Your download link is at the very bottom of the page... always.



Processed through Paypal
No account required.


Donate Bitcoin to this wallet:
1KkUMXvQ2ko3xcJkzitB7WYgoW6m79WFfm
Donate Ethereum to this wallet:
0x40E56922F43637224935CDC35e2c96E0392A8505
Donate Litecoin to this wallet:
LLYAFEyqjH69gkyCEpRjXNyedRCWrVChfL

Buy our over-priced crap to help keep things running.
Take No CrapwareOG Dad CapNo Password


Join our Facebook groupFollow us on TwitterFollow us on InstagramOur RSS FeedJoin us on TikTokJoin us on LinkedIn


 Home » OlderGeeks.com Freeware Downloads » Searching Files   
Search
Search Terms
Search Category Leave category selection blank to search within all categories.
Search Results
Files
  File Name Rating Downloads
Last Update/Developer
525 DOS Games From The 1980s
525 DOS Games From The 1980s One giant zip file containing all of the games in this list. Run on an old computer or in a DOS virtual machine. See Virtualization Software in our download section. 007 - Licence To Kill (1989) (Quixel) 10th Frame Bowling (1988) (Access) [v2] 20000 Leagues Under the Sea (1988) (Coktel Vision) 2400 A.D. (1988) (Origin Systems) 3-Demon (1983) (PC Research Inc) 4th and Inches (1987) (Accolade) 4x4 Off-Road Racing (1988) (Epyx) 8088 Othello (1985) (M.W. Bayley) A Mind Forever Voyaging (1985) (Infocom) A Nightmare on Elm Street (1989) (Westwood Studios) A-Maze (1989) (Wizard Games) A10 Tank Killer (1989) (Dynamix) Aaargh! (1988) (Arcadia) Ace (1987) (Cascade) Ace 2 (1987) (Cascade) Ace of Aces (1987) (Artech) Action Fighter (1989) (Core Design) Action in the North Atlantic (1989) (General Quarters) Adventure Construction Set (1987) (Electronic Arts) Adventures in Math (1983) (IBM) [v1.00] Adventures in Serenia (1986) (Sierra) African Raiders-01 (1986) (Tomahawk) Afterburner (1989) (Unlimited Software) Air Trax (1983) (Presearch Incorporated) Airball (1987) (MicroDeal) Airborne Ranger (1988) (MPS Labs) Aldo Again (1989) (David & Benjamin Ibach) Aldo's Adventure (1987) (David & Benjamin Ibach) Alf (1988) (Alien Productions) Alice in Wonderland (1989) (Robin Johnson) Alien Syndrome (1987) (Sega) Alley Cat (1984) (Synapse) Alter Ego - Female (1983) (Activision) Alter Ego - Male (1983) (Activision) Amazing Maze (1983) (Donovan W. Foster) [v1.2] Amnesia (1986) (Cognetics Corporation) Ancient Land of Ys (1989) (Kyodai) Andromeda Conquest (1982) (Avalon Hill) Annals of Rome (1986) (PSS) Antarctic Adventure (1984) (Friends Software) Anti-Ballistic-Missile (1982) (Davis Disk) AntiXonix (1985) (D. Pavlovsky) Apache Strike (1989) (Activision) Arcade Volleyball (1988) (Vladimir Zakharov) Archipelagos (1989) (Logotron) Archon (1984) (Mission Accomplished) Arctic Fox (1986) (Dynamix) Arkanoid (1988) (Taito) Arkanoid 2 - Revenge of Doh (1989) (Taito) Arnhem (1985) (Cases Computer Simulations) Aspar GP Master (1989) (Dinamic) Astro Blaster (1988) (Rolf Franzon) Astrotit (1987) (Rudeware) Autoduel (1988) (MicroMagic) Avoid the Noid (1989) (BlueSky Software) [cga] Avoid the Noid (1989) (BlueSky Software) [ega] Axe of Rage (1989) (Palace Software) Backgammon (1987) (ShareData) Bad Cat (1988) (Rainbow Arts) Bad Street Brawler (1987) (Beam Software) Ballyhoo (1986) (Infocom) Barbarian (1989) (Mastertronic) Barbarian 2 (1989) (Palace Software) Batalia (1986) (The Right Brothers) Batman - The Caped Crusader (1988) (Ocean) Battle ...
5/5 7,770 Oct 06, 2023
Various <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/SilentService_th.png"border="0">
Impro-Visor v10.2 for MacOS
Impro-Visor v10.2 for MacOS Impro-Visor (short for “Improvisation Advisor”) is a music notation program designed to help jazz musicians compose and hear solos similar to ones that might be improvised. The objective is to improve understanding of solo construction and tune chord changes. There are other, secondary, things it can do, such as improvise on its own. It has also been used for transcription. Because rhythm-section (e.g. piano, bass, drums) accompaniment is automatically generated from chords, Impro-Visor can be used as a play-along device. Now having a wider array of accompaniment styles, its use is not limited to jazz. Partial List of Features: Lead sheets and solos can be constructed through either point-and-click or using a plain text editor (one is provided, but any editor can be used). Optional automatic note coloration shows whether notes are consonant or dissonant with chords and scales. Chords may also be entered quickly through a "roadmap" editor, which also analyzes chord changes for implied keys and idiomatic progressions ("bricks"). Harmonic note entry option guides the user to select notes that are consonant with harmony. Similarly, transposition options provide chromatic or harmonic transposition. Solos or solo fragments can be played back immediately on the computer, with automatic rhythm section accompaniment. Can be used for self-study, classroom, or play-along. Any segment of a leadsheet can be played back in looped mode. Users can define new accompaniment styles. There is spreadsheet-like Style Editor, and a Style Extractor facility that helps create styles from MIDI performances. . Solos and heads may be exported as MIDI files, with accompaniment if desired. Solos and heads may be exported as MusicXML, for import to other popular music notation software. It is not necessary that the soloist memorize the solos that are created in Impro-Visor. The act of constructing solos is intended to help one get a better understanding of the tune ...
