There are no ads or fake
download buttons on this site.
This project is supported by
your donations.
Please donate. Thanks!



Processed through Paypal
No account required.


​​Facebook​​Follow OlderGeeks on Pinterest Follow @GeekOnTheLoose

PayWhatYouWant


CLICK HERE TO SEARCH

 Home » OlderGeeks.com Freeware Downloads » Searching Files   
Search Results
Files
  File Name Rating Downloads
Last Update/Developer
Kaspersky CapperKiller 1.0.12.0
Kaspersky CapperKiller 1.0.12.0 The CapperKiller utility is designed for treating the aftermaths of a Trojan-Banker.Win32.Capper infection. 1. Signs of infection The given piece of malware changes proxy settings in the following browsers (if installed on the host): Internet Explorer, Mozilla Firefox, Opera, Google Chrome (uses Internet Explorer settings). It adds a special URL to the Use automatic configuration script option in the Internet connection settings. A reboot may be required after the treatment. The CapperKiller utility performs the following: Detects and fixes proxy settings in all browsers. Detects and deletes malicious exec files.
5/5 769 Jan 24, 2017
Kaspersky Lab
Kaspersky FippKiller 1.0.2
There is a special utility for curing an active Worm.Win32.Fipp.a infection. Infection symptoms: Significantly increased RDP traffic (brute-force attack). Antivirus software performance degradation on many hosts in local network. Infected hosts attempt to access URLs like *.ppift.* How to disinfect an infected system: Download the FippKiller.exe file. Launch the FippKiller.exe file on the infected (or potentially infected) host. It is recommended not to reboot hosts after using the utility until the network has been successfully disinfected. Command line options to use with the utility: -p <path> - scan a particular host; -n – scan network volumes; -r - scan flash drives, and removable USB / FireWire hard disks; -y – close the window once the utility completes; -s – scan in silent mode (without displaying the console window); -l <file_name> - log file name; -v – create a detailed log file (should be used with -l); -m – system infection protection monitoring mode; -q – scan the system, activate monitoring mode once the scan completes.
5/5 3,666 Jan 24, 2017
Kaspersky
Kaspersky Password Manager 8.0.5.485
Kaspersky Password Manager 8.0.5.485 It’s unwise to use the same password for multiple accounts… but multiple passwords are difficult to remember. Kaspersky Password Manager securely stores all your passwords, addresses &amp; credit card details – and synchronizes them across your PC, Mac, Android phone &amp; tablet, iPhone &amp; iPad… so you only need to remember one master password – to access all your individual passwords &amp; data.
5/5 9 Feb 01, 2017
Kaspersky Labs
Kaspersky PC Cleaner 1.0.1.150
Kaspersky PC Cleaner 1.0.1.150 Make your PC run smoothly &amp; effectively, by cleaning it from junk files &amp; temporary items - and tune up your digital privacy.
5/5 25 Jan 11, 2017
Kaspersky Labs
Kaspersky Products Remover 1.0.1194
Kaspersky Products Remover 1.0.1194 If an error occurs when uninstalling a Kaspersky Lab product with Windows (Control Panel --> Programs and Features), then download and launch the free tool KAVremover. In order to fully remove the product, perform the following actions: 1: Download Kavremover. 2: Boot your computer in Safe Mode. 3: Run Kavremover. 4: Restart your computer after the utility completes. This utility deletes all activation data. You will need to activate your product after reinstalling.
5/5 1,303 Jan 27, 2017
Kaspersky Lab
Kaspersky RakhniDecryptor 1.14.0.0
Kaspersky RakhniDecryptor 1.14.0.0 RakhniDecryptor utility for removing Trojan-Ransom.Win32.Rakhni malicious software (.oshit and others) The malicious programs Trojan-Ransom.Win32.Rakhni, Trojan-Ransom.Win32.Agent.iih, Trojan-Ransom.Win32.Aura, Trojan-Ransom.Win32.Autoit, and Trojan-Ransom.AndroidOS.Pletor are used by malefactors to encrypt files so that their extensions are changed as follows: <filename>.<original_extension>.<locked> <filename>.<original_extension>.<kraken> <filename>.<original_extension>.<darkness> <filename>.<original_extension>.<nochance> <filename>.<original_extension>.<oshit> <filename>.<original_extension>.<oplata@qq_com> <filename>.<original_extension>.<relock@qq_com> <filename>.<original_extension>.<crypto> <filename>.