Files | ||||
File Name | Rating | Downloads | ||
![]() |
HiJackThis+ v3.1.0.2 HiJackThis+ v3.1.0.2 The resurrection of one of our favorite virus/malware removal tools of all time! HiJackThis+ (Plus) (previously called: HiJackThis Fork v3) is a fork and a continuation of the original Trend Micro HiJackThis by Merijn Bellekom development, once a well-known tool. HiJackThis+ is a free utility for Microsoft Windows that scans your computer for settings changed by adware, spyware, malware and other unwanted programs. The difference from classical antiviruses is the ability to function without constant database updates, because HiJackThis+ primarily detects hijacking methods rather than comparing items against a pre-built database. This allows it to detect new or previously unknown malware - but it also makes no distinction between safe and unsafe items. Users are expected to research all scanned items manually, and only remove items from their PC when absolutely appropriate. Therefore, FALSE POSITIVES ARE LIKELY. If you are ever unsure, you should consult with a knowledgeable expert BEFORE deleting anything. HiJackThis+ is not a replacement of a classical antivirus. It doesn't provide a real-time protection, because it is a passive scanner only. Consider it as an addition. However, you can use it in form of boot-up automatic scanner in the following way: • Run the scanning • Add all items in the ignore-list • Set up boot-up scan in menu "File" - "Settings" - "Add HiJackThis to startup" • Next time when user logged in, HiJackThis will silently scan your OS and display UI if only new records in your system has been found. Features • Lists non-default settings in the registry, hard drive and memory related to autostart • Generates organized, easily readable reports • Does not use a database of specific malware, adware, etc • ... |
![]() |
2,553 | Jul 14, 2023 Alex Dragokas <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/HiJackThisFork2_th.png"border="0"> |
![]() |
Hiren's BootCD 15.1 (Classic) Hiren's BootCD 15.1 (Classic) All in One Bootable CD which has all these utilities Antivirus Tools Avira AntiVir Personal (07-12-2011): Free anti-virus and anti-spyware on-demand scanner, detects and removes more than 50000 viruses and trojans (Windows Freeware). ClamWin Free Antivirus 0.97.3 (07-12-2011): A free antivirus, GNU GPL Open Source Virus Scanner (Windows Freeware). ComboFix (07-12-2011): Designed to cleanup malware infections and restore settings modified by malware (Windows Freeware). Dr.Web CureIt! Antivirus: A free standalone anti-virus and anti-spyware on-demand scanner (downloadable) (Windows Freeware). GMER 1.0.15: Hidden services, hidden registry, hidden file scanner, Rootkit Detector and Remover (Windows Freeware). Malwarebytes Anti-Malware 1.51.1 (07-12-2011): Anti-malware application that can thoroughly remove even the most advanced malware (Windows Freeware). Remove Fake Antivirus 1.82: A tool to remove virus/malware which disguises itself to be an antivirus and produces fake alert/warnings and urge you to purchase a useless copy of the fake antivirus (Windows Freeware). RootkitRevealer 1.7.1: Rootkit Revealer is an advanced patent-pending root kit detection utility (Windows Freeware). Spybot: Search & Destroy 1.6.2 (07-12-2011): Application to scan for spyware, adware, hijackers and other malicious software (Windows Freeware). SuperAntispyware 5.0.1134 (07-12-2011): Remove Adware, Malware, Parasites, Rootkits, Spyware, Trojan, and Worms (a must have tool) (Windows Freeware). TDSSKiller 2.6.21.0: To remove malware belonging to the family Rootkit.Win32.TDSS aka Tidserv, TDSServ and Alureon (Windows Freeware). Backup Tools CloneDisk 1.9.6: All in one tool for MBR, Partition, Disk, VMWare Disk images vmdk/vmx/vhd, and much more (Windows Freeware). COPYR.DMA Build013: A Tool for making copies of hard disks with bad sectors (Dos Freeware). CopyWipe 1.14: Copy old hard drive to a ... |
![]() |
14,648 | Aug 06, 2024 Hirems <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/hirensbootcd_th.png"border="0"> |
![]() |
Homedale v2.14 Homedale v2.14 Wi-Fi / WLAN Monitor With Homedale you can scan for Wi-Fi / WLAN Access Points and monitor their signal strength. The details windows shows all ‘Information elements’ and their decoded data. Use the detected access points with Google Geolocation, Mozilla Location Service and Open WLAN Map Service to locate yourself. It works with 802.11a/b/g/n/ac wireless networks in the 2.4 GHz and 5 GHz frequency bands using 20, 40, 80 and 160 MHz width channels. Details See an overview of all available access points with their signal strength, security [WEP/WPA/WPA2], network name (SSID), BSSID, vendor based on MAC address, channel, supported data rates and much more. Details from information elements (IE) advertised by the access points are parsed and shown. Signal Strength You can also monitor the signal strength of selected access points in a graph over the time. With a right mouse click, you can start logging to a text file and create a screenshot. Frequency Usage See the usage of all Wi-Fi channels and find the optimal channel for your access point. Connect Make a right mouse click to connect and disconnect from a Wi-Fi / WLAN access point. The blue icon shows the currently connected access point. Changes: Windows v2.14 New: Channel Utilisation Rssi graph color inverted macOS v1.17 New: Crash prevented Supported Languages: English French German Greek Italian Korean Norwegian Polish Portuguese Russian Simplified Chinese Slovenian Swedish Traditional Chinese Ukrainian Command line options: /n <0/1/2> 0: Do not use ndis [default for >=Vista], 1: Use ndis [default for <=XP], 2: Use ndis exclusively /r <x> Refresh after x milli seconds /s <ssid1,…> Log only specified ssid's /m <12-34-56-78-90-ab,…> Log only specified bssid's /l <file name> Enable logging to specified file name /d Append to existing log file instead of deleting it first /e Log all access points /c Use , for log file instead of tab /f <filter> Filter access points for display and logging /t <x> Exit application after x milli seconds /a Log currently connected ap /p Or portable.dat file is in same folder, use portable ... |
![]() |
4,691 | Nov 15, 2024 The SZ Development <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Homedale3_th.png"border="0"> |
![]() |
HopToDesk v1.42.6 WARNING: If someone called who you don't know or if you dialed a number that popped up on your screen and someone sent you here to download this program... YOU ARE BEING SCAMMED. HANG UP IMMEDIATELY! HopToDesk v1.42.6 Remote Desktop Software. Free for personal and commercial use. What is HopToDesk and what makes it unique? HopToDesk is a free remote desktop tool allowing users to share their screen and allow remote control access to their computers and devices. Unlike other similar tools such as TeamViewer or AnyDesk, HopToDesk is free for both personal and business use, provides true end-to-end encryption for all peer communications, and open source. What are the main features of HopToDesk? Screen sharing, remote control, file transfer, and live chat are the basic features available with HopToDesk. Other features such as direct IP access, IP whitelisting and SOCKS5 proxy connections are supported. How secure is HopToDesk? Security and privacy is a priority at HopToDesk. All traffic between users, including chats, file transfers, and screen sharing is end-to-end encrypted. This means HopToDesk does not have the ability to see users screens, files, or any information shared between partners during a remote session. Other remote desktop products do not offer end-to-end encryption and frequently send background data to the remote desktop provider's servers, allowing them to detect commercial use and prevent the application from running again. This is not possible with HopToDesk. Do I need to configure my router or firewall to use HopToDesk? HopToDesk should simply work and be able to connect to any peer without needing to change any router or firewall settings. Other remote desktop tools such as Windows Remote Desktop and VNC do require setting up port forwarding or opening ports on the router or firewall to allow remote connections to be made, however this is not the case with HopToDesk. Can I easily use HopToDesk to manage many ... |
![]() |
3,506 | Oct 31, 2024 HopToDesk <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/HopToDesk1_th.png"border="0"> |
![]() |
HouseCall v1.62.1.1180 HouseCall v1.62.1.1180 Free online security scan. Detect and fix viruses, worms, spyware, and other malicious threats for free. Features: • Free Malware Scan Discover if your files are safe and block malicious software hidden outside of files. • Threat Report With the detailed report, you can see what threats have targeted your device and take quick action. • Threat Removal Threats can harm your device before you realize there is a problem. Use HouseCall to get your device back to normal. • Custom Scan Options With HouseCall, you can choose which scan to run - quick or full. You can even create a custom scan. Free and quick online virus scan HouseCall can quickly find new threats on your Windows computer for free without getting in the way of your existing security software. You can count on HouseCall to keep malicious files off your device and stop them from spreading. Click here to visit the author's website. |
![]() |
8,887 | Nov 19, 2024 Trend Micro <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/housecall_th.png"border="0"> |
![]() |
HTTP Downloader v1.0.3.1 32bit HTTP Downloader v1.0.3.1 32bit HTTP Downloader is a download manager for the HTTP(S) protocol. Maximize your download throughput by utilizing high performance input/output completion ports (IOCP). HTTP Downloader can open thousands of connections at a time and consumes very little system resources. WARNING: Using this software to download from OlderGeeks could get your IP address banned due to protections on our site. How ironic is that? HTTP Downloader is a high-performance, multi-part download manager. You can Start, Pause, Stop, and Queue up to 100 downloads at a time. Each download can be split into 100 parts. That's 10,000 connections! Drag and drop links into the program's main window or, select File > Add URL(s)... to bring up the Add URL(s) window. From here you can select the download location to save the files. The Advanced button allows you to configure the number of parts to split each download, the SSL / TSL version to use for HTTPS connections, authentication information (basic or digest), and any necessary cookies, headers, and POST data. Clicking the Download button will begin the download(s). HTTP Downloader has various options to configure the behavior of the program. The options can be accessed from Tools > Options... The first tab that appears is the General tab. In it you can choose to display the System Tray icon which will generally appear on the lower right corner of the taskbar (next to the clock). The program can be set to minimum to the System Tray instead of to the taskbar and close to the System Tray instead of exiting the program. Always on top will cause all the program's windows to appear on top of every other program's windows. Enable download history will save the entries in the main window so that they can be loaded the next time the program starts. ... |
![]() |
5,225 | Feb 10, 2020 Eric Kutcher <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/HTTP Downloader6_th.png"border="0"> |
![]() |
HTTP Downloader v1.0.3.1 64bit HTTP Downloader v1.0.3.1 64bit HTTP Downloader is a download manager for the HTTP(S) protocol. Maximize your download throughput by utilizing high performance input/output completion ports (IOCP). HTTP Downloader can open thousands of connections at a time and consumes very little system resources. WARNING: Using this software to download from OlderGeeks could get your IP address banned due to protections on our site. How ironic is that? HTTP Downloader is a high-performance, multi-part download manager. You can Start, Pause, Stop, and Queue up to 100 downloads at a time. Each download can be split into 100 parts. That's 10,000 connections! Drag and drop links into the program's main window or, select File > Add URL(s)... to bring up the Add URL(s) window. From here you can select the download location to save the files. The Advanced button allows you to configure the number of parts to split each download, the SSL / TSL version to use for HTTPS connections, authentication information (basic or digest), and any necessary cookies, headers, and POST data. Clicking the Download button will begin the download(s). HTTP Downloader has various options to configure the behavior of the program. The options can be accessed from Tools > Options... The first tab that appears is the General tab. In it you can choose to display the System Tray icon which will generally appear on the lower right corner of the taskbar (next to the clock). The program can be set to minimum to the System Tray instead of to the taskbar and close to the System Tray instead of exiting the program. Always on top will cause all the program's windows to appear on top of every other program's windows. Enable download history will save the entries in the main window so that they can be loaded the next time the program starts. ... |
![]() |
5,057 | Feb 10, 2020 Eric Kutcher <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/HTTP Downloader6_th.png"border="0"> |
![]() |
iDailyDiary Free v4.40 iDailyDiary Free v4.40 Provides a simple interface that immediately gets you started taking daily notes, creating a journal, putting your thoughts into writing and much more. The iDailyDiary editor is richtext with the ability to insert graphics, URL's, Hypertext links and links to other diary pages. iDailyDiary is fully searchable so you can always track down those important dates and reminders. Below is the basic Diary Page. Key Features • Works with MS Windows XP, 2003, 2008, 2012, Vista, 7, 8, 10, 11 - 32bit and 64bit • Backup and Restore to Cloud • Data files encrypted and password protected • Richtext Editor • Fully Searchable • Insert Pictures, URL's and Hypertext • Multiple entries/tabs for each day • Export to HTML format to create web pages • Supports Unicode (non-western character sets) • Multi-Language GUI, including Chinese, Dutch, French, German, Italian, Turkish and Japanese Overview iDailyDiary has been designed around a simple page-for-a-day diary. As you can see, your diary can contain a mixture of pictures and formated text. Image files of various types are supported including Bitmap, JPeg, Icons and even animated GIF's. Diary Navigation Navigating your diary couldn't be easier. Simply use the left and right arrow buttons to select either Yesterday or Tomorrow or choose the popup calendar to select any day of the month/year. In addition to the calendar on the top toolbar you have a month view calendar bar at the bottom of your diary. This calendar bar not only allows you to view and select any day of the current month but also highlights which days of the month you have made entries in your diary. In this screen shot you can see that both Tuesday 1st and Thursday 3rd have entries, but not the other days. Multiple Daily Entries You are not limited to just one page per day. Feel ... |
![]() |
2,493 | Oct 16, 2024 Splinterware Software Solutions <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/idailydiary1_th.png"border="0"> |
![]() |
InControl v1.0.2 InControl v1.0.2 Easily manage Windows 10 and 11 out-of-control updating and upgrading. Controls Windows automatic updating/upgrading system by targeting it to a specific major version and feature update release. By default, the current release will be used. So if you “Take Control” with the major version and feature release shown in the boxes in the lower left, Windows will remain right where it is – only installing monthly security updates – until you “Release control”. If you wish to move to a future release, say from Windows 10 21H1 to Windows 10 21H2, you can first “Release Control” to allow those two fields to be edited. Then change the “21H1” to “21H2” and press “Take Control”. Windows Update will now be targeted at the 21H2 feature release and will offer it for installation once it's available. And if you do nothing else, your system will remain there until you again deliberately release control. Note that InControl will hold your Windows right where it is, even after the current version and feature release has gone out of support. You will see a complaint about the current version of Windows requiring an update. But your system will not be updated while you are InControl. If you have been playing with InControl and want to restore its Version and Release fields to their natural (current) default values, delete those fields' contents while the system is not under control, then click “Take Control” and they will be set to the system's current version and feature release. That's pretty much it. Like all of GRC's ultra lightweight freeware utilities, no setup or installation is required. Just run the utility with administrative rights. What it does . . . The first thing InControl does upon starting is verify that it's running on a non-Enterprise and non-Server edition of at least Windows 10. ... |
![]() |
2,489 | May 19, 2025 Gibson Research Corporation <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/InControl1_th.png"border="0"> |
![]() |
INetGet for Windows v1.02 INetGet for Windows v1.02 Simple command-line tool for downloading files via HTTP(S) or FTP, based on the WinINet API. This program provides a similar functionality as the well-known WGet and cURL tools. However, in contrast to those, INetGet is based directly on the "native" Windows Internet programming interface (WinINet). This comes at the advantage that INetGet is very small and lightweight, as it uses the HTTP(S) and FTP services provided by the operating system, instead of having to implement these protocols on its own. There are no external dependencies (e.g. OpenSSL or GnuTLS), except for standard system libraries that are present on every Windows system anyway. Still, advanced features, such as HTTPS and IPv6, are supported. Furthermore, since INetGet is based on the Windows crypto libraries, it uses the Windows certificate store. This means that, in contrast the aforementioned tools, you do not need to provide and maintain your own certificate bundle for HTTPS. Certificate updates as well as security fixes for the underlying cryptographic routines are automatically provided, via Windows Update. On the downside, you will have to trust Microsoft's protocol implementations. And the availability of some features depends on the Windows version. System Requirements INetGet works on Windows Vista or any later Windows version. Windows XP should work too, but is not recommended these days! The 32-Bit version of INetGet runs on all 32-Bit and 64-Bit Windows versions, while the 64-Bit version of INetGet requires a 64-Bit Windows version. IPv6 support requires Internet Explorer 7 or later. Note that all supported Windows versions (Vista or later) already meet this requirement. Windows XP requires manual update to IE7 in order to enable IPv6 support. As far as HTTPS support is concerned, all relevant Windows versions (XP or later) support TLS 1.0 as well as the deprecated SSL 2.0 and SSL 3.0 protocols. Support for ... |
![]() |
5,456 | Dec 01, 2019 LoRd_MuldeR <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/INetGet for Windows1_th.png"border="0"> |
![]() |
Input Director v2.1.4 Input Director v2.1.4 Enables the control of multiple Windows systems using the keyboard/mouse attached to one computer. Switch control between systems either by hotkey or by moving the cursor to the screen edge on one computer for it to appear on the next one Input Director supports a shared clipboard - copy on one computer, switch control, and paste . Input Director is compatible with: Windows 11, Windows 10, Windows 8/8.1 and Windows 7. The systems must be networked. Features Easy to Use Easy to follow installation and usage guides - setup only takes a few minutes Input Director's flexible monitor layout system makes it easy to accurately reflect a monitor's physical location and size: Multi-monitor support Shared Clipboard - copy and paste between computers (including files!) Compatible with Windows 11, Windows 10, Windows 8/8.1 and Windows 7 Only Input Director ensures the cursor remains visible and correct if the mouse is disconnected on a Windows 10 or Window 11 system Transitioning control to another computer is as simple as moving your cursor off the screen on one computer for it to jump to the other Able to control a computer without needing to login to it first Supports Windows fast user switching Compatible with Windows User Account Control pop-ups Manage all your computers at once Simultaneously lock all computers Import/Export Input Director configuration and apply configuration updates from the command line Synchronise screensavers across your computers Synchronise shutdown of your system (or individually configure whether a computer goes to standby, hibernate or shuts down) Wake systems over the network Security Encrypt network data between Input Director controlled computers Lock down the Input Director configuration so that only System Administrators may make changes Systems can limit which systems can control them by host name, ip address or network subnet Transition Features Ripples surround the cursor for a few seconds after transitioning to help the eye follow the cursor from one computer to another: Transitioning using the mouse can be ... |
![]() |
4,031 | Oct 20, 2023 Shane Richards <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Input Director1_th.png"border="0"> |
![]() |
