Version: 8.60.2021.0802 - August 03 2021 New: Auto Updating. New: Beta Channel. Compatible with Windows 11. Fixed security issues in the BootRacer service. Fixed bugs in Startup Control, Ultimate Services Optimizer. Rebuilt the German localization. Thank you to Roland Fischer. Click here to visit the author's website.
5/5 5,085 Sep 13, 2021
Greatis Software <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/BootRacer1_th.png"border="0">
Brave v1.64.122
Brave v1.64.122 You deserve a better Internet. Brave Team: So we reimagined what a browser should be. It begins with giving you back power. Get unmatched speed, security and privacy by blocking trackers. Earn rewards by opting into our privacy-respecting ads and help give publishers back their fair share of Internet revenue. We all know what’s wrong. As a user, access to your web activity and data is sold to the highest bidder. Internet giants grow rich, while publishers go out of business. And the entire system is rife with ad fraud. Brave Shields for Privacy Block data-grabbing ads and trackers The vast bulk of websites and ads include software that tries to to identify you. They want to track your every move across the web. Brave blocks all this, allowing you to browse freely. BROWSE AT WARP SPEED Blocking harmful ads and trackers means a faster Internet Brave loads major news sites up to six times faster than Chrome, Safari and Firefox on mobile and desktop. REAL PRIVACY Browse much more privately with Tor* Other browsers claim to have a “private mode,” but this only hides your history from others using your browser. Brave lets you use Tor right in a tab. Tor not only hides your history, it masks your location from the sites you visit by routing your browsing through several servers before it reaches your destination. These connections are encrypted to increase anonymity. BRAVE REWARDS Earn frequent flier-like tokens just for browsing Turn on Brave Rewards to earn frequent flier-like tokens for viewing privacy-respecting ads. You can set the number of ads you see per hour. Currently you can support your favorite web creators with your tokens, but soon you’ll be able to spend tokens on premium content, gift cards, and more. A BETTER DEAL Tip and contribute to websites directly through Brave Rewards Today, you can donate tokens to your favorite websites. ...
5/5 3,933 Apr 12, 2024
Brave <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Brave1_th.png"border="0">
BruteShark v1.2.5
BruteShark v1.2.5 A Network Forensic Analysis Tool (NFAT) that performs deep processing and inspection of network traffic (mainly PCAP files). It includes: password extracting, building a network map, reconstruct TCP sessions, extract hashes of encrypted passwords and even convert them to a Hashcat format in order to perform an offline Brute Force attack. The main goal of the project is to provide solution to security researchers and network administrators with the task of network traffic analysis while they try to identify weaknesses that can be used by a potential attacker to gain access to critical points on the network. Two BruteShark versions are available, A GUI based application (Windows) and a Command Line Interface tool (Windows and Linux). The various projects in the solution can also be used independently as infrastructure for analyzing network traffic on Linux or Windows machines. For further details see the Architecture section. What it can do Extracting and encoding usernames and passwords (HTTP, FTP, Telnet, IMAP, SMTP...) Extract authentication hashes and crack them using Hashcat (Kerberos, NTLM, CRAM-MD5, HTTP-Digest...) Build visual network diagram (Network nodes &amp; users) Reconstruct all TCP &amp; UDP Sessions File Carving Windows Prerequisites: WinPcap / Npcap driver (Wireshark installs one of this by default) .NET Core SDK Linux Prerequisites: libpcap driver Examples Videos Hashes Extracting Building a Network Diagram File Carving Password Extracting Reconstruct all TCP Sessions Brute Shark CLI Architecture All BruteShark projects are implemented using .Net Core and .Net Standard for modern and cross platform support. The solution is designed with three layer architecture, including a one or more projects at each layer - DAL, BLL and PL. The separation between layers is created by the fact that each project refers only its own objects. PcapProcessor (DAL) As ...
5/5 3,017 Jun 13, 2023
Oded Shimon <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/BruteShark1_th.png"border="0">
Buttercup v2.12.0
Buttercup v2.12.0 Cross-platform, free and open-source password manager based on NodeJS. Buttercup is a password manager - an assistant for helping you store all of your login credentials. Buttercup helps you keep your accounts safe and assists you when you want to log in - all you need to do is remember just one password: your master password. This is the Desktop application in the Buttercup suite, and there's also a mobile app and browser extension so that you can access your credentials anywhere. You store your credentials (login information) in a secure archive, which can then be stored on your own computer or any of our supported cloud services (like Dropbox, for example). Archives are encrypted using the AES specification, and cannot be read by anyone besides those with the master password. Brute-force decryption is not technically possible. You should not share your archive with anyone, but rest assured: your contents are safe. Why you need software like Buttercup Many of us have 10s or 100s of accounts, and it would be crazy to secure these with 1 or 2 passwords. Why? If an attacker gains access to one of the systems you have an account with, your password there may be easily stolen - if an attacker gets this it's highly likely they will try to log in to other accounts you have with the same password. If you're using the same password on more than one site, you risk having several accounts stolen if any one of them is breached. Buttercup helps you by remembering all of your passwords, and because you no longer have to remember them yourself, you can use different passwords for every single site. Protecting your details Buttercup provides a secure way of storing your details, but it is only as secure as how you treat your master password and ...
5/5 3,037 Oct 22, 2021
Perry Mitchell & Sallar Kaboli <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Buttercup1_th.png"border="0">
Chainsaw v2.5.0
Chainsaw v2.5.0 Rapidly Search and Hunt through Windows Event Logs Chainsaw provides a powerful ‘first-response’ capability to quickly identify threats within Windows event logs. It offers a generic and fast method of searching through event logs for keywords, and by identifying threats using built-in detection logic and via support for Sigma detection rules. Features 🔍 Search and extract event log records by event IDs, string matching, and regex patterns 🎯 Hunt for threats using Sigma detection rules and custom built-in detection logic ⚡ Lightning fast, written in rust, wrapping the EVTX parser library by @OBenamram 🔥 Document tagging (detection logic matching) provided by the TAU Engine Library 📑 Output in an ASCII table format, CSV format, or JSON format Hunting Logic Sigma Rule Matching Using the --rules and --mapping parameters you can specify a directory containing a subset of SIGMA detection rules (or just the entire SIGMA git repo) and chainsaw will automatically load, convert and run these rules against the provided event logs. The mapping file tells chainsaw what event IDs to run the detection rules against, and what fields are relevant. By default the following event IDs are supported: Built-In Logic Extraction and parsing of Windows Defender, F-Secure, Sophos, and Kaspersky AV alerts Detection of key event logs being cleared, or the event log service being stopped Users being created or added to sensitive user groups Brute-force of local user accounts RDP Logins You can specify the --lateral-all flag to chainsaw to also parse and extract additional 4624 logon types (network logons, service, batch etc.) relating to potential lateral movement that may be interesting for investigations. Getting Started You can use the pre-compiled versions of chainsaw ...
5/5 2,058 Mar 17, 2023
F-Secure Countercept <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Chainsaw5_th.png"border="0">
ChromisPOS v0.95.3 build 1902-01
ChromisPOS v0.95.3 build 1902-01 Chromis is a feature rich Point of Sale software. Which will run a variety of hardware, the only requirement is that it must be capable of running Java 1.8 Installing Chromis is simple and fast, using its own custom installer available for a number of operating systems. It supports multi terminal mode, and works with a number of Open Source database solutions. It is supplied with ability to use a Derby embedded db as standard, but if you wish to use a multi terminal then a product like MySQL is used. Chromis pos has a small team of people who are always willing to assist with any issues. This download is for the 64bit version. Download the 32bit version here. Features Windows XP, Vista, 7, 8 &amp; 10 Extensive hardware support Java 1.8 supported Multi sales modes Screen resolutions from 800 x 600 User customizable Sales screen, Ticket and Receipt layouts Builtin scripting language Support for Derby, MySql &amp; PostgreSQL supported Barcode reader Support Kitchen Display monitor, supprt multiple stations Builtin customer database User security CSV product import Builtin reporting and reports Support for Price\weight encoded barcodes conforms to GS1 standards Supports USB printer, so you no longer need to rely on serial ports Ability to migrate to multiuser db after testing with builtin db 14th February v 0.95.3 build 1902-01 Added days for removedlines data Added function for ticketline size, this is point size of the rows in the sales panel Added new column in taxes, taxcategories &amp; taxcustcategories tables ready for future ...
5/5 5,589 Jan 22, 2020
John Lewis <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Chromis POS5_th.png"border="0">
Classic Auto Login v1.0.0.1
Classic Auto Login v1.0.0.1 Bring back the Auto Login feature in Windows 10 and 11. Microsoft changed the setup option of automatic login from version 2004 of Windows 10, for security reasons. The operating system can still log in automatically, but the setup interface is usually not available. Classic Auto Login offers an alternative means of setting up auto login. Classic Auto Login is the software implementation of a method recommended and documented by Microsoft. The documentation mentioned on this page is available in several languages. There is only one advantage of operating system level auto login, namely convenience. In all other respects, it raises serious issues due to security reasons. The issues can be divided into two groups: 1) All the data and software that are available on the computer can be accessed, run, edited, deleted by practically anyone who has physical access to the computer. 2) The password of auto login is stored in the Registry in an unencrypted text format, so you can obtain the password knowing the required method. Microsoft has officially made available a similar software (Autologon), which stores the password in an encrypted format at another place in the Registry. Despite the encryption, this method unfortunately provides no additional security compared to Classic Auto Login, as point one above is also fulfilled by this software. So the current user of the computer can find out the password if he/she uses the appropriate method. The issues described so far are also present during the configuration by netplwiz, which is available as part of the operating system. The password stored by netplwiz can be retrieved in the same way as in case of Autologon. So using auto login is not recommended in most cases. Its use is only justified in case of computers exclusively used for gaming and/or media consumption. There are some ...
5/5 3,338 Apr 22, 2024
WinTools <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/classicautologin2_th.png"border="0">
Claws Mail for Windows v3.17.4
Claws Mail for Windows v3.17.4 Claws Mail is an email client (and news reader), based on GTK+, featuring : Graceful, and sophisticated interface Easy configuration, intuitive operation Abundant features Extensibility Robustness and stability The appearance and interface are designed to be familiar to new users coming from other popular email clients, as well as experienced users. Almost all commands are accessible with the keyboard. The messages are managed in the standard MH format, which features fast access and data security. You'll be able to import your emails from almost any other email client, and export them just as easily. Click here for online manual 26th July 2019 Claws Mail 3.17.4 CLAWS MAIL RELEASE NOTES Claws Mail is a GTK+ based, user-friendly, lightweight, and fast email client. New in this release: ~~~~~~~~~~~~~~~~~~~~ * New HTML viewer plugin: Litehtml viewer * Added option 'Enable keyboard shortcuts' to the 'Keyboard shortcuts' frame on /Configuration/Preferences/Other/Miscellaneous * Compose: implemented copying of attached images to clipboard * Compose: images and text/uri-list (files) can now be attached by pasting into the Compose window * Python plugin: window sizes are now remembered for the Python console, the 'Open URLs' and the 'Set mailbox order' windows. * Fancy plugin: the download-link feature now follows redirections * MBOX export: the Enter key in the dialogue now starts the export * The date (ISO format) has been added to log timestamps * Updated translations: Brazilian ...
5/5 5,579 Sep 20, 2019
The Claws Mail Team <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/ClawsMail1_th.png"border="0">
ClipAngel v2.13
ClipAngel v2.13 Clipboard history capture and paste tool ClipAngel records all data copied including text, images, and files, making it easy to retrieve earlier data where Windows usually allows only one item at a time. The program keeps data even after reboot and can paste in RDP, CMD, elevated windows etc. independently from current input language. Clipboard views include rich text and HTML formatting, filtering by text and details on URL, application and window data. The program can emulate keyboard input and includes customizable hotkeys. For additional security, the program can block specific applications where passwords may be copied and encrypt stored items. This program belongs to class "Clipboard Manager". It captures many clipboard objects and allows user to select and paste one in any program. Inspired by analogs: ClipDiary, Ditto, AceText. Main priorities: usability, compatibility, reliability. Requires .Net Framework 4.52+ (Windows Vista+/Server 2008+) If not installed, download here https://www.microsoft.com/en-us/download/details.aspx?id=42642 Features Supports clipboard formats: text, html, rtf, file, image Captures data of supported types copied to clipboard (clips) Captures sender window title and process name for clip Shows source URL for HTML clip Filter by marks "Used (Pasted)" and "Favorite" with keyboard shortcuts Filter by clip type Hot (as you type) text filter for clip list Stores last used text filters Marking used (pasted) clips Marking filter matches in text Marking hyperlinks in text and Alt+click to open them Marking END of clip text Marking filter matches in list Allows to paste clip as original or plain text selected or all "Paste special" command to cutomize paste of clip ...
5/5 5,244 Dec 28, 2023
tormozit <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/ClipAngel1_th.png"border="0">
CloudReady Home v89.4.44
CloudReady Home v89.4.44 CloudReady: Home Edition is the free, easy way to transform your old PC or Mac into a high-performing Chrome device. Transform your computers so they’re secure, easy to manage, and never slow down. CloudReady gives you all the power of the web without the weight or risk of traditional operating systems. Whether you're a parent, a student, a teacher, or someone who needs to work from home—if you need a reliable, high-performing device, the CloudReady Home Edition is for you. It's an OS designed for now—and for what's next. Based on Google’s Chromium OS, CloudReady provides unparalleled speed, simplicity, and security without hardware limitations, whether your computers are brand new or 10 years old. That’s why companies, non-profits, schools, and government agencies around the world use CloudReady to streamline and secure their devices when accessing web apps and VDI. Due to performance limitations, only machines with 2 GB RAM or more are certified for use with CloudReady. Even if a machine is certified for use with CloudReady, it must have 2 GB RAM to to be officially supported. Before you begin visit the Certified Models List to see if your device will run CloudReady. This download is for the 64bit image. You will also need the USB Maker, download here. Instructions on building your installer: If you're using a Mac, click here If you're using a Chromebook, click here If you're using Windows, click here Click here to visit the author's website.