<original_extension>.<helpdecrypt@ukr.net> <filename>.<original_extension>.<pizda@qq_com> <filename>.<original_extension>.<dyatel@qq_com> <filename>.<original_extension>_crypt <filename>.<original_extension>.<nalog@qq_com> <filename>.<original_extension>.<chifrator@qq_com> <filename>.<original_extension>.<gruzin@qq_com> <filename>.<original_extension>.<troyancoder@qq_com> <filename>.<original_extension>.<encrypted> <filename>.<original_extension>.<cry> <filename>.<original_extension>.<AES256> <filename>.<original_extension>.<enc> <filename>.<original_extension>.<coderksu@gmail_com_id371> <filename>.<original_extension>.<coderksu@gmail_com_id372> <filename>.<original_extension>.<coderksu@gmail_com_id374> <filename>.<original_extension>.<coderksu@gmail_com_id375> <filename>.<original_extension>.<coderksu@gmail_com_id376> <filename>.<original_extension>.<coderksu@gmail_com_id392> <filename>.<original_extension>.<coderksu@gmail_com_id357> <filename>.<original_extension>.<coderksu@gmail_com_id356> <filename>.<original_extension>.<coderksu@gmail_com_id358> <filename>.<original_extension>.<coderksu@gmail_com_id359> <filename>.<original_extension>.<coderksu@gmail_com_id360> <filename>.<original_extension>.<coderksu@gmail_com_id20> <filename>.crypt@india.com.random_characters> <filename>.<original_extension>.<hb15> For example: Before: file.doc / After: file.doc.locked Before: 1.doc / After: 1.dochb15 To regain control over the files encrypted by Trojan-Ransom.Win32.Rakhni, Trojan-Ransom.Win32.Aura, Trojan-Ransom.Win32.Agent.iih, Trojan-Ransom.Win32.Autoit, and Trojan-Ransom.AndroidOS.Pletor, use the RakhniDecryptor utility developed by Kaspersky Lab specialists. 1. How to work with the utility IMPORTANT: Trojan-Ransom.Win32.Rakhni creates the exit.hhr.oshit file that contains an encrypted password to user's files. If this file remains on the computer, it will make decryption with the RakhniDecryptor utility faster. If the file has been removed, it can be recovered with file recovery utilities. After the file is recovered, put it into %APPDATA% and run the scan with the utility once again. The exit.hhr.oshit file has the following path: Windows XP: C:\Documents and Settings\<username>\Application Data Windows 7/8: C:\Users\<username>\AppData\Roaming To decrypt ...
5/5 3,677 Jul 23, 2015
Kaspersky Lab
Kaspersky RannohDecryptor 1.8.0.0
Kaspersky RannohDecryptor 1.8.0.0 If the system is infected by a malicious program of the family Trojan-Ransom.Win32.Rannoh , Trojan-Ransom.Win32.AutoIt, Trojan-Ransom.Win32.Fury, or Trojan-Ransom.Win32.Cryakl, all files on the computer will be encrypted in the following way: In case of a Trojan-Ransom.Win32.Rannoh infection, file names and extensions will be changed according to the template locked-<original name>.<four random letters>. In case of a Trojan-Ransom.Win32.Cryakl infection, the tag {CRYPTENDBLACKDC} is added to the end of file names. In case of a Trojan-Ransom.Win32.AutoIt infection, extensions will be changed according to the template <original name>@<mail server>_.<random set of characters>. Example: ioblomov@india.com_RZWDTDIC. To decrypt files affected by Trojan-Ransom.Win32.Rannoh, Trojan-Ransom.Win32.AutoIt, Trojan-Ransom.Win32.Fury, Trojan-Ransom.Win32.Crybola or Trojan-Ransom.Win32.Cryakl, use the RannohDecryptor utility.
5/5 1,181 Jan 24, 2017
Kaspersky Lab
Kaspersky RectorDecryptor 2.6.35.0
Kaspersky RectorDecryptor 2.6.35.0 Cybercriminals use Trojan-Ransom.Win32.Rector for disrupting normal performance of computers and for unauthorized modification of data making it unusable. Once the data has been “taken hostage” (blocked), its owner (user) receives a ransom demand. The victim is supposed to deliver the ransom in exchange for pirate's promise to send a utility that would restore the data or repair the PC. Kaspersky Lab specialists have developed a special utility for decrypting the data encrypted by Trojan-Ransom.Win32.Rector. The utility has a GUI. Do the following to decrypt files encrypted by Trojan-Ransom.Win32.Rector: Download the utility RectorDecryptor.zip to an infected computer; Extract its content using an archiver (WinZip, e.g.); Run the file RectorDecryptor.exe; The utility starts working by clicking the button Start scan. It finds and decrypts encrypted files. Select the option Delete crypted files after decryption to delete copies of encrypted files with extensions .vscrypt, .infected, .bloc, .korrektor, etc. after successful decryption.