InSpectre v8 InSpectre v8 Easily examine and understand any Windows system's hardware and software capability to prevent Meltdown and Spectre attacks. “InSpectre” is an easy to use & understand utility designed to clarify the many overlapping and confusing aspects of any Windows system's ability to prevent the Meltdown and Spectre attacks. As the application's textual display says... In early 2018 the PC industry was rocked by the revelation that common processor design features, widely used to increase the performance of modern PCs, could be abused to create critical security vulnerabilities. The industry quickly responded, and is responding, to these Meltdown and Spectre threats by updating operating systems, motherboard BIOSes and CPU firmware. Protection from these two significant vulnerabilities requires updates to every system's hardware–its BIOS which reloads updated processor firmware–and its operating system–to use the new processor features. To further complicate matters, newer processors contain features to minimize the performance impact of these important security improvements. But older processors, lacking these newer features, will be significantly burdened and system performance will suffer under some workloads. This InSpectre utility was designed to clarify every system's current situation so that appropriate measures can be taken to update the system's hardware and software for maximum security and performance. Release History Release #8 — Now shows whether an Intel microcode patch is (ever) available for Spectre. Intel has finished designing microcode update patches for its processors. On April 2nd, 2018, they announced that processors that have not yet been patches will never be patched. Their full statement is available in this PDF document. In that document, Intel specifies which of their many processors do have patches and which of their more recent processors will never receive updated firmware. Now that the industry has this information, this 8th release of InSpectre incorporates that list of CPUIDs and displays whether microcode firmware updates exist for the system's Intel CPU. BOGUS “SmartScreen” ... |
![]() |
5,444 | Nov 13, 2019 Gibson Research Corporation <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/InSpectre1_th.png"border="0"> |
![]() |
Integrity Downloader v2.1.0.5 Integrity Downloader v2.1.0.5 A free Internet file downloading program that prioritizes security aspects. Using it can significantly reduce the security risks associated with downloads. Integrity Downloader ensures secure file downloads in the following way: 1) Before downloading a file, it displays security information related to the given URL and domain based on queries to VirusTotal. 2) Before downloading a file, it retrieves and displays important data from the server where the file is stored (e.g., file size, last modified, content type, redirect). 3) When downloading is in progress, it provides various pieces of information on the download status. 4) After downloading a file, it compares the size of the downloaded file with the data stored on the server. Further operations are only permitted if these two values match. 5)After downloading a file, it calculates and displays MD5, SHA1, or SHA256 checksums. The integrity of the downloaded file can be verified based on the checksum. 6) Based on the checksum, it displays the results of VirusTotal scans related to the downloaded file in a simplified and visually comprehensible format. 7) Also based on the checksum, it generates a checksum file that can be interpreted by Total Commander. 8) Before executing the downloaded file, it displays simplified information from VirusTotal about the file and the most important data on any digital signatures. 9) There is an option to enable SmartScreen integration. If enabled, additional security checks are done before the file is executed. Integrity Downloader is compatible with all internet browsers and other software. The only requirement is that the software can copy the URL to the clipboard. The most popular internet browsers can send the URL ... |
![]() |
652 | Aug 07, 2024 Peter Panisz <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/IntegDown1_th.png"border="0"> |
![]() |
Intel-SA-00086 Detection Tool for Linux Intel-SA-00086 Detection Tool for Linux Purpose The INTEL-SA-00086 Detection Tool will assist with detection of the security vulnerability described in INTEL-SA-00086. Read below for more information. SA00086_Windows.zip - For Windows* Users This download contains two versions of the tool. The first is an interactive GUI tool that discovers the hardware and software details of the device and provides a risk assessment. This version is recommended for a local evaluation of the system. The second version of the tool is a console executable that saves the discovery information to the Windows* registry and/or to an XML file. This version is more convenient for IT administrators wishing to perform bulk discovery across multiple machines to find systems to target for Firmware updates. SA00086_Linuxtar.gz - For Linux* Users The version of the tool is a command line executable that will display a risk assessment for the system being tested. Note: Versions of the INTEL-SA-00086 Detection Tool earlier than 1.0.0.146 did not check for CVE-2017-5711 and CVE-2017-5712. These CVE's only affect systems with Intel Active Management Technology (Intel AMT) version 8.x-10.x. Users of systems with Intel AMT 8.x-10.x are encouraged to install version 1.0.0.146, or later, to help verify the status of their system in regards to the INTEL-SA-00086 Security Advisory. |
![]() |
5,255 | Apr 04, 2019 Intel <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/IntelSA00086Detect_th.png"border="0"> |
![]() |
Intel-SA-00086 Detection Tool for Windows Intel-SA-00086 Detection Tool for Windows Purpose The INTEL-SA-00086 Detection Tool will assist with detection of the security vulnerability described in INTEL-SA-00086. Read below for more information. SA00086_Windows.zip - For Windows* Users This download contains two versions of the tool. The first is an interactive GUI tool that discovers the hardware and software details of the device and provides a risk assessment. This version is recommended for a local evaluation of the system. The second version of the tool is a console executable that saves the discovery information to the Windows* registry and/or to an XML file. This version is more convenient for IT administrators wishing to perform bulk discovery across multiple machines to find systems to target for Firmware updates. SA00086_Linuxtar.gz - For Linux* Users The version of the tool is a command line executable that will display a risk assessment for the system being tested. Note: Versions of the INTEL-SA-00086 Detection Tool earlier than 1.0.0.146 did not check for CVE-2017-5711 and CVE-2017-5712. These CVE's only affect systems with Intel Active Management Technology (Intel AMT) version 8.x-10.x. Users of systems with Intel AMT 8.x-10.x are encouraged to install version 1.0.0.146, or later, to help verify the status of their system in regards to the INTEL-SA-00086 Security Advisory. |
![]() |
5,470 | Apr 04, 2019 Intel <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/IntelSA00086Detect_th.png"border="0"> |
![]() |
IP Changer (IPC) v1.3.5.1 IP Changer (IPC) v1.3.5.1 Provides a simple way to change your IP address for all your available network adapters. IP Changer (IPC) will detect all Network Adapters enabled on Startup; from there, you can select the Adapters you wish to configure and change between them to manage all your Network Interfaces as you see fit. It additionally includes access to Enable/Release/Renew DHCP, Enable/Disable Network Adapter, and Enter IP Manually. And you can also make Custom Settings that can be saved, making them readily available the next time you open the tool. Requirement: -Windows 7* SP1 and higher * Windows 7 SP1 is supported with Extended Security Updates installed. Changes: v1.3.5.1 -Remembering last selected adapter (enabled by default in the Options). -Remembering network usage setting (enabled by default in the Options). -Show WAN IP Adress (disabled by default in the Options). -QoL improvement when entering IP (pressing 'TAB' or '.' will change box). -UI ajustement. -Optimisations. -Minor bug fixes. Click here to visit the author's website. |
![]() |
3,698 | Jun 18, 2025 Wagnardsoft <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/IPChanger1_th.png"border="0"> |
![]() |
IPFire v2.27 core172 IPFire v2.27 core172 The Open Source Firewall Secure your network with IPFire IPFire is a hardened, versatile, state-of-the-art Open Source firewall based on Linux. Its ease of use, high performance in any scenario and extensibility make it usable for everyone. Security Security is the highest priority in IPFire. It is hardened to protect itself from attacks from the Internet and prevents attacks on your network. Firewall Its powerful firewall engine and Intrusion Prevention System protects your network against attacks from the Internet and Denial-of-Service attacks. Open Source IPFire is free software and developed by an open community and trusted by hundreds of thousands of users from all around the world. Features Security The primary objective of IPFire is security. Its easy to configure firewall engine and Intrusion Prevention System stops any attackers from breaking into your network. In the default configuration, the network is split into various zones with different security policies such as a LAN and DMZ to manage risks inside the network and have custom configuration for the specific needs of each segment of the network. But even the firewall needs to protect itself. IPFire is built from scratch and not based on any other distribution. This allows the developers to harden IPFire better than any other server operating system and build all components specifically for use as a firewall. Frequent updates keep IPFire strong against security vulnerabilities and new attack vectors. Firewall IPFire employs a Stateful Packet Inspection (SPI) firewall, which is built on top of Netfilter, the Linux packet filtering framework. It filters packets fast and achieves throughputs of up to multiple tens of Gigabit per second. Its intuitive web user interface allows to create groups of hosts and networks which can be used to keep large set of rules short and tidy - something very important in complex environments with strict access control. Logging and graphical reports give great insight. Various ... |
![]() |
1,916 | Feb 10, 2023 Lightning Wire Labs GmbH <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/IPFire1_th.png"border="0"> |
![]() |
ISO to USB v1.6 ISO to USB v1.6 ISO to USB is a free and small software that can burn the ISO image file directly to the USB drives, these USB drives include USB flash drives, memory sticks and other USB storage devices, it also supports to create a bootable USB disk with Windows operating systems. Freeware. Burn ISO to USB disks with ease The ISO image file is a popular image of the CD/DVD discs, an ISO file can include all the content on the disc, this software can easily burn these ISO files to a USB flash disk, makes it easy to carry and use. The program's interface is very simple, you only need select the ISO file you want to burn and the target USB drive, then click "Burn" button, an USB disk that includes all ISO image data will be created. There do not have any complicated settings, it is easy to use very much. Bootable USB flash disks This software currently only support Windows bootable disk, can work with both BOOTMGR and NTLDR boot mode, can create USB disk with FAT, FAT32, exFAT or NTFS file system. (When you are making a bootable USB disk, suggest you choose the FAT32 file system.) This program have be tested with Win8/Win7 PE and WinXP PE bootable ISO image files, it can work fine, the generated USB disk can normally boot the computers. Only a small part of the machines can boot Win8/Win7, but can not boot WinXP, these machines will display "NTLDR is missing", for this problem there is no good solution currently. If create bootable USB disk failed, sometimes the USB disk will be unusable, you can try the following steps to recover it: Insert your USB disk. (a) For Win8, press keyboard "Windows key" + X together to ... |
![]() |
5,103 | Mar 15, 2020 ISOTOUSB <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/ISO to USB1_th.png"border="0"> |
![]() |
iSpy 6.3.3.0 iSpy 6.3.3.0 iSpy uses your webcams and microphones to detect and record movement or sound and provides security, surveillance, monitoring and alerting services. Any media that is captured is compressed to flash video and made available, securely over the web. iSpy can be setup to run on multiple computers simultaneously. iSpy is free, open-source software, so if you want it to do anything else, please download the source code and customise it to your requirements. With iSpy you can: Connect and monitor as many cameras and microphones as you like. Import and export object lists to share with colleagues. Connect multiple computers in a group and manage over the web Install iSpy Server and publish your webcam to other instances of iSpy, over your network and to the web Detect, highlight, track and record movement Detect loitering Customise movement detection areas on your cameras Detect and record sound Run any program or send an email or SMS alert when movement or sound is detected Run any program or send an email or SMS alert when movement or sound is not detected (monitor machinery or staff activity) Receive email movement alerts with attached frame grab images from your webcams Periodically receive image grabs via email from your webcams Connect to any device, even webcams attached to other computers with JPEG, MJPEG, IP Cam, webcam and AVI file support Watch live and recorded media over the web (through this website) and also via mobile devices Access and control iSpy remotely Password protect iSpy and hide it in the System Tray Schedule sound and video capturing to start and stop automatically Time-lapse record from any camera Motion track and count moving objects Connect multiple instances of iSpy and iSpy server running on different computers to this website and view all aggregated media online Create groups, invite friends and share access to your webcams and microphones Receive email alerts if your connection goes offline Download the source ... |
![]() |
9,655 | Mar 03, 2015 Developerinabox |
![]() |
KCleaner v3.8.0.110 KCleaner v3.8.0.110 KCleaner is designed to be the most efficient Hard Disk cleaner, tracking every useless byte in order to give you all the ressources you may need for your documents, music, pictures, movies,... It is the first product of this kind featuring a full automatic mode, which works in background so that you don't have to care about when to launch it. As a proof of its efficiency, it often finds up to many Gb not even seen by its competitors so... give KCleaner a try ! And if data security is something you are interested in, you'll love the secured file deletion methods proposed by KCleaner, making deleted files unrecoverable by any known mean. Features Detects and cleans temporary and useless files (cache, unused setup files...) Automatic mode working in background Secured file deletion method Expert mode : let users control any file deletion done by KCleaner Internationalization support. Changes: KCleaner - 3.8 Released 2021-02-21 0006382: [Refactoring] Updated French translation (Kyle_Katarn) 0006378: [New Feature] Capacity to remove licence (Kyle_Katarn) 0004732: [Bug] Does not clean browser caches (Kyle_Katarn) 0006348: [Refactoring] Updated Chinese translation (Kyle_Katarn) 0006335: [Refactoring] Updated Dutch translation (Kyle_Katarn) Click here to visit the author's website. |
![]() |
4,695 | Feb 22, 2021 KC Softwares <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/KCleaner1_th.png"border="0"> |
![]() |
KeePass v2.47 KeePass v2.47 KeePass Password Safe is a free, open source, lightweight, and easy-to-use password manager for Windows. With so many passwords to remember and the need to vary passwords to protect your valuable data, it’s nice to have KeePass to manage your passwords in a secure way. KeePass puts all your passwords in a highly encrypted database and locks them with one master key or a key file. As a result, you only have to remember one single master password or select the key file to unlock the whole database. And the databases are encrypted using the best and most secure encryption algorithms currently known, AES and Twofish. Features Strong security (AES encryption, SHA-256 hash, protection against dictionary and guessing attacks, in-memory protection, ...). Portable (no installation required), available for many platforms (Windows, Linux, Mac OS X, smart devices/phones, ...). Efficient and flexible organization (entry groups, tags, time fields, file attachments, ...). Various data transfer methods (clipboard, drag and drop, auto-type, plugins can provide integration with other applications, ...). Powerful password generator (generation based on character sets and patterns, with many options). Extensible (plugin architecture) and multi-language (more than 40 languages are available). Changes from 2.46 to 2.47: New Features: In the 'Find' dialog, search parameters can now be saved as profiles; the profiles can be accessed quickly via the main menu ('Find' → 'Search Profiles') and the group context menu. Added search mode 'XPath expression' in the 'Find' dialog, which creates a KeePass 2.x XML DOM of the current database in memory and finds entries using the specified XPath expression. Added option 'History' in the 'Find' dialog, which includes history entries in searches. ... |
![]() |
6,728 | Apr 04, 2021 KeePass <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/KeePass1_th.png"border="0"> |
![]() |
KeyLock v2.1.20101.1 KeyLock v2.1.20101.1 KeyLock is a program to lock your computer with a USB Flash Drive or a phone. Safe: It's not possible to use your computer after you've locked it with KeyLock. Our exclusive technologies use the Windows lock screen to lock your PC, making it impossible to reach the desktop. After unlocking, you can immediately use your computer again. Easy and Quick: You quickly need your computer with the common Windows security? First you need to unlock, type your password, have a typo, type in again and finally, your pc is unlocked. With KeyLock, all these problems are solved: Press "Unlock" on your phone or put your USB Flash Drive in your computer and you can use it immediately. Changelog: 2.1.1 18 August 2018 - Bug fixes There are two malware hits on Virus Total. These are false positives. The program has been tested malware free. Click here to visit the author's website. |
![]() |
7,716 | Dec 28, 2018 Brabonet <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/keylock1_th.png"border="0"> |
![]() |
KeyScrambler 3.8.0.0 KeyScrambler 3.8.0.0 KeyScrambler encrypts your keystrokes deep in the kernel, foiling keylogging attacks with scrambled, undecipherable data. This advanced method of keystroke protection defeats both known and unknown keyloggers. The friendly interface displays realtime encrypted stream of keystrokes so you see when and how KeyScrambler is working. Strengthens where defenses are the weakest in your traditional anti-virus, anti-malware programs and PC security. Compare Editions A free browser add-on, KeyScrambler Personal protects all your inputs in IE, Firefox, and Flock. KeyScrambler Pro and Premium are paid programs that protect a wide array of apps. How It Works KeyScrambler encrypts your keystrokes at the keyboard driver level and decrypts them at the destination application, giving keyloggers "scrambled," useless keys to record. For Online Games Both KeyScrambler Pro and Premium protect your player's IDs, passwords and digital assets in over two dozen online games. For Business Read how and why KeyScrambler is important for your business. KeyScrambler Premium protects critical systems and reduces risks of information theft at the workplace. Features KeyScrambler defeats known and unknown keyloggers; also protects Chinese, Japanese, and Korean inputs; is compatible with other security programs, tokens and smart cards; and requires no user effort. How To The user-friendly interface allows you to do things on KeyScrambler for a more comfortable, personalized fit. Supports: Advanced Browser, AM Browser, AOL Explorer, AOL 9, Avant, Comodo Dragon, Comodo IceDragon, CometBird, Crazy Browser, Firefox, Flock, Google Chrome, Internet Explorer, K-meleon, Maxthon, MSN Explorer, Netscape, Orca Browser, Opera, Safari, Seamonkey, SlimBrowser, SR Iron Browser, TheWorld Browser, Palemoon, Lunascape, RockMelt, WaterFox, and Yahoo Browser. |
![]() |
8,072 | Jul 29, 2015 QFX Software <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/Windows8_Login_th.png"border="0"> |
![]() |
KillEmAll (command line) v21.11.12.1 KillEmAll (command line) v21.11.12.1 KillEmAll is a ‘panic‘ button with an ‘ask questions later‘ attitude, designed to identify and terminate all non-essential running programs. Great for quickly closing unwanted apps, system inspection, and even malware removal! Why Use It? The best usage case for KillEmAll to most users is to close all open web browser windows if you get a suspected malicious popup while visiting a website. The the reason you don’t simply close or “X out” the popup is because malicious code can be run even if you click the X button — it is after all just another button, you might as well be clicking “OK” or “Yes, please do what you want with my PC…” but if you don’t click anything and KillEmAll does the work, forcing the application’s process to close without any additional code execution. Other tasks that benefit from the advantage of quickly and forcefully closing all applications: before performing maintenance on your PC, before and during general troubleshooting, or before playing resource intensive games. General Usage: Simply run the .exe (from anywhere, even a flash drive or network path) and then press a key to terminate unnecessary programs running under any standard user account, or alternately you can press ‘D‘ for Debug mode (more on that below.) If your Windows is configured with UAC enabled (default) then you can right-click and choose Run as Administrator to kill all other programs running under an Administrator/System account. If started via Windows Explorer, KillEmAll will display a ‘press any key to exit’ prompt when completed, giving you the option to press ‘L‘ to generate a log file. When started from a console window you ... |
![]() |
3,107 | Nov 19, 2021 d7xtech.com <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/KillEmAll_Mini1_th.png"border="0"> |
![]() |