5/5 2,538 Jul 13, 2021
Neverware <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/CloudReady1_th.png"border="0">
CMail v0.8.9
CMail v0.8.9 A freeware application that allows you to send e-mail from the command line in Windows. It is primarily intended for sending e-mail from batch files or other scripts, but simple enough to be used interactively. If you are looking for an alternative to Blat with SSL support (stunnel not required), or more control over message formatting, CMail may be a good choice. Basic E-Mail CMail is not intended to be a better Blat, it was developed to assist with testing mail server and content analysis software, and as such has evolved with a completely different feature set. While being very easy to use in its basic form, CMail provides advanced options for those who require them, allowing users to specify such things as the encoding mechanism for the message body and individual attachments, the types of authentication mechanisms to use, aliases for all recipients (similar software often doesn’t support aliases, or can only send to a single user), and per-recipient Delivery Status Notification settings. Users can also control various aspects of the SMTP session, including enforcing the use of SSL/TLS where security is a consideration, setting the HELO/EHLO, adding custom headers, and mandating the use of IPv4 or IPv6. Features • Flexible configuration via files or the command line and optional GUI provided by CMailGUI. • TLS/SSL (including TLS 1.3) via STARTTLS or SMTPS (SSL-enabled version). Built-in, stunnel not required. • Support for adding multipart/alternative HTML message bodies (UTF-8) and embedded images. • SMTP authentication using CRAM-MD5, PLAIN, LOGIN and OAUTHBEARER. • Unlimited attachments using base64, quoted printable or uuencoding. • Wildcard attachment support to attach directory content. • Unlimited To/Cc/Bcc recipients, with aliases and DSN options for each if desired. ...
5/5 2,244 Sep 12, 2023
Inveigle.net <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/CMail1_th.png"border="0">
CommandStay v1.0
CommandStay v1.0 A registry tweak to force the Command Prompt window to remain open after running any batch files. INSTRUCTIONS (Note: You may not get asked all of these questions.) 1) Double or single click on CommandStay.reg 2) On the Security Warning window, click RUN. 3) When asked "Do you want to allow this app to make changes to your computer?", choose YES. 4) When asked "Adding information can unintentionally change or delete values and cause... Are you sure you want to continue?", choose YES. 5) On the message telling you it was successful, click OK. 6) Restart your computer. Click here to visit the author's website.
5/5 1,900 Feb 21, 2022
OlderGeeks.com <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/CommandStay1_th.png"border="0">
ConfigureDefender v3.1.1.1
ConfigureDefender v3.1.1.1 A small utility for configuring Windows 10 built-in Defender Anti-Virus settings. ConfigureDefender utility is a small GUI application to view and configure important Defender settings on Windows 10. It uses PowerShell cmdlets (with a few exceptions) to change the Windows Defender settings. Furthermore, the user can apply one of three pre-defined protection levels: DEFAULT, HIGH, and MAX. Changing one of the protection levels requires a reboot in order to take effect. Using the Maximum Protection Level The MAX Protection Level blocks anything suspicious via Attack Surface Reduction, Controlled Folder Access, SmartScreen (set to block) and cloud level (set to block) - Defender Security Center is hidden. These settings are very restrictive and using them can produce many false positives even in the home environment. Such a setup is not recommended in the business environment. Advanced Users Some important remarks on the possible ways used to configure Defender (for advanced users). Windows Defender settings are stored in the Windows Registry and most of them are not available form Windows Defender Security Center. They can be managed via: Group Policy Management Console (gpedit.msc is not available in Windows Home edition) Direct via Registry editing (manually, via *.reg files or scripts) PowerShell cmdlets (set-mppreference, add-mppreference, remove-mppreference, PowerShell 5.0). Windows Defender Registry Keys Normally, Windows Defender stores most settings under the key (owned by SYSTEM): Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender The registry keys can be changed while using Defender Security Center or PowerShell cmdlets. Overwriting settings via Group Policy Management Console (GPO) Administrators can use Windows Group Policy Management Console (GPO) utility to override certain Windows Defender registry values. Group Policy settings are stored under another key (owned by ADMINISTRATORS): Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Keep in mind that GPOs do not delete the normal Defender settings! Manually changing WD settings via registry Registry editing is ...
5/5 2,168 Dec 07, 2022
AndyFul <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/ConfigureDefender1_th.png"border="0">
ContaCam v9.9.19
ContaCam v9.9.19 This Free Video Surveillance and Live Webcam software for Windows is extremely easy on system resources, and does not contain unnecessary bloat. It is fast, light, and versatile enough to meet all your security needs while still being very user friendly and able to run on even the most moderate systems. Features Supported from Windows 7 up to Windows 10. The program is available in the following languages: English, Chinese, French, German, Italian, Portuguese, Russian and Spanish. CCTV security surveillance with motion detection recording. Motion detection events presented as animated thumbnails in web browser, check the street demo and the home demo Motion detection actions like sending email with attached movement file or running any external program. Daily summary video creation option. Manual records and snapshots (video game captures, movie recording, ...). Integrated web server with password protection Supported are Webcams, WDM, DV devices and Network / IP cameras (streaming with RTSP / H.264 / H.265 or MJPEG) Integrated with Plate Recognizer for license plate recognition. Do person detection with DeepQuest AI / DeepStack. Remote watching by enabling port forwarding or using a Cloud Client (Dropbox, ...). Unlimited parallel cameras setup. Re-stream a video source through the web server. Can be started as a Windows Service to keep running and recording even if not logged in. Audio support for USB webcams, capture cards and rtsp ip cameras. Changes: 9.9.19 (August 25th 2021) - Introduced profiles to configure up to 4 commands per camera - Added magnetic/snapping borders to the camera windows - Updated internal ...
5/5 7,645 Oct 22, 2021
Contaware <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/contacam_th.png"border="0">
Core FTP LE v2.2.1960
Core FTP LE v2.2.1960 This free, secure FTP client gives you a fast, easy, reliable way to update and maintain your website via FTP. It also provides a secure method (via SSL, TLS, FTPS, HTTPS, or SFTP) to upload / download files to and from FTP servers. Check out the list of features and you'll find almost every feature you need, all in a free ftp program. There are no popup ads, advertising or spyware and you're never asked or reminded to register. Features: Secure SFTP, SSL, TLS, &amp; FTPS International Domain support Fast and secure client transfers HIPAA compliant security Mode Z compression User-friendly interface(s) Site to Site file transfers FULL drag and drop support Start/stop/resume of transfers Auto retry of failed transfers Transfer bandwidth control Browser integration File masking (wildcards) Keep Alive functionality Remote file searching File permissions (CHMOD) Advanced directory listings .htaccess &amp; .htpasswd editing One click transfers Keep Alive functionality Automatic S/Key support Favorites via menu &amp; drop down Desktop shortcuts &amp; drop u/l's Command line support FTP/HTTP Proxy, Socks 4&amp;5 support Changelog Version 2.2 (build 1960), updated Sep 28th, 2020 Fixes for Windows SSL "High crypto" mode - resolves issues with servers requiring TLS 1.2 when using "AUTH TLS" and "FTPS/Direct SSL" Windows SSL crash on disconnection via server timeout, fixed This may be the last build that includes the ansi version (sorry Win98/NT users!). Version 2.3 will be available very soon with many internal updates including updates to OpenSSL 1.1.1g/TLS v1.3 and changes since 1957. This download is for the 64bit version. If you need the 32bit version, download here.
5/5 4,951 Apr 11, 2021
Core FTP <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Core FTP LE1_th.png"border="0">
CrococryptMirror v1.43
CrococryptMirror v1.43 CrococryptMirror (aka "Crococrypt") is an encryption tool which mirrors complete folders to encrypted folders. The encryption algorithms that are used are AES and Twofish (256 bits, cascading). The keyfile is secured by a password using PKCS #5 (PBKDF2) with a SHA512/Whirlpool based HMAC using 100000 iterations and also AES and Twofish. Additionally, a ZIP compression for storage space optimization is used. For reasons of performance the synchronization of source and destination folder is done in the background. A backup copy of the keyfiles has to be stored at a secure place. Without the keyfile the containers cannot be decrypted. In the portable version of CrococryptMirror keyfile and settings are stored together with the application folder. Hence, the complete application can be transported on an external storage device. Moreover, the folder "container" can be used to store portable containers. Mirroring can be done manually (on-demand) or by using the sync service which detects directory changes on the fly. Features Copying and synchronizing of arbitrary folders/directories to encrypted folders (Backup Containers) Automatic Synchronization (Live mode, e.g., for Cloud Uploads) On-Demand Synchronization (e.g., for external drives like USB drives) Encryption of file content, filenames, file meta data Shorten of filenames Using the highest encryption standards (AES-256 &amp; Twofish-256) and password security techniques (PBKDF2, SHA512 &amp; Whirlpool, 100000 iterations) Especially the password security implementation is flexible and can be adapted in the future to fit current hardware performance issues Source folders can be stored in multiple destination containers at the same time (e.g., USB disk drive and Cloud storage) Network drives can be used as ...
5/5 4,881 Feb 05, 2021
Frank Hissen <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/CrococryptMiror1_th.png"border="0">
Cryptomator v1.12.4
Cryptomator v1.12.4 A simple tool for digital self-defense. It allows you to protect your cloud data by yourself and independently. Most cloud providers encrypt data only during transmission or they keep the keys for decryption for themselves. These keys can be stolen, copied, or misused. Thanks to Cryptomator, only you have the key to your data in your hand. Cryptomator allows you to access your files from all your devices. It's easy to use and integrates seamlessly between your data and the cloud. How does Cryptomator protect your data? Cryptomator's technology meets the latest standards and encrypts both files and filenames with AES and 256 bit key length. To start with Cryptomator, you assign a password for a folder - we call it a vault - within your cloud. That is all. No complicated key creation, no registration, no configuration! To access the vault, simply enter the password again. You will be provided with a virtual encrypted drive to which you can move your data - just like a USB flash drive. Every time you store something on this drive, Cryptomator encrypts the data automatically. Pretty simple, right? The technology behind this is state-of-the-art and encrypts both files and filenames with AES and 256 bit key length. This means: if someone looks into the folder in your cloud, they cannot draw any conclusions about your data. Optimal protection thanks to the latest technology standards If someone looks into the folder in your cloud, they cannot draw any conclusions about your data. Why is Cryptomator secure and trustworthy? No backdoors, no expiration date thanks to open source You don't have to trust Cryptomator blindly, because it is open source software. For you as a user, this means that everyone can see the code. Audited by security researchers In addition to independent security audits, the software is continuously and publicly tested in an automated way and ...
5/5 4,552 Apr 09, 2024
Skymatic <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Cryptomator1_th.png"border="0">
CutePDF Writer v4.0
CutePDF Writer v4.0 Create PDFs from almost any application. Easiest Free PDF Converter ! Convert to professional quality PDF file from any printable document. New version 4.0 has more settings and do more. Windows 10 and Server 2019 Ready Support programmatic access FREE software for personal, commercial, gov or edu use. Users love it since 2004. Just click Print and select CutePDF Writer as your printer. It’s that simple. Select a file in any application that prints and open it. Choose “File” > “Print”. Choose “CutePDF Writer” as the printer in the print dialog box, and click “Print”. (Do Not select "Print to File" option.) Enter a new file name for your PDF and select options. “Save” to your desired location. Installation Requirements Supports Microsoft Windows Vista/7/8/8.1/10 (32-bit/64-bit). Supports Microsoft Windows Server 2008/2012/2016/2019. Requires PS2PDF converter such as Ghostscript (recommended). You can get the free AGPL Ghostscript here. GNU Ghostscript is a free open-source interpreter for the PostScript language and the PDF file format. It is distributed under the GNU General Public License. What's New Added support for Server 2008/2012/2016/2019 and Terminal Server. New version 4.0 allows you to change Document Properties, add Passwords with security settings and do much more. Added support for basic programmatic access. Seamlessly integrate with CutePDF Professional. New version works with the latest version of Ghostscript. To use with other PS2PDF application, please refer to FAQs. Supports foreign language Windows better. No longer include Ghostscript. You may download and install it separately. Click here to visit the author's ...
5/5 3,334 Feb 12, 2020
Acro Software Inc. <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/CutePDF Writer1_th.png"border="0">
CyberChef v10.4.0
CyberChef v10.4.0 The Cyber Swiss Army Knife by the UK Government Code and Cypher School (GCHQ) CyberChef is a simple, intuitive web app for carrying out all manner of "cyber" operations within a web browser. These operations include simple encoding like XOR or Base64, more complex encryption like AES, DES and Blowfish, creating binary and hexdumps, compression and decompression of data, calculating hashes and checksums, IPv6 and X.509 parsing, changing character encodings, and much more. The tool is designed to enable both technical and non-technical analysts to manipulate data in complex ways without having to deal with complex tools or algorithms. It was conceived, designed, built and incrementally improved by an analyst in their 10% innovation time over several years. Live demo • CyberChef is still under active development. As a result, it shouldn't be considered a finished product. There is still testing and bug fixing to do, new features to be added and additional documentation to write. Please contribute! • Cryptographic operations in CyberChef should not be relied upon to provide security in any situation. No guarantee is offered for their correctness. • A live demo can be found here - have fun! How it works There are four main areas in CyberChef: 1) The input box in the top right, where you can paste, type or drag the text or file you want to operate on. 2) The output box in the bottom right, where the outcome of your processing will be displayed. 3) The operations list on the far left, where you can find all the operations that CyberChef is capable of in categorised lists, or by searching. 4) The recipe area in the middle, where you can drag the operations ...
5/5 3,073 May 24, 2023
UK's Government Code and Cypher School <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/CyberChef1_th.png"border="0">
Database .NET v33.0.7877
Database .NET v33.0.7877 An innovative, powerful and intuitive multiple database management tool. You can browse/grant objects, design tables, edit rows, run queries, generate scripts, analyze/monitor SQL and import/export/migrate/sync data with a consistent interface. Major Features/ Special Features/ Exclusive Features Browsing Table Data: Browsing Table Data Highlighting Groups of Cells Displaying Data Types on the column header Data Visualization Multiple Tabs and Browsing Mode (Paging/Horizontal/Vertical) Cell Viewer Calculate Selected Cells Print SQL statements and query results Filtering Table Data: Editing Table Data: Editing Table Data Form Editor and Viewer Cell Editor(*) DateTime Picker XML/JSON Editor PrimaryKey Selector GUID Generator (De)Compression and (De)Encoding strings Data Import and Export: Data Import(*)(Clipboard/CSV/TSV/PSV/SSV/TXT/XML): Importing specific fields Empty as NULL Record Separator Data Export(*)(CSV/TSV/PSV/SSV/XLSX/XLS/XML/JSON/HTM/MD /SQL): ...
