Processed through Paypal
No account required.

Donate Bitcoin to this wallet:
Donate Ethereum to this wallet:
Donate Litecoin to this wallet:
​​Facebook​​Follow @GeekOnTheLoose


 Home » Freeware Downloads » Searching Files   
Search Terms
Search Category Leave category selection blank to search within all categories.
Search Results
  File Name Rating Downloads
Last Update/Developer
AVG LinkScanner 2014.4335
AVG LinkScanner 2014.4335 Nowadays, there are far more threats out there than plain viruses. You have probably come across the term spyware as well, however, authors of malicious codes and dangerous websites are very innovative, and new kinds of threats emerge quite often, the vast majority of which are on the Internet. Here are some of the most common: Exploit is a malicious code that takes advantage of a flaw or vulnerability in an operating system, Internet browser, or other essential program. Social engineering is a common term for various techniques used to trick people into giving away their personal information (passwords, bank account details, credit card numbers etc.). A typical example of social engineering is phishing – an attempt to acquire sensitive personal data by shamming a trustworthy and well-known organization. Usually, the potential victims are contacted by a bulk e-mail asking them to e.g. update their bank account details. In order to do that, they are invited to follow the link provided which then leads to a fake website of the bank. Scam can be also considered a kind of social engineering; it includes false job offers, or ones that will abuse the workers for illegal activities, summons to withdraw a large sum of money, fraudulent lotteries and the like. Hoax is a bulk e-mail containing dangerous, alarming or just bothering and useless information. Many of the above threats use hoax e-mail messages to spread. Finally, malicious websites are ones that deliberately install malicious software on your computer, and hacked sites do just the same, only these are legitimate websites that have been compromised into infecting visitors. AVG LinkScanner is here to protect you from all these online threats. AVG LinkScanner is up and running immediately from the moment of installation. All basic settings have been pre-set by the manufacturer, so most of the ...
4/5 3,700 Dec 02, 2016
AVG Technologies <img src=""border="0">
Discalot 171122
Discalot 171122 Discalot - the disc compiler Frontend to MS-oscdimg.exe If you want to compile an image, bootable or not, you propably have assembled your disc-files in a folder. Discalot is assisting you to create an image of this directory structure. Choose a custom boot sector or two (UEFI), to extend boot options. Various options for file system (UDF, Joliet, ISO 9660) are provided. Use the whole spectrum of oscdimg command line options in a graphical user interface. Explorer context menu can be extended by Discalot(_x64).exe /s [Options] Run Discalot(_x64).exe /? for details. Select your custom oscdimg.exe to use, in the GUI. Discalot is tested with oscdimg [build 2.56] on Windows7x64 and Windows10x64. MS-oscdimg.exe (Microsoft CD/DVD Premastering Utility) is part of Windows® Automated Installation Kit (AIK). By GetWaikTools ( you can download all (or single) waik tools without downloading any full ISO. Enjoy compiling your discs T. What's New in Version 171122 bug fixed - script failed when compiling path with spaces.
5/5 387 Feb 03, 2018
ReTokener <img src=""border="0">
Double R Pack: Amiga Disc Collection
Double R Pack: Amiga Disc Collection In 2011, Fermix took the collection of "Double R / Intense - Bronx", a set of over 950 Amiga floppies, and transferred them to an archive. The floppies, hand-collected over years, include music, demos, and programs. Included were a number of screenshots which are assembled into a browsable "book" (included).