Large Text File Viewer 5.2 Large Text File Viewer 5.2 Have you ever felt frustrated when you just want to look at the content of a large text file but it takes forever for Notepad or Word to open it? This program was designed for viewing large (>1GB) text files. It uses little memory and is able to open a gigabyte file instantly. Background file indexing makes browsing even faster. It opens files that are currently being written by other programs, and automatically checks and reads the files if new contents have been appended. It supports view split. The user may split the view either horizontally or vertically, and have each side show different portion of the same file. It allows the user to perform high-speed complex text search by means of plain text or regular expression. The regular expression syntax is slightly different from the standard ones. Please click here for details. The regular expressions for finding the following items have been provided as preset for the convenience of the users: quoted string hexadecimal integer floating-point number date of any format time of any format domestic phone number (US & Canada) social security number IP address email address http address ftp address ... |
![]() |
5,313 | Oct 23, 2019 swiftgear.com <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Large Text File Viewer1_th.png"border="0"> |
![]() |
LastActivityView v1.37 LastActivityView v1.37 A tool for Windows operating system that collects information from various sources on a running system, and displays a log of actions made by the user and events occurred on this computer. The activity displayed by LastActivityView includes: Running .exe file, Opening open/save dialog-box, Opening file/folder from Explorer or other software, software installation, system shutdown/start, application or system crash, network connection/disconnection and more... You can easily export this information into csv/tab-delimited/xml/html file or copy it to the clipboard and then paste into Excel or other software. System Requirements This utility works on any version of Windows, starting from Windows 2000 and up to Windows 11. Both 32-bit and 64-bit systems are supported. Known Limitations This tool gathers information from various sources, including the Registry, the events log of Windows, the Prefetch folder of Windows (C:\windows\Prefetch), the MiniDump folder of Windows (C:\Windows\Minidump), and more... The accuracy and the availability of the information displayed by LastActivityView might be different from one system to another. For example, if the user or a software makes changes in the Registry, the action time displayed by LastActivityView might be wrong, because it's based on the modified time of some Registry keys. Also, for every type of action/event, there is some limitation according to the way that the information is saved in the system. For example, the 'Select file in open/save dialog-box' action is limited for one action of every file extension, so if the user opened 2 .doc files with the open/save dialog-box, only the last one will be displayed. Changes Version 1.37: Fixed bug: LastActivityView crashed when trying to read empty or invalid Prefetch file. Start Using LastActivityView LastActivityView doesn't require any installation process or additional dll files. In order to start using it, simply run the executable file - LastActivityView.exe After you run LastActivityView, it scans your ... |
![]() |
9,549 | Feb 12, 2024 Nir Sofer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/lastactivityview_th.png"border="0"> |
![]() |
LibreWolf v133.0-3 LibreWolf v133.0-3 A fork of Firefox, focused on privacy, security and freedom. This project is an independent fork of Firefox, with the primary goals of privacy, security and user freedom. LibreWolf is designed to increase protection against tracking and fingerprinting techniques, while also including a few security improvements. This is achieved through our privacy and security oriented settings and patches. LibreWolf also aims to remove all the telemetry, data collection and annoyances, as well as disabling anti-freedom features like DRM. Main Features No Telemetry No experiments, adware, annoyances, or unnecessary distractions. Private Search Privacy-conscious search providers: DuckDuckGo, Searx, Qwant and more. Content Blocker Included uBlock Origin is already included for your convenience. Enhanced Privacy Hardened to maximize privacy, without sacrificing usability. Fast Updates LibreWolf is always built from the latest Firefox stable source, for up-to-date security and features along with stability. Open Source Everyone can participate in the development of LibreWolf. Join them on GitLab, Matrix and Gitter. This download is for the Windows 64bit Installer version. All other download assets are below: macOS: librewolf-133.0-3-macos-arm64-package.dmg librewolf-133.0-3-macos-x86_64-package.dmg Linux: LibreWolf.x86_64.AppImage See your distro's repository for custom versions. Click here to visit the author's website. |
![]() |
2,308 | Dec 12, 2024 LibreWolf Core Contributors <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/LibreWolf2_th.png"border="0"> |
![]() |
linkMaker v1.1.1 linkMaker v1.1.1 linkMaker provides a better interface to create shortcuts, symbolic links¹ and ntfs hardlinks/junction points². The app is intended to replace the antiquated 'Create Shortcut' wizard with something better; it makes all options available on one screen, and tries to auto-fill as much info as it can. Shell integration is provided for the 'new file' menu and the right-click drag menu. ¹Symbolic Links are similar to shortcuts, but are more transparent (most apps can't tell the difference between a symlink and the target file). I don't think Microsoft has ever provided a GUI to create them, but they're quite useful for redirecting files. ²Junction points and HardLinks are specific to ntfs filesystem, and can be somewhat fiddly. It's recommend to stick to shortcuts and symbolic links uness you understand how they work. Usage Notes Requirements: Version 4 or better of the .net framework is recommended. Get it from Microsoft. No installation; just unpack and run. A settings file and ancillary files may be created in the program folder. Instructions: You'll probably want to enable the shell integration menus... if so: Run the app, then hit the settings button and check those boxes. After that you can use the app or the shell menu's to create links. Remember you can drag files and folders to fill-in the target, and the link name will auto-fill based on that. When picking folders as a link target: The folder picker windows provides is an abomination, so we use the file picker to choose both files and folders. To pick a folder, navigate to the inside of the folder you want, then hit 'Open' with "{Press Open now to select the parent folder}" in the file name box. Note on Security and Elevation: Microsoft, in their Sublime Wisdom, decided the creation of symbolic links should be subject to special restrictions. The situation is ... |
![]() |
3,895 | Dec 06, 2019 cresstone <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/linkMaker1_th.png"border="0"> |
![]() |
Linux Kodachi v8.27 Linux Kodachi v8.27 Secure, open source Linux distribution Linux Kodachi operating system is based on Ubuntu 18.04.6 LTS it will provide you with a secure, anti forensic, and anonymous operating system considering all features that a person who is concerned about privacy would need to have in order to be secure. Kodachi is very easy to use all you have to do is boot it up on your PC via USB drive then you should have a fully running operating system with established VPN connection + Tor Connection established + DNScrypt service running. No setup or Linux knowledge is required from your side we do it all for you. The entire OS is functional from your temporary memory RAM so once you shut it down no trace is left behind all your activities are wiped out. Kodachi is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity. Features • VPN Ready • Tor Ready with exit node selection • DNScrypt ready • Onion Circuits/Onion share • i2p • GNUNET • Exodus multi currency wallet • Rkhunter • Peer Guardian • Panic Room • Bleachbit • Atom • Audicity • Zulucrypt • System and Security Info on Desktop • Wipe Ram • Wipe Free Space • Kill OS! • Nautilus-wipe • Keepass2x • Seahorse • Gpa ... |
![]() |
2,951 | Feb 15, 2024 eeds <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/LinuxKodachi3_th.png"border="0"> |
![]() |
Linux Reader v4.16 Linux Reader v4.16 Access files and folders on Ext, UFS, HFS, ReiserFS, or APFS file systems from Windows How to get safe and quick access to alternative file systems? DiskInternals Linux Reader is a new easy way to do this. This program plays the role of a bridge between your Windows and Ext2/Ext3/Ext4, HFS and ReiserFS file systems. This easy-to-use tool runs under Windows and allows you to browse Ext2/3/4, HFS and ReiserFS file systems. There are a number of evident merits of the program, which you should know. First of all, DiskInternals Linux Reader is absolutely free. Secondly, the program provides for read-only access and does not allow you to make records in file system partitions. This guarantees that the interference in an alterative file system will not affect the work of Linux later. Apart from this, it is necessary to note, that it gives you an opportunity to use common Windows Explorer for extracting data. A preview option for pictures is one more pleasant point, which is worth mentioning. How to get safe and quick access to any file systems? DiskInternals Linux Reader is an easy and short way to solve the problem! While saving, it ignores file security policies. It means that it is possible to access absolutely any file on a Linux disk from Windows. The program can create and open disk images. Do not install the program on the disk where you're going to recover lost data. Never recover deleted files to the same disk. Use a different disk or disk partition instead. Linux Reader provides you with access to files on the following file systems: • Ext2/3/4 • ReiserFS, Reiser4 • HFS, HFS+(reader) • FAT, exFAT • NTFS, ReFS • UFS2 • ... |
![]() |
6,091 | Mar 19, 2023 DiskInternals, ltd. <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/LinuxReader2_th.png"border="0"> |
![]() |
LocalSend v1.17.0 LocalSend v1.17.0 Share files to nearby devices. Free, open-source, cross-platform. LocalSend is a free, open-source app that allows you to securely share files and messages with nearby devices over your local network, without needing an internet connection. It's a cross-platform app that enables secure communication between devices using a REST API and HTTPS encryption. Unlike other messaging apps that rely on external servers, LocalSend doesn't require an internet connection or third-party servers, making it a fast and reliable solution for local communication. How it Works LocalSend uses a secure communication protocol that allows devices to communicate with each other using a REST API. All data is sent securely over HTTPS, and the TLS/SSL certificate is generated on the fly on each device, ensuring maximum security. For more information on the LocalSend Protocol, see the documentation. Changes: v1.17.0 A small interim release before WebRTC is stable (#2204) feat: add advanced setting to filter network interfaces (@Tienisto) feat(mobile): swipe gesture to select multiple media files (@Tienisto) feat(windows): when pasting an image, automatically convert it to PNG (@BrianMwit) feat(android): add option to open gallery when image/video was automatically saved (@Tienisto) fix: path traversal vulnerability when saving files (@Tienisto) fix: black screen when tapping on "Back" twice in "Share via link" (@Tienisto) fix(macos): window disappears on command key when minimize to tray is enabled (@Tienisto) fix(windows): do not poll local IP resulting in unwanted location permissions (@Tienisto) This download is for the Windows installer version. All other download assets are below: Windows (portable): LocalSend-1.17.0-windows-x86-64.zip macOS: LocalSend-1.17.0.dmg Apple App Store Linux: LocalSend-1.17.0-linux-x86-64.AppImage LocalSend-1.17.0-linux-x86-64.deb LocalSend-1.17.0-linux-x86-64.tar.gz Android: LocalSend-1.17.0-android-google-play.apk LocalSend-1.17.0-android-arm64v8.apk LocalSend-1.17.0-android-arm32v7.apk LocalSend-1.17.0-android-x64.apk Google Play F-Droid Amazon Appstore iOS: Apple App Store Click here to visit the author's website. |
![]() |
1,252 | Feb 20, 2025 LocalSend <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/LocalSend1_th.png"border="0"> |
![]() |
log4j-scan v1.0 log4j-scan v1.0 A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 on hosts. Features Support for lists of URLs. Fuzzing for more than 60 HTTP request headers (not only 3-4 headers as previously seen tools). Fuzzing for HTTP POST Data parameters. Fuzzing for JSON data parameters. Supports DNS callback for vulnerability discovery and validation. WAF Bypass payloads. Description From the authors: We have been researching the Log4J RCE (CVE-2021-44228) since it was released, and we worked in preventing this vulnerability with our customers. We are open-sourcing an open detection and scanning tool for discovering and fuzzing for Log4J RCE CVE-2021-44228 vulnerability. This shall be used by security teams to scan their infrastructure for Log4J RCE, and also test for WAF bypasses that can result in achiving code execution on the organization's environment. It supports DNS OOB callbacks out of the box, there is no need to setup a DNS callback server. Usage $ python3 log4j-scan.py -h [•] CVE-2021-44228 - Apache Log4j RCE Scanner [•] Scanner provided by FullHunt.io - The Next-Gen Attack Surface Management Platform. [•] Secure your External Attack Surface with FullHunt.io. usage: log4j-scan.py [-h] [-u URL] [-l USEDLIST] [--request-type REQUEST_TYPE] [--headers-file HEADERS_FILE] [--run-all-tests] [--exclude-user-agent-fuzzing] [--wait-time WAIT_TIME] [--waf-bypass] [--dns-callback-provider DNS_CALLBACK_PROVIDER] [--custom-dns-callback-host CUSTOM_DNS_CALLBACK_HOST] optional arguments: -h, --help show this help message and exit -u URL, --url URL Check a single URL. -p PROXY, --proxy PROXY Send requests through proxy. ... |
![]() |
2,389 | Dec 15, 2021 Mazin Ahmed <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/log4j-scan1_th.png"border="0"> |
![]() |
LSASecretsView v1.26 LSASecretsView v1.26 Free tool to view LSA secrets stored on your computer LSASecretsView is a small utility that displays the list of all LSA secrets stored in the Registry on your computer. The LSA secrets key is located under HKEY_LOCAL_MACHINE\Security\Policy\Secrets and may contain your RAS/VPN passwords, Autologon password, and other system passwords/keys. Note: Your antivirus will probably detect this as malicious. It is malicious if someone else is using it on your computer without your knowledge. If you are using it to retrieve your own stored information, it is safe. Using LSASecretsView LSASecretsView doesn't require any installation process or additional DLLs. Just copy the executable file (LSASecretsView.exe) to any folder you like, and run it. The main window of LSASecretsView contains 2 panes: The upper pane displays the list of all LSA secret entries. When you select one or more items in the upper pane, the lower pane displays the LSA data of the selected items, in Hex and Ascii formats. Reading LSA secrets from external instance of Windows Starting from version 1.20, LSASecretsView allows you to read the LSA secrets from external instance of Windows. This feature can be useful if you have a dead system that cannot boot anymore. You can use this feature from the user-interface, by using the 'Advanced Options' in the File menu, or from command-line, by using /external parameter, for example: LSASecretsView.exe /external g:\windows System Requirement This utility works on 2000/XP/2003/2008/Vista/7/8/10/11. Windows 98/ME is not supported. License This utility is released as freeware. You are allowed to freely distribute this utility via floppy disk, CD-ROM, Internet, or in any other way, as long as you don't charge anything for this. If you distribute this utility, you must include all files in the distribution package, without any modification ! Disclaimer The software is provided "AS IS" without any warranty, either expressed or implied, including, but ... |
![]() |
9,404 | Jan 29, 2024 Nir Sofer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/lsasecretsview_th.png"border="0"> |
![]() |
MailChecker v15.0.26208 MailChecker v15.0.26208 MailChecker is a very easy and quick utility, allowing you to validate a list of mail addresses. Info: the mail addresses test procedure and resolution detection used by this tool are not guaranteed to be working with all the mail addresses. Part of the validation procedure depends from the communication between the program and mail servers: if some security settings at server side prevent this communication, results cannot be evaluated correctly. Enjoy MailChecker! Installation Just download the package, open it, and run “setup.exe”. On the security warning of ClickOnce setup, click “Install” button. |
![]() |
5,333 | Jul 24, 2019 iSystems <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/MailChecker1_th.png"border="0"> |
![]() |
MajorPrivacy v0.98.0 MajorPrivacy v0.98.0 A free, cutting-edge privacy and security tool for Windows. Major Privacy offers unparalleled control over process behavior, file access, and network communication. By leveraging advanced kernel-level protections, MajorPrivacy creates a secure environment where user data and system integrity are fully safeguarded. Unlike traditional tools, MajorPrivacy introduces innovative protection methods that ensure mounted encrypted volumes are only accessible by authorized applications, making it the first and only encryption solution of its kind. Features: Process Protection Secure your processes in isolated enclaves, preventing interference from unauthorized applications—even those running with elevated or system-level privileges. Software Restriction Block undesired processes and prevent unauthorized DLLs from loading, ensuring only trusted software operates on your system. Secure Drives – A Revolutionary Encryption Solution MajorPrivacy introduces a game-changing feature for encrypted volumes: • Encrypted Volumes: Create secure disk images to store confidential data. • Guarded Access: Unlike traditional encryption tools where mounted volumes are accessible to any running process, MajorPrivacy ensures that only authorized applications can access data in mounted volumes. Unauthorized processes, even those running with elevated privileges, are completely blocked from interacting with the volume. • This unique approach makes MajorPrivacy the only encryption tool capable of protecting mounted volumes from unauthorized access, ensuring unparalleled security for sensitive data. File and Folder Protection Protect sensitive files and folders from being accessed or modified by unauthorized processes, securing your personal and professional data. Advanced Network Firewall Control inbound and outbound network communications with an advanced firewall, giving you full control over which applications access the internet. DNS Inspection and Filtering DNS Inspection: Monitor DNS cache and trace events to identify domains accessed by running processes. DNS Filtering (Coming Soon): Apply pre-defined blocklists (compatible with Pi-hole) or custom ... |
![]() |
95 | May 19, 2025 David Xanatos <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/MajPriv1_th.png"border="0"> |
![]() |
Malwarebytes Anti-Exploit v1.13.1.585 Malwarebytes Anti-Exploit v1.13.1.585 Protects you against the security vulnerabilities in the code, which make up your software programs. Your software contains millions of lines of code, which unfortunately some people want to exploit. Malwarebytes Anti-Exploit protects you from these vulnerabilities which people can manipulate in order to infect your system with malware. The software gives you three layers of security protection around popular browsers and applications, thereby preventing the vulnerable code from being exploited. The software is not an antivirus product in itself, but it is compatible with most antivirus software. Features • It protects browsers and their add-ons • Protects browser components • Protects media players and PDF readers • Allows you to manage custom shields • Best of all, it's free! Changes: v1.13.1.585 Stability/issues fixed: Fixed issues with Chrome browser Fixed false positives with MS Office products Improved Logging capabilities Internal Product Improvements Click here to visit the author's website. |
![]() |
9,952 | Apr 03, 2024 Malwarebytes <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/malwarebytes-anti-exploit-free-main-window_th.png"border="0"> |
![]() |
Malwarebytes Anti-Malware for Android 1.00.0.0400 Malwarebytes Anti-Malware for Android 1.00.0.0400 The world’s most popular anti-malware technology has now gone mobile! Malwarebytes Anti-Malware Mobile protects your phone or tablet from malware, infected apps, and unauthorized surveillance. Malwarebytes Anti-Malware Mobile Detects and eliminates malware, including spyware and Trojans Scans your apps for malicious code Stops unauthorized access to your personal data Scans your Android device for security vulnerabilities Identifies applications that are tracking your location Take your anti-malware protection to go Malwarebytes Anti-Malware Mobile guards your identity and personal data on-the-go. So you and your Android smartphone or tablet are safe from malware and unauthorized surveillance. Wherever you are. Whenever you go. Make your smartphone smarter Is that app or downloaded photo safe? With Malwarebytes Anti-Malware Mobile, you never have to worry again. Powerful anti-malware and anti-spyware technology protects your Android device. Detecting Trojans, spyware, and other malware before they can steal your identity or eavesdrop. Choose what you keep private Cybercriminals, and even legitimate companies, can collect private information from your Android device. Where you go. Who your contacts are. Malwarebytes Anti-Malware Mobile identifies what your applications are doing, and which private information is being accessed. So you can control who knows, and what they know. Close the security holes Malwarebytes Anti-Malware Mobile automatically recognizes security vulnerabilities in your Android device’s settings. Then it makes recommendations on how to close those holes. Make your smartphone lighter Mobile security software is typically bloated with location features (Remote Lock, Locate on a Map, etc.). Features that can already be found on your Android Device Manager. Malwarebytes Anti-Malware Mobile preserves your device’s performance by adding only the necessary security features. Anti-Malware/Anti-Spyware Proactively scans applications and files for malware and spyware Scans native memory and SD card Schedules automatic scans Updates the protection database automatically Privacy Manager Identifies every application’s access privileges in detail Breaks down access privileges by category: Contacts, Identity Information, Simple Message Service (SMS), and Security Settings Security Audit Identifies security vulnerabilities on ... |