5/5 5,091 May 28, 2022
fish <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/DatabaseNET1_th.png"border="0">
DavMail v6.2.2
DavMail v6.2.2 A free POP/IMAP/SMTP/Caldav to Exchange gateway. Ever wanted to get rid of Outlook ? DavMail is a POP/IMAP/SMTP/Caldav/Carddav/LDAP gateway allowing users to use any mail client with Exchange and Office 365, even from the internet through Outlook Web Access on any platform, tested on MacOSX, Linux and Windows. Features • POP • IMAP • SMTP • Caldav • Carddav • LDAP • Office 365 • Exchange Changes ## DavMail v6.2.2 2024-03-30 Includes some build process fixes, use jlink to build a customized jre for standalone package, Thunderbird configuration documentation updated with new screenshots. Also implemented a new -token command line option to launch O365InteractiveAuthenticator and get an authentication token. Most changes are related to build process and rpm packaging for Fedora/RHEL, also includes a few bug fixes on IMAP ### OSX - OSX: document how to embed Zulu jre inside DavMail app ### Enhancements - Fix comment in DavMail shell - Detect missing network connectivity during token refresh to avoid invalidating token - Upgrade JCIFS to 1.3.19 for NTLM support - Cleanup from audit - Drop war package from release files, there are more modern ways to run DavMail in server mode without a webapp container - From audit: place LOCK.wait in a loop - Fix from audit, use try with resource - Cleanup from audit, remove deprecated getSubjectDN, getIssuerDN ### O365 - O365: Improve error message on missing add-exports, see https://github.com/mguessan/davmail/issues/344 - O365: Refactor manual authentication dialog to clearly separate steps - Remove explicit dependency on O365InteractiveAuthenticator for -token option - Implement a -token option to launch interactive authenticator and print obtained refresh token, see https://github.com/mguessan/davmail/issues/338 - O365: Try to adjust ItemId to 140 length, see https://github.com/mguessan/davmail/issues/328 - O365: prepare GCC-High/DoD endpoints support, fix regression - O365: prepare GCC-High/DoD endpoints support, move outlook login url references to ...
5/5 460 Apr 04, 2024
Mickael Guessant <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/DavMail3_th.png"border="0">
DBeaver v24.0.0
DBeaver v24.0.0 Free universal database tool and SQL client. Free multi-platform database tool for developers, SQL programmers, database administrators and analysts. Supports any database which has JDBC driver (which basically means - ANY database). • Has a lot of features including metadata editor, SQL editor, rich data editor, ERD, data export/import/migration, SQL execution plans, etc. • Based on Eclipse platform. • Uses plugins architecture and provides additional functionality for the following databases: MySQL/MariaDB, PostgreSQL, Greenplum, Oracle, DB2 LUW, Exasol, SQL Server, Sybase/SAP ASE, SQLite, Firebird, H2, HSQLDB, Derby, Teradata, Vertica, Netezza, Informix, etc. Changes: v24.0.0 • SQL Editor: - Nested CASE statements were supported - Deleting queries from Outline was fixed - Type casts support was improved - Handling of right-click on collapsed query was fixed - Expanding collapsed group after the code execution was fixed • Metadata editor: changing the key name when a constraint is changed • Data Editor: SRID switching in the Spatial data viewer was fixed • ER Diagram: - Missing connection lines were fixed - Mikami-Tabuchi routing type was disabled • AI: ...
5/5 1,379 Mar 21, 2024
DBeaver Community Contributors <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/dbeaver1_th.png"border="0">
DDS
DDS DDS is a program that will scan your computer and create logs that can be used to display various startup, configuration, and file information from your computer. This program is used in security forums to provide a detailed overview of what programs are automatically starting when you start Windows. The program will also display information about the computer that will allow experts to quickly ascertain whether or not malware may be running on your computer. To use DDS, simply download the executable and save it to your desktop or other location on your computer. You should then double-click on the DDS.com icon to launch the program. DDS will then start to scan your computer and compile the information found into two log files. When DDS has finished it will launch the two Notepad windows that display the contents of these log files. The contents of these log files can then be attached to a reply in virus removal forums so that an expert can analyze them.
5/5 5,777 Nov 13, 2019
sUBs <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/DDS3_th.png"border="0">
Defender Exclusion Tool v1.2
Defender Exclusion Tool v1.2 Drag and drop files to exclude from Windows Defender scanning. Regardless of whether you choose Microsoft Defender Antivirus, or a third party antivirus solution you need to be sure these products are not scanning critical File and folders because Occasionally Microsoft Security Essentials or Microsoft Defender cause problems with some Files and folders. Typical issues include slow performance , deleting some necessary files or erratic operation or it may flag a file or folder that you trust as malicious. To work around these problems you can add this kind of files and folders to the list of exceptions. What is new: (Friday, June 4, 2021) 1. [Added] – Language support 2. [Added] – Expor/Import feature 3. [Added] – Option to show all Microsoft Defender exclusions (include group policy) 4. [Added] – Some minor improvements 5. [Fixed] – Defender Injector Name has been changed to Defender Exclusion Tool 6. [Removed] – CMD Parameter support (For security reason) In Windows 10 , there is a new app called Microsoft Defender Security Center . The app, formerly known as “Microsoft Defender Dashboard”, has been created to help the user control his security and privacy settings. You can add any trusted file, file type, folder, or a process to the exclusions list with the following steps ; 1. Open settings Application 2. Choose Update &amp; security 3. Open Windows security 4. Select Virus &amp; threat protection 5. Click Manage settings under the Virus &amp; threat protection settings 6. Click Add or remove exclusions 7. Under Add an exclusion, select the files, folders, file types, or process. You may need to repeat the instructions to exclude other items you don’t want the antivirus to scan to avoid false positives As you see adding exceptions manually through the graphical user interface would be time consuming, tedious and, prone to human error therefore we have coded a portable Freeware ...
5/5 2,283 Jun 09, 2021
Sordum.org <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/defexclusiontool4_th.png"border="0">
DefenderUI v1.12
DefenderUI v1.12 Significantly improves usability and unlocks many hidden security features of Microsoft Defender. Compatible with Windows 10 / 11 and truly free. Download the user guide: DefenderUIUserGuide.pdf Click here to visit the author's website.
0/5 1,664 Aug 28, 2023
DefenderUI <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/DefenderUI2_th.png"border="0">
Deskreen v2.0.4
Deskreen v2.0.4 Turn any device into a secondary screen for your computer. Deskreen is a desktop app that turns any device with a web browser into a secondary screen for your computer over WiFi. Deskreen can be used to mirror entire computer display onto any device screen that has a web browser. Also you can limit Deskreen to select only one application window view to share - very useful for presentation purposes. The best feature of Deskreen is to use any device as a secondary screen. To have a true extended desktop experience Deskreen should be used with Virtual Display Adapter. Also with no need for Virtual Display Adapter you can have a teleprompter with Deskreen using your tablet or smartphone, for that Deskreen has Flip Screen Mode that mirrors computer screen in web browser of your tablet (aka. flip screen horizontally). Features Second Screen Use any device with a web browser as a second screen for your computer (with the help of Virtual Display Adapter). Share Screen View Share your computer entire screen to any device that has a web browser. Share App View Limit Deskreen to share only a single application view to any device with a web browser. Teleprompter on Any Device If you are a video blogger and you need a teleprompter, or you need to look at the camera during a video conference, Flip Screen Mode is just for you WiFi Compatible Deskreen can share screen video over WiFi. No cables needed. Multiple Connected Devices Connect as many devices as you want at the same time. Share computer screen to all of them. Advanced Video Quality Control You can change picture quality while sharing a screen. Auto quality change supported. Easy to Use Three easy steps to connect with Deskreen. User friendly design with features that you need. Secure Deskreen was built with security in mind. It uses an industry standard of End-to-end encryption. Fast Depending ...
5/5 2,155 Jul 20, 2023
Pavlo (Paul) Buidenkov <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Deskreen5_th.png"border="0">
DevManView v1.80
DevManView v1.80 An alternative to the Device Manager of Windows that displays all devices and their properties in a flat table, instead of a tree viewer. In addition to displaying the devices of your local computer, DevManView also allows you view the devices list of another computer on your network, as long as you have administrator access rights to this computer. DevManView can also load the devices list from external instance of Windows and disable unwanted devices. This feature can be useful if you have Windows operating system with booting problems, and you want to disable the problematic device. System Requirements DevManView works on any version of Windows, starting from Windows 2000 and up to Windows 11. For x64 version of Windows, you should download the x64 version of DevManView, because the 32-bit version of DevManView cannot disable/enable devices on x64 operating system. Changes Version 1.80: Starting from this version, DevManView doesn't request to run as Administrator when your run it. Added 'Run As Administrator' option (Ctrl+F11). You need to use this option if you want to disable/enable/uninstall devices or to view the install/connect/disconnect time. Added /RunAsAdmin command-line option. For using with the disable/enable command-line options. Added 'Black Background' option (Under the View menu). When it's turned on, the main table is displayed in black background and white text, instead of default system colors. Updated to work properly in high DPI mode. Using DevManView DevManView doesn't require any installation process or additional dll files. In order to start using it, simply run the executable file - DevManView.exe After running DevManView, the main window displays the list of all devices found in your system. By default, non-plug and play drivers (LegacyDriver) are not displayed, but you can add them by selecting the ...
5/5 5,871 Sep 12, 2023
Nir Sofer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/devmanview_th.png"border="0">
Display Driver Uninstaller (DDU) v18.0.7.5
Display Driver Uninstaller (DDU) v18.0.7.5 A driver removal utility that can help you completely remove AMD/NVIDIA graphics card drivers and packages from your system, without leaving leftovers behind (including registry keys, folders and files, and the driver store). The AMD/NVIDIA video drivers can normally be uninstalled from the Windows Control panel, this driver uninstaller program was designed to be used in cases where the standard driver uninstall fails, or whenever you need to thoroughly delete Intel, nVidia or ATI/AMD video card drivers. The current effect after you use this driver removal will be similar as if its the first time you install a new driver just like a fresh, clean install of Windows. As with any tool of this kind, we recommend creating a new system restore point before using it, so that you can revert your system at any time if you run into problems. This tool acts similar to what other driver cleaner programs do + the extra mentioned above. If you have problem installing older driver or newer one, give it a try as there are some reports that it fixes those problems. Recommended usage: • You MUST disconnect your internet or completely block Windows Update when running DDU until you have re-installed your new drivers. • DDU should be used when having a problem uninstalling / installing a driver or when switching GPU brand. • DDU should not be used every time you install a new driver unless you know what you are doing. • DDU will not work on network drive. Please install in a local drive (C:, D: or else). • The tool can be used in Normal mode but for absolute stability when using DDU, Safemode is always the best. ...
5/5 6,849 Apr 11, 2024
Wagnard <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/DDU_th.png"border="0">
DNS Benchmark v1.3.6668
DNS Benchmark v1.3.6668 Domain Name Speed Benchmark Are your DNS nameservers impeding your Internet experience? A unique, comprehensive, accurate &amp; free Windows (and Linux/Wine) utility to determine the exact performance of local and remote DNS nameservers . . . “You can't optimize it until you can measure it” Now you CAN measure it! Although GRC's DNS Benchmark is packed with features to satisfy the needs of the most demanding Internet gurus (and this benchmark offers features designed to enable serious DNS performance investigation), the box below demonstrates that it is also extremely easy for casual and first-time users to run: How to Run the DNS Benchmark After downloading and starting the utility (there's nothing to install), it's as easy as . . . 1 . . . 2 . . . 3 Click the “Nameservers” tab to select the main benchmark display and data pages. 2t Click the “Run Benchmark” button (it may take a moment to become enabled). 3t Click and read the “Conclusions” tab after the benchmark completes. Unless you're a super-guru, PLEASE really do read the “Conclusions” tab once the benchmark has completed. Some people have initially been overwhelmed and intimidated by this benchmark's deep and rich feature set, and by the amount of specific detail it generates. They haven't known what it meant or what, if anything, they should do about it. But you will discover that the “Conclusions” tab presents a distillation of all that, into a set of carefully worded . . . er . . . Conclusions. Really. Why a DNS Benchmark? People use alphabetic domain names (www.grc.com), but Internet data packets require numerical Internet IP addresses (4.79.142.202). So the first step required before anything can be done on the Internet is to lookup the site's or service's domain name to determine its associated Internet IP address. www.grc.com arrow-r [4.79.142.202] Since nothing can happen ...
5/5 4,752 Oct 09, 2019
Gibson Research Corporation <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/DNSBench1_th.png"border="0">
Dns Jumper v2.2
Dns Jumper v2.2 DNS, or domain name system, is the internet protocol that turns human readable website names (such as sordum.org) into machine readable numeric addresses. In some cases, you can improve browsing speed and/or improve your security by replacing the DNS provided by your internet service provider. DNS Jumper is a tool which makes this easy for you. Why you should use DNS Jumper: 1. It can aid in accessing blocked websites 2. It can improve security by changing to more secure DNS servers 3. It can help keep your children safe by blocking inappropriate websites (e.g. adult material) by selecting a Family Safe DNS server. 4. It can speed browsing by moving to a faster DNS server 5. Changing DNS servers manually can be done, but DNS Jumper greatly simplifies the process DNS Jumper 2.1 has some new and important features, such as Turbo Resolve which can apply the fastest DNS at startup. DNS Jumper is freeware, and portable (no installation needed). What is new: (Tuesday , 17. March 2020) 1. [FIXED] – Error when Resolve time is less than one millisecond 2. [FIXED] – Minor BUGS 3. [ADDED] – Quick Configuration menu and Hot keys (On DnsJumper tray icon) 4. [ADDED] – Option to stop Auto sort on Fastest DNS window (in DnsJumper.ini file AutoSortDnsList=True/False) How to Change Your DNS Settings 1. Under “Choose a DNS Server”, click the drop-down menu and select a server from the list 2. Click the “Apply DNS” button (for IPv6, be sure to tick the IPv6 checkbox) How to Restore Your DNS settings or use your ISP’s default DNS Again: There are two ways to do this: 1. Click the “Quick Configuration” button (the star icon) and select from the list 2. Under “Choose a DNS Server”, open the drop-down menu and select “Default (or Restore) DNS” from the list, then click “Apply DNS”. (for IPv6, be sure to tick the IPv6 ...