5/5 5,654 Nov 14, 2019
Bob Keller <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/ImproVisor1_th.png"border="0">
Impro-Visor v10.2 for Windows
Impro-Visor v10.2 for Windows Impro-Visor (short for “Improvisation Advisor”) is a music notation program designed to help jazz musicians compose and hear solos similar to ones that might be improvised. The objective is to improve understanding of solo construction and tune chord changes. There are other, secondary, things it can do, such as improvise on its own. It has also been used for transcription. Because rhythm-section (e.g. piano, bass, drums) accompaniment is automatically generated from chords, Impro-Visor can be used as a play-along device. Now having a wider array of accompaniment styles, its use is not limited to jazz. Partial List of Features: Lead sheets and solos can be constructed through either point-and-click or using a plain text editor (one is provided, but any editor can be used). Optional automatic note coloration shows whether notes are consonant or dissonant with chords and scales. Chords may also be entered quickly through a "roadmap" editor, which also analyzes chord changes for implied keys and idiomatic progressions ("bricks"). Harmonic note entry option guides the user to select notes that are consonant with harmony. Similarly, transposition options provide chromatic or harmonic transposition. Solos or solo fragments can be played back immediately on the computer, with automatic rhythm section accompaniment. Can be used for self-study, classroom, or play-along. Any segment of a leadsheet can be played back in looped mode. Users can define new accompaniment styles. There is spreadsheet-like Style Editor, and a Style Extractor facility that helps create styles from MIDI performances. . Solos and heads may be exported as MIDI files, with accompaniment if desired. Solos and heads may be exported as MusicXML, for import to other popular music notation software. It is not necessary that the soloist memorize the solos that are created in Impro-Visor. The act of constructing solos is intended to help one get a better understanding of the tune ...
5/5 5,688 Nov 14, 2019
Bob Keller <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/ImproVisor1_th.png"border="0">
Internet Processes Viewer v3.8.5.0
Internet Processes Viewer v3.8.5.0 Retrieves detailed snapshots of your computer’s active TCP and UDP network connections along with the owning processes and users each time you run it. It gives quick results with a level of detail helpful when analyzing Cybersecurity incidents and troubleshooting network applications. SHA-256: 814fa4d55277e46a81ca07c110977191f521499989acbee2bff7e41d0b2d1c28 This application may be used at no cost after reading and accepting the built-in EULA. Typical write access to your interactive user's HKCU Software registry is required for the product license acceptance. Uniquely identify executable modules used in creating and maintaining suspicious network connections. Provide .csv reports from the application running on an endpoint of interest to your Cybersecurity support team. Intended target audience: Cybersecurity, Network, Systems Analysts, and similar technical users. Click the question mark in the upper right hand corner of the program for full instructions on it's use. Minimum system requirements Microsoft Windows 10 or 11 and .NET 6 Click here to visit the author's website.
5/5 2,917 Jun 13, 2022
Steve Chaison Software <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/InternetProcessesTracker_th.png"border="0">
Kega Fusion v3.64
Kega Fusion v3.64 Fusion is a Sega SG1000, SC3000, SF7000, Master System, Game Gear, Genesis/Megadrive, SVP, Pico, SegaCD/MegaCD and 32X emulator for Win9x/ME/2000/XP/Vista/Win7/Win8/Win10 This emulator has very low system requirements, allowing you to run games smoothly even on an old PC.
5/5 4,867 Jun 28, 2019
Steve Snake <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/KegaFusion1_th.png"border="0">
Pencil Biplane Battle
Pencil Biplane Battle Fight enemy aircraft in this notebook paper drawing world. Use up and down arrows to fly and CTRL key to fire.
5/5 4,844 Dec 01, 2016
Steve Huck <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/Pencil Biplane Battle1_th.png"border="0">
PureText v6.2
PureText v6.2 A tiny tray utility that removes all text formatting from your clipboard and optionally pastes the resulting pure text to the active window with a single hotkey. After running PureText, you will see a "PT" icon appear near the clock on your task bar. You can click on this icon to remove formatting from the text that is currently on the clipboard. You can right-click on the icon to display a menu with more options. The easiest way to use PureText is to simply use its Hotkey to paste text instead of using the standard CTRL+V Hotkey that is built into most Windows applications. To configure PureText, right-click on its tray icon and choose "Options" from the pop-up menu. The default Hotkey is WINDOWS+V, but this can be changed. In this Options window, you can also configure PureText to run each time you start Windows. What