![]() |
29,562 | Nov 09, 2013 Malwarebytes Corporation |
![]() |
Malwarebytes Support Tool v1.9.14.1109 Malwarebytes Support Tool v1.9.14.1109 Troubleshoots, repairs, and resolves issues with Malwarebytes for Windows. The Support Tool troubleshoots and repairs issues for Desktop Security. If you're experiencing a technical issue that can't be repaired, you can use the Support Tool to uninstall and reinstall the app. To do this, use the Advanced Clean option to delete all app files and configurations. You then have the option to reinstall app once removed. 1) Download the Malwarebytes Support Tool below. 2) In the Downloads folder, open the mb-support-x.x.x.xxx.exe file. 3) In the User Account Control pop-up window, click Yes to continue the installation. • Microsoft .NET 4.0 Framework is required to run the Support Tool on your computer. If you do not have a .NET 4.0 Framework, you will receive the following error while running the tool: In the pop-up window, click OK to open Microsoft's download page and download the latest update. • In the .NET 4.0 Framework not found pop-up window, click OK to open Microsoft's download page and download the latest .NET Framework components. 4) In the Malwarebytes Software License Agreement pop-up window, check the box ( mceclip0.png ) next to Accept License Agreement after consenting to the agreement terms. 5) Click Next to complete the installation. The Malwarebytes Support Tool automatically opens. 6) In the left navigation pane of the Malwarebytes Support Tool, click Advanced. 7) In the Advanced Options, click Clean. 8) In the Malwarebytes Cleanup pop-up window, click Yes. A pop-up window indicating the loading of the cleanup appears. Before the next step, make sure all your work is saved in the background. 9) In the Malwarebytes Cleanup pop-up window, click OK to restart your computer. 10) Once your computer restarts, ... |
![]() |
2,768 | Jul 03, 2025 Malwarebytes <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/MBSupport1_th.png"border="0"> |
![]() |
Malwarebytes Windows Firewall Control v6.9.2.0 Malwarebytes Windows Firewall Control v6.9.2.0 Managing Windows Firewall is now easier than ever Program Overview Malwarebytes Windows Firewall Control is a powerful tool which extends the functionality of Windows Firewall and provides new extra features which makes Windows Firewall better. It runs in the system tray and allows the user to control the native firewall easily without having to waste time by navigating to the specific part of the firewall. This is the best tool to manage the native firewall from Windows 11, 10, 8.1, 8, 7, Server 2012 and newer Server versions. Windows Firewall Control offers four filtering modes which can be switched with just a mouse click: High Filtering - All outbound and inbound connections are blocked. This profile blocks all attempts to connect to and from your computer. Medium Filtering - Outbound connections that do not match a rule are blocked. Only the programs that you allow can initiate outbound connections. Low Filtering - Outbound connections that do not match a rule are allowed. The user can block the programs he doesn't want to allow initiating outbound connections. No Filtering - Windows Firewall is turned off. Avoid using this setting unless you have another firewall running on your computer. Windows Firewall Control doesn't do any packet filtering and does not block or allow any connection. This is done by Windows Firewall itself based on the existing firewall rules. Program Features √ Notifications of outbound blocked connections. √ Learning mode that automatically allows digitally signed programs. √ Create temporary rules which are automatically deleted when they expire or on program restart. √ Intuitive user interface which is easy accessible through a system tray icon. √ Full support with standard user accounts. Elevated privileges are required only at installation. √ Disable the ability of other programs to tamper Windows Firewall rules and state. √ Integrated support of creating, modifying and deleting Window Firewall ... |
![]() |
10,005 | Feb 15, 2023 Malwarebytes <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/windows_firewall_control_th.png"border="0"> |
![]() |
McAfee Rootkit Remover 0.8.9.209 McAfee Rootkit Remover 0.8.9.209 McAfee Rootkit Remover is a stand-alone utility used to detect and remove complex rootkits and associated malware. Currently it can detect and remove ZeroAccess, Necurs and TDSS family of rootkits. McAfee Labs plans to add coverage for more rootkit families in future versions of the tool. How do you use RootkitRemover? Download the latest version of RootkitRemover When prompted, choose to save the file to a convenient location on your hard disk, such as your Desktop folder. When the download is complete, navigate to the folder that contains the downloaded RootkitRemover file, and run it. It is best to run the tool in Administrator mode. The tool then runs a window which shows the status of the process. The various stages are: Initializing Scanning Cleaning When the process is completed, it prompts the user to press any key to exit the tool. It is recommended to reboot the system and perform a full scan with the McAfee VirusScan to remove remnants of the infection that might still be left on the system. Frequently Asked Questions Q: What is the need for the RootkitRemover tool? A: RootkitRemover is not a substitute for a full anti-virus scanner. It is designed to detect and remove specific rootkit infections. Q: How to use the RootkitRemover tool? A: The tool can be run by either double clicking it or through the command-line. It is advisable to run a full system scan using McAfee VirusScan after removing any infection with the tool. Q: How do I save the scan results to a log file? A: The tool is designed to automatically save the report in the same folder as the tool is placed. Q: Why do I need to rescan with McAfee VirusScan? Would I need ... |
![]() |
6,538 | Nov 13, 2019 McAfee Labs <img src="http://www.oldergeeks.com/downloads/gallery/thumbs/RR1_th.png"border="0"> |
![]() |
Mem Reduct v3.4 Mem Reduct v3.4 A lightweight real-time memory management application to monitor and clean system memory on your computer. The program used undocumented internal system features (Native API) to clear system cache (system working set, working set, standby page lists, modified page lists) with variable result ~10-50%. Application it is compatible with Windows XP SP3 and higher operating systems, but some general features available only since Windows Vista. Note: After unzipping, right-click the appropriate executable file for your version of Windows and choose "Run as Administrator". Portable mode To activate portable mode, create memreduct.ini in application folder, or move it from %APPDATA%\Henry++\Mem Reduct. GPG Signature Binaries have GPG signature memreduct.exe.sig in application folder. Public key: pubkey.asc (pgpkeys.eu) Key ID: 0x5635B5FD Fingerprint: D985 2361 1524 AB29 BE73 30AC 2881 20A7 5635 B5FD Languages Put memreduct.lng file into application directory and restart the program. Download language Read instruction to create your own localization Changes: v3.4 (25 January 2022) security code improvements improved windows 10 support added arm64 binaries (portable only) added option to opt-out cleanup standby list restriction (issue #92) added dropdown menu for button to clean specified memory region added log cleanup results into a file feature (issue #76) added option to disable tray balloon sound added command line support (issue #82) added single-click tray icon option added per-monitor dpi support changed default ranges for up-down controls (issue #107) fixed wrong unit in notification (issue #112) fixed update installation in some cases fixed winxp font selection updated translations updated ... |
![]() |
5,610 | Apr 10, 2024 Henry++ <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/memreduct1_th.png"border="0"> |
![]() |
MemPad v3.69 MemPad v3.69 A plain text outliner and note taking program with a structured index. All pages are stored in a single file. User interface available in 20 languages. Unicode. Features The program offers standard editing functions including cut, copy, paste, undo, date/time insert, drag and drop, and supports Web links as well as network and local file or folder links (full path not required) and internal page links. Environment variables can be used in file links to run programs, for example. The index structure can be modified by buttons, context menu or hotkeys. Cut and paste functions and quick node moving. MemPad always saves data without prompting (when closing Mempad or opening another file). Optional auto save (every 4 minutes). Automatic backup (can be disabled by option); restore last backup, reload file. Search through all pages or within a node; continue searching forwards or backwards; Replace. Sort nodes (siblings) ascending/descending. Word wrap mode, Read-only file handling, page locking (global or individual); memory stack (pages, text positions) for browser type back/forw. jumping Options include: Selectable font, Background color, Minimize to System Tray, Hotkey, Always on top, ESC shortcut to quit or minimize. Popup menus with user defined words or expressions to insert, optionally with date and time tokens. Configurable Web look up (dictionary etc.) through context menu. Mini Launcher (through Tool button, menu, System Tray) Diary support with year/month/day index structure. Go to (or create) today's page with a key stroke. Export page, node or all to a file or directly to another program; import functions. Insert text file as page. Password protected encryption. MemPad operates in file environments (by extension and/or directory), each with its own INI file. No Registry entries. File/Open menu within a chosen file environment; optional "New Window". Help is provided as MemPad file (in English, see image). Important: Installation using Windows' "Extract" function If you use Windows' built-in "Extract" function to unpack the downloaded ZIP file, first ... |
![]() |
4,977 | Feb 18, 2022 Horst Schaeffer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/mempad1_th.png"border="0"> |
![]() |
Metadefender Client v4.1.20.56 Metadefender Client v4.1.20.56 Metadefender Cloud Client is the most thorough free malware analysis tool available. By running data through Metadefender Cloud, Cloud Client performs a deep endpoint forensic analysis for malware using several unique methods. Look for threats and assess the security state of your endpoint if you think it may be compromised. Methods: Memory Module Multi-Scanning: process and dynamic link library (DLL) analysis using over 40 anti-malware engines Local Anti-malware Analysis: a unique and effective analysis of anti-malware log files Rogue IP Detection: ensuring there are no network connections to a rogue IP address using several IP reputation sources Memory Module Multi-Scanning Running over 40 anti-malware engines that use heuristic detection, Metadefender Cloud Client analyzes all running processes and loaded memory modules. It performs a deep scan, analyzing the DLLs accessed by these processes for malware as well. This results in a deeper analysis than that of other free tools like Process Explorer or VirusTotal. And it does all this quickly – in just a few minutes. When you run it, Metadefender Cloud Client begins scanning all processes and DLL files for any threat. Once the analysis is complete, you’ll see a summary at the top of the window of how many potential threats of all kinds were identified. You’re able to click on each individual result and see the specific processes and DLLs that may be infected. Cloud Client is unique in allowing you to review the results on such a granular level. Highlight a process to see the results of the analysis. Click the arrow next to it in order to see the libraries accessed by the application while it runs. Then, click on individual DLL files to see the threats identified, and which specific anti-malware engines identified them. You can also see a list of potentially infected ... |
![]() |
5,662 | Nov 15, 2019 OPSWAT, Inc. <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/metadefendercloudclient1_th.png"border="0"> |
![]() |
Metasploitable v2.0.0 Metasploitable v2.0.0 This is Metasploitable2 (Linux) Metasploitable is an intentionally vulnerable Linux virtual machine. This VM can be used to conduct security training, test security tools, and practice common penetration testing techniques. The default login and password is msfadmin:msfadmin. Never expose this VM to an untrusted network (use NAT or Host-only mode if you have any questions what that means). Metasploitable 2 Exploitability Guide is HERE. Click here to visit the author's website. |
![]() |
4,139 | Nov 13, 2019 rapid7user <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Metasploitable1_th.png"border="0"> |
![]() |
Microsoft Autoruns v14.11 Microsoft Autoruns v14.11 This utility, which has the most comprehensive knowledge of auto-starting locations of any startup monitor, shows you what programs are configured to run during system bootup or login, and when you start various built-in Windows applications like Internet Explorer, Explorer and media players. These programs and drivers include ones in your startup folder, Run, RunOnce, and other Registry keys. Autoruns reports Explorer shell extensions, toolbars, browser helper objects, Winlogon notifications, auto-start services, and much more. Autoruns goes way beyond other autostart utilities. Autoruns' Hide Signed Microsoft Entries option helps you to zoom in on third-party auto-starting images that have been added to your system and it has support for looking at the auto-starting images configured for other accounts configured on a system. Also included in the download package is a command-line equivalent that can output in CSV format, Autorunsc. You'll probably be surprised at how many executables are launched automatically! Usage Simply run Autoruns and it shows you the currently configured auto-start applications as well as the full list of Registry and file system locations available for auto-start configuration. Autostart locations displayed by Autoruns include logon entries, Explorer add-ons, Internet Explorer add-ons including Browser Helper Objects (BHOs), Appinit DLLs, image hijacks, boot execute images, Winlogon notification DLLs, Windows Services and Winsock Layered Service Providers, media codecs, and more. Switch tabs to view autostarts from different categories. To view the properties of an executable configured to run automatically, select it and use the Properties menu item or toolbar button. If Process Explorer is running and there is an active process executing the selected executable then the Process Explorer menu item in the Entry menu will open the process properties dialog box for the process executing the selected image. Navigate to the Registry or file system location displayed or the configuration of an auto-start item by ... |
![]() |
10,539 | Feb 09, 2024 Microsoft Corp. <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/msautoruns_th.png"border="0"> |
![]() |
Microsoft Edge Browser (Latest) Microsoft Edge Browser (Latest) The browser for business is here. Built on Chromium open source, backed by Microsoft security and innovation. Supports IE Apps and sites Open Internet Explorer-based legacy apps and sites—and the modern web—all while staying in Microsoft Edge. Protects your users and data Microsoft Edge has the highest-rated protection against phishing and malware to help protect your network from external threats. Empowers productivity Microsoft Edge turns every new tab into a portal for productivity with quick access to Office apps, files, sites and built-in Microsoft Search. Unlocks remote work Use Microsoft Edge across your devices whether at home or work with cross-platform support and profiles that sync. Access legacy Internet Explorer-based sites in Microsoft Edge Microsoft Edge with Internet Explorer (IE) mode is the only browser with built-in compatibility for legacy sites and apps. Set up IE mode Improve compatibility, retain value, and streamline productivity with Microsoft Edge and Internet Explorer mode. LEARN MORE Harness Microsoft 365 Microsoft Edge seamlessly works with Microsoft 365 management, security, and productivity tools. Work across platforms Available on supported versions of Windows, macOS, iOS, Android, and Linux (coming soon). Easy sync Have your favorites, passwords, settings, and more with you on home, work, or mobile devices. Security and Protection for your users and data With built-in tools and support for Microsoft 365 security, Microsoft Edge provides a comprehensive approach to browser security on your endpoints. SmartScreen Microsoft Edge has the highest-rated protection against phishing and malware. Conditional Access Single-sign on and native Azure Active Directory Conditional Access allow IT to securely manage access to corporate data using identity. Application Guard Run Microsoft Edge in an isolated container to help prevent bad actors from infiltrating the device OS or corporate network. Information Protection Separate corporate data and control how it’s copied, pasted, or otherwise used with native support for Windows Information Protection. Data Loss Prevention (DLP) Microsoft Endpoint DLP is natively supported so organizations can easily extend their control over data when accessed from the browser. Tracking Prevention Control how ... |
![]() |
4,281 | May 29, 2022 Microsoft Corp. <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/edge1_th.png"border="0"> |
![]() |
Midori Browser v11.5 Midori Browser v11.5 A web browser that cares about your privacy and security on the web. What makes Midori the browser of the future? Midori Browser is a lightweight, fast, and secure browser that protects your privacy and keeps your data safe. Enjoy thousands of add-ons, an ad blocker, and much more. Workspaces Allows you to organize tabs and windows more efficiently, featuring different labels and categories. Design It includes different appearance modes such as default, light, and dark, as well as options to configure and customize to various preferences. Privacy Midori enhances and improves privacy by activating features that significantly boost privacy, including DNS navigation, default HTTPS browsing, anti-mining blocking, tracker blocking, and more. Telemetry Midori does not include any type of telemetry or unnecessary distractions and add-ons; it never has and never will. Open source Midori Browser has always been and will always be open source. It's licensed under MPL (Mozilla Public License 2.0), GPL (General Public License), and AGPL (Affero General Public License). This download is for the Windows installer version (very bottom of page). All other download assets are below: Windows: midori-11.5.win64.zip PORTABLE macOS: midori-11.5.1.mac.dmg Linux: midori_11.5.1-2_amd64.deb midori_11.5.1-2_arm64.deb midori_11.5.1-2_i386.deb OpenSUSE Tumbleweed: midori-browser-11.5.1-2.1.x86_64.rpm Click here to visit the author's website. |
![]() |
166 | Apr 03, 2025 Astian, Inc <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Midori1_th.png"border="0"> |
![]() |
MJ Registry Watcher v1.2.8.9 MJ Registry Watcher v1.2.8.9 A simple registry, file and directory hooker/poller, that safeguards the most important startup files, registry keys and values, and other more exotic registry locations commonly attacked by trojans. MJ Registry Watcher has very low resource usage, and is set to poll every 30 seconds by default, although you can adjust this to anywhere between 0 and 9999. A configuration file stores all your settings for future use. MJRW not only polls the system, but it also hooks it, so that most changes to keys, files and directories are reported instantaneously. Key deletions are still caught by the polling loop though, since they cannot be hooked. Exactly which keys and files are protected can be completely configured by the user, although the sets supplied with MJRW will cover most standard PCs. There is an additional automatic registry backup system that takes a snapshot of the entire registry about every 28 days and stores it in the directory MJRegBackup. The filename is of the form MJRegBackup_yyyymmdd.reg where yyyy is the year, mm is the month and dd is the day. The last 15 snapshots are kept. They can be restored from a menu option : this can be used in Safe Mode as administrator to rescue a non-booting PC. To install it, extract the files with pathnames, and you'll have a self-contained .exe file with a small help text file, the keys and files lists, alert sounds, and a couple of exclusion files in the MJRegWatcher directory. Set the properties for RegWatcher.exe to run it as administrator, so that it can interface to the registry properly. It may run in Accept mode without this step. To do this, go to the RegWatcher.exe file in Explorer, right-click to Properties, and go to the Compatibility tab. Check the admin box. Whenever the ... |
![]() |
5,419 | Mar 03, 2025 Mark Jacobs <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/RegWatcher1_th.png"border="0"> |
![]() |
MobaXterm Home Edition v24.3 MobaXterm Home Edition v24.3 Enhanced terminal for Windows with X11 server, tabbed SSH client, network tools and much more. MobaXterm is your ultimate toolbox for remote computing. In a single Windows application, it provides loads of functions that are tailored for programmers, webmasters, IT administrators and pretty much all users who need to handle their remote jobs in a more simple fashion. MobaXterm provides all the important remote network tools (SSH, X11, RDP, VNC, FTP, MOSH, ...) and Unix commands (bash, ls, cat, sed, grep, awk, rsync, ...) to Windows desktop, in a single portable exe file which works out of the box. There are many advantages of having an All-In-One network application for your remote tasks, e.g. when you use SSH to connect to a remote server, a graphical SFTP browser will automatically pop up in order to directly edit your remote files. Your remote applications will also display seamlessly on your Windows desktop using the embedded X server. Key features • Embedded X server Fully configured Xserver based on X.org • Easy DISPLAY exportation DISPLAY is exported from remote Unix to local Windows • X11-Forwarding capability Your remote display uses SSH for secure transport • Tabbed terminal with SSH Based on PuTTY with antialiased fonts and macro support • Many Unix/Linux commands on Windows Basic Cygwin commands (bash, grep, awk, sed, rsync,...) • Add-ons and plugins You can extend MobaXterm capabilities with plugins • Versatile session manager All your network tools in one app: Rdp, Vnc, Ssh, Mosh, X11, ... • Portable and light application MobaXterm has been packaged as a single executable which does not require admin rights and which you can start from an USB stick • Professional application MobaXterm Professional has been designed for security and stability Changes: v24.3 (2024-10-30) New feature: added "graphical macros" that can record your mouse and keyboard inputs and replay them later Improvement: you can now put ... |