5/5 8,582 Oct 25, 2021
Sordum.org <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/dns_jumper2_th.png"border="0">
DOSBox v0.74-3
DOSBox v0.74-3 You can "re-live" the good old days with the help of DOSBox It can run plenty of the old classics that don't run on your new computer! DOSBox is a DOS-emulator that uses the SDL-library which makes DOSBox very easy to port to different platforms. DOSBox also emulates CPU:286/386 realmode/protected mode, Directory FileSystem/XMS/EMS, Tandy/Hercules/CGA/EGA/VGA/VESA graphics, a SoundBlaster/Gravis Ultra Sound card for excellent sound compatibility with older games... DOSBox is totally free of charge and OpenSource. DOSBox 0.74-3 has been released! A security release for DOSBox 0.74: Fixed that a very long line inside a bat file would overflow the parsing buffer. (CVE-2019-7165 by Alexandre Bartel) Added a basic permission system so that a program running inside DOSBox can't access the contents of /proc (e.g. /proc/self/mem) when / or /proc were (to be) mounted. (CVE-2019-12594 by Alexandre Bartel) Several other fixes for out of bounds access and buffer overflows. Some fixes to the OpenGL rendering. The game compatibility should be identical to 0.74 and 0.74-2. It's recommended to use config -securemode when dealing with untrusted files. This download is for the Windows version. If you need the MacOS version, download here. Click here to visit the author's website.
5/5 7,905 Jun 30, 2021
DOSBox <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/dosbox2_th.png"border="0">
DSynchronize v2.46.42
DSynchronize v2.46.42 DSynchronize is a program (Freeware) that syncronizes two or more directories on a local area network. The program compares every directory "Source" with the respective "Destination", then changes the "Destination" (adding, replacing, or deleting files and subdirectory) in such way to make those files or subdirectories identical to the "Source." It supports multiple filters (separated by "; ") type *.exe; *.txt etc. You can configure synchronizations to use Varying environments (% WINDIR%,% USERPROFILE% etc.). The use is rather intuitive. SUPPORTED SYSTEMS: ~~~~~~~~~~~~~~~~~~ Windows 10 Windows 8 Windows Seven Windows VISTA Windows 2003 Windows XP Windows 2000 Windows NT4 with SP6a and IE4 or superior. OPTIONS: ~~~~~~~~ "Save on exit" It serves for saving all the settings and remembering which directories to synchronize. "Antifragmentation" It reduces the fragmentation of the disk: In order to prevent holes in the file structure when a file is replaced, the old file is first removed from the structure and then the replacement file is written into the old file's place. "Set/Enable timer" This option sets the synchronization to run on a regular basis. You can tell it how much time to wait between synchronizations in terms of hours and minutes. You can also specify certain days that you would like synchronization to occur or a specific time to sync on the days specified. "Shutdown at the end" This option will automatically shut down the PC at the end of the synchronization. "You create folder if it does not exist" If the specified directory does not exist on the destination, it will automatically be created there with the same name as the source directory. "Add date to destination folder" This option add the date to files on the destination. For example, if the source file x is ". C:\mapindestination" it becomes "C:\mapindestination 18-07-2004 22.30", this can be used for creating ...
5/5 5,616 May 27, 2020
Dimio <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/dsynchronize2_th.png"border="0">
Dubbing AI v1.1.1
Dubbing AI v1.1.1 Free Real-Time AI Voice Changer What makes Dubbing stand out among other AI voice generators is the fact that as a real-time voice changer, it converts any voice into quality and cloned voices in less than 300 milliseconds. From gamers to live-streamers and content creators. Everybody can generate realistic-sounding voiceovers across different ages, languages, and accents using Dubbing AI. Its easy-to-use interface, low-usage, and high-end features make it a must-have tool for someone who wants to own a good voice when communicating online. Convert into Anyone in Real-Time, and it's FREE. Leveraging advanced AI algorithms and deep learning. The realistic real-time voice changer catches the precise tone and picks up even the smallest expression in the human voice and converts it into any voice you wish. Dubbing creates life-like synthetic voices that mimic the tonalities and prosodies of human voices. Dubbing AI is the perfect tool for gamers and streamers looking to enhance their game experience and content quality. When compared to similar AI voice changers such as Voicemod, MorphVox, and Voice.ai, Dubbing provides more iconic character voices that allow gamers to explore their voice avatar as they immerse in the game. With over 1000 tones of voice free to use, and updates on a weekly basis. Dubbing AI allows you to explore voices from the latest trending game and anime characters to famous celebrities. Most importantly, Dubbing AI is FREE. Low-Latency and Usage. Dubbing AI’s cutting-edge algorithm supports Dubbing to do all these amazing features in extremely low usage, Dubbing only runs in your CPU and only uses 2-3%, while compared to RVC which runs around 25-50% of your CPU and 15% of your GPU. Dubbing also minimized memory storage to around 300M. We want to ensure that Dubbing AI will not be a burden while you play your favorite game ...
5/5 679 Dec 08, 2023
HALO INTERACTIVE PTE. LTD. <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/DubbingAI1_th.png"border="0">
EaseBackup v8.09 R1
EaseBackup v8.09 R1 EaseBackup is an easy-to-use backup solution that lets you protect your information everywhere, anytime - at home, at work, or on the road. It keeps files and folders secure by storing them on your hard and removable drives, CD/DVD, FTP Servers, Amazon S3 account and tapes. Restoring is as easy as clicking a button, but you can also use a number of advanced options. Patch mode reduces size of backup archives on 80-90%! Securing the files you have on your home computer or on your workstation at the office, is a very important part of a productive and reliable working environment. According to statistics, dozens of gigabytes of data are being lost or damaged every single day. There are thousands of possible reasons for loss of valuable information stored on your computer: accidents, virus attacks, human errors, power problems. In order to be protected from unexpected loss of important data, people backup their files. However, backup on the same hard disk does not provide the required safety - in case of disk crash all data will be lost including backup copies. EaseBackup has been designed to protect your information anywhere, anytime - at home, at work, or on the road, and it keeps your files and folders secure by storing them on another computer, removable disks, FTP Server, Amazon S3, Azure Storage and Google Storage account or tape drives, An additional DBBackup module allows you to backup Oracle, MS SQL Server and MS Exchange Server databases! Unlike traditional backup programs, EaseBackup maintains its own list of backed up files and every time compares this list against all found disk files. If a Backup Set has the latest version of a file, this file won't be backed up again. This technology ...
5/5 4,900 Jul 18, 2019
KieSoft <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/EaseBackup1_th.png"border="0">
EG ClamNet Antivirus v1.0.1.0
EG ClamNet Antivirus v1.0.1.0 A simple antivirus that provide a graphical interface for ClamAV and real-time protection. EG ClamNet antivirus is simple and user friendly antivirus (currently for Windows OS ) that uses ClamAV as an internal scanning engine to detect trojans, viruses, malware and other known malicious threats. It can be installed on the existing default windows antivirus (Windows Defender) and compatible with it as extra protection. Antivirus and Internet Security: EG ClamNet Antivirus is powered by ClamAV which has fast scanning, detects over 9 millions viruses, malware, worms and trozens. It also protects from MS Office macro viruses, mobile malware, other threats (including known ransomware). Cleaner: EG ClamNet Antivirus has an additional feature of effective cleaning of junk files. With this feature you can optimize your system, increase memory space and system speed by cleaning junk files. Cleaning such junk files improves your system's security and speed-up your system. Features Custom, Quick, Full and Real-time Scanning Quarantine folder Junk Files Cleaner Automatic Updates Powered by ClamAV (An opensource, powerful, fast virus scanning engine) Supported Platforms Microsoft Windows (7, 8, 8.1, 10 and 11) This download is for the 64bit version. If you need the 32bit version, download here. If you are already using EG ClamNet Antivirus, use these update only files. EGCNAV_WINx64_UPDATE.zip EGCNAV_WINx86_UPDATE.zip Click here to visit the author's website.
5/5 1,578 Jul 26, 2023
EG1.in <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/EGClamNet3_th.png"border="0">
Ekiga v4.0.1
Ekiga v4.0.1 Ekiga (formerly known as GnomeMeeting) is an open source SoftPhone, Video Conferencing and Instant Messenger application over the Internet. It supports HD sound quality and video up to DVD size and quality. Because it uses both of the major telephony standards (SIP and H.323), it is interoperable with many service providers and many types of hardware and software. Ekiga Softphone Features Main Features of the Ekiga Softphone in a nutshell Version 4.0 Ease of use with a modern Graphical User Interface Audio and Video free calls through the internet Free Instant Messaging through the internet with Presence support Audio (and video) calls to landlines and cell phones with support to the cheapest service providers High Definition Sound (wideband) and Video Quality up to DVD quality (high framerate, state of the art quality codec and frame size) Free of choice of the service provider SMS to cell phones if the service provider supports it (like the default provider) Standard Telephony features support like Call Hold, Call Transfer, Call Forwarding, DTMF Remote and Local Address Book support: Remote Address Book support with authentification using the standard LDAP technology, Local Address support in Gnome (Evolution) Multi platform: Windows and GNU/Linux Wide interoperability: Ekiga use the main deployed stantards for telephony protocols (SIP and H.323) and has been tested with a wide range of softphones, hardphones, PBX and service providers Graphical User Interface Version 4.0 HIG Compliant GUI: Ekiga looks right, behaves properly, and fits into the GNOME user interface as a whole Translated into Many Languages Contact centric interface: preferred contacts can be ...
5/5 3,183 Mar 07, 2020
Damien Sandras <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Ekiga1_th.png"border="0">
Ellp 1.0.0.1322
Ellp 1.0.0.1322 When your PC is on, simply Automate. Ellp™ connects and automates things you do every day on your device, so you can focus on what matters most. Simplify your life in 3 simple steps Get started in seconds! Choose Flip through and select your preferred Ellp cards from a number of categories including the Internet, social media, power, performance, space, security, multimedia and privacy. Edit Set your preferences once and start getting the most out of your device right away. Personalize each Ellp card based on your needs, using Ellp’s simple editor. Start Easily automate your device by activating the Ellp cards that matter most to you. Enjoy the peace of mind that comes with having a personal device helper.
5/5 4,895 Nov 10, 2017
Ellp Limited <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/ellp1_th.png"border="0">
Emsisoft Decryptor for Paradise v1.0.0.1
Emsisoft Decryptor for Paradise v1.0.0.1 The Paradise ransomware encrypts victims using Salsa20 and RSA-1024, and appends one of several extensions such as ".paradise", "2ksys19", ".p3rf0rm4", ".FC", ".CORP", and ".STUB" An example ransom note "---==%$$$OPEN_ME_UP$$$==---.txt" can be found below. WHAT HAPPENED! Your important files produced on this computer have been encrypted due a security problem. If you want to restore then write to the online chat. Contact! Online chat: http://prt-recovery.support/chat/6-Support Your operator: Support Your personal ID: [redacted] Enter your ID and e-mail in the chat that you would immediately answered. Attention! Do not rename encrypted files. Do not try to decrypt your data using third party software, it may cause permanent data loss. Do not attempt to use the antivirus or uninstall the program. This will lead to your data loss and unrecoverable. Decoders of other users is not suitable to decrypt your files - encryption key is unique. How to use the Emsisoft Decryptorfor Paradise MPORTANT! Be sure to quarantine the malware from your system first, or it may repeatedly lock your system or encrypt files. If your current antivirus solution fails to detect the malware, it can be quarantined using the free trial version of Emsisoft Anti-Malware. If your system was compromised through the Windows Remote Desktop feature, we also recommend changing all passwords of all users that are allowed to login remotely and check the local user accounts for additional accounts the attacker might have added. How to decrypt your files 1. Download the decryptor from the same site that provided this “How To” document. 2. Run the decryptor as an administrator. The license terms will show up next, which you have to agree to by clicking the “Yes” button: 3. After accepting the terms, select your file pair using the “Browse” buttons. Then, click the “Start” button. 4. The decryptor will display the reconstructed encryption details once the recovery process has finished. The display is purely informational ...
5/5 3,440 Jan 21, 2020
Emisoft <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/ParadiseDecryptor1_th.png"border="0">
Eqonomize! v1.5.6
Eqonomize! v1.5.6 Efficient and easy accounting for personal finances. Eqonomize! is a cross-platform personal accounting software, with focus on efficiency and ease of use for small households. Eqonomize! provides a complete solution, with bookkeeping by double entry and support for scheduled recurring transactions, security investments, and budgeting. It gives a clear overview of past and present transactions, and development of incomes and expenses, with descriptive tables and charts, as well as an approximation of future account values. Eqonomize! is free software, licensed under the GNU General Public License v3 (or later). Features: • Bookkeeping Bookkeeping by double entry Transactions: expenses, incomes, transfers, and security transactions Transaction properties: description, value, quantity, date, payee/payer, from/to account/category, tags, associated files, links, and comments (plus specific properties for transactions related to securities and loans) Split transaction Refunds and repayments Explicit support for loans/debts with interest and fee payments Scheduled transactions, with support for a wide range of recurrency schemes, and confirmation of occurrences Support for multiple currencies, with selectable currency for each account (included currencies are automatically updated) Reconciliation Parameters of the last entered transaction, with the same description (or category or payee/payer), is automatically filled in when a description (or category/payer/payee) is entered (with auto-completion) Value input fields support arithmetics and currency conversion • Budgeting ...