5/5 3,726 Jan 24, 2017
Kaspersky Lab
Kaspersky Rescue Disk 10.0.32.17
Kaspersky Rescue Disk 10.0.32.17 Boot from the Kaspersky Rescue Disk to scan and remove threats from an infected computer without the risk of infecting other files or computers. If your computer is infected with the ransom malware, then use a special Kaspersky WindowsUnlocker utility. Ransom malware blocks access to data so that the user can no longer use it and prevents the computer from running correctly. Once the data has been blocked or encrypted, the user will receive a ransom demand. In order to disinfect the registry using Kaspersky WindowsUnlocker, perform the following actions: If you booted Kaspersky Rescue Disk in the graphic mode, click the button К ; in the bottom right corner of the screen and in the menu select Terminal. In the command prompt enter the command windowsunlocker and press Enter on the keyboard. Burn this ISO image to a CD, insert it into the infected system's CD-ROM drive, enter the PC's BIOS, set it to boot from the CD and reboot the computer. This lists the Gentoo-specific options, along with a few options that are built-in to the kernel, but that have been proven very useful to our users. Also, all options that start with "do" have a "no" inverse, that does the opposite. For example, "doscsi" enables SCSI support in the initial ramdisk boot, while "noscsi" disables it. Easily remove malicious objects from your computer without the risk of getting infected.
5/5 3,898 Jan 27, 2017
Kaspersky
Kaspersky ScatterDecryptor 1.0.0.0
Kaspersky ScatterDecryptor 1.0.0.0 If your computer is infected with Trojan-Ransom.BAT.Scatter, use the ScatterDecryptor utility for restoring encrypted files. Trojan-Ransom.BAT.Scatter encrypts user files with a public key and changes their extensions. The files can only be decrypted with a unique secret key. ScatterDecryptor restores the files only if the utility contains a certain Trojan-Ransom.BAT.Scatter modification's secret key.
5/5 2,325 Jan 24, 2017
Kaspersky Labs International Ltd.
Kaspersky ScraperDecryptor 1.0.0.0
Kaspersky ScraperDecryptor 1.0.0.0 The malicious program Trojan-Ransom.Win32.Scraper encrypts user files to block access to them. After the data has been blocked, the user is required to pay a ransom. To decrypt files affected by Trojan-Ransom.Win32.Scraper, use the ScraperDecryptor utility developed by Kaspersky Lab engineers.
5/5 1,413 Jan 20, 2015
Kaspersky Lab
Kaspersky TDSSKiller 3.1.0.11
Kaspersky TDSSKiller 3.1.0.11 A rootkit is a program or a program kit that hides the presence of malware in the system. A rootkit for Windows systems is a program that penetrates into the system and intercepts the system functions (Windows API). It can effectively hide its presence by intercepting and modifying low-level API functions. Moreover it can hide the presence of particular processes, folders, files and registry keys. Some rootkits install its own drivers and services in the system (they also remain “invisible”). Kaspersky Lab has developed the TDSSKiller utility that allows removing rootkits. The utility supports 32-bit and 64-bit operation systems. The utility can be run in Normal Mode and Safe Mode. It detects and removes the following malware: malware family Rootkit.Win32.TDSS; bootkits; rootkits. List of malicious programs: Rootkit.Win32.TDSS, Rootkit.Win32.Stoned.d, Rootkit.Boot.Cidox.a, Rootkit.Boot.SST.a, Rootkit.Boot.Pihar.a,b,c, Rootkit.Boot.CPD.a, Rootkit.Boot.Bootkor.a, Rootkit.Boot.MyBios.b, Rootkit.Win32.TDSS.mbr, Rootkit.Boot.Wistler.a, Rootkit.Win32.ZAccess.aml,c,e,f,g,h,i,j,k, Rootkit.Boot.SST.b, Rootkit.Boot.Fisp.a, Rootkit.Boot.Nimnul.a, Rootkit.Boot.Batan.a, Rootkit.Boot.Lapka.a, Rootkit.Boot.Goodkit.a, Rootkit.Boot.Clones.a, Rootkit.Boot.Xpaj.a, Rootkit.Boot.Yurn.a, Rootkit.Boot.Prothean.a, Rootkit.Boot.Plite.a, Rootkit.Boot.Geth.a, Rootkit.Boot.CPD.b, Backdoor.Win32.Trup.a,b, Backdoor.Win32.Sinowal.knf,kmy, Backdoor.Win32.Phanta.a,b, Virus.Win32.TDSS.a,b,c,d,e, Virus.Win32.Rloader.a, Virus.Win32.Cmoser.a, Virus.Win32.Zhaba.a,b,c, Trojan-Clicker.Win32.Wistler.a,b,c, Trojan-Dropper.Boot.Niwa.a, Trojan-Ransom.Boot.Mbro.d, e, Trojan-Ransom.Boot.Siob.a, Trojan-Ransom.Boot.Mbro.f. How to disinfect a compromised system Download the TDSSKiller.exe file to a folder on the infected (or possibly infected) computer; Run the TDSSKiller.exe file; Wait until the scanning and disinfection completes. A reboot might require after the disinfection has been completed.