![]() |
3,932 | Nov 07, 2024 Mobatek <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/MobaXterm3_th.png"border="0"> |
![]() |
Monitor File Events v1.03 Monitor File Events v1.03 "Monitor File Events" is an activity sniffer on your system, it determines any change on any file or folder on your computer. Possibility to scan up to 5 different directories and their relative sub-directories with search filters for directories and files, obtaining precise targets, without messing up the list with hundreds of processes in other paths that are not interest. The selected filters determine what you are watching and thus, which events can be triggered. So what is going on in your system, something that even the Task Manager cannot say. Quick Inspection of the Directory, with a double click on the Events or Processes displayed. Saving of log activities in * .txt format, with a simple and clean reading, to easily compare the activities in order of time and scan, thanks to the time stamped in each line. Window position selectable with switch activities in Top Most. Automatic saving of last User Settings. Features Watch Process : processes activity with any process association in run mode or in background mode. Process activity splitted into a columns: "ID" "PROCESS NAME" "EXECUTABLE PATH" "COMMAND LINE" Events Folders & Files : "Name-Dir" "Name-File" "Creation-Time" "Size-Change" "Security" "Attributes" "Last-Write" "Last-Access" Something is Changed : Occurs when a file or directory in the specified Path is changed. Something has been Created: Occurs when a file or directory in the specified Path is created. Something has been Deleted : Occurs when a file or directory in the specified Path is deleted. Something has been Renamed : Occurs when a file or directory in the specified Path is renamed. Attributes : The attributes of the file or folder. CreationTime : The time ... |
![]() |
3,450 | May 27, 2020 Alex Malkovich <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Monitor File Events2_th.png"border="0"> |
![]() |
MonitorControl v4.0.1 MonitorControl v4.0.1 Controls your external Apple display brightness and volume and shows native OSD. Use menulet sliders or the keyboard, including native Apple keys! Major features Control your display's brightness, volume and contrast! Shows native OSD for brightness and volume. Supports multiple protocols to adjust brightness: DDC for external displays (brightness, contrast, volume), native Apple protocol for Apple and built-in displays, Gamma table control for software adjustment (recommended for OLED), shade control for AirPlay, Sidecar and Display Link devices. Supports smooth brightness transitions. Seamlessly combined hardware and software dimming extends dimming beyond the minimum brightness available on your display. Synchronize brightness from built-in and Apple screens - replicate Ambient light sensor and touch bar induced changes to a non-Apple external display! Sync up all your displays using a single slider or keyboard shortcuts. Allows dimming to full black (advanced feature). Support for custom keyboard shortcuts as well as standard brightness and media keys on Apple keyboards. Dozens of customization options to tweak the inner workings of the app to suit your hardware and needs (don't forget to enable Show advanced settings in app Preferences). Modern, stylish and highly customizable menulet reflecting the design of Control Control introduced in Big Sur. Simple, unobstrusive UI to blend in to the general aesthetics of macOS (even the menu icon can be hidden). Supports automatic updates for a hassle-free experience. How to install and use the app 1) Download the app below 2) Copy the MonitorControl app file from the .DMG to your Applications folder 3) Click on the MonitorControl app file 4) Add the app to Accessibility under System ... |
![]() |
2,368 | Nov 10, 2021 MonitorControl <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/MonitorControl1_th.png"border="0"> |
![]() |
Monochrome v1.3 Monochrome v1.3 Monochrome is an IRC client intended for long-time IRC users. Its primary goals are security, reliability and stability despite IRC network failures or connectivity problems. If you have not used IRC before, you should probably look for another client; Monochrome is currently lacking documentation and assumes the user to have basic knowledge of common IRC commands and conventions. Main features: Reliable automatic identification with NickServ on most popular IRC networks. Full Unicode support. Sending and receiving of DCC file transfers, with auto-accept whitelist. Ignore and half-ignore lists. Trigger word list. Auto-away, monitoring of away state of other users. Logging. Customizable command aliases. Variety of entertaining easter eggs! Noteworthy features currently missing: Scripting - though functionality such as identifying with NickServ is automated, so there's no major need for running custom scripts. Help and documentation. System requirements: Windows XP or newer. .NET framework 4.x. License: GNU General Public License, version 2 Changes: Version 1.3 highlights: Added "nick account" to server parameters - use this to specify your primary nick when identifying with NickServ from another nick. Useful when keeping more than one client connected. Added widely requested "hide specific status messages" functionality so you can suppress joins/quits/modes. Holding shift key while launching now suppresses automatically connecting to configured IRC servers. Added mudlord's bsfilter code (hidden feature, only configurable via the XML). Added safeguards so you can't run more than one Monochrome instance with the same configuration file; existing instance is activated instead. Fixed incompatibility with servers ... |
![]() |
4,747 | Feb 05, 2020 Peter Pawlowski <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Monochrome1_th.png"border="0"> |
![]() |
Moonlight v6.1.0 Moonlight v6.1.0 Open source game streaming client. Moonlight allows you to play your PC games on almost any device, whether you're in another room or miles away from your gaming rig. Moonlight (formerly Limelight) is an open source implementation of NVIDIA's GameStream protocol. We implemented the protocol used by the NVIDIA Shield and wrote a set of 3rd party clients. You can stream your collection of PC games from your GameStream-compatible PC to any supported device and play them remotely. Moonlight is perfect for gaming on the go without sacrificing the graphics and game selection available on PC. Features Stream at up to 4K resolution If you can see it on your PC, you can stream it using Moonlight, including your full Windows desktop at 4K 120 FPS with a capable client. Support for 120 FPS streaming Stream at up to 120 FPS using the new Moonlight PC client with the option to disable V-Sync for the lowest possible latency. Stream outside your home You can host from most home networks without having to do any manual configuration or type any IP addresses. Check out the automatic configuration tool in our Setup Guide. Multiple platforms If you have an Android device, iOS device, PC or Mac, Chromebook, PS Vita, or even a Raspberry Pi, you can use Moonlight to stream to it. Open source The code for our Moonlight clients is hosted on GitHub under the GPLv3 license. We welcome contributions and would be happy to help with ports to new platforms. Completely free Moonlight is a project run by the community, not a company. We have no interest in pushing ads, bundled services, paid versions with extra features, or subscriptions. Setup guide here. Changes: v6.1.0 OS Support Changes: Windows 10 (1809), Windows Server 2019, or later is now required 32-bit versions of Windows are no longer supported macOS ... |
![]() |
4,691 | Feb 20, 2025 Moonlight Team <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/moonlight1_th.png"border="0"> |
![]() |
Mozilla Firefox Portable v140.0.2 Mozilla Firefox Portable v140.0.2 Portable Firefox is a fully functional package of Firefox optimized for use on a USB key drive. It has some specially-selected optimizations to make it perform faster and extend the life of your USB key as well as a specialized launcher that will allow most of your favorite extensions to work as you switch computers. It will also work from a CDRW drive (in packet mode), ZIP drives, external hard drives, some MP3 players, flash RAM cards and more. To install, just download the ZIP and unzip it to the root directory of your USB drive. It will create a "firefox" directory and all the requisite directories underneath. To use Firefox on your drive, launch it with the PortableFirefox.exe file in the firefox directory. DO NOT launch the firefox.exe file directly, as this will create a profile on your hard drive or use an existing one. Additionally, be sure you've closed any local copies of Firefox and that they've finished shutting down. Otherwise, a new window of your local install will be launched. This is a feature of Firefox itself to prevent multiple copies running at the same time. Mozilla Firefox - Your web, the way you like it: high performance, easy customization and advanced security. Features: Anti-Malware Firefox protects you from viruses, worms, trojan horses and spyware delivered over the Web. If you accidentally access an attack site, it will warn you away from the site and tell you why it isn’t safe to use. Anti-Phishing Shop and do business safely on the Internet. Firefox gets a fresh update of web forgery sites 48 times in a day, so if you try to visit a fraudulent site that’s pretending to be a site you trust (like your bank), a browser message—big as life—will stop you. Instant Web Site ID Want to be extra sure ... |
![]() |
10,435 | Jul 02, 2025 Mozilla & John T. Haller <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/FirefoxPortable_th.png"border="0"> |
![]() |
Mozilla Thunderbird v128.9.0 Extended Support Release Mozilla Thunderbird v128.9.0 Extended Support Release This release is intended for users who want all available new features on an annual basis and stability/security fixes on a monthly basis. Mozilla's fastest, most beautiful email, calendar, and contacts release yet. Designed to maximize your freedoms. Freedom from Chaos Waste less time finding browser tabs. Access all your messages, calendars, and contacts in one fast app. Filter and organize the way you like. Manage all accounts separately or in a unified inbox. Thunderbird simply makes your life simpler. Freedom from Manipulation Mozilla's agenda isn’t hidden. It’s to make the world better. Thunderbird is funded by user donations. They don’t collect personal data, sell ads in your inbox, or secretly train AI with your private conversations. Thunderbird is open source. As part of the Mozilla family you can be confident they always put your privacy and security first. Freedom to Geek Out Thunderbird is yours. Thunderbird is clean and elegant by default, but easily customizable to match your workflow and visual preferences. It is loaded with unique and powerful features. Key Features Include: • Mail Account Setup Wizard • One-click Address Book • Attachment Reminder • Tabbed Email • Quick Filter Toolbar • Search Tools • Message Archive • Large Files Management • Smart Folders • Add-ons Manager • Robust Privacy • Phishing Protection • Automated Update • Junk Mail Tools • Open Source System Requirements: Windows Windows 10 or later Windows Recommended Hardware 1GHz or faster Intel/AMD compatible processor 1GB RAM / 2GB of RAM for the 64-bit version ... |
![]() |
7,872 | Apr 03, 2025 The Mozilla Organization <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/mozillathunderbird_th.png"border="0"> |
![]() |
Mozilla Thunderbird v137.0 Full Packages Mozilla Thunderbird v137.0 Full Packages The email and productivity app that maximizes your freedoms. These are the full setup files, not the downloader versions. Freedom from Chaos Waste less time finding browser tabs. Access all your messages, calendars, and contacts in one fast app. Filter and organize the way you like. Manage all accounts separately or in a unified inbox. Thunderbird simply makes your life simpler. Freedom from Manipulation Mozilla's agenda isn’t hidden. It’s to make the world better. Thunderbird doesn't collect personal data, sell ads in your inbox, or secretly train AI with your private conversations. Thunderbird is open source. As part of the Mozilla family you can be confident they always put your privacy and security first. Freedom to Geek Out Thunderbird is yours. Thunderbird is clean and elegant by default, but easily customizable to match your workflow and visual preferences. It is loaded with unique and powerful features. This download is for the Windows 64bit version (very bottom of page). All other download assets are below: Windows: Thunderbird Setup32bit 137.0.exe (32bit) macOS: Thunderbird 137.0.dmg Linux: thunderbird-137.0.tar.xz Click here to visit the author's website. |
![]() |
129 | Apr 03, 2025 The Mozilla Organization <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/mozillathunderbird_th.png"border="0"> |
![]() |
MP4Tools v3.8 MP4Tools v3.8 A collection of cross-platform free tools to manipulate MP4 files. MP4Tools is a collection of simple free tools to manipulate MP4 files without re-encoding and without quality loss. It is Open Source Software and is completely free. MP4Tools contains following applications: • MP4Joiner is a free application that allows join multiple MP4 files into one without reencoding and without quality loss. • MP4Splitter is a free application that allows split a MP4 file in multiple files without reencoding and without quality loss Changes: MP4Joiner: added possibility to specify audio sample rate and bitrate for re-encoding MP4Splitter: added possibility to split on key frames only (disabled by default) MP4Splitter: added support of drag and drop updaed Spain translation (thanks to Alejandro Cremades Bernabeu) added Spain (Venezuela) (thanks to Ricardo A. Rivas) added Korean translation (thanks to Hae Moon, Kwon) added Sinhala translation (thanks to Asanka Sovis / අසංක සෝවිස්) updated ffmpeg to version 4.1.1 This download is for the Windows version. If you need the macOS (OS X ≥ 10.10, Catalina+) version, download here. Starting MP4Tools on macOS Catalina or higher: To start MP4Tools you need to control-click the app icon, then choose Open from the shortcut menu. The app is saved as an exception to your security settings, and you can open it in the future by double-clicking it, just as you can any authorized app. Click here to visit the author's website. |
![]() |
1,684 | Jun 04, 2023 Alex Thüring <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/MP4Tools2_th.png"border="0"> |
![]() |
Mumble Portable v1.5.735 Mumble Portable v1.5.735 Open source, low latency, high quality voice chat. From Mumble: "Mumble was the first VoIP application to establish true low latency voice communication over a decade ago. But low latency and gaming are not the only use cases it shines in." "We heard from users who record podcasts with our multi-channel audio recorder, players seeking realism with our positional audio in games, Eve Online players with huge communities of over 100 simultaneous voice participants (I bet they make good use of our extensive permission system 😄), the competitive Team Fortress 2 community making us their required voice communication platform, hobby radio transmission users, and a variety of workplaces adapting Mumble to fit their needs - be it on-head mobile devices or communicating across countries or into airplanes." "Administrators appreciate Mumble for being able to self host and have control over data security and privacy. Some make use of the extensive permission system for complex scenarios (for example separating two groups but leaders being able to talk to both). Some love to provide their users with additional functionality with scripts making use of server APIs, or host music bots and the like that connect to the server. Those that have an existing user database often make use of authenticators to allow authenticating with existing account login data." Features: For End-Users • Low-latency - great for talking and gaming • Stay private and secure - always encrypted communication - Public/private-key authentication by default • Recognize friends across servers • For gamers: - In-game Overlay - see who is talking, FPS and the current time ... |
![]() |
163 | Apr 11, 2025 Mumble Team and PortableApps.com <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Mumble_th.png"border="0"> |
![]() |
Mumble v1.5.735 Mumble v1.5.735 Open source, low latency, high quality voice chat. From Mumble: "Mumble was the first VoIP application to establish true low latency voice communication over a decade ago. But low latency and gaming are not the only use cases it shines in." "We heard from users who record podcasts with our multi-channel audio recorder, players seeking realism with our positional audio in games, Eve Online players with huge communities of over 100 simultaneous voice participants (I bet they make good use of our extensive permission system 😄), the competitive Team Fortress 2 community making us their required voice communication platform, hobby radio transmission users, and a variety of workplaces adapting Mumble to fit their needs - be it on-head mobile devices or communicating across countries or into airplanes." "Administrators appreciate Mumble for being able to self host and have control over data security and privacy. Some make use of the extensive permission system for complex scenarios (for example separating two groups but leaders being able to talk to both). Some love to provide their users with additional functionality with scripts making use of server APIs, or host music bots and the like that connect to the server. Those that have an existing user database often make use of authenticators to allow authenticating with existing account login data." Features: For End-Users • Low-latency - great for talking and gaming • Stay private and secure - always encrypted communication - Public/private-key authentication by default • Recognize friends across servers • For gamers: - In-game Overlay - see who is talking, FPS and the current time - ... |
![]() |
1,824 | Apr 11, 2025 Mumble Project Team <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Mumble_th.png"border="0"> |
![]() |
NeatShift v1.1.4 NeatShift v1.1.4 Organize your files without breaking anything. NeatShift is a modern Windows application that helps you organize files and folders while maintaining their accessibility through symbolic links. Features 🔗 Smart File Movement: Move files while maintaining access through symbolic links 🛡️ Safe Operations: Automatic system restore point creation for safety 🎨 Modern UI: Clean Windows 11 style interface with dark/light theme support ⚡ Drag and Drop: Easy file and folder selection 🔍 Link Management: View and manage existing symbolic links ⚠️ Error Prevention: Smart validation and error handling Installation • Run NeatShift.exe - No installation needed - No .NET runtime required (included in the package) System Requirements Minimum Requirements • Windows 7 SP1 or later • Administrator privileges • 100 MB free disk space Recommended • Windows 10/11 • SSD for faster file operations • System Restore enabled (for safety features) Administrator Privileges NeatShift requires administrator privileges for two essential functions: • Creating Symbolic Links: Windows security model requires elevated privileges to create symbolic links. This is a system-level security requirement to prevent potential misuse of links. • System Restore Points: Creating system restore points requires access to system protection settings, which is only available with administrator rights. Changes: v1.1.4 Dec 26 2024 Fixed resource handling in single-file build Improved icon handling Better XAML resource management Read Usage Guide. Click here to visit the author's website. |
![]() |
270 | Dec 26, 2024 BytexGrid <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/NeatShift1_th.png"border="0"> |
![]() |
Net Disabler v1.1 Net Disabler v1.1 On average, teens spend nine hours a day using media for entertainment – that’s more time than they spend sleeping and far more time than they spend studying. This is why more and more families are looking into ways to block internet access temporarily.But as we all know, it can be hard to give up things that are bad for us, we get home from work but continue to check email, waste time on social networking sites, or stare blankly at a computer for such reason We may want to turn the internet off temporarily. The reasons to Completely Disable Internet are varied and many , for example : 1. To prevent programs from calling home or from updating. 2. To prevent your computer from receiving email or social media alerts etc. you could also use it to avoid distractions during work. 3. Disconnecting from the internet can limit the impact of the malware it is a security technique known as an “air gap”. By separating the computer from any network makes it more secure. 4. Internet access can be harmful if employees spend too much time browsing the Internet instead of performing their regular duties… Technically, you can control internet by running netsh interface command in command prompt window to enable and disable the network connection that has the internet access. But This method can be easily circumvented and does not offer a guarantee. If you want to disable Internet connectivity for some time or on some events, you can easily do it with Net Disabler it is a small portable Freeware tool, you can use it to quickly turn the Internet off or on again. The application displays the current status of the Internet connection in the interface above is on status and below is off Usage is very simple,there are 4 Internet ... |