5/5 6,159 Apr 19, 2024
Eqonomize Project <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Eqonomize1_th.png"border="0">
Eraser v6.2.0.2991
Eraser v6.2.0.2991 Eraser is an advanced security tool for Windows which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Eraser is currently supported under Windows XP (with Service Pack 3), Windows Server 2003 (with Service Pack 2), Windows Vista, Windows Server 2008, Windows 7, 8, 10 and Windows Server 2012, 2016. Eraser is Free software and its source code is released under GNU General Public License. Why Use Eraser? Most people have some data that they would rather not share with others – passwords, personal information, classified documents from work, financial records, self-written poems, the list continues. Perhaps you have saved some of this information on your computer where it is conveniently at your reach, but when the time comes to remove the data from your hard disk, things get a bit more complicated and maintaining your privacy is not as simple as it may have seemed at first. Your first thought may be that when you ‘delete’ the file, the data is gone. Not quite, when you delete a file, the operating system does not really remove the file from the disk; it only removes the reference of the file from the file system table. The file remains on the disk until another file is created over it, and even after that, it might be possible to recover data by studying the magnetic fields on the disk platter surface. Before the file is overwritten, anyone can easily retrieve it with a disk maintenance or an undelete utility. Eraser Features It works with Windows XP (with Service Pack 3), Windows Server 2003 (with Service Pack 2), Windows Vista, Windows Server 2008, Windows 7,8,10 and Windows Server 2012.Windows 98, ME, NT, 2000 can still be used with version 5.7!.It works with any drive that works with Windows.Secure ...
5/5 7,825 Dec 17, 2020
The Eraser Team <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Eraser1_th.png"border="0">
ESET EternalBlue Checker 1.0.0.1
ESET EternalBlue Checker 1.0.0.1 ESET has released a free tool to help determine whether your Windows machine is patched against EternalBlue. If the tool finds a vulnerability in your system due to missing Microsoft patches, Your computer is vulnerable will be displayed. Press any key to open the Microsoft Windows update page. Click Microsoft Update Catalog in Method 2: Microsoft update Catalog section. On the Microsoft Update Catalog page, find your operating system in the Products column and click the Download button next to your system. Click the link in the Download window to download the security update for your system. After the security update has been installed, restart your computer. After the computer has restarted, run ESETEternalBlueChecker.exe again to verify that the security update installed correctly and your system is no longer at risk. If the security update was installed correctly, Your computer is safe, Microsoft security update is already installed will be displayed. Warn colleagues who frequently receive emails from external sources – for instance financial departments or Human Resources. Regularly back up your data. In the event of infection, this will help you recover all data. Do not leave external storage used for backups connected to your computer to eliminate the risk of infecting your backups. If your system requires Windows Updates to receive the patch for this exploit, create new backups after applying the patch. Disable or restrict Remote Desktop Protocol (RDP) access Disable macros in Microsoft Office. If you are using Windows XP, disable SMBv1.
5/5 4,922 Nov 13, 2019
ESET <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/ESET EternalBlue Checker1_th.png"border="0">
ESET SysInspector v1.4.2.0
ESET SysInspector v1.4.2.0 Free PC diagnostic tool Experiencing problems? Use the ESET SysInspector utility to inspect your PC. Fix problems straight away, or submit a log to ESET Customer Care for resolution. ESET SysInspector is an easy to use diagnostic tool that helps troubleshoot a wide range of system issues. Coming either as a free, standalone application, as well as, integrated into ESET NOD32 Antivirus, ESET Internet Security and ESET Smart Security Premium, it captures critical and detailed information about your computer. Solve problems While best used to track down the presence of malicious code, ESET SysInspector also comes in handy when resolving issues related to: Running processes and services Presence of suspicious and unsigned files Software issues Hardware incompatibility Outdated or malfunctioning drivers An unpatched operating system Broken registry entries Suspicious network connections Easily identify problems ESET SysInspector assigns each entry a color-coded risk level. Simply move the slider to filter out the most severe issues you want to prioritize. Additionally, the "Compare Logs" functionality allows you to keep track of system modifications simplifying the process of identifying potential problems. System requirements Operating Systems: Windows 11/10/8/7/Vista/XP, Windows Server 2012/2008R2/2008/2003 Processor Architecture: i386 (Intel®80386), amd64 (x86-64) Memory: 38 MB Documentation Online user guide Changes: Version 1.4.2.0 Added: Dumping of WMI scripts Fixed: Various localization, documentation and functional bugs This download is for the 64bit version. If you need the 32bit version, download here. Click here to visit the author's website.
5/5 3,236 Dec 08, 2021
ESET, spol. s r.o. <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/ESETSysInspector1_th.png"border="0">
Eternal Blues 0.0.0.8
Eternal Blues 0.0.0.8 Eternal Blues is a free EternalBlue vulnerability scanner. It helps finding the blind spots in your network, these endpoints that are still vulnerable to EternalBlue. Just hit the SCAN button and you will immediately start to get which of your computers are vulnerable and which aren’t. That’s it. If you wish, you can switch networks, or edit your own (yeah, you can also scan the world wide web if you wish). Please use it for good cause only. We have enough bad guys already… Was this tool tested in real networks? Oh yeah. Obviously I cannot say which, but with almost every network I connected to, there were a few vulnerable computers. IMPORTANT: It does *not* exploit the vulnerability, but just checks whether it is exploitable. Yet another vulnerability scanner? There are many vulnerability scanners out there. So… why did I create another? Mainly for the ease of use. The majority of latest WannaCry, NoPetya (Petya, GoldenEye or whatever) victims, are not technical organizations and sometimes just small business who don’t have a security team, or even just an IT team to help them mitigate this. Running NMap, Metasploit (not to mention more commercial products) is something they will never do. I aimed to create a simple ‘one-button’ tool that tells you one thing and one thing only – which systems are vulnerable in your network. Tips If you’re about to run it in your working environment, please update the IT/Security team in advance. You don’t want to cause (IDS/IPS/AV) false alarms If vulnerable systems were found – please take a Windows update asap For God’s sake, please disable SMBv1 already. Whether your systems are patched or not. This protocol was written over 3 decades ago…! If you would like to enjoy the ...
5/5 4,909 Nov 13, 2019
Omerez <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/EternalBlues1_th.png"border="0">
Eusing Maze Lock v4.2
Eusing Maze Lock v4.2 Pattern based technique to lock your computer. Locking your screen prevents other people from accessing your computer while you are away from it. There are several applications able to help you lock your computer. However, few of these applications are comparable to Eusing Maze Lock. Eusing Maze Lock uses a new technique to help your computer. This technique is pattern based. You need first to set your own unlock pattern by connecting some of the nine dots together (There is a default unlock pattern has been pre-set). When you try to unlock your computer, you need to draw the same pattern exactly as you set. It is a cool software which lets you to lock your pc with your customize maze. Eusing Maze Lock is a powerful tool designed to help you lock your computer with a single click on the tray icon. While it provides a different locking system than the one bundled into Windows, Eusing Maze Lock places an icon in the system tray that allows you to either lock the machine instantly or using a custom hotkey. Then Eusing Maze Lock will display a lock screen and protected your computer. Overall, Eusing Maze Lock is a useful application that serves its purpose and provides some interesting configuration options that can be easily set up by both beginners and more experienced users. You can specify the lock screen background image, change the pattern to 4 x 4 or 5 x 5. Eusing Maze Lock can auto-lock the computer when windows startup and computer inactivity. With this unique application installed on your computer you will get a truly impressive security application. Key Features Pattern based technique to lock your computer Quick and safe computer lock by hot key, or mouse click ...
5/5 1,862 Dec 08, 2021
Eusing Software <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/EusingMazeLock1_th.png"border="0">
EventLogChannelsView v1.19 32bit
EventLogChannelsView v1.19 32bit EventLogChannelsView is a simple tool for Windows 10/8/7/Vista that shows the list of all event log channels on your system, including the channel name, event log filename, enabled/disabled status, current number of events in the channel, and more... It also allows you to easily make some actions on multiple channels at once: enable/disable channels, set their maximum file size, and clear all events stored in the channels. System Requirements This utility works on any version of Windows, starting from Windows Vista and up to Windows 10. Both 32-bit and 64-bit systems are supported. Windows XP and older systems are not supported. Versions History Version 1.19: Added 'Add Header Line To CSV/Tab-Delimited File' option (Turned on by default). Start Using EventLogChannelsView EventLogChannelsView doesn't require any installation process or additional DLL files. In order to start using it, simply run the executable file - EventLogChannelsView.exe After running EventLogChannelsView, the main window displays the list of all event log channels currently available on your system. If you want to connect a remote computer on your network, press F7 (Choose Data Source), choose to load the event channels from a remote computer and type the computer name. You can select one or more channels and then disable them (F2), enable them (F3), set their maximum file size or clear all events stored in the channel. You can use the 'Save Selected Items' option to export the channels list to html/xml/csv/tab-delimited file. Columns Description Channel Name: Name of the event log channel. Publisher: Name of the channel publisher. Filename: Name of the event log filename ( .evtx and .etl files) Full Path: Full path of the event log filename Enabled: Displays 'Yes' if the event log channel is enabled and 'No' if ...
5/5 4,430 Nov 29, 2019
Nir Sofer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/eventlogchannelsview1_th.png"border="0">
EventLogChannelsView v1.19 64bit
EventLogChannelsView v1.19 64bit EventLogChannelsView is a simple tool for Windows 10/8/7/Vista that shows the list of all event log channels on your system, including the channel name, event log filename, enabled/disabled status, current number of events in the channel, and more... It also allows you to easily make some actions on multiple channels at once: enable/disable channels, set their maximum file size, and clear all events stored in the channels. System Requirements This utility works on any version of Windows, starting from Windows Vista and up to Windows 10. Both 32-bit and 64-bit systems are supported. Windows XP and older systems are not supported. Versions History Version 1.19: Added 'Add Header Line To CSV/Tab-Delimited File' option (Turned on by default). Start Using EventLogChannelsView EventLogChannelsView doesn't require any installation process or additional DLL files. In order to start using it, simply run the executable file - EventLogChannelsView.exe After running EventLogChannelsView, the main window displays the list of all event log channels currently available on your system. If you want to connect a remote computer on your network, press F7 (Choose Data Source), choose to load the event channels from a remote computer and type the computer name. You can select one or more channels and then disable them (F2), enable them (F3), set their maximum file size or clear all events stored in the channel. You can use the 'Save Selected Items' option to export the channels list to html/xml/csv/tab-delimited file. Columns Description Channel Name: Name of the event log channel. Publisher: Name of the channel publisher. Filename: Name of the event log filename ( .evtx and .etl files) Full Path: Full path of the event log filename Enabled: Displays 'Yes' if the event log channel is enabled and 'No' if ...
5/5 4,442 Nov 29, 2019
Nir Sofer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/eventlogchannelsview1_th.png"border="0">
Everything v1.4.1.1024
Everything v1.4.1.1024 A local search engine that locates files and folders by filename instantly in Windows. Unlike Windows search "Everything" initially displays every file and folder on your computer (hence the name "Everything"). You type in a search filter to limit what files and folders are displayed. Features Small installation file Clean and simple user interface Quick file indexing Quick searching Minimal resource usage Share files with others easily Real-time updating What is "Everything"? "Everything" is search engine that locates files and folders by filename instantly for Windows. Unlike Windows search "Everything" initially displays every file and folder on your computer (hence the name "Everything"). You type in a search filter to limit what files and folders are displayed. How long will it take to index my files? "Everything" only indexes file and folder names and generally takes a few seconds to build its database. A fresh install of Windows 10 (about 120,000 files) will take about 1 second to index. 1,000,000 files will take about 1 minute. Does Everything search file contents? Yes, "Everything" can search file content with the content: search function. File content is not indexed, searching content is slow. Does "Everything" hog my system resources? No, "Everything" uses very little system resources. A fresh install of Windows 10 (about 120,000 files) will use about 14 MB of ram and less than 9 MB of disk space. 1,000,000 files will use about 75 MB of ram and 45 MB of disk space. Does "Everything" monitor file system changes? Yes, "Everything" does monitor file system changes. Your search windows will reflect changes made to the file system. Does "Everything" contain any malware, spyware or adware? No, "Everything" does not contain any malware, spyware or adware. Does "Everything" miss changes made to the file system if it is not running? No, "Everything" can be closed and restarted without missing ...
5/5 5,740 May 26, 2023
voidtools <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Everything1_th.png"border="0">
Farbar Service Scanner v30.4.2023.0
Farbar Service Scanner v30.4.2023.0 A small portable tool that allows you to diagnose network connectivity issues due to corrupted or missing Windows services. Certain malware, such as TDSS, may delete or corrupt Windows services, which would cause your computer to no longer have network connectivity. When FSS is run it will display a detailed report on the services, driver services, their configurations and the files that are responsible for network connectivity. Using this information a user can diagnose issues with their network connectivty as well as other Microsoft services. The tool checks the following services: • RpcSs • PlugPlay • Internet Services • Windows Firewall • System Restore • Security Center/Action Center • Windows Update • Windows Defender Click here to visit the author's website.
5/5 5,924 Apr 02, 2024
Farbar <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/FarbarServiceScanner1_th.png"border="0">
Fastlock v1.2
Fastlock v1.2 Fastlock is a small and fast utility to hide the screen activity with a security password. This tool blocks any windows control components: Alt+F4, Alt+Tab, Task Manager, Windows Keys, Security Screen. There is no way to kill Fastlock's process and get access to your desktop. Difference to system's lock screen: There is no CPU deceleration, which enables you an instant access to your programs after unlocking. Notice, that Fastlock is only a temporary solution to lock your screen. Changelog: Version 1.2: - Fixed taskbar and starbutton flickering - Fixed possible access to the startmenu by spamming winbutton - Implemented new error exceptions - Changes in the Fastlock's Password Tool are now being processed in real-time - Locked keys and changing keyboard layout are now being displayed
5/5 4,828 May 30, 2017
2xDSoft <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/fastlock1_th.png"border="0">
Fawkes v0.3
Fawkes v0.3 Image "Cloaking" for Personal Privacy 2020 is a watershed year for machine learning. It has seen the true arrival of commodized machine learning, where deep learning models and algorithms are readily available to Internet users. GPUs are cheaper and more readily available than ever, and new training methods like transfer learning have made it possible to train powerful deep learning models using smaller sets of data. But accessible machine learning also has its downsides. A recent New York Times article by Kashmir Hill profiled clearview.ai, an unregulated facial recognition service that has downloaded over 3 billion photos of people from the Internet and social media and used them to build facial recognition models for millions of citizens without their knowledge or permission. Clearview.ai demonstrates just how easy it is to build invasive tools for monitoring and tracking using deep learning. So how do we protect ourselves against unauthorized third parties building facial recognition models that recognize us wherever we may go? Regulations can and will help restrict the use of machine learning by public companies but will have negligible impact on private organizations, individuals, or even other nation states with similar goals. The SAND Lab at University of Chicago has developed Fawkes1, an algorithm and software tool (running locally on your computer) that gives individuals the ability to limit how their own images can be used to track them. At a high level, Fawkes takes your personal images and makes tiny, pixel-level changes that are invisible to the human eye, in a process we call image cloaking. You can then use these "cloaked" photos as you normally would, sharing them on social media, sending them to friends, printing them or displaying them on digital devices, the same way you would any other photo. The difference, however, is that if and when someone ...
