Processed through Paypal
No account required.

Donate Bitcoin to this wallet:
Donate Ethereum to this wallet:
Donate Litecoin to this wallet:
Facebook Follow @GeekOnTheLoose


 Home » Freeware Downloads » Searching Files   
Search Terms
Search Category Leave category selection blank to search within all categories.
Search Results
  File Name Rating Downloads
Last Update/Developer
525 DOS Games From The 1980s
525 DOS Games From The 1980s One giant zip file containing all of the games in this list. Run on an old computer or in a DOS virtual machine. See Virtualization Software in our download section. 007 - Licence To Kill (1989) (Quixel) 10th Frame Bowling (1988) (Access) [v2] 20000 Leagues Under the Sea (1988) (Coktel Vision) 2400 A.D. (1988) (Origin Systems) 3-Demon (1983) (PC Research Inc) 4th and Inches (1987) (Accolade) 4x4 Off-Road Racing (1988) (Epyx) 8088 Othello (1985) (M.W. Bayley) A Mind Forever Voyaging (1985) (Infocom) A Nightmare on Elm Street (1989) (Westwood Studios) A-Maze (1989) (Wizard Games) A10 Tank Killer (1989) (Dynamix) Aaargh! (1988) (Arcadia) Ace (1987) (Cascade) Ace 2 (1987) (Cascade) Ace of Aces (1987) (Artech) Action Fighter (1989) (Core Design) Action in the North Atlantic (1989) (General Quarters) Adventure Construction Set (1987) (Electronic Arts) Adventures in Math (1983) (IBM) [v1.00] Adventures in Serenia (1986) (Sierra) African Raiders-01 (1986) (Tomahawk) Afterburner (1989) (Unlimited Software) Air Trax (1983) (Presearch Incorporated) Airball (1987) (MicroDeal) Airborne Ranger (1988) (MPS Labs) Aldo Again (1989) (David & Benjamin Ibach) Aldo's Adventure (1987) (David & Benjamin Ibach) Alf (1988) (Alien Productions) Alice in Wonderland (1989) (Robin Johnson) Alien Syndrome (1987) (Sega) Alley Cat (1984) (Synapse) Alter Ego - Female (1983) (Activision) Alter Ego - Male (1983) (Activision) Amazing Maze (1983) (Donovan W. Foster) [v1.2] Amnesia (1986) (Cognetics Corporation) Ancient Land of Ys (1989) (Kyodai) Andromeda Conquest (1982) (Avalon Hill) Annals of Rome (1986) (PSS) Antarctic Adventure (1984) (Friends Software) Anti-Ballistic-Missile (1982) (Davis Disk) AntiXonix (1985) (D. Pavlovsky) Apache Strike (1989) (Activision) Arcade Volleyball (1988) (Vladimir Zakharov) Archipelagos (1989) (Logotron) Archon (1984) (Mission Accomplished) Arctic Fox (1986) (Dynamix) Arkanoid (1988) (Taito) Arkanoid 2 - Revenge of Doh (1989) (Taito) Arnhem (1985) (Cases Computer Simulations) Aspar GP Master (1989) (Dinamic) Astro Blaster (1988) (Rolf Franzon) Astrotit (1987) (Rudeware) Autoduel (1988) (MicroMagic) Avoid the Noid (1989) (BlueSky Software) [cga] Avoid the Noid (1989) (BlueSky Software) [ega] Axe of Rage (1989) (Palace Software) Backgammon (1987) (ShareData) Bad Cat (1988) (Rainbow Arts) Bad Street Brawler (1987) (Beam Software) Ballyhoo (1986) (Infocom) Barbarian (1989) (Mastertronic) Barbarian 2 (1989) (Palace Software) Batalia (1986) (The Right Brothers) Batman - The Caped Crusader (1988) (Ocean) Battle ...
5/5 2,525 Nov 13, 2017
Various <img src=""border="0">
Genealogica Grafica 1.23.2
Genealogica Grafica 1.23.2 Make an ancestor, descendants or relationship chart. Produce an elegant web-style genealogical text in your own language. Link charts and text and publish it on the web. Superb results and easy to produce from a gedcom file. Introduction Genealogica Grafica is the successor of KStableau. The program offers broad charting capabilities, such as: ancestor chart (pedigree) plus outline descendants chart plus outline ancestor tree descendant tree timeline descendants chart inbreeding charts relationship charts circle diagrams geographic map of birthplaces In addition, you can rely on: a clear User Interface capabilities for personalized report phrasing superior Gedcom consistency checks editing of tableau layout high-quality prints automatic detection of new versions UI and output in English, French, German, Dutch, Swedish or Norwegian The program is free. Some features in outline you can specify the depth of a chart (tableau and tree) there is a 'tree' for ancestors you can integrate the text into the tableau (pop-ups) you can edit the title and links in a tableau and add new ones full control of colors and background images comprehensive search for persons (name, ID) integrated inspection of the gedcom you can even edit the gedcom very very thorough tests on gedcom consistency sort children and marriages choice of presentation of names determine the level of detail in ...
5/5 583 Sep 07, 2017
Tom de Neef <img src=" Grafica1_th.png"border="0">
Mp3tag v2.90
Mp3tag v2.90 Mp3tag is a powerful and easy-to-use tool to edit metadata of audio files. It supports batch tag-editing of ID3v1, ID3v2.3, ID3v2.4, iTunes MP4, WMA, Vorbis Comments and APE Tags for multiple files at once covering a variety of audio formats. Furthermore, it supports online database lookups from, e.g., Discogs, MusicBrainz or freedb, allowing you to automatically gather proper tags and download cover art for your music library. You can rename files based on the tag information, replace characters or words in tags and filenames, import/export tag information, create playlists and more. Main features: Batch Tag Editing Write ID3v1.1, ID3v2.3, ID3v2.4, MP4, WMA, APEv2 Tags and Vorbis Comments to multiple files at once. Support for Cover Art Download and add album covers to your files and make your library even more shiny. Import from Discogs, freedb, MusicBrainz Save typing and import tags from online databases like Discogs, freedb, MusicBrainz, and more. Replace characters or words Replace strings in tags and filenames (with support for Regular Expressions). Create Playlists automatically Create and manage playlists automatically while editing. Rename files from tags Rename files based on the tag information and import tags from filenames. Export to HTML, RTF, CSV Generate nice reports and lists of your collection based on user-defined templates. Full Unicode Support User-interface and tagging are fully Unicode compliant. Besides these main features Mp3tag offers a variety of other functions and features ranging ranging from batch export of embedded album covers, over support for iTunes-specific tags like media type or TV Show settings, to combining multiple actions into groups that can be applied with a single mouse click. Supported Audio Formats Advanced Audio Coding (aac) Apple Lossless Audio Codec (alac) Audio Interchange File Format (aif / aifc / aiff) Direct Stream Digital Audio (dsf) Free Lossless ...
5/5 217 Sep 22, 2018
Florian Heidenreich <img src=""border="0">
Nmap Security Scanner 7.70
Nmap Security Scanner 7.70 Nmap ("Network Mapper") is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), a utility for comparing scan results (Ndiff), and a packet generation and response analysis tool (Nping). Features: Flexible: Supports dozens of advanced techniques for mapping out networks filled with IP filters, firewalls, routers, and other