![]() |
5,416 | Apr 16, 2021 Sordum.org <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/NetDisabler1_th.png"border="0"> |
![]() |
NetAdapter Repair All In One 1.2 NetAdapter Repair All In One 1.2 NetAdapter Repair is an All In One program that allows a user to effectively troubleshoot and repair common problems with windows networking adapters. Repair Buttons and Additional Tools: Advanced Repair (WinSock/TCP IP Repair, Clear all Proxy/VPN Settings, Windows Firewall Repair) Release and Renew DHCP Address Clear Host File Clear Static IP Settings (enable DHCP) Change to Google DNS Flush DNS Cache Clear ARP/Route Table NetBIOS Reload and Release Internet Options - Clear SSL State Enable LAN Adapters Enable Wireless Adapters Reset Internet Options Security/Privacy Set Network Windows Services Default |
![]() |
8,132 | Jul 18, 2014 Conner Bernhard |
![]() |
NetHotfixScanner 1.5 NetHotfixScanner 1.5 Network Hotfix Scanner is a free advanced hotfix check utility that scans network computers for missing hotfixes and patches, and helps you download and install them. NetHotfixScanner gives you a quick look at the hotfixes and patches installed or missed on any remote computer in your corporate network, it tells you by colored icons specific security bulletin rating ( critical, important, moderate ), title, description and bulletin URL. The tool is designed with a user-friendly interface and is easy to use. |
![]() |
9,385 | Nov 15, 2019 Nsasoft LLC <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/nethotfixscanner_th.png"border="0"> |
![]() |
Network Profile Name Changer v1.4 Network Profile Name Changer v1.4 Delete / Rename Network Connections When you connect to a Ethernet or wired network for the first time, Windows automatically creates a network profile and assigns generic names like Network 1, Network 2, etc. finally stores it on your computer as a known network. A wireless network profile will use the SSID of the wireless network (ex: router) . Some users and administrators may dislike the non-descriptive network connections names and want to rename , delete or clear redundant network profiles (names). After Windows 7 , Microsoft removed Netork Profile rename option therefore you will not find any option whatsoever in the Settings app or Control Panel to change the network name. It is still possible to edit network profile names to make them more descriptive but the only effective way to Rename or remove the connections in Windows 11, Windows 10 and Windows 8 is by using the registry editor. (valid in all Windows versions) Changes What is New (Thursday, September 28, 2023) 1.[FIXED] – Deleted network profile leaves leftover in a registry key 2.[FIXED] – Can’t upper/lower letter in renaming 3.[ADDED] – Multiple selection feature in the List with Ctrl key 4.[ADDED] – x64 version 5.[ADDED] – High contrast support 6.[ADDED] – Manage Known Networks has been added (Under the menu button) 7.[ADDED] – Some code Improvements How to Change the Active Network Profile Name You can check the current name in the Network and Sharing Center on Windows , press the Windows + R keys to open the Run dialog, type one of the following commands and press Enter. control.exe /name Microsoft.NetworkAndSharingCenter explorer.exe shell:::{8E908FC9-BECC-40f6-915B-F4CA0E70D03D} The name of the network is displayed at the very top of the page. Windows Users have three main options to change a network name; 1. Using Local Security Policy (It is only available in professional versions of Windows) 2. Using the Windows Registry 3. Using Network ... |
![]() |
3,722 | Mar 17, 2024 Sordum.org <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/NetProfNameChange1_th.png"border="0"> |
![]() |
Network Security Toolkit (NST) v38 Network Security Toolkit (NST) v38 A network security analysis and monitoring toolkit Linux distribution. Network Security Toolkit (NST) is a bootable ISO image (Live USB Flash Drive) based on Fedora 36 providing easy access to best-of-breed Open Source Network Security Applications and should run on most x86_64 systems. The main intent of developing this toolkit was to provide the security professional and network administrator with a comprehensive set of Open Source Network Security Tools. The majority of tools published in the article: Top 125 Security Tools by INSECURE.ORG are available in the toolkit. An advanced Web User Interface (WUI) is provided for system/network administration, navigation, automation, network monitoring, host geolocation, network analysis and configuration of many network and security applications found within the NST distribution. In the virtual world, NST can be used as a network security analysis, validation and monitoring tool on enterprise virtual servers hosting virtual machines. Features Multi-Tap Network Packet Capture Web-Based Network Security Tools Management Host/IPv4 Address Geolocation Network/System Monitoring Network Intrusion Detection Network Interface Bandwidth Monitor Web-based Snort IDS Integration Active Connections Monitor Network Segment ARP Scanner Network Packet Capture CloudShark Upload Support Multi-Port Terminal Server VNC / RDP Desktop Session Management Click here to visit the author's website. |
![]() |
3,030 | Oct 03, 2023 networksecuritytoolkit.org <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/NST1_th.png"border="0"> |
![]() |
NewPipe v0.27.3 NewPipe v0.27.3 The lightweight YouTube experience for Android. Do you like watching videos on YouTube but want an intuitive, feature-rich and privacy friendly app for that? NewPipe has been created with the purpose of getting the original YouTube experience on your smartphone without annoying ads and questionable permissions. Supported services YouTube YouTube is one of the most popular video and live streaming platforms, including music, news, gaming and much more. PeerTube PeerTube is a decentralized video platform. Any PeerTube instance can be added to NewPipe. SoundCloud SoundCloud is a streaming platform for music. Bandcamp Bandcamp is an artist-friendly platform for sharing music. It offers user-friendly DRM-free downloads. media.ccc.de media.ccc.de is the video archive and live streaming platform of the German hacker and information security activist group Chaos Computer Club. And more to come! Special instructions to use .apk files in Android Allow app installations from unknown sources in Android. We found a great article on how to do this HERE. Features • Watch videos at resolutions up to 4K • Listen to audio in the background, only loading the audio stream to save data • Popup mode (floating player, aka Picture-in-Picture) • Watch live streams • Show/hide subtitles/closed captions • Search videos and audios (on YouTube, you can specify the content language as well) • Enqueue videos (and optionally save them as local playlists) • Show/hide general information about videos (such as description and tags) • Show/hide next/related videos • Show/hide comments • Search videos, audios, channels, playlists and albums • Browse videos and audios within a channel • Subscribe to channels (yes, without logging into any account!) • Get notifications about new videos from ... |
![]() |
2,328 | Nov 26, 2024 Team NewPipe <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/NewPipe1_th.png"border="0"> |
![]() |
Nmap Security Scanner v7.95 Nmap Security Scanner v7.95 A free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), a utility for comparing scan results (Ndiff), and a packet generation and response analysis tool (Nping). Features: Flexible: Supports dozens of advanced techniques for mapping out networks filled with IP filters, firewalls, routers, and other obstacles. This includes many port scanning mechanisms (both TCP & UDP), OS detection, version detection, ping sweeps, and more. See the documentation page. Powerful: Nmap has been used to scan huge networks of literally hundreds of thousands of machines. Portable: Most operating systems are supported, including Linux, Microsoft Windows, FreeBSD, OpenBSD, Solaris, IRIX, Mac OS X, HP-UX, NetBSD, Sun OS, Amiga, and more. Easy: While Nmap offers a rich set of advanced features for power users, you can start out as simply as "nmap -v -A targethost". Both traditional command line and graphical (GUI) versions are available to suit your preference. Binaries are available for those who do not wish to compile Nmap from source. Free: The primary ... |
![]() |
10,128 | Jul 26, 2024 Nmap <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/nmap4_th.png"border="0"> |
![]() |
no-defender v1.1.0 no-defender v1.1.0 A slightly more fun way to disable Windows Defender. (through the WSC api) How it works (As told by the author) "There's a WSC (Windows Security Center) service in Windows which is used by antiviruses to let Windows know that there's some other antivirus in the hood and it should disable Windows Defender. This WSC API is undocumented and furthermore requires people to sign an NDA with Microsoft to get its documentation, so I decided to take an interesting approach for such a thing and used an already existing antivirus called Avast. This AV engine includes a so-called wsc_proxy.exe service, which essentially sets up the WSC API for Avast." "With a little bit of reverse engineering, I turned this service into a service that could add my own stuff there." Limitations (As told by the author) "Sadly, to keep this WSC stuff even after the reboot, no-defender adds itself (not really itself but rather Avast's module) to the autorun. Thus, you would need to keep the no-defender binaries on your disk :(" Usage Changes: v1.1.0 Added win32 builds Added firewall disabling Use 7-Zip to unzip this file. This download is for the 64bit version (very bottom of page). If you need the 32bit version, download here. Click here to visit the author's website. |
![]() |
1,617 | Jun 04, 2024 Arsenii es3n1n <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/no-defender1_th.png"border="0"> |
![]() |
NordLocker (MacOS) v1.0.47 NordLocker (MacOS) v1.0.47 Store and share your files securely. Encryption is on us. Encrypt 5 GB for free! Personal files. For your eyes only. Photos, videos, notes Think of all the personal files you’d rather keep private. Prevent them from ending up in the wrong hands and being exploited in malicious ways. Finances, IDs, passwords Getting this info compromised may lead to identity theft or loss of money. NordLocker ensures top-notch security for your sensitive data. Your secrets Whether it’s your diary or a secret music collection, NordLocker protects it from prying eyes so you don’t have to worry about someone trying to snoop on you. Work-related data. Secured. Freelancing work Use NordLocker to ensure secure file access and make your professionalism shine when sharing your work with clients. Confidential work in progress If you’re an entrepreneur, programmer, researcher or any other professional in the process of creating something big, keep it confidential as long as you need. Medical records Medical data is increasingly becoming a target for cybercrime. Protect sensitive data of your patients by storing it securely encrypted. Leading-edge encryption at your fingertips We use the most advanced ciphers and principles, featuring Argon2, AES256, ECC (with XChaCha20, EdDSA and Poly1305), and other creations of modern cryptography to guarantee ultimate security of your files. Encrypt everything, worry about nothing We protect your files with seamless end-to-end encryption. Enjoy peace of mind – files encrypted with NordLocker are safe no matter where you decide to keep them. Secure all types of files – as many as you like. Safeguard your cloud data Cloud services give you storage – we add security on top. Encrypt your files with NordLocker before uploading to the cloud and enjoy peace of mind knowing that no one’s peeking. NordLocker plays nicely with all cloud storage providers. Share securely Need to transfer confidential data to a partner or a client? Give them access to the encrypted file and send ... |
![]() |
4,177 | Jan 30, 2020 NordLocker <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/NordLocker1_th.png"border="0"> |
![]() |
NordLocker (Windows) v1.0.47 NordLocker (Windows) v1.0.47 Store and share your files securely. Encryption is on us. Encrypt 5 GB for free! Personal files. For your eyes only. Photos, videos, notes Think of all the personal files you’d rather keep private. Prevent them from ending up in the wrong hands and being exploited in malicious ways. Finances, IDs, passwords Getting this info compromised may lead to identity theft or loss of money. NordLocker ensures top-notch security for your sensitive data. Your secrets Whether it’s your diary or a secret music collection, NordLocker protects it from prying eyes so you don’t have to worry about someone trying to snoop on you. Work-related data. Secured. Freelancing work Use NordLocker to ensure secure file access and make your professionalism shine when sharing your work with clients. Confidential work in progress If you’re an entrepreneur, programmer, researcher or any other professional in the process of creating something big, keep it confidential as long as you need. Medical records Medical data is increasingly becoming a target for cybercrime. Protect sensitive data of your patients by storing it securely encrypted. Leading-edge encryption at your fingertips We use the most advanced ciphers and principles, featuring Argon2, AES256, ECC (with XChaCha20, EdDSA and Poly1305), and other creations of modern cryptography to guarantee ultimate security of your files. Encrypt everything, worry about nothing We protect your files with seamless end-to-end encryption. Enjoy peace of mind – files encrypted with NordLocker are safe no matter where you decide to keep them. Secure all types of files – as many as you like. Safeguard your cloud data Cloud services give you storage – we add security on top. Encrypt your files with NordLocker before uploading to the cloud and enjoy peace of mind knowing that no one’s peeking. NordLocker plays nicely with all cloud storage providers. Share securely Need to transfer confidential data to a partner or a client? Give them access to the encrypted file and send ... |
![]() |
3,845 | Jan 30, 2020 NordLocker <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/NordLocker1_th.png"border="0"> |
![]() |
Norton Remove and Reinstall Tool v4.5.0.148 Norton Remove and Reinstall Tool v4.5.0.148 Norton Remove & Reinstall tool helps to uninstall and reinstall Norton security products. Before you begin The Norton Remove and Reinstall tool uninstalls most Norton products, and reinstalls the latest version. Before you proceed, make sure that you meet the following requirements: You need to have an Internet connection The tool does not remove Norton Utilities or Norton Family The tool does not remove your Norton Identity Safe local vault You can also choose to just uninstall without reinstalling. Click here to visit the author's website. |
![]() |
6,797 | Dec 01, 2020 Symantec <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/NortonRemovalTool_th.png"border="0"> |
![]() |
NoScript v11.5.0 NoScript v11.5.0 Free Open Source Software (FOSS) providing extra protection for Firefox (on Android, too!), Chrome, Edge, Brave and other web browsers. NoScript is a built-in key security component of the Tor Browser, the top anonymity tool defending millions against surveillance and censorship. This browser extension allows JavaScript and other potentially harmful content to be executed only by trusted web sites of your choice (e.g. your online bank). NoScript also provides the most powerful anti-XSS protection ever available in a browser. NoScript's unique pre-emptive script blocking approach prevents exploitation of security vulnerabilities (known, such as Meltdown or Spectre, and even not known yet!) with no functionality loss: you can enable JavaScript and other dynamic capabilities for sites you trust with a simple click. Experts* will agree: the web is really safer with NoScript. * experts endorsing NoScript, among others: Edward Snowden (former NSA analyst and whistleblower against surveillance state); Window Snyder (former top security officer at Microsoft, Square, Inc., Apple, Fastly, Intel and Mozilla Corp.); Douglas Crockford (Javascript expert and creator of the JSON format); the Sans Internet Storm Center Changes: v11.5.0 x [tor-browser#32668] Use the Security Level as the default policy for Options Reset on Tor Browser x [tor] Stateless-compatible Tor Browser integration x [L10n] Updated pt_BR x Stateless-compatible temporary permissions x Switch from deferWebTraffic to Wakening x Stateless-compatibile TabGuard x Switch to non-persistent background page x [xss] Refactor for non-persistence x Removed Fennec-specific code x Bump min Gecko compatibility to 115.0 (stateless background script support) This download is for the Firefox version (very bottom of page). If you need the Chrome and other Chromium-based browsers (eg. Edge, Brave, Vivaldi...) version, download here. Click here to visit the author's website. |
![]() |
9,221 | Oct 29, 2024 InformAction <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/noscript_th.png"border="0"> |
![]() |
Notepad++ v8.8.2 Notepad++ v8.8.2 A free source code editor which supports several programming languages running under the MS Windows environment. This project, based on Scintilla edit component (a very powerful editor component) are written in C++ with pure win32 api and STL (that ensures the higher execution speed and smaller size of the program), is under the GPL Licence. Features: Syntax Highlighting and Syntax Folding: Supported languages : C, C++, Java, C#, XML, HTML, PHP, Javascript, RC resource file, makefile, ASCII art file extension .nfo , screenshot1, screenshot2), doxygen, ini file, batch file, ASP, VB/VBS source files, SQL, Objective-C, CSS, Pascal, Perl, Python, Lua, TCL, Assembler, Ruby, Lisp, Scheme, Properties, Diff, Smalltalk, Postscript and VHDL. More Features: •WYSIWYG •User Defined Syntax Highlighting •Multi-Document Tabs •Regular Expression Search/Replace supported •Full Drag N' Drop supported •Dynamic position of Views •File Status Auto-detection •Zoom in and zoom out •Multi-Language environment supported •Bookmark •Brace and Indent guideline Highlighting •Macro recording and playback Changes: v8.8.2 regression-fixes, bug-fixes and new features: Fix regression of folding state not being remembered through sessions. (Fix #16597, #16670) Fix “Go To Settings” links in Style Configurator regression (from v8.8). (Fix #16592) Fix small regression of tab background (hovered) highlighting issue after drag&drop. (Fix #16559) Fix an unresponsive (hang) issue due to hide lines. (Fix #16316) Fix installer security issue by using the absolute path instead of an unspecified path (CVE-2025-49144). (commit, fix report on GitHub, fix #16744) Installer component “WinGUp”: update cURL to 8.13.0 for fixing cURL’s security issue CVE-2025-0167. (Fix #16531, ... |
![]() |
8,988 | Jul 01, 2025 Don Ho <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/notepad_th.png"border="0"> |
![]() |
NoWinLock v1.0 NoWinLock v1.0 Disable the Lock feature in Windows 10 and 11. Disabling Lock, forces all users to sign out or shutdown their computers preventing the ability to leave programs running or files open when their computer is not in use. INSTRUCTIONS (Note: You may not get asked all of these questions.) 1) Double or single click on NoWinLock.reg 2) On the Security Warning window, click RUN. 3) When asked "Do you want to allow this app to make changes to your computer?", choose YES. 4) When asked "Adding information can unintentionally change or delete values and cause... Are you sure you want to continue?", choose YES. 5) On the message telling you it was successful, click OK. 6) Restart your computer. To undo NoLockScreen, run UndoNoWinLock.reg using the same instructions. Click here to visit the author's website. |
![]() |
2,293 | Feb 20, 2022 OlderGeeks.com <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/NoWinLock1_th.png"border="0"> |
![]() |
NVIDIA GeForce Experience v3.20.5.70 NVIDIA GeForce Experience v3.20.5.70 Keep your drivers up to date. Optimize your game settings. Even capture and share videos, screenshots, and livestreams with friends. GeForce® Experience™ lets you do it all. It’s the perfect companion to your GeForce® GTX graphics card. Share Your Greatest Moments Now you can record and share gameplay videos and livestreams on YouTube, Twitch, and Facebook. NVIDIA ShadowPlay™ technology lets you broadcast with minimal performance overhead, so you never miss a beat in your games. The GeForce Experience in-game overlay makes it fast and easy. Broadcast to Facebook Live. Automatically record with ShadowPlay Highlights. Get Game Ready Drivers For each major game release, NVIDIA works closely with developers to boost performance, fix bugs, and improve your gaming experience. Technologies like NVIDIA GameWorks™ give you the tools you need to optimize gameplay and bring you these improvements through a Game Ready driver update. GeForce Experience automatically notifies you when these drivers are available, and with a single click, you can update to the latest driver--without leaving your desktop. Optimize Your Game Settings GeForce Experience takes the hassle out of PC gaming by configuring your game’s graphics settings for you. Don’t know what texture filtering level to set in Overwatch? Not to worry - NVIDIA taps into the power of the NVIDIA cloud data center to test thousands of PC hardware configurations and find the best balance of performance and image quality. Then it automatically configures personalized graphics settings based on your PC’s GPU, CPU, and display. Supported for over 400 Games GEFORCE EXPERIENCE 3.20.5 RELEASE HIGHLIGHTS What's new in GeForce Experience 3.20.5 Enhanced In-Game Overlay GeForce Experience 3.20.5 Beta now adds new performance monitoring metrics in the in-game overlay. In addition to FPS, the performance monitoring metrics now show detailed performance stats, temperature, and latency metrics. ... |
![]() |
9,292 | Jan 12, 2021 NVIDIA <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/geforce-experience1_th.png"border="0"> |
![]() |