5/5 3,068 Aug 20, 2020
The SAND Lab at University of Chicago <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Fawkes1_th.png"border="0">
Fido v1.50
Fido v1.50 A PowerShell script to download Windows or UEFI Shell ISOs Fido is a PowerShell script that is primarily designed to be used in Rufus, but that can also be used in standalone fashion, and whose purpose is to automate access to the official Microsoft Windows retail ISO download links as well as provide convenient access to bootable UEFI Shell images. This script exists because, while Microsoft does make retail ISO download links freely and publicly available (at least for Windows 8 through Windows 11), up until recent releases, most of these links were only available after forcing users to jump through a lot of unwarranted hoops that created an exceedingly counterproductive, if not downright unfriendly, consumer experience, that greatly detracted from what people really want (direct access to ISO downloads). As to the reason one might want to download Windows retail ISOs, as opposed to the ISOs that are generated by Microsoft's own Media Creation Tool (MCT), this is because using official retail ISOs is currently the only way to assert with absolute certainty that the OS content has not been altered. Indeed, because there only exists a single master for each of them, Microsoft retail ISOs are the only ones you can obtain an official SHA-1 for allowing you to be 100% sure that the image you are using has not been corrupted and is safe to use. This, in turn, offers assurance that the content YOU are using to install your OS, which it is indeed critical to validate beforehand if you have the slightest concern about security, does match, bit for bit, the one that Microsoft released. On the other hand, regardless of the manner in which Microsoft's Media Creation Tool produces its content, because no two MCT ISOs are ever the same (due to MCT always regenerating the ISO ...
5/5 2,602 Jul 17, 2023
Pete Batard <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Fido3_th.png"border="0">
Firewall App Blocker v1.9
Firewall App Blocker v1.9 Simplifies the blocking of apps in Windows Firewall with simple drag and drop. In Windows, you can use Windows Firewall to block or unblock certain applications, but it doesn’t offer an easy-to-use interface for its advanced features. If you want to block an application from accessing the internet, you must go through the following steps: 1. Click the Windows Start Menu and open Control Panel 2. Select System &amp; Security 3. Then in the Firewall section, you select “Allow a program through the Windows Firewall” 4. If the program you wish to block or unblock isn’t listed, you must click “Allow another program” to add it. Choose the application in the list and select “Add”. Else you must then browse the hard drive to find it, and so on. This seems complicated for the average user. Firewall App Blocker makes the process very easy! Simply drag and drop the application you wish to block into the FAB window, or browse the hard disk to find it.That’s it! If you want to allow it access again, just right clik on it and choose “Allow” or select it and press the Delete button also you can use Allow button. In this version there are some extra features on the Firewall menu, including “White List Mode”, Block internet , Restrict Firewall Options etc. What is WhiteList Mode: it will block everything except on the white listed items, to activate it tick the “Enable WhiteList” box on the right bottom corner , The whitelist mode denies access to all network interfaces, After enabling WhiteList Mode Drag and drop an Application/Applications on the “Firewall Application Blocker” interface to Allow it/them , It was the most wanted feature Following command can be used to allow WhatsApp in whitelist. You can use this command with task scheduler or in a script. fab_x64.exe /a /allow ...
5/5 5,598 Oct 02, 2022
Sordum.org <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Firewall App Blocker1_th.png"border="0">
FixExec
FixExec FixExec is a program that is designed to fix executable file associations for the .bat, .exe, and .com file extensions. If the program detects any of these associations are missing, changed, or hijacked, the settings will be set back to the original Windows defaults. When file associations for batch, executable, or COM files are changed it could cause your executables to no longer start. For example, when you double-click on a .bat, .exe, and .com file the programs will not start and Windows will ask what you would like to start the program with. FixExec is designed to resolve these issues by rebuilding the executable file association Windows Registry keys that have become damaged. Furthermore, it is not uncommon for malware to change the .exe, .bat, or .com file associations so that when you launch a program it will launch a malware file instead. This makes it very difficult to start your security programs to help you remove the infection as they no longer will start properly. With this in mind FixExec will terminate any processes found in locations that malware typically starts from. This will allow you to quickly terminate the malware and reset the file associations so that you can then properly launch your security programs. It may, though, terminate legitimate programs when running. Do not worry if this happens as you just can restart them or restart your computer to get these processes started again. You can download FixExec as a native 64-bit application that will only run on 64-bit Windows versions. If you would like to use one executable, that works properly on both 32-bit and 64-bit versions of Windows, then you can download the 32-bit version. The 32-bit version of FixExec also includes the 64-bit version for ease of use. When the 32-bit version is ...
5/5 5,795 Mar 03, 2017
Lawrence Abrams <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/FixExec1_th.png"border="0">
FixWin 11 v11.1
FixWin 11 v11.1 A free Windows repair tool that lets you fix Windows problems, issues, and annoyances with a click. It has been updated to version 11 and is optimized to support Windows 11 and Windows 10 operating systems. The fixes have been categorized under 6 tabs: File Explorer: Offers fixes to resolve problems relating to Windows File Explorer. Internet and Connectivity: Lets you fix Internet problems that you be facing after upgrading Windows OS System fixes: Offers fixes to several common Windows problems and includes an option to reset thumbnail cache, re-register all system DLL files and fixes for Windows Activation issues System Tools: Offers to fix built-in tools that may not be working properly. A new Advanced System Information tab displays some specific advanced information about your system, like the number of threads in the processor, number of logical processors, maximum display resolution, maximum refresh rate, etc. Troubleshooters: This section provides direct links to bring up the built-in Windows Troubleshooters and download links to other Troubleshooters released by Microsoft. Additional Fixes: Offers several other fixes for Windows 11 and Windows 10. How to repair Windows 11 problems using FixWin 11 1) We first suggest that you run the System File Checker. The button provided on the Welcome page will run sfc /scannow and will check for and replace any corrupted Windows system files. It is expected to take anywhere from 5-10 minutes. If asked to, reboot your computer. 2) If you are facing problems relating to the Microsoft or the Store apps, re-register the Store apps. A 1-click button has been provided on the Welcome page that lets you do so easily. 3) If you are facing major issues with Windows 11/10, running the DISM utility to repair your Windows System Image, might be a really good idea. A button for this too ...
5/5 6,675 Aug 01, 2023
Paras Sidhu <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/FixWin10_th.png"border="0">
FixWin v 2.1 for Windows 8
FixWin v 2.1 for Windows 8 FixWin 2 for Windows 8 is a portable tool that offers to repair and fix over 50 common Windows annoyances, issues &amp; problems. They have been categorized under 6 tabs, viz : File Explorer, Internet &amp; Connectivity, Modern UI, System Tools, Troubleshooters and Additional Fixes. The best part of using the tools, is that it provides direct links to bring up the built-in 16 Windows Troubleshooters. No need to open your control panel and search from them! Simply open the Troubleshooters tab of FixWin and open any one of the troubleshooters. It’s so simple! Here is the List of fixes offered by FixWin v 2 for Windows 8. File Explorer – Recycle Bin icon is missing from Desktop – Reset Folder view settings to default when folders are showing different command bar than content – Fix Folder Options. Folder Options is missing from Control Panel or has been disabled by administrator or malware – Fix Recycle Bin when its icon doesn’t refresh automatically – Explorer doesn’t start on startup in Windows – Thumbnails not showing in File Explorer – Reset Recycle Bin. Recycle Bin is corrupted. – CD drive or DVD drive isn’t recognised by Windows or other programs – “Class not registered” error in File Explorer or Internet Explorer – “Show hidden files, folders and drives” option isn’t shown in Folder Options Internet &amp; Connectivity – Right Click Context Menu of Internet Explorer is disabled – Cannot connect to internet. There’s some problem in Internet Protocol (TCP/IP) – Problem regarding DNS resolution. Fix it by clearing DNS resolver cache – Long list of failed and installed updates. Clear Windows Update History – Problem with Windows Firewall settings. Reset Windows Firewall Configuration – Reset Internet Explorer To Default Configuration. – Runtime errors are appearing in Internet Explorer while surfing – Optimize Internet Explorer maximum connections per server to download more than two files at ...
5/5 6,930 Mar 03, 2017
The Windows Club <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/fixwin-for-windows-8-600x428_th.png"border="0">
EXE Flashpoint 10 Infinity
Flashpoint 10 Infinity BlueMaxima's Flashpoint is a webgame preservation project. Internet history and culture is important, and content made on web platforms including, but not limited to Adobe Flash, make up a significant portion of that culture. This project is dedicated to preserving as many experiences from these platforms as possible, so that they aren't lost to time. Since early 2018, Flashpoint has saved more than 90,000 games and 10,000 animations running on 33 different platforms. Flashpoint was started in January 2018 by BlueMaxima in an attempt to outrun the disappearance of content prior to the death of Flash. It has since evolved into an international project involving over 100 community contributors, encompassing both webgames and animations created for numerous internet plugins, frameworks, and standards. Flashpoint utilizes a strong selection of open-source software. By combining the power of Apache, a custom-built launcher, and our own application called the Flashpoint Secure Player, we can play web-based media in a quick, user-friendly environment without leaving permanent changes or security holes on your computer. We offer two versions of the software; Ultimate, which contains every piece of media in an offline ready format, and Infinity, a smaller distribution that allows you to download and play content at will. Both versions are unaffected by the end of support for Flash and other plugins. This project is and will always be entirely non-profit, to preserve the sense of community and sharing that came with Flash and its ilk. Search the Collection - Request Content for Archival WARNING FOR AVAST AND AVG USERS: Important Flashpoint components will be detected as a virus and quarantined; this is a false positive. Follow these instructions to make an exception for Flashpoint. BlueMaxima works hard to keep all of their downloads virus-free. Common Issues All games are opening to a white screen. This is commonly caused by ...
5/5 2,284 Jul 08, 2021
BlueMaxima <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Flashpoint1_th.png"border="0">
Floorp v10.14.0
Floorp v10.14.0 A Firefox-based web browser that focuses on a balance of web openness, anonymity, security and functionality. Features Strong tracker protection Floorp includes a powerful tracking blocker by default to protect you from various malicious trackings that lurk on the web. In addition, measures against fingerprint collection. Extensive customization Unlimited layout customization for Floorp. Move the position of the tab bar to the bottom of the window or hide the title bar. Your own Floorp. Switchable design In addition to customizing with Firefox's usual themes, you can switch the browser's interface from 5 different designs. Also OS specific design. Regular release Floorp is a Firefox ESR based Rapid Release browser with feature updates every 4 weeks. We provide updates faster than Firefox and fix security issues faster. No information collection Floorp does not have the ability to collect user information. We only know the total number of downloads and updates for all users! We don't need to know your personal information. Fully open source Floorp's source code is fully open, and anyone can look at the source code and build Floorp. It's not just the browser itself that exposes. The build environment is also open source. This download is for the Windows 64bit online installer version. All other download assets are below: Windows: floorp-win64.installer.exe (full installer) macOS: floorp-macOS-universal.dmg Linux: floorp-10.14.0.deb floorp-10.14.0.en-US.linux-x86_64.tar.bz2 floorp-10.14.0.en-US.linux-aarch64.tar.bz2 Click here to visit the author's website.
5/5 941 Jun 29, 2023
Ryosuke Asano <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Floorp1_th.png"border="0">
Forkle v0.62.0.601
Forkle v0.62.0.601 Yet another browser? Forkle is probably the simplest viable web browser for Windows available. It has no extensions, no tabs, no toolbars, and no bookmark manager. So why would you want to give it a try? Compared to Firefox, Chrome, Edge, or IE: ● It has the largest viewable screen space ● It is privacy-oriented: zero behavior tracking, zero telemetry ● It has the most lightweight adblocker ● It has the fastest cold startup time ● It has the smallest binary size ● It often has the lowest RAM usage ● It is Keepass friendly Security is also a top priority in Forkle. Its feature set is intentionally limited, to minimize both distractions and attack vectors. With a binary size under 2MB, Forkle is extremely lightweight, making it ideal for quick, casual web browsing. It is also an excellent match for USB thumbdrives and resource-limited systems. Getting started No installation needed! Just unzip to any folder, and launch. Options can be customized by editing config files. Requirements Windows 7 or later, with the latest security updates. Admin rights are not required. Beta This is an experimental browser still in beta, with many features still incomplete. Expect bugs and rough edges. Some websites might not display properly. Privacy Forkle fully respects your privacy and contains no adware, malware or sponsored content of any sort. It also does not send data to any third party. SHA256:5daf53336a47410fab60fef1a4fd2bf1627c3edd4f0904ce572207903a6cfbfa Click here to visit the author's website.