PureText Will and Will Not Do PureText only removes rich formatting from text. This includes the font face, font style (bold, italics, etc.), font color, paragraph styles (left/right/center aligned), margins, character spacing, bullets, subscript, superscript, tables, charts, pictures, embedded objects, etc. However, it does not modify the actual text. It will not remove or fix new-lines, carriage returns, tabs, or other white-space. It will not fix word-wrap or clean up your paragraphs. If you copy the source code of a web page to the clipboard, it is not going to remove all the HTML tags. If you copy text from an actual web page (not the source of the page), it will remove the formatting. PureText is equivalent to opening Notepad, doing a PASTE, followed by a SELECT-ALL, and then a COPY. The benefit of PureText is performing all these actions with a single Hotkey and having the ...
5/5 1,922 Nov 15, 2021
Steve P. Miller <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/PureText4_th.png"border="0">
Recently Created or Modified Executables Search v2.1.0.2
Recently Created or Modified Executables Search v2.1.0.2 Free tool for incident response. Inspect executable modules created or modified on your computer during a recent time window (cybersecurity incident time) you select. Returns each module's metadata along with the file's SHA-256 value. Helps discover file artifacts from malware incidents. More info: This application may be used at no cost after reading and accepting the built-in EULA. Write access to the Application's working directory is required for the product license file. Uniquely identify executable modules, file artifacts, deposited by System processes and unsafe user activity during a Cybersecurity incident time. Helps associate modules with unsafe or risky applications. Intended target audience: Cybersecurity, Network, Systems Analysts, and similar technical users. SHA-256: 239fbc57cafdadeec735bf12aa1453b5c8858af16286c8606c8a7d2c7340bc22 Supported operating systems: Windows 10/11 64bit Important Notes: 1) This program will not function unless you install Microsoft .NET 6.0. Get it HERE. 2) This program will not function unless you right-click the file and choose to run as an administrator. 3) Once launched, allow the program to finish it's scan operation. This may take a few minutes. Click here to visit the author's website.
5/5 2,506 Jan 02, 2024
Steve Chaison Software <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/RecentExes1_th.png"border="0">
ShareWatch v1.0
ShareWatch v1.0 Allows you to see who is connected to a computer and what files they are accessing. Have you ever wondered why your hard drive or modem is active, but you aren't doing anything to cause it to be active? It is possible a remote user is accessing your computer. Have you ever had a file locked but you don't know why? ShareWatch can tell you if a network user is using the file and allows you to disconnect them so that you can edit/delete the file. Have you ever wanted to shutdown a computer, but don't want to drop people using the computer. ShareWatch will show you all resources in use by remote users. Features: Watch shares on local and remote servers. Shows the users and computers that are connected to each share, along with what files are open. Allows you to disconnect any file, user, computer, or share. Address book lookup to show you the details about each user connected (this feature is turned off by default) Computer lookup to show you both the computer name and IP address of the computers connected. Can be run as a tray application. Supports top-most and transparency. Works on Windows Windows 95 - Windows 11. Multithreaded to allow servers to be queried independently from each other while not blocking each other or the user interface. What ShareWatch Can do... ShareWatch only watches folders that are shared out using the Windows folder sharing feature. This is usually how people share files and printers with each other on a home or corporate network. It can watch the shares ...
5/5 1,976 Nov 15, 2021
Steve P. Miller <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/sharewatch1_th.png"border="0">
shutdownBlocker 1.2.2
shutdownBlocker 1.2.2 shutdownBlocker.exe is simple program that intercepts and blocks shutdown / restart / logoff commands. It protects from user mistakes, poorly designed installers (those lacking a 'restart later' option), and even windows itself (looking at you, 10). It works by registering a ShutdownBlockReasonCreate() reason and objecting to WM_QUERYENDSESSION messages. It can optionally be set to consume all calls to shutdown.exe and MusNotification.exe (among other things, this blocks Windows 10 Update restarts); but this requires running the app as an administrator. A full rundown on how this stuff works is below the changelog. Usage Notes Requirements: .NET Framework 4.0 or better; Get it from Microsoft. Instructions: Unpack the app to a folder; run it. (A settings file will be created in the program folder.) Then click the Block or Allow button. If you wish to block shutdown.exe or MusNotification.exe restarts (to suppress Windows Update restarts), you will need to run the program as an administrator. As of v1.2 We automatically ask the OS for this (you'll get a UAC prompt); The app will also warn you if it's not been run as a admin. The program must be kept running to work. You can send it to the notification tray by using the 'Hide' button, the escape key, or if upper right close button. Optionally you can hide the tray icon (in settings) for completely invisible operation. You can have the program start up automatically via a check-box in settings; this uses a scheduled task for auto-start. Remember though, if you move the app, you should re-create the scheduled task (Uncheck 'start with windows', hit ok, then check it again). Command Line Usage: -startHidden If an instance of the program is not already running, starts the program and immediately hides it. -block ...