NxFilter v4.5.4.1 NxFilter v4.5.4.1 A freeware web-filter designed for enterprise environments. It started as a dns-filter. Now it provides web-proxy based filtering as well. NxFilter can do everything you can expect from a dns-filter or a web-filter. Faster and lighter Filtering requires an extra process for your network. It can be a bottle neck in your network and cause a latency problem. NxFilter uses lightweight DNS protocol for its filtering. There will be no latency problem from NxFilter. Network performance NxFilter doesn’t just do filtering. It caches DNS responses from public DNS servers. Once it cached, it will be resolved in your local network. It will save you a lot of bandwidth and improve your network performance. Scalability We see many sites running NxFilter for several thousand users. At the moment, the biggest number of users for a single NxFilter server we have seen is 60,000. We don’t know its limit yet. Authentication You want to protect your network with a login procedure and differentiate users with userames and IP addresses on your report view. NxFilter offers IP and password based authentication by itself. Active Directory integration You can import users and groups from an Active Directory domain and you can filter them by multiple policies based on those imported groups and users. Single sign-on Your users don’t want to go through any other login process after they logged in to their PCs. NxFilter provides several kinds of single sign-on agents. Some of them can be used for Active Directory integration. Multiple policies You can have multiple policies for your users. One policy for staffs and a stricter policy for your students. You can apply these policies based on IP and IP ranges or users and groups created on NxFilter GUI or imported from your Active Directory domain. Easy deployment You can say that NxFilter is the easiest webfilter to install and manage. Many of our users are ... |
![]() |
6,801 | Jan 27, 2022 Jahastech <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/NxFilter_th.png"border="0"> |
![]() |
OandO ShutUp10++ v1.9.1443 OandO ShutUp10++ v1.9.1443 Free antispy tool for Windows 10 and 11 OandO ShutUp10++ means you have full control over which comfort functions under Windows 10 and Windows 11 you wish to use, and you decide when the passing on of your data goes too far. Using a very simple interface, you decide how Windows 10 and Windows 11 should respect your privacy by deciding which unwanted functions should be deactivated. OandO ShutUp10++ is entirely free and does not have to be installed – it can be simply run directly and immediately on your PC. And it will not install or download retrospectively unwanted or unnecessary software, like so many other programs do these days! More control over your operating system • Adapt your security settings • Protect your privacy • Control location services • Do not pass on your user data and diagnostics Further information • Portable Version – no installation required • Free of charge for private users, • companies and educational institutions • Operating System: Supports all Microsoft® Windows 11 and Windows 10 • Available in English, German, French, Italian, Spanish, • Russian and Chinese (simplified) Windows 11 and Windows 10 wants to give users the easiest possible daily experience and in doing so very rarely forces you to actually read and confirm a security notice. Unfortunately, this simplified approach from Microsoft means much more data is passed onto them than many users would like. Microsoft uses most data to display personalized information to you that is aimed at making your computer life easier. As an example, Windows can remind you to set off to the airport 30 minutes earlier due to traffic ... |
![]() |
7,409 | Feb 12, 2025 OandO Software GmbH <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/ShutUp10start_th.png"border="0"> |
![]() |
OfflineInsiderEnroll v2.6.4 OfflineInsiderEnroll v2.6.4 A simple Windows Command Prompt script to enable access to the Windows Insider Program on machines not signed in with Microsoft Account. This script is compatible only with Windows 11 or Windows 10 version 1809 and later. Usage This script requires administrative priviliges to run. You can simply execute it by right clicking it > Run as Administrator. Installation and configuration changes After starting, the script offers selection of Windows Insider Program channels. To make a selection, press a letter coresponding to option you choose and press ENTER. If the machine was not enrolled to the Insider Program, you will get prompted to restart your machine to enable Microsoft Flight Signing which is required by Windows Insider Program. Notice: Windows Insider Program requires telemetry to be set to Full. After enrolling your machine to the Windows Insider Program please make sure that your diagnostic data collection settings are set to Full. Some Insider Preview builds may not get offered in Windows Update if you do not have correct telemetry settings. You can verify or modify your telemetry settings as follows: Windows 11: Settings > Privacy and Security > Diagnostics & feedback Windows 10: Settings > Privacy > Diagnostics & Feedback Restoring Windows Insider Program to default options To restore Windows Insider Program to default settings simply choose Stop receiving Insider Preview builds in OfflineInsiderEnroll Script. You will get prompted to reboot, because this option will disable Microsoft Flight Signing. How does this work? This script takes advantage of undocumented TestFlags registry value. If this value is set to 0x20, all access to online Windows Insider services gets disabled. Because of this, we can set our own Windows Insider Preview configuration without being overriden by the contact to the service. Since Windows Update does not check if machine is actually enrolled to the program, you will get offered Insider Preview builds by ... |
![]() |
2,801 | Mar 13, 2023 abbodi1406 <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/OfflineInsiderEnroll1_th.png"border="0"> |
![]() |
OnionShare v2.1 (MacOS) OnionShare v2.1 (MacOS) OnionShare lets you securely and anonymously send and receive files. It works by starting a web server, making it accessible as a Tor onion service, and generating an unguessable web address so others can download files from you, or upload files to you. It does not require setting up a separate server or using a third party file-sharing service. If you want to send files to someone, OnionShare hosts them on your own computer and uses a Tor onion service to make them temporarily accessible over the internet. The receiving user just needs to open the web address in Tor Browser to download the files. If you want to receive files, OnionShare hosts an anonymous dropbox directly on your computer and uses a Tor onion service to make it temporarily accessible over the internet. Other users can upload files to you from by loading the web address in Tor Browser. Documentation To learn how OnionShare works, what its security properties are, and how to use it, check out the wiki. Click here to visit the author's website. |
![]() |
4,579 | Sep 23, 2019 Micah Lee <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/onionshare1_th.png"border="0"> |
![]() |
OnionShare v2.1 (Windows) OnionShare v2.1 (Windows) OnionShare lets you securely and anonymously send and receive files. It works by starting a web server, making it accessible as a Tor onion service, and generating an unguessable web address so others can download files from you, or upload files to you. It does not require setting up a separate server or using a third party file-sharing service. If you want to send files to someone, OnionShare hosts them on your own computer and uses a Tor onion service to make them temporarily accessible over the internet. The receiving user just needs to open the web address in Tor Browser to download the files. If you want to receive files, OnionShare hosts an anonymous dropbox directly on your computer and uses a Tor onion service to make it temporarily accessible over the internet. Other users can upload files to you from by loading the web address in Tor Browser. Documentation To learn how OnionShare works, what its security properties are, and how to use it, check out the wiki. Click here to visit the author's website. |
![]() |
4,720 | Sep 23, 2019 Micah Lee <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/onionshare1_th.png"border="0"> |
![]() |
Open Source Point of Sale v3.3.9 Open Source Point of Sale v3.3.9 A free, open source, web based point of sale application written in PHP using CodeIgniter framework. It uses MySQL as the data back end and has a Bootstrap 3 based user interface. The main features are: • Stock management (Items and Kits with extensible list of Attributes) • VAT, GST, customer and multi tiers taxation • Sale register with transactions logging • Quotation and invoicing • Expenses logging • Cashup • Receipt and invoice printing and/or emailing • Barcode generation and printing • Suppliers and Customers database • Multiuser with permission control • Reporting on sales, orders, expenses, inventory status • Receivings • Giftcard • Rewards • Restaurant tables • Messaging (SMS) • Multilanguage • Selectable Boostrap (Bootswatch) based UI theme • Mailchimp integration • reCAPTCHA to protect login page from brute force attacks • GDPR ready The software is written in PHP language, it uses MySQL (or MariaDB) as data storage back-end and has a simple but intuitive user interface. The latest 3.x version is a complete overhaul of the original software. It is now based on Bootstrap 3 using Bootswatch themes, and uses CodeIgniter version 3 as framework. It also has improved functionality and security. Try the online demo. A demo version of the latest master version can be found on the developer's Demo Server. LOGIN using username: admin password: pointofsale Server Requirements PHP version 7.2 ... |
![]() |
2,883 | Feb 18, 2024 opensourcepos <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/OSPOS_th.png"border="0"> |
![]() |
OpenPuff v4.01 OpenPuff v4.01 An open source, professional steganography tool OpenPuff is a professional steganography tool: HW seeded random number generator (CSPRNG) Deniable steganography Carrier chains (up to 256Mb of hidden data) Carrier bits selection level Modern multi-cryptography (16 algorithms) Multi-layered data obfuscation (3 passwords) X-squared steganalysis resistance Unique layers of security and obfuscation: 256bit+256bit symmetric-key cryptography (with KDF4 password extension) 256bit symmetric-key data scrambling (CSPRNG-based shuffling) 256bit symmetric-key data whitening (CSPRNG-based noise mixing) Adaptive non-linear carrier bit encoding OpenPuff supports many carrier formats: Images (BMP, JPG, PCX, PNG, TGA) Audio support (AIFF, MP3, NEXT/SUN, WAV) Video support (3GP, MP4, MPG, VOB) Flash-Adobe support (FLV, SWF, PDF) OpenPuff is a portable/stealth software: Native portable structure (no installation, registry keys, .ini files) Runs in user mode with DEP on Multithread support (up to 32 CPUs) = Faster processing OpenPuff is safe: Spyware/adware-free Fully redistributable OpenSource core crypto-library (libObfuscate) OpenPuff is a professional steganography tool with unique features, suitable for highly sensitive data covert transmission. Carrier chains: Data is split among many carriers. Only the correct carrier sequence enables unhiding. Moreover, up to 256Mb can be hidden, if you have enough carriers at disposal. Last carrier will be filled with random bits in order to make it undistinguishable from others. Supported formats: Images, audios, videos, flash, adobe. Layers of security: Data, before carrier injection, is encrypted ... |
![]() |
2,630 | Feb 10, 2022 Embedded SW <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/OpenPuff1_th.png"border="0"> |
![]() |
Optimizer v15.8 Optimizer v15.8 An advanced configuration utility designed to enhance your privacy and security on Windows. This tool is highly recommended for use after a fresh installation of Windows to achieve maximum privacy and security benefits. Depending on your Windows version, Optimizer can also help you apply specific system tweaks. Note: This program has 4 hits on VirusTotal These are false positives due to the changes this program makes to your computer. The program is safe. Features: • Full multilingual support (22 languages available) • Enhance system and network performance • Disable unnecessary Windows services • Turn off Windows telemetry, Cortana, and more • Disable Office telemetry (works with Office 2016 or newer) • Stop automatic Windows 10 updates • Download multiple useful apps quickly • Uninstall UWP apps • Clean system drive and browser profiles • Fix common registry issues • Ping IPs and assess latency • Search IPs on SHODAN.io • Quickly change DNS server (from a pre-made list) • Flush DNS cache • Remove unwanted startup programs • Edit your HOSTS file • Identify and terminate file lock handles • Hardware inspection tool • Add items to the desktop right-click menu • Define custom commands for the run dialog • Support silent runs using a template file Compatibility: • Requires .NET Framework 4.8.1 • Compatible with Windows 7, 8, 8.1, 10, 11 • Can run on Windows Server 2008, 2012, ... |
![]() |
4,250 | Sep 12, 2023 hellzerg <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Optimizer1_th.png"border="0"> |
![]() |
OSE File and Text Encryption v1.11 OSE File and Text Encryption v1.11 Free tool to encrypt files and text using any one of a number of ciphers and modes provided by OpenSSL. Features • Completely portable • Ideal for Tails persistent storage • Very fast encryption Note from the author: OSE, A Graphical Frontend to OpenSSL's symmetric encryption OSE will encrypt files and text using any one of a number of ciphers and modes provided by OpenSSL, and its use is quite self explanatory. OSE is completely self contained and portable, making it ideal for USB flash drives and Tails persistent storage. It will create one file in the working directory, ".ose_cipher", which simply keeps track of the last used cipher. It is not necessary, just there for convenience, and if it's removed or not there, OSE will simply create another one defaulting to aes-128-ecb. Of course, OpenSSL must be present for OSE to work, and additionally, it makes calls to the system utility "echo" when encrypting text, so: Linux - OpenSSL and echo are already part of every distribution Windows - OpenSSL is probably not installed on your system, and the Windows "echo" call is inadequate for use by OSE. OSE, when launched, will spawn both openssl.exe and echo.exe in the working directory. (echo.exe is a Windows port of the UNIX/Linux echo) OSE will clean up these files upon terminating. Notes on long text strings: While you can encrypt a lot of text with the "echo" pipe, it's not unlimited. If you run into the case where OSE informs of a too long text string, an option is included to encrypt text using the TCL AES package using a 256 bit keystream and cbc mode. The password hashing and salting using this mode are extremely robust; you lose no security. Using this mode, the length of the ... |
![]() |
2,000 | Feb 06, 2024 Dana Booth <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/OSEFileTextEncrypt1_th.png"border="0"> |
![]() |
OSFMount v3.1.1002 OSFMount v3.1.1002 Mount local disk image files (bit-for-bit copies of a disk partition) in Windows with a drive letter. OSFMount also supports the creation of RAM disks, basically a disk mounted into RAM. This generally has a large speed benefit over using a hard disk. As such this is useful with applications requiring high speed disk access, such a database applications, games (such as game cache files) and browsers (cache files). A second benefit is security, as the disk contents are not stored on a physical hard disk (but rather in RAM) and on system shutdown the disk contents are not persistent. OSFMount supports mounting images of CDs in .ISO format , which can be useful when a particular CD is used often and the speed of access is important. System requirements Win 10 and Win 11 Win 7 SP1, Win 8, Windows Server 2008, 2012 (Windows Server 2016 has issues) are supported but have not been validated 64bit support (For 32-bit support, please use OSFMount v2) CPU with SSE4.2 instruction set (i.e. CPUs released after 2010) Users must have administrator privileges. RAM: 1GB (When mounting large disk images, the more RAM the better) Disk space: 15 MB of free hard disk space for the installation files. Known issues #1: On certain Windows systems (mostly Windows server 2016), when using OSFMount, Windows will prevent the OSFMount driver from loading. See the following page for more details, "Why do I get the error, Error loading OSFMount Driver?" #2: If you get an Access Denied message during install for the osfmount.sys file, or OSFmount driver is disabled error. Reboot the machine and reinstall. A previous version of the driver was likely still loaded in memory, preventing an update. Changes v3.1.1002, 15 Sep 2023 Fixed mounting of image files located on a network share using physical emulation This download is for the 64bit version. ... |
![]() |
5,595 | Sep 15, 2023 Passmark Software <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/osfmount1_th.png"border="0"> |
![]() |
OW Shredder v6.45.872.0 OW Shredder v6.45.872.0 File, folder and drive eraser OW Shredder is a powerful security tool, that allows you to completely erase sensitive data from your computer. Individual files, free disk space, and entire volumes get erased securely. In addition OW Shredder offers various tools to scan, analyze, and wipe; other traces that were left behind. OW Shredder also supports a desktop widget, a context menu integration and automatic recycle bin cleaning. All in all this small and portable application gives users or even companies the perfect solution to eleminate sensitive data from their computers or servers. Desktop widget Customizable GUI Command line support Simple drag and drop Advanced multi-threading Context menu integration Automatic recycle bin cleaning Different and custom erase algorithm Changes: 6.45 NEW: Software web parts updated to schiffer.tech Click here to visit the author's website. |
![]() |
4,759 | Feb 13, 2019 Hendrik Schiffer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/OW Shredder1_th.png"border="0"> |
![]() |
Oxynger KeyShield v2.2 Oxynger KeyShield v2.2 Private and Secure Virtual Keyboard Anti-Spyware Virtual Keyboard Oxynger KeyShield is a secure virtual keyboard for Windows to enter passwords and other confidential information to get protection from malicious programs known as keyloggers. Oxynger KeyShield protects its keystrokes from keystroke logging, screen logging, mouse logging, clipboard logging and shoulder surfing. Oxynger KeyShield is an essential security tool for protecting high-stakes passwords such as master password, online bank password or cryptocurrency wallet password. Keystroke Logging Protection Oxynger KeyShield provides the world's best protection from keylogging. It is 100% protected against hook based, API based, kernel/driver based and hardware keyloggers. Ordinary anti-keyloggers only protect from some type software keyloggers. But Oxynger KeyShield protect its keystrokes from software and hardware keyloggers. Most virtual keyboards (such as the virtual keyboard that comes with Windows) send normal keyboard event messages to the target program to type text. Almost every software keylogger can record these typed characters. Oxynger KeyShield do not use ordinary methods to send keystrokes to target application. Instead it uses a very secure communication channel for sending keystrokes to target application. Keyloggers will not be able to record keystrokes send through this channel. Screen Capture Protection Oxynger KeyShield is protected from making its screenshots or video. Many modern keyloggers are able to capture screens while entering passwords using a virtual keyboard. Screen capture protection of Oxynger KeyShield is currently the world's best. It prevents taking its screenshot using screen capture programs. It is also protected from video recording programs. Mouse Logging Protection Oxynger KeyShield provides superior protection from mouse logging. Protection from mouse logging is accomplished by not using the common QWERTY layout for positioning keys in Oxynger KeyShield. If mouse logging protection is turned on then it uses a random key layout. Thus hackers won’t get any idea of the key layout of Oxynger KeyShield in a ... |
![]() |
2,532 | Dec 08, 2021 Oxynger Technologies <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Oxynger4_th.png"border="0"> |
![]() |
Pale Moon v33.5.0 Pale Moon v33.5.0 Your browser, Your way! Pale Moon is an Open Source, Goanna-based web browser available for Microsoft Windows, focusing on efficiency and customization. Make sure to get the most out of your browser! Pale Moon offers you a browsing experience in a browser completely built from its own, independently developed source that has been forked off from Firefox/Mozilla code a number of years ago, with carefully selected features and optimizations to improve the browser's stability and user experience, while offering full customization and a growing collection of extensions and themes to make the browser truly your own. Main features: • Optimized for modern processors • Based on our own optimized layout and rendering engine (Goanna) • Safe: forked from mature Mozilla code and regularly updated with the latest security patches • Secure: Additional security features and security-aware development • Supported by our user community, and fully non-profit • Familiar, efficient, fully customizable interface • Support for full themes: total freedom for any element's design • Support for easily-created lightweight themes (skins) • Smooth and speedy page drawing and script processing • Increased stability: experience fewer browser crashes • Support for many "legacy" Firefox extensions • Support for a growing number of Pale Moon exclusive extensions • Extensive and growing support for existing web standards This browser, even though fairly close to Gecko-based browsers like Mozilla Firefox and SeaMonkey in the way it works, is based on a different layout engine and offers a different set of features. It aims to provide close adherence to official web standards and specifications in its implementation (with minimal ... |
![]() |
4,752 | Dec 05, 2024 Moonchild Productions <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Pale Moon_th.png"border="0"> |
![]() |