5/5 3,985 Apr 11, 2019
Radsix <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/forkle_th.png"border="0">
Foxit Reader Portable v2024.1
Foxit Reader Portable v2024.1 View, annotate, form fill, and sign PDF across desktop, mobile, and web. Foxit Reader is a free PDF document viewer and creator, with incredible small size, breezing-fast launch speed and rich feature set. Whether you're a consumer, business, government agency, or educational organization, you need to read, create, sign, and annotate (comment on) PDF documents and fill out PDF forms. Foxit Reader is a small, lightning fast, and feature rich PDF viewer which allows you to open, view, sign, and print any PDF file. Foxit Reader is the only high volume PDF reader providing a complete PDF creation solution, providing the power of PDF creation to every desktop. Foxit Reader comes equipped with comprehensive protection against security vulnerabilities, keeping your system and company safe. Note that ConnectedPDF can not be used portably due to it requiring a locally-installed service. System Requirements: Windows Vista, 7, 8, 10, 11 App License: Freeware (Personal and business use) Foxit Reader is packaged for portable use with permission from Foxit Corporation. Click here to visit the author's website.
5/5 5,347 Mar 07, 2024
Foxit Software Incorporated & PortableApps.com (Vic Saville) <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/FoxitReaderPortable_th.png"border="0">
Free Firewall v2.5.6
Free Firewall v2.5.6 Free firewall is a full-featured professional firewall that protects against the threats of the Internet. Control every program on your computer by permit or deny access to the Internet. Free Firewall will notify you if applications want to access the Internet in the background, without your knowledge. In Paranoid mode, no software can access on the Internet or network, without your prior consent. You have full control over the flow of data out of your system and into. Protection against external threats Prevent the attacker to get access to your computer by exploiting security vulnerabilities. Protect yourself from a remote access and control of your system and access to your personal information. Protection against internal threats Protect yourself, your privacy and your personal data, by preventing the intruded malware from access to the Internet. Prevent that viruses and worms spread on the network. Functions Regulate internet traffic Individually regulate the access to the network and Internet per application. Allow access to the Internet only those programs, you unconditionally trust. Access notification If a non-regulated program wants to access the Internet, you will receive immediately a notification with which you can permit or block the Internet access. Paranoid mode Trust no one! In Paranoid mode, no software can access on the Internet or network, without your prior consent. Only applications which you trust get Internet access. Credulous mode Are you a credulous person? You have no fear about your privacy? In Credulous mode, all applications will have access to the Internet or network until you explicitly prohibit it. Additional features Free firewall is not only a full-featured firewall, but provides additional features to protect your privacy against attackers. Prevent that tracking services on web sites analyze your surfing habits. The firewall prevents calls to statistics and analysis services on Internet pages, which log the user behavior in the background. Touch friendly The user interface ...
5/5 5,526 Jul 13, 2020
Evorim <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Free Firewall1_th.png"border="0">
fSekrit v1.4
fSekrit v1.4 fSekrit is a small application for keeping securely encrypted notes. These notes are truly stand-alone; the editor program and your note are merged together into a tiny self-contained program file, bypassing the need to install a special application to view your data. This makes fSekrit ideal for keeping encrypted notes on, for example, USB flash drives. Another advantage of using fSekrit is that your un-encrypted data is never stored on your harddisk. With a traditional encryption utility you would have to decrypt your file to disk, view or edit it, and then re-encrypt it. Unless you use secure file wiping tools, it would be a trivial matter for someone to retrieve your un-encrypted data, even though you deleted the temporary file. This is not a viable attack against fSekrit, though, since it never stores your un-encrypted data on disk. (See security notes about swapping and hibernation, though!) fSekrit uses very strong encryption to ensure that your data is never at risk. Rather than using hocus-pocus home-brewed algorithms, fSekrit uses the standard, military grade, peer-reviewed AES/Rijndael in CBC mode, with a 256-bit keysize. Self contained fSekrit notefiles are tiny! Only around 50k plus the size of your encrypted text. Release History: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ version 1.40 - December 3, 2009 - 90kb/45.5kb - fixed: long-standing bug where failing to save changes when closing fSekrit with a modified document would cause fSekrit to exit, rather than notifying of error and let user attempt to save again. - fixed: saves are *finally* done properly, by saving to a temporary file and replacing the current file only when all the file writing business is done. - added: font selection dialog, no longer do you need to much around with the registry to set another default font. The font is still not stored in your document, ...
5/5 4,586 Oct 22, 2019
f0dder <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/fSekrit1_th.png"border="0">
FullEventLogView v1.80
FullEventLogView v1.80 A simple tool for Windows 11/10/8/7/Vista that displays in a table the details of all events from the event logs of Windows, including the event description. It allows you to view the events of your local computer, events of a remote computer on your network, and events stored in .evtx files. It also allows you to export the events list to text/csv/tab-delimited/html/xml file from the GUI and from command-line. System Requirements This utility works on any version of Windows, starting from Windows Vista and up to Windows 11. Both 32-bit and 64-bit systems are supported. For Windows XP and older systems, you can use the MyEventViewer tool. FullEventLogView vs MyEventViewer MyEventViewer is a very old tool originally developed for Windows XP/2000/2003. Starting from Windows Vista, Microsoft created a new event log system with completely new programming interfaces. The old programming interface still works even on Windows 10, but it cannot access the new event logs added on Windows Vista and newer systems. MyEventViewer uses the old programming interface, so it cannot display many event logs added on Windows 10/8/7/Vista. FullEventLogView uses the new programming interface, so it displays all events. Changes: Version 1.80: Added 'Black Background' option (Under the View menu). When it's turned on, the main table and the lower pane text-box are displayed in black background and white text, instead of default system colors. Fixed issue: When copying data to the clipboard or exporting to tab-delimited file, every line contained an empty field in the end of the line. Start Using FullEventLogView FullEventLogView doesn't require any installation process or additional DLL files. In order to start using it, simply run the executable file - FullEventLogView.exe After running FullEventLogView, the main window loads and displays all events from the last 7 days. You can change the default 7-days time ...
5/5 5,533 Jan 04, 2024
Nir Sofer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/fulleventlogview_th.png"border="0">
G Security 1.0
G Security 1.0 G Security is an easy to use Desktop locker/Screen locker developed for Microsoft Windows. It allows a user to securely lock down Windows in such a way that it cannot be accessed by an unauthorized user. G Security is light weight and easy to use with a highly user friendly interface. It prevents anyone from accessing your computer when its locked down so that your private data stored on the computer cannot be accessed by anyone. It completely locks down your computer so that even if someone gets a hold of your computer, he or she can do nothing on it. It can lock down your computer on start up as well as any time you want just by pressing some keys. Once the computer is locked down shortcut keys like Alt+tab, Ctrl+Alt+Esc, Alt+F4 etc will not work at all. The Ctrl+Alt+Del screen will also be secured in such a way that no one can unlock you computer without correct password. Any running application will also be prevented from messing up with the locked computer. It can be used by multiple users at a time on a single computer with settings stored for each user individually so that each user can use G Security with its own preferences. G Security also supports hotkey to lock the system. In a few words its extremely secure, easy to use and configurable desktop locking solution available for everyone free of cost. Some of its key features include : Its easy to use. Its a Freeware. Fully locks down your computer. Can protect Windows on startup. Suitable for all kinds of users. Multi user support. ...
5/5 5,207 Jun 20, 2016
Malik Usman Aura <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/G Security1_th.png"border="0">
GetBackPhotoViewer v1.0
GetBackPhotoViewer v1.0 A quick registry tweak to get Windows Photo Viewer back. Sure, the Windows Photos App has some cool features but who has time to wait for it to open when you just want to quickly open an image? GetBackPhotoViewer changes a value in the Windows Registry that makes Windows Photo Viewer appear on the list when selecting a default app to open images. If you upgraded from Windows 7 or 8, you still have this ability. If your Windows 10 was a clean install, you need this tool. INSTRUCTIONS (Note: You may not get asked all of these questions.) 1) Double or single click on GetBackPhotoViewer.reg 2) On the Security Warning window, click RUN. 3) When asked "Do you want to allow this app to make changes to your computer?", choose YES. 4) When asked "Adding information can unintentionally change or delete values and cause... Are you sure you want to continue?", choose YES. 5) On the message telling you it was successful, click OK. 6) Restart your computer. 7) Set Windows Photo Viewer as Your Default Image Viewer: a) Click the Settings icon on the Start menu (little gear). b) Click Apps. c) Click default apps on the left side. d) Click icon below Photo Viewer on right. e) When "Choose an App: pops-up, choose Windows Photo Viewer. If you are still not able to see Windows Photo Viewer in the list of choices, run the second .reg file called Optional2ndFile.reg. Click here to visit the author's website.
5/5 1,918 Feb 20, 2022
OlderGeeks.com <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/GetBackPhotoViewer1_th.png"border="0">
Getting to Know Windows 10 for Employees 1.0
Getting to Know Windows 10 for Employees 1.0 A PowerPoint presentation for employees. Quickly get started with new features of Windows 10, including Microsoft Edge and advanced security. Personalize Windows, draw with Windows Ink, and set up Microsoft Office 365. Windows 10 helps you stay secure, get organized, and be productive. Quickly get started using Windows 10 features with the tips and tricks included in this guide. Find out how Windows 10 protects your identity and data with advanced security features. Learn about personalizing Windows to suit your preferences. Write and draw with Windows Ink and add 3D effects with Paint 3D. Collaborate with Microsoft Office 365 and OneDrive for Business. Windows 10 helps you stay secure, get organized, work productively, and be creative.
5/5 4,902 Oct 23, 2019
Microsoft Corp. <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/gettingtoknowWin101_th.png"border="0">
Ghidra v10.3.3
Ghidra v10.3.3 A software reverse engineering (SRE) suite of tools developed by NSA's Research Directorate in support of the Cybersecurity mission SHA-256: 63833361bea8ef5ada1bc28cd2aa2ae4ab43204d2672b595500372582152eebe Ghidra Software Reverse Engineering Framework Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate. This framework includes a suite of full-featured, high-end software analysis tools that enable users to analyze compiled code on a variety of platforms including Windows, Mac OS, and Linux. Capabilities include disassembly, assembly, decompilation, graphing, and scripting, along with hundreds of other features. Ghidra supports a wide variety of process instruction sets and executable formats and can be run in both user-interactive and automated modes. Users may also develop their own Ghidra plug-in components and/or scripts using Java or Python. In support of NSA's Cybersecurity mission, Ghidra was built to solve scaling and teaming problems on complex SRE efforts, and to provide a customizable and extensible SRE research platform. NSA has applied Ghidra SRE capabilities to a variety of problems that involve analyzing malicious code and generating deep insights for SRE analysts who seek a better understanding of potential vulnerabilities in networks and systems. Ghidra Installation Guide Changes Ghidra 10.3.3 (August 2023) Improvements Analysis. Fixed potential infinite loop in clear flow and repair if the function found to be non-returning is cleared. (GP-3578) Debugger:Listing. The items in the Auto-Read Memory drop-down menu are now consistently ordered. (GP-3721) Debugger:Modules. Added a Mapping column in the Modules window. (GP-3436, Issue #5330) Decompiler. Decompiler now prints Equate values using constant syntax highlighting. (GP-3679, Issue #5059) GUI. Updated the Enum Editor to trim whitespace in the name ...
5/5 4,510 Sep 20, 2023
NSA's Research Directorate <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Ghidra7_th.png"border="0">
GIGABYTE Intel ME Critical FW Update Utility vB18.0125.1
GIGABYTE Intel ME Critical FW Update Utility vB18.0125.1 GIGABYTE TECHNOLOGY Co. Ltd, a leading manufacturer of motherboards and graphics cards, has implemented safety measures aligned with Intel®’s response to the Intel Management Engine (ME) and Intel Trusted Execution Engine (TXE) security vulnerabilities, so customers can be reassured their motherboards are fully protected. For all customers who have purchased GIGABYTE motherboards for Intel platforms, please visit the official website to download the latest BIOS versions as well as ME and TXE drivers. The updates for the motherboards will be released starting with the Z370, 200 and 100 series and then previous generation motherboards. GIGABYTE has released a safety update for the user’s convenience. The GIGABYTE Intel ME Critical FW Update Utility on the GIGABYTE website will automatically detect the system's ME version and update it to the latest version.
5/5 4,962 Nov 13, 2019
Gigabyte <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/GigabyteIntelME1_th.png"border="0">
GlassWire v2.3.369
GlassWire v2.3.369 GlassWire is a free network monitor &amp; security tool with a built in firewall. Network Monitor GlassWire's network monitor visualizes your current and past network activity by traffic type, application, geographic location, all on a beautiful and easy to understand graph. Go back in time up to 30 days and see what your computer or server was doing in the past. Click the graph to see details of what app or network event caused a spike in network activity. Threat Monitoring GlassWire reveals hosts that are known threats, unexpected network system file changes, unusual application changes, ARP spoofing, DNS changes, and alerts you to the problem so you can take action. GlassWire can also remotely monitor and help protect servers or other computers far away. Install GlassWire on your server or remote PC and look out for unexpected threats or problems. If you see unexpected activity you can block it with GlassWire’s firewall. Firewall GlassWire's firewall reveals all your network activity so you can easily see what your computer is doing in the background. GlassWire's firewall shows you what current and past servers your computer is communicating with so you can see potential threats and block them if necessary. What happened while you were away? GlassWire shows you what network activity occurred while you were away or logged out from your computer. No more wondering what your computer was doing while you were out. Just go back in time with GlassWire's graph and see exactly what happened in detail. Remote Server Monitoring Do you have remote servers where you host websites, applications, or games? GlassWire can monitor all your server network activity and alert you to potential threats. Also with GlassWire's usage tab you can see exactly how much bandwidth you are using in detail to help stay under your hosting company limits. Block bandwidth ...
5/5 8,678 Nov 28, 2021
GlassWire <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/GlassWire1_th.png"border="0">
Google Chrome Portable v111.0.5563.111
Google Chrome Portable v111.0.5563.111 Run Google Chrome from a cloud folder, external drive, or local folder without installing into Windows. This is an online installer that will download Google Chrome during setup. The faster browser Chrome is faster than fast – it’s engineered for speed and has the tools to help you get things done quickly. And with automatic updates, you always have the newest version of Chrome with the latest performance improvements. The safer way to browse You shouldn’t have to be a security expert to stay safe online. Get an extra layer of protection with Google Password Manager, Chrome’s Enhanced Safe Browsing, and more. App Notes • Passwords Not Saved Between PCs By Default: Google Chrome stores passwords in such a way that they are encrypted in a way tied to current PC. While the passwords are not kept or left behind on the PC itself, they won't be retrievable when you move to a new PC. PortableApps.com added password portability as an advanced option, though, which you can enable by reading the help.html file. • Certificates Not Portable: Google Chrome has no certificate manager. It uses Windows' certificates manager. So, any certificates you install through the Google Chrome interface are stored on the current local machine and will not travel with you. Thus, you should not use any private certificates with Google Chrome except on your own PC. • Some Settings/Extensions Locked Per PC: Google Chrome locks specific settings to a given PC. This behavior is by design by the Chrome team. If you would like this changed, please file a bug with the Chrome team. A suggested workaround is to sign in to Google to restore all settings and extensions and to use an extension such as Session Buddy to maintain your ...