5/5 1,699 Jun 13, 2015
Various Authors - Assembled by: Fermix <img src=""border="0">
Hyper 2.0.0 (All Platforms)
Hyper 2.0.0 Hyper is a command line terminal built upon web technologies such as html, javascript and css and offers a robust plugin-extension system. The goal of the project is to create a beautiful and extensible experience for command-line interface users, built on open web standards. In the beginning, our focus will be primarily around speed, stability and the development of the correct API for extension authors. In the future, we anticipate the community will come up with innovative additions to enhance what could be the simplest, most powerful and well-tested interface for productivity. For: macOS, Windows, Fedora, Debian, Other Linux Distros Instructions:
5/5 374 Jan 23, 2018
Guillermo Rauch <img src=""border="0">
Nmap Security Scanner 7.70
Nmap Security Scanner 7.70 Nmap ("Network Mapper") is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), a utility for comparing scan results (Ndiff), and a packet generation and response analysis tool (Nping). Features: Flexible: Supports dozens of advanced techniques for mapping out networks filled with IP filters, firewalls, routers, and other obstacles. This includes many port scanning mechanisms (both TCP &amp; UDP), OS detection, version detection, ping sweeps, and more. See the documentation page. Powerful: Nmap has been used to scan huge networks of literally hundreds of thousands of machines. Portable: Most operating systems are supported, including Linux, Microsoft Windows, FreeBSD, OpenBSD, Solaris, IRIX, Mac OS X, HP-UX, NetBSD, Sun OS, Amiga, and more. Easy: While Nmap offers a rich set of advanced features for power users, you can start out as simply as "nmap -v -A targethost". Both traditional command line and graphical (GUI) versions are available to suit your preference. Binaries are available for those who do not wish to compile Nmap ...
5/5 4,319 May 16, 2018
Nmap <img src=""border="0">
Resource Hacker 5.1.4
Resource Hacker 5.1.4 Resource Hacker™ has been designed to be the complete resource editing tool: compiling, viewing, decompiling and recompiling resources for both 32bit and 64bit Windows executables. Resource Hacker™ can open any type of Windows executable (*.exe; *.dll; *.scr; *.mui etc) so that individual resources can be added modified or deleted within these files. Resource Hacker™ can create and compile resource script files (*.rc), and edit resource files (*.res) too. Compiling: Compiling can be initiated either by passing a resource script file as a parameter on the the command line (see below), or by using Resource Hacker's text editor. Supported compiler directives include: #DEFINE, #UNDEF, #IF, #ELIF, #ELSE, #IFDEF, #IFNDEF, #INCLUDE, and #PRAGMA. The #INCLUDE, #IF, and #IFDEF directives can all be nested to multiple levels. Strings within resource statements are defined between double-quote (") characters. These strings can also contain typical 'C' style backslashed 'escaped' characters — \t , , \\ , \" , and \000 .. \377 (octal). A double-quote within a string can be 'escaped' by preceding it with either a backslash or with another double-quote character. Script comments are preceded either by double forward-slashes (//) or by a semi-colon (;). Filenames in within resource statements can only be parsed as strings, so they MUST be enclosed within double-quote characters otherwise compile errors will be raised. A complete list of Resource-Definition Statements can be found here. Viewing Resources: Once a file has been opened, most resources will be displayed as either an image (or group of images) or as decompiled text: However, some resource types will be displayed in both its compiled form (eg dialog or popup menu) and in its decompiled text format. Some resource types can only be displayed as a dump of raw byte data: Using the internal editor to modify text-based resources: Dialog, menu, string-table, message-table, accelerators and Borland form resources can all be easily ...
5/5 299 Jul 16, 2018
Angus Johnson <img src=" Hacker1_th.png"border="0">
Shallot 0.96.2514
Shallot 0.96.2514 Shallot is a file manager with the maximum degree of flexibility and customizability. Some features: Unlimited number of file panels Lots of customization options, e.g. directory tree can be hidden and is flexible in behavior lots of view options program behavior ... while conserving a good usability It nicely works with convoluted file systems, like editing an image in an archive in another archive on a network drive. It has a plugin interface which allows one to implement many additional functionality (like new filesystems) with Python scripting, without any compiler hassles. Using Shallot Beginning Whenever you start Shallot, you see the main window, which is assembled by the following parts: An action bar on the top: A lot of buttons which can trigger some actions. The main menu is also here ('three horizontal bars' icon). The address bar: See the current directory path and navigate upwards to the breadcrumbs or enter a new location. The directory tree on the left: A tree view of the filesystem(s) for easy navigation in wild directory hierarchies. The file view on the right: Shows the content of the current directory. There might be more than just one of this views (if you configure it this way). A status bar on the bottom: Comes up when it wants to tell you somethings. The general usage is not very different from other general purpose file managers. This text will not go that deep into it: Navigate to filesystem ...
5/5 351 Jun 09, 2017
Josef Hahn <img src=""border="0">
Unofficial Windows 98 Second Edition Service Pack 3.63
Unofficial Windows 98 Second Edition Service Pack 3.63 Microsoft has never released a service pack for Windows98 SE but this contains all Windows98 SE updates from Windows Update site and more. Instructions: Prerequisites: Minimum 64 MB of RAM for Main Updates. 160 MB free hard disk space for (ALL) options. Installation Guide: [1] Install Windows 98 Second Edition (with or without 98lite).* [2] Install all drivers for your hardware. [3] Install Internet Explorer (any version).* [4] Install latest DirectX 9c.* [5] Install latest Service Pack 3.x (Main Updates).* [6] Install optional components of Service Pack 3.x.* [7] Install MS Office.* [8] Install KernelEx, 98SE2ME, Revolution Pack.* [* = Optional] Before installing U98SESP3.EXE make sure that: 1/ You have the original w98SE installation disc. It will change core system files. It means that if something goes wrong you must be prepared to reinstall windows from the beginning. Sometimes installing U98SESP3.EXE after a fresh install is working normaly while it failed on an old install. 2/ You made a back up of all important datas. It's extremely unlikely that an error forces you to reinstall windows and eventualy to reformat thus to erase your hard drive. But for the sake of safety, please do it! 3/ You made a back up of your system files A copy of the "windows" and "Program Files" directories, at least the "windows" directory, preferably on a second physical hard drive or on CD or DVD or an external drive. This is usefull to revert back to a prior w98se install which was already updated and functioning well. Restoring windows 98 can be done simply be recopying all the system files back to their original location, in dos mode. The easiest way is to use a second physical (not a partition) and internal (not USB) hard drive. It's aslo a good idea to make sure a copy of the registry has been automaticaly preserved in the system files you backed up and to know how to restore the registry in ...
5/5 4,625 Jun 05, 2018
PROBLEMCHYLD <img src=""border="0">
Windows Repair Toolbox
Windows Repair Toolbox Windows Repair Toolbox (freeware) is a software created to help you repair a Windows system, by making the process faster, easier and uniform. Features: - Download and run "on-the-fly" the best free portable software when it comes to diagnose and solve several kinds of Windows problems. The tools are categorized by their function, and the program will automatically download the correct version for the Windows edition in which you're working. When you finish, simply uninstall the tool, and all downloaded software it's also removed. Note: there are 3 tools that aren't portable, those are marked with an [ i ] (stands for "installer"); - Displays relevant information about the computer to be repaired: CPU temperature, name and % of use; amount of RAM installed on the system and % of use; amount of free space left in C:\ partition; Windows edition and install date. - Allows you to perform quality assurance tests after the repair is complete; - Allows you to save notes about the repair process; - Provides 1-click access to some useful Windows tools (chkdsk, sfc, regedit, msconfig); - "Unattended fix" option, automatically performs: malware removal, system cleaning and repair and disk defragmentation. A email letting you know that the automatic repair is complete, and containing the logs, can be sent to you. Disclaimer (read carefully): By running Windows Repair Toolbox you accept COMPLETE responsibility for ANYTHING that happens. This tool has ZERO WARRANTY for any purpose. Run it AT YOUR OWN RISK. All 3rd-party tools you might download using Windows Repair Toolbox belong to their respective owners and authors, and are bound by their respective licences. It is YOUR RESPONSIBILITY to determine if you have the rights to use those 3rd-party tools in whatever environment you use this software. Requirements: .NET Framework 4, internet connection, Windows XP to 10.
5/5 1,279 Jul 10, 2018
Windows Repair Toolbox <img src=""border="0">
Showing rows 1 to 9 of 9 Showing Page 1 of 1  1 

Search - Statistics & RSS - Contact Admin - -
PHCDownload 1.1.2 - Copyright (c) 2005 - 2018 - 0.0333 seconds

Tweets by @GeekOnTheLoose