Password Generator v3.8 Password Generator v3.8 Password Generator can generate secure and easy to read and remember passwords. The most important features are: Password Generator can generate WEP and WPA2 keys for Wireless LAN (WLAN). Due to separate use of vowels and consonants, as well as separate syllables, the created passwords are easy to read and easy to remember. For a fast creation of passwords you can use user defined password-set. These password-sets allows the definition of the length and the character types to be used in the passwords. Reconstructable passwords can be created from sentences. Passwords for UNIX, PHP and .HTACCESS (DES, MD5 and SHA1) can be created. The checksums of passwords (MD5, SHA1, SHA256 and SHA512) can be generated. Password Generator can analyze the security of passwords and also shows details. 1.000 passwords can be created at once. The passwords can be saved in a plain text file. Password Generator is portable and can be used on USB devices. After you start the program, you can change the display language my choosing Extras and then Language from the drop-down menus. Languages: English, German, Catalan, Chinese, Chinese (trad.), Dutch, French, Greek, Italian, Japanese, Norwegian, Polish, Portuguese, Portuguese (brasil.), Russian, Spanish, Swedish, Ukrainian 7-Zip Code--- Use 7-Zip 32bit or 7-Zip 64bit to unzip this file. Changelog Version 3.8 Changed Password Generator has been converted to Microsoft .NET Framework 4. Click here to visit the author's website. |
![]() |
4,254 | Aug 06, 2020 Gaijin.at <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/PasswordGenerator1_th.png"border="0"> |
![]() |
Password Safe v3.69.0 Password Safe v3.69.0 How many passwords do you have to secure? Whether the answer is one or hundreds, Password Safe allows you to safely and easily create a secured and encrypted user name/password list. With Password Safe all you have to do is create and remember a single "Master Password" of your choice in order to unlock and access your entire user name/password list. Security starts with you, the user. Keeping written lists of passwords on scraps of paper, or in a text document on your desktop is unsafe and is easily viewed by prying eyes (both cyber-based and human). Using the same password over and over again across a wide spectrum of systems and web sites creates the nightmare scenario where once someone has figured out one password, they have figured out all your passwords and now have access to every part of your life (system, e-mail, retail, financial, work). • Start your safe and simplified digital life • Free open source software • Installation in minutes on Windows 7, 8,10 and 11 • Designed by renowned security technologist Bruce Schneier • Over 5 million downloads Changes: v3.69.0 Jun 29 2025 Bugs Fixed GH1524 Report selection now works correctly when language isn't English. GH1525 Title bar for alternate notes editor selection is now correct. SF1613 Text in file merge/sync/compare dialog is no longer truncated on some displays. New features GH1237, SF823 A rough password strength meter now displays the strength of the password for entries and the master password. Slovak is now fully supported thanks to Milan. This download is for the Windows 64bit version (very bottom of page). If you need ... |
![]() |
7,495 | Jun 30, 2025 Bruce Schneier <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/passwordsafe_th.png"border="0"> |
![]() |
Password Security Scanner v1.62 Password Security Scanner v1.62 A free utility that scans the passwords stored by popular Windows applications and displays security information about them. This utility scans the passwords stored by popular Windows applications (Microsoft Outlook, Internet Explorer, Mozilla Firefox, and more...) and displays security information about all these passwords. The security information of every stored password includes the total number of characters, number of numeric characters, number of lowercase/uppercase characters, number of repeating characters, and password strength. You can use this tool to determine whether the passwords used by other users are secured enough, without watching the passwords themselves. System Requirements: This utility works on any version of Windows, starting from Windows 2000 and up to Windows 11. On the latest update of Windows 11 (24H2), LSA protection is enabled by default, and this feature blocks this tool from retrieving the Windows Credentials passwords. You can disable the LSA protection by following the instructions on this Microsoft Web page: Disable LSA protection Supported Applications: Currently, Password Security Scanner scans the passwords of the following applications: vInternet Explorer 4.0 - 6.0 • Internet Explorer 7.0 - 11.0 • Mozilla Firefox (All Versions) • Mozilla Thunderbird • Google Chrome • Dialup/VPN passwords of Windows (Requires elevation) • MSN/Windows Messenger • Microsoft Outlook • Windows Live Mail • Yandex Web Browser • Vivaldi Web Browser • SeaMonkey Web browser. • Pale Moon Web browser. • Chromium-Based Edge Web browser • Opera Web browser (Version 15 or greater) • Windows Credentials Passwords (Requires elevation) Support for more applications will be added in ... |
![]() |
4,006 | Apr 16, 2025 Nir Sofer <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/passwordscan_th.png"border="0"> |
![]() |
Password Tech v3.5.6 Password Tech v3.5.6 A powerful password generator capable of generating large amounts of cryptographically-secure passwords, pronounceable passwords, pattern-based passwords, passphrases composed of words, and scripted passwords. Passwords can be stored in encrypted databases along with user names, URLs, notes, etc. Password Tech provides lots of options to customize passwords to the users' various needs, and individual scripting with Lua gives full control over the process of password generation. Text encryption is also supported. Features • Full Unicode support • Cryptographically-secure • Password manager/safe • Passphrases • Pronounceable passwords • Pattern-based passwords • Password scripting with Lua • Fully customizable • Text encryption Supported operating systems: Windows 10 or later. Changes: v3.5.6 NEW FEATURES: - PassCube: Allow keeping list of (up to 10) recently opened databases - PassCube: New button "Hide notes" (next to Notes box) to hide the text in the notes box when the box is out of focus - Window "Character Set Builder": New option to include a tag or comment in the character set definition - Configuration | Database: New option "Keep list of recently opened files" FIXES: - Password security bar in main window not displayed anymore after clearing password box automatically - Ensure proper termination of threads when exiting application This download is for the Windows 64bit version (very bottom of page). If you need the Windows 32bit version, download here. Click here to visit the author's website. |
![]() |
4,238 | Mar 02, 2025 Christian Thöing <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/PWGen1_th.png"border="0"> |
![]() |
PasteBar v0.5.5 PasteBar v0.5.5 Limitless, Free Clipboard Manager for Mac and Windows Tired of the same copy and paste tasks? PasteBar saves your time, eliminates repetitive tasks, to boost your productivity and streamline your digital life. Effortless management of everything you copy Enjoy unlimited clipboard history, saved custom clips, and quick-access paste menus. Organize and track everything you copy and paste using collections, tabs, and boards. With modern interface and intuitive features ensure easy access to your copy history and your most important content — all in one place. Privately and securely stored on your local device. • Unlimited, searchable copy history • Saved custom clips • Quick-access paste menus • Collections, tabs, and boards to organize most important content • Organize and track everything you copy and paste • Locally stored data for privacy and secure access • Free and open source with code available on Github • Modern interface Endless storage for all your copied information Clipboard history is a game-changer for anyone looking to optimize their copy-and-paste workflow. Whether you're a content creator, blogger, writer, designer, programmer or any other professional who relies on copying and pasting content regularly, this feature will save you countless hours and streamline your process. Embrace the convenience and efficiency of clipboard history and discover a smarter way to work. • Ideal for anyone who relies on copying and pasting content regularly • Save countless hours and streamline your process • Quickly search and reuse previously copied content • Eliminate the frustration of searching for previously copied content • Prevent accidentally overwriting your clipboard with new content • Optimize your copy-and-paste workflow • Discover a smarter way to work Private, Safe and Secure Stored on Your Local Device Your privacy and security are our top priorities. All your clipboard history data and custom clips are stored exclusively on your local device. We never transfer your information to the cloud or any external servers, ensuring ... |
![]() |
336 | Aug 08, 2024 PasteBar <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/PasteBar1_th.png"border="0"> |
![]() |
Patch My PC Home Updater Portable v5.2.3.0 Patch My PC Home Updater Portable v5.2.3.0 Easily install and update apps on your home PC. Protect and Update Your PC — Did you know your computer needs regular updates to stay secure? In fact, 70% of successful malware attacks exploit outdated vulnerabilities (aka not “patching” your PC). Instead of spending time manually updating every single program on your home computer, our free software does it for you—updating over 500 applications automatically! This keeps your PC safe from security risks without the hassle. It’s easy, free, and helps keep hackers away. Don’t be part of the 55% of home users who are unaware of the importance of updating their software*. The Home Updater will make patching your PC easy. *According to the Ponemon Vulnerability Survey Features: • Updates over 500 common apps check including portable apps • Option to automatically close programs before updating it • No bloatware during installations • Applications install/update silently by default no install wizard needed • Create a baseline of applications if installing on new PC’s • Optionally, disable silent install to perform a manual custom install • Quickly uninstall multiple programs • Easy to use user interface • Scan time is usually less than 1 second • Installs 64-bit apps by default on 64-bit windows • Set updates to happen on a schedule • Optionally choose to install 32-bit apps on 64-bit Windows • Change updated and outdated apps color for color blindness • Skip updates for any application you don’t want to update • Suppresses restarts when performing application updates System Requirements: • Internet access • Microsoft Windows Desktop Runtime 8.0 (64-Bit) • A 64-bit version of Windows that is still supported by Microsoft Click here to visit the author's website. |
![]() |
49 | Jun 10, 2025 PatchMyPC.net <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/PatchPC1_th.png"border="0"> |
![]() |
PC Services Optimizer 2.2.385 PC Services Optimizer 2.2.385 PC Services Optimizer is an open source system tweaking solution that enables you to optimize Windows services in an easy, automatic and safe way based on the way you use your computer. It does not require any technical knowledge, as it provides easy to understand options to tune-up your system for better performance and security. Automatic TuneUp Automatic TuneUp tweaks your PC settings for best performance in an easy and safe way according to the way you use your computer. It will turn off unneeded Windows services without affecting the normal function, this will make your PC run faster and more secure. Manual TuneUp Manual TuneUp gives you the power to optimize Windows services in an easy, safe and advanced way without getting involved with Windows services functions and dependencies. Gaming Mode Gaming Mode will give your system an immediate performance boost. Unneeded Windows features will be temporary turned off to free up computer resources and concentrate computer power on programs you are currently using. Services Profiles PC Services Optimizer can save your services settings in profiles, enabling you to apply your different settings in seconds, saving you a lot of time specially when dealing with multiple computers or users. Services Manager Services Manager enables advanced users to master Windows services including third party services. It provides several tools for performing advanced functions for example you can install, start, stop, delete and specify the startup type of Windows services. Change Info: + Vista Services Optimizer name changed to PC Services Optimizer. + Added support for Microsoft Windows 8.1. + Added support for high DPI settings. + Added services snapshot creation notice. + Improved Live Update. + Fixed bug in Live Update. + Minor UI enhancements and bug fixes. |
![]() |
8,982 | Feb 19, 2014 Smart PC Utilities |
![]() |
PDF24 Creator v11.12.0 PDF24 Creator v11.12.0 Free and easy to use PDF solution with many features. The Tools: PDF Creator Easily assemble, create and modify PDF files with the Drag and Drop enabled user interface. • Merge or split PDF files • Add, remove, extract, rotate, sort and move PDF pages • Import and automatic conversion of documents (Word, Excel, images, etc. to PDF • Various preview modes for easy editing of PDF documents • Integrated viewer • Drag and Drop wherever possible • Follow up tools: Save, Print, Email, Fax, ... PDF Printer Print on this printer in order to create a PDF or use it as a universal PDF converter that converts any printable file to PDF. • Virtual printer for PDF creation • Multiple PDF printers for different tasks • Automatic saving • Profiles for recurring tasks • PDF printer assistant for saving, sending by e-mail, ... • Universal PDF converter • Digital letter paper PDF Reader A full featured and lightweight PDF Reader for displaying PDFs is also included. • Full PDF Reader for viewing PDFs • Lightweight, without ballast • Low resource requirements • Short starting time • Has all the features of a normal PDF reader • Comes as a replacement for other PDF readers PDF Converter Convert files to PDF and PDF files to other file types PDF Compression Convert files to PDF and PDF files to other file types PDF OCR Recognize text in PDF and image files via OCR ... |
![]() |
7,074 | May 22, 2023 Geek Software GmbH <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/PDF24_th.png"border="0"> |
![]() |
PeaZip v10.4.0 PeaZip v10.4.0 Free, cross-platform zip/unzip software, Rar file extractor and file/archive manager. PeaZip is a free file archiver utility and rar extractor for Windows and Linux, work with 200+ archive types and variants (7z, ace, arc, bz2, cab, gz, iso, paq, pea, rar, tar, wim, zip, zipx...), handle spanned archives (001, r01, z01...) and support multiple archive encryption standards. The project aims to provide a cross-platform, portable, GUI frontend for multiple Open Source technologies (7-Zip, FreeArc, PAQ, PEA, UPX) focused on file and archive management, and security (strong encryption, two factor authentication, encrypted password manager, secure delete). The program is written in Lazarus / FreePascal (Windows installable packages are scripted with InnoSetup) and offers a LGPLv3 alternative to proprietary software (WinZip, WinRar, etc), running as native application on Windows/Win64, Wine/ReactOS, Linux x86/x86-64 (with Linux ARM and BSD ports also available), and Darwin / macOS both Intel x86_64 and aarch64 (e.g. M1 Apple Silicon SoC). Features • Volume spanning • Compression • Authenticated encryption • Supports: 7Z, 7-Zip sfx, ACE, ARJ, Brotli, BZ2, CAB, CHM, CPIO, DEB, GZ, ISO, JAR, LHA/LZH, NSIS, OOo, PAQ/LPAQ, PEA, QUAD, RAR, RPM, split, TAR, Z, ZIP, ZIPX, Zstandard. Changes v10.4.0 04-14-25 BACKEND Zstd 1.5.7 Pea 1.24 CODE Expanded script samples for CLI usage and system integration in (peazip)/res/share/batch Legacy code cleanup Various fixes Fixed compact side bar being invisible at lower zoom levels Fixed drag and drop operations failing for some formats Fixed script generation (Advanced tab) when "TAR before" and "Delete files after archiving" options are both in use FILE MANAGER Added alternative context menus for quick navigation in file/archive manager Ctrl+RightClick shows breadcrumb context menu Shift+RightClick shows session history context menu Ctrl+Shift+RightClick shows navigation context menu Can now sort items in the Password Manager File browser popup now provides more information fields: attributes, compression/encryption method, content (compressed folders), object level comments, creation ... |
![]() |
6,411 | Apr 14, 2025 PeaZip <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/peazip1_th.png"border="0"> |
![]() |
Pegasus Mail v4.80 Pegasus Mail v4.80 A free email client for Windows. Pegasus Mail is an e-mail client that runs on computers using Microsoft Windows: by client, we mean that it interacts directly with the user, allowing mail to be sent, read, filed, printed and otherwise manipulated through a graphical interface. Probably one of the most feature-rich mail clients available, most users say that they find the program easy to use despite its richness. Small and fast, Pegasus Mail can be left running permanently on the workstation and includes powerful tools to notify the user when new mail arrives. Features • Multilingual availability - available with fully-translated French, German and Italian interfaces, as well as English. • Security, security, security: Pegasus Mail protects you from even the worst HTML-borne virus and trojans, and protects your privacy by intercepting web bugs. Pegasus Mail is immune to *all* the exploits that affect the "other" mailer - browse your mail with genuine confidence. • View your folders in either a multi-pane mode (like the "other" mailer) or in Pegasus Mail's powerful "classic" mode, where each folder has its own window and can be manipulated separately. Switching between these views is as simple as clicking a single button. • Mail filtering; Pegasus Mail pioneered this in 1991, and it's still the most powerful implementation of automated rule-based filtering you'll find in a mail client. • Bayesian filtering - Pegasus Mail's built-in Spamhalter Bayesian filter learns from the spam you receive and automatically files it in your junk folder. • Content control allows you to apply comprehensive rules to trap spam and unwanted mail • MailMerge allows you to create customized form letters to multiple recipients ... |
![]() |
6,448 | Apr 22, 2024 David Harris <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Pegasus Mail1_th.png"border="0"> |
![]() |
pelook v1.65 pelook v1.65 Pelook is a comprehensive information tool for 32 and 64 bit Windows EXE, DLL, driver and OBJ files (PE/COFF images). This tool is suitable for reverse engineers or anyone needing to delve into the internals of Windows PE files. At first glance, pelook may seem a lot like Microsoft's dumpbin tool, however you'll find it has many additional features and doesn't have the unnecessary verbosity of dumpbin. Rather than blindly dumping fields from the various headers and sections that comprise a PE image, pelook creates an intelligent report of the most useful information in the most compact form possible without sacrificing readibility. Why shouldn't you be able to see the target architecture, dependency DLLs, section list, loader flags, supported .NET framework and version resource all within the same screenful of information and all within the same tool? Pelook was originally written for the virtual memory map display and pointer to image-file-offset conversions; two features I always needed but never found in other PE dumping tools. Pelook combines the most widely used features in these popular tools in addition to other useful features: Dumpbin - Microsoft's PE/COFF header dump tool Depends - Microsoft's Dependency Walker imports/exports tool filever - Microsoft's version information resource dump tool clrver - Microsoft's CLR version tool (determine .NET Framework version needed for an EXE) Some of pelook's features are: Support for both 32-bit and 64-bit Windows modules (PE32 and PE32+, a.k.a. PE64) Dump COFF and section headers (Portable Executable/OBJ files) Dump Data Directory table Dump Debug Directory Summary (recognition of Microsoft and Borland debug) Dump import and delay-import dependency DLLs and associated functions (or just a DLL name list ... |
![]() |
4,967 | Dec 12, 2019 BYTE* <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/pelook1_th.png"border="0"> |
![]() |
Permanent Eraser v2.9.1 Permanent Eraser v2.9.1 When you normally delete files on the Mac, the operating system is only forgetting where those particular files are placed, while the data still physically remains on the drive. Beginning with Mac OS X 10.3, Apple enhanced its security by introducing the Secure Empty Trash feature, which follows the U.S. DoD pattern of overwriting data seven times. This feature was then later removed in OS X 10.11 El Capitan. Permanent Eraser provides additional wiping methods such as the 3-pass DoE or 35-pass Gutmann algorithms. This utility overwrites your data multiple times, scrambles the original file name, and truncates the file size to nothing before Permanent Eraser finally unlinks it from the system. Once your data has been erased, it can no longer be read through traditional means. CD/DVD Erasing Permanent Eraser fills in what the Finder forgot! Simply drag a CD-RW or DVD-RW onto Permanent Eraser to erase the disc's contents. Finder Integration Don't want to take up more space in your already cluttered Dock? Instead, drag Permanent Eraser into your Finder's toolbar or sidebar for easy access to wipe away the files you no longer need. Click the icon to empty your Trash, or drag and drop files to erase them. Better Progress Not only has the progress meter's accuracy greatly increased over earlier versions, but it is also displayed from the Dock's icon. Automator + Services Mac OS 10.4+ users get to make use of the bonus Automator Actions and Finder plug-in built to work with Permanent Eraser. Right-click on items you want to destroy and select Services → Erase, or make use of the Erase Trash, Erase Selected Items, or Erase Free Space Automator Actions. International Permanent Eraser has been translated for English, German, French, Italian, Dutch, Swedish, Traditional Chinese, and Welsh. Changes: Permanent Eraser 2.9.1 (18 July 2020) ... |
![]() |
3,245 | Jan 12, 2022 Edenwaith <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Permanent Eraser2_th.png"border="0"> |
OlderGeeks.com Copyright (c) 2025