5/5 10,905 Mar 23, 2023
Google and PortableApps.com <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/googlechromeportable_th.png"border="0">
Grub2Win v2.3.8.3
Grub2Win v2.3.8.3 Safely multiboot Windows and Linux systems on both GPT and MBR disks. Now includes the latest GNU Grub 2.12 rc1 kernel Grub2Win is completely free and open source. All modules are digitally signed for your security. Works with both EFI and BIOS firmware. Supports Windows 11, 10, 8, 7 and XP. Grub2Win boots native GNU Grub version 2.12 code. Everything is installed to a single 22 MB directory on your Windows C: drive. The install also updates your EFI partition.. Automatically generates config files for PhoenixOS, Android, Ubuntu, Debian, Suse, Fedora, Manjaro, Mint, Clover, POSROG and Windows. You can import Linux config files for Chrome and most other distributions. You can enter your own custom commands for each menu entry. Grub2Win began in 2010. It has been downloaded more than 1,200,000 times in 180 countries worldwide. Features • Supports both 64 and 32 bit EFI as well as BIOS firmware. • Installs to Windows 11, 10, 8, 7 and XP. • Requires just one directory on the Windows C: drive, about 20 MB disk space. • Works with all languages. Boot time help is available in 32 languages. • Simple Windows GUI easily sets up Grub2Win in seconds. • Lets you set your EFI firmware boot order from within Windows. • Preview and customize the 9 included graphic background themes. You can also create and customize your own background themes. • Works with all filesystems including Mac hfs and Btrfs. • Can search for and boot a partition by it's UUID or label. Supports advanced scripting. • Works with both GPT and MBR disks - up to 128 primary partitions per drive. ...
5/5 3,007 Jan 19, 2024
Drummer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Grub2Win1_th.png"border="0">
EXE Hacker
Hacker Hack your way through the security softwares and defeat your enemies! In Hacker you will control various programs that have different abilites. Your goal is to advance from node to node and try to defeat all the security programs that include guards, scanners and firewalls. Use your credits to buy more programs from shops around the map and fuse them together to create even more powerful versions. Take control of every server you get your hands on and shut down the national defense core! Play the arena mode and try to defeat as many waves of enemy programs as possible. The game was greatly inspired by an old flash game called The Nightfall Incident. You should go check that out too. controls: WASD to move around in the map menu LMB to do stuff
4/5 6,039 Sep 28, 2016
Pixel Melody <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/Hacker92464_th.png"border="0">
Hamachi 2.2.0.328
Hamachi 2.2.0.328 Hamachi will allow you to establish secure direct connections to PCs that are not accessible otherwise due to the restrictions in network setup. By installing Hamachi on two computers and clicking a couple of buttons you can connect them instantly and securely. For example, if your home computer is connected to the Internet via Connection Sharing or Broadband Router, you will not generally be able to access it, say, from your office. By installing Hamachi on both computers and clicking a couple of buttons you can connect them instantly and securely. Now you can browse file shares, run remote desktop or even host a multiplayer game on one computer and join in from another. Just as if they were connected with a physical wire. Hamachi is a networking technology enabling any two computers on the Internet to talk directly to each other regardless of the presence of firewalls or address translation devices on the route between them. Most interestingly, Hamachi enables peer-to-peer communications between two computers residing behind two different connection sharing devices. In geek language - it allows for bidirectional NAT traversal. Peer to peer connectivity becomes possible with the help of Hamachi servers that mediate the establishment of an initial contact between peers. Once peers connect the traffic starts to flow directly between them. This not only ensures that data travels the best route possible, but it also minimizes latency (ping time) and maximizes transfer speeds. Hamachi is secure. All Hamachi communications are encrypted and authenticated using industry-standard algorithms and protocols. Nobody will be able to see what two Hamachi peers are talking about. However what is more important - Hamachi security architecture is completely open meaning that its detailed description is available for review to anyone interested. Features: Network Limits: Network Capacity: Create or join up to 256 Hamachi networks. User Capacity: Each Hamachi network can have ...
0/5 8,560 Apr 01, 2015
LogMeIn, Inc.
Hardentools v2.1
Hardentools v2.1 A collection of simple utilities designed to disable a number of "features" exposed by operating systems (Microsoft Windows, for now), and primary consumer applications. These features, commonly thought for enterprise customers, are generally useless to regular users and rather pose as dangers as they are very commonly abused by attackers to execute malicious code on a victim's computer. The intent of this tool is to simply reduce the attack surface by disabling the low-hanging fruit. Hardentools is intended for individuals at risk, who might want an extra level of security at the price of some usability. It is not intended for corporate environments. WARNING: This tool disables a number of features, including of Microsoft Office, Adobe Reader, and Windows, that might cause malfunctions to certain applications. Use this at your own risk. Disabled Features Generic Windows Features Disable Windows Script Host. Windows Script Host allows the execution of VBScript and JavaScript files on Windows operating systems. This is very commonly used by regular malware (such as ransomware) as well as targeted malware. Disabling AutoRun and AutoPlay. Disables AutoRun / AutoPlay for all devices. This prevents applications from automatically executing when you plug a USB stick into your computer. Disables powershell.exe and powershell_ise.exe execution via Windows Explorer. This prevents the use of PowerShell by malicious code trying to infect the system. You will not be able to open PowerShell directly anymore. Disables cmd.exe execution via Windows Explorer (optional). You will not be able to use the cmd terminal and it should prevent malicious code trying to infect the system by using cmd.exe to e.g. start powershell.exe. This setting is optional because cmd.exe is used quite often by users and applications. This must therefore be enabled ...
5/5 4,084 Dec 05, 2021
Security Without Borders <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Hardentools2_th.png"border="0">
Hasleo Backup Suite Free v4.0
Hasleo Backup Suite Free v4.0 Completely free Windows backup software Hasleo Backup Suite Free is a free Windows backup and restore software, which embeds backup, restore and cloning features, it is designed for Windows operating system users and can be used on both Windows PCs and Servers. The backup and restore feature of Hasleo Backup Suite can help you back up and restore the Windows operating systems, disks, partitions and files(folders) to protect the security of your Windows operating system and personal data. The cloning feature of Hasleo Backup Suite can help you migrate Windows to another disk, or easily upgrade a disk to an SSD or a larger capacity disk. Features • Backup and Restore, clone Windows OS, disks, partitions and files (folders). • Supported backup modes: full, incremental and differential. • Supports compression, encryption, splitting and merging of backup image files. • Delta restore improves restore speed by restoring only changed blocks. • Automatically and regularly perform backup task with backup schedule. • Image retention policy and centralized backup task management. • Creation of WinPE emergency disk and command line interface (CLI) support. • Supported OS: Windows Vista/Server 2008 or later, fully compatible with GPT and UEFI. Tech Specification Supported Operating Systems Windows Vista/Server 2008 or later (32/64-bit) Supported Devices HDD, SSD, USB, Thunderbolt, etc. Supported File Systems FAT12, FAT16, FAT32, NTFS, Other Supported Compression Levels None, Low, Medium, High Supported Encryption Modes AES 128, AES 256 Supported Backup Modes Full, Incremental, Differential CPU Intel® Pentium® processor 1GHz or above RAM 1 GB or more (2 GB Recommended) Disk Space 500 MB and above free space Click here to visit the author's website.
5/5 447 Nov 28, 2023
Hasleo Software <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/HasleoBack_th.png"border="0">
HDClone X.2 Free Edition v11.0.8
HDClone X.2 Free Edition v11.0.8 The Universal Cloning Tool HDClone cre­ates phys­i­cal or log­i­cal cop­ies (clones) and file im­ages of hard disks and oth­er mass stor­age me­dia. HDClone is the per­fect tool for back­ups and for cre­ating cop­ies of en­tire soft­ware or operating system in­stal­la­tions. A spe­cial Safe­Rescue mode makes HDClone an in­valu­able tool for res­cu­ing de­fec­tive hard disks and oth­er me­dia. HDClone works in­de­pen­dent of par­ti­tion­ing scheme, file system and operating system. It also works with pro­pri­e­tary for­mats which would oth­er­wise be in­ac­ces­si­ble. HDClone X.2 is the legitimate successor of HDClone X. Thislatest version of HDClone is a seamless continuation of itssuccessful predecessor HDClone X, which is why we chose toname it X.2. This does not mean that HDClone X.2 is a sub-release of HDClone X, but instead the namereflects thatHDClone X.2 is the result of having taken HDClone X to thenext level. This is also evident by the list of new features. Wehave consistently advanced the development of HDClone in allaspects. Aside from the main features, we have improved uponmany details in order to make HDClone even easier and moreefficient to use. Once again, these improvements were alsoaided by the ideas and suggestions that we welcomed from theHDClone community. In addition to the nine existing HDClone language versions English, German, French, Italian, Spanish,Portuguese, Polish, Russian and Turkish, HDClone X.2 is now also available in Traditional Chinese and Simplified Chinese. This expansion of our language version lineup is our response to the steadily growing worldwide popularity of our products, especially HDClone, which is evidenced by our customers in 169 countries.What’s New?HDClone X.2 comes with two completely new apps – ResumeImage for data rescue, specifically when it comes to disks with thermal issues, and DirectCopy, which can create fast (SmartCopy) 1:1 copies. In addition, six apps have been significantly improved. With ...
5/5 2,521 Jun 24, 2021
Miray <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/HDClone1_th.png"border="0">
HiBit Startup Manager v2.6.30
HiBit Startup Manager v2.6.30 Manage the list of all applications that are loaded automatically when Windows starts up. Features • Allow adding, edit, disable and remove startup programs • Improve the overall performance of the computer • Enhance System Security with Startup Monitoring • Delay the Launching of Startup Apps • Solve annoying error messages when the system load • Manage &amp; Optimize Windows Services and Scheduled Tasks • Easily manage the right-click context menu on your computer • Easily Manage Windows system restore points • Easy-to-use User Interface • Automatic update to the latest version • Windows Vista/7/8/10/11 (32/64 bits) Changes: v2.6.30 (2024-01-23) Redesigned and improved VirusTotal scanner tool. Added ability to use private API in VirusTotal scanner tool. Improved GUI and bug fixes. Click here to visit the author's website.
5/5 3,661 Jan 31, 2024
HiBitSoft.IR <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/HiBitStartupManager1_th.png"border="0">
Hidden Windows 10 Features v1.3.1
Hidden Windows 10 Features v1.3.1 Free program to turn on hidden features in Windows 10 (mostly works in Windows 11 as well). Windows 10, just like the previous Windows versions, have many useful hidden features. These features can be enabled by editing the Windows registry. Manual editing of Windows registry is long and not so easy process. With Hidden Windows 10 Features are hidden features available with one click. This tool allows to export settings and imports them to another computer. It can also be used as a backup when settings are changed. Hidden Windows 10 Features allows to add items such as Recycle Bin, All Control Panel Items, Administrative Tools, Printers and hide folder shortcuts like 3D Objects, Pictures, Videos from This PC. Software lets increase taskbar transparency and display seconds on the taskbar clock. The context menu can be extended by items Copy to, Move to, Open with Notepad for all files. This tool contains features to enhance the security of Windows 10 by disabling autorun, Windows Script Host and by enabling secure sign in with CTRL+ALT+DELETE. Privacy also can be improved by disabling Compatibility telemetry and Bing search in the start menu. Hidden Windows 10 Features can return vertical volume control, just like in Windows 7 and hide or remove functions from Windows 10 like Action Center, OneDrive from file explorer or Cortana. On the keyboard Caps Lock key can be disabled. Other features are disabling aero shake, activating GodMode and stop Windows from adding “- Shortcut” to shortcut file names. All these and more functions are available with Hidden Windows 10 Features. This download is for the 64bit version. If you need the 32bit version, download here. Click here to visit the author's website.
5/5 812 Sep 01, 2023
Theropods <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/hidwin10feat1_th.png"border="0">
Hide From Uninstall List v1.0
Hide From Uninstall List v1.0 You may want to hide one or more entries added by software setup(s) in Add/Remove Programs (also known as “Programs and Features”, “Uninstall a Program”, “Add or Remove Programs” ) under Windows,There can be several reasons for this 1. You do not want anybody to know the program is installed on computer. 2. You do not want somebody uninstall it. 3. The app is already removed but the entry left in the list. It’s also good for security or privacy purpose, but How do you remove an item from the app list without uninstalling it? There is a simple trick used to hide programs from your parents, friends, or family. For example, you share a computer with your parents and you do not want them to know you have a Program installed. You can hide programs in Programs and Features in Windows manually according to the microsoft. 1. Click Start, click Run, type regedit in the Open box, and then press ENTER. 2. Locate and click the following registry key , back it up ( click the Uninstall registry key, click Export Registry File on the Registry menu) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall 3. Each key under Uninstall represents a program that appears in Add/Remove Programs 4. Under DisplayName value data , Identify the registry key that represents the program that is in Add/Remove Programs, right-click the key, and then click Delete.But this way seems tedious therefore we have coded a portable Freeware Application to simplify the whole process How to use “Hide From Uninstall List” Application 1. After unzipping, run the program , you will see all the installed programs on the list 2. There are two ways To hide an installed Application a) You can highlight the Program and use Ghost icon (To unhide it please use Eye icon) b) Right click the Program entry and use “Hide from Programs and features ...
5/5 4,330 Dec 20, 2019
Sordum.org <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/hide_from_uninstall_list1_th.png"border="0">
   
Showing rows 1 to 100 of 336 Showing Page 1 of 4  1  2  3  »  Last » 


OlderGeeks.com Copyright (c) 2024