5/5 5,382 Aug 08, 2016
Kaspersky Lab
Kaspersky Virus Removal Tool 15.0.19.0
Kaspersky Virus Removal Tool 15.0.19.0 Kaspersky Virus Removal Tool is a utility designed to remove all types of threats from computers. Kaspersky Virus Removal Tool uses the effective detection algorithms realized in Kaspersky Anti-Virus and AVZ. Kaspersky Virus Removal Tool does not provide resident protection for your computer. After disinfecting a computer, you are supposed to remove the tool and install a full version of antivirus software. Advantages: Simplified interface. Can be installed to an infected computer (Safe Mode supported). Composite scan and disinfection system: signature detection and heuristic analyzer. Gathering system information and interactive creation of scripts for disinfection. General functions: Automatic and manual removal of virus, Trojans and worms. Automatic and manual removal of Spyware and Adware modules. Automatic and manual removal of all types of rootkits. Known issues: System memory scan is unavailable in x64 versions of Windows XP / Vista / 7 due to specific features of application system drivers. Impossible to rename application folder if User Account Control is enabled in Windows Vista settings and application Self-Defence disabled. Support rules for Kaspersky Virus Removal Tool: Technical support is provided only for users of Kaspersky Anti-Virus and Kaspersky Internet Security. If you are not a user of a Kaspersky Lab product, then in order to get technical support available for the tool, visit Kaspersky Lab The tool should be used for disinfection purpose under expert guidance via the service http://kaspersky-911.com. Unguided creation of scripts can result in a data loss or crippled computer. Having virus on your computer is always a risk of crippling it or losing data. Kaspersky Lab does not take any responsibility for the possible harm inflicted by virus during disinfection.
5/5 3,962 Jan 26, 2017
Kaspersky Lab
Kaspersky XoristDecryptor 2.3.45.0
Kaspersky XoristDecryptor 2.3.45.0 Malware of the family Trojan-Ransom.Win32.Xorist is designed for unauthorized modification of data on a victim computer. It makes computers uncontrollable or blocks its normal performance. After taking the data as a “hostage” (blocking it), a ransom is demanded from the user. The victim is supposed to deliver the ransom to the pirate, who is promising to send in return a program which would release the data or restore normal performance of the computer. There is a utility to confront malware of the family Trojan-Ransom.Win32.Xorist - XoristDecryptor.exe. The utility XoristDecryptor.exe is provided with a GUI. Disinfection of an infected system: Download the XoristDecryptor.zip to an infected computer. Extract the utility using an archiver program, WinZip for example. Run the XoristDecryptor.exe file. Click the Start scan button to execute the utility . The utility will prompt you to enter path of at least one encrypted file to begin the decryption process. The trojan program encrypts all files with the following extensions: doc, xls, docx, xlsx, db, mp3, waw, jpg, jpeg, txt, rtf, pdf, rar, zip, psd, msi, tif, wma, lnk, gif, bmp, ppt, pptx, docm, xlsm, pps, ppsx, ppd, tiff, eps, png, ace, djvu, xml, cdr, max, wmv, avi, wav, mp4, pdd, html, css, php, aac, ac3, amf, amr, mid, midi, mmf, mod, mp1, mpa, mpga, mpu, nrt, oga, ogg, pbf, ra, ram, raw, saf, val, wave, wow, wpk, 3g2, 3gp, 3gp2, 3mm, amx, avs, bik, bin, dir, divx, dvx, evo, flv, qtq, tch, rts, rum, rv, scn, srt, stx, svi, swf, trp, vdo, wm, wmd, wmmp, wmx, wvx, xvid, 3d, 3d4, 3df8, pbs, adi, ais, amu, arr, bmc, bmf, cag, cam, dng, ink, jif, jiff, jpc, jpf, jpw, mag, mic, mip, msp, nav, ncd, odc, odi, opf, qif, qtiq, srf, xwd, abw, act, adt, aim, ans, asc, ase, bdp, bdr, bib, boc, crd, diz, dot, dotm, dotx, dvi, ...
5/5 3,677 Jan 24, 2017
Kaspersky Lab
   
Showing rows 1 to 14 of 14 Showing Page 1 of 1  1 

Search - Statistics & RSS - Contact Admin - -
PHCDownload 1.1.2 - Copyright (c) 2005 - 2017 - 0.0242 seconds


Tweets by @GeekOnTheLoose