5/5 4,850 Mar 19, 2017
cresstone.com <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/shutdownBlocker1_th.png"border="0">
TCP Handshake Connection Tester v2.5.2.1
TCP Handshake Connection Tester v2.5.2.1 Check for completion of the standard TCP 3-way handshake and connection time between a local interface IP address and a target host. TCPConTest.exe also lets you check the selected network interface for IP packet errors. SHA-256: ea2ce65a7e6319fe586e298e8f16dbe457e7c156391019a18e0ec3da586fc060 Minimum system requirements Microsoft Windows 10® 64-bit, Build 18363.1256 • .NET 5.0 Click here to visit the author's website.
5/5 2,726 Jul 17, 2021
Steve Chaison Software <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/TCP Connection Tester_th.png"border="0">
The Bridge Designer 2016
The Bridge Designer 2016 Design a bridge. Learn about engineering. Change the world. The Bridge Designer is a free educational software package designed to provide middle-school and high-school students with a realistic introduction to engineering through the design of a highway truss bridge. The winner of two major national awards for educational software development, the Bridge Designer has the “look and feel” of the computer-aided design (CAD) packages used by practicing engineers but is much easier to use. It can be installed on either Windows or Mac computers. Overview The Bridge Designer will provide you with a realistic introduction to engineering through an authentic, hands-on design experience. This software provides you with the tools to model, test, and optimize a steel highway bridge, based on realistic specifications, constraints, and performance criteria. The Bridge Designer is free and in the public domain. It is provided and intended for educational use only. How it works When you start up the Bridge Designer, you are presented with the project requirement--to design a steel truss bridge to carry a two-lane highway across a deep river valley. Using the Design Project Setup Wizard, choose from a variety of different deck elevations and support configurations for your bridge. Each will cause the structure to carry load in a different way, and each has a different cost. After defining the deck elevation and support configuration, create a structural model by drawing joints and members on the computer screen with your mouse. Each member has its own unique properties--material, cross-section shape, and size. You can define these properties as you design the structure--or just accept the default values and modify them later. Once the structural model is complete, click the Load Test Button to run a simulated load test of your bridge. This test will determine whether your design is strong enough to carry ...
5/5 1,359 Oct 14, 2022
Stephen J. Ressler <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/BridgeDesigner3_th.png"border="0">
Web Link Communications Security Inspector v1.3.2.0
Web Link Communications Security Inspector v1.3.2.0 Safely inspect and analyze suspicious web links from email or other messages before opening them in your web browser. About: This application inspects communications used in URIs without compromising your endpoint security and privacy. Just read and accept the built-in EULA to use the application's fully enabled features. A User's Guide is bundled along with the Application in the .zip file. More info, licensing and uses: The application may be used at no cost after reading and accepting the built-in EULA. Web Link Communications Security Inspector safely provides useful analytical information on web link communications whether you use it in a professional setting or personally from your own computer. In addition to analyzing suspicious web links from your email or other messaging system, you can also use this application to diagnose or validate communications with your company webservers or with your personal webserver before setting them up live on the Internet. This application may also be useful in security awareness training scenarios, to illustrate how the security of protocols used often varies from link-to-link or when client or server configurations place constraints on TLS negotiation. SHA-256: 2186f8898e92517f1838a3d1bc10c81a96be35d2bc052ee5023be26d3423df19 Requirements: x64 .NET® 6 Desktop runtime must be installed before using this application. Get it from Microsoft. Click here to visit the author's website.
5/5 1,639 May 22, 2022
Steve Chaison Software <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/WebLinkCSI1_th.png"border="0">
   
Showing rows 1 to 13 of 13 Showing Page 1 of 1  1 


OlderGeeks.com Copyright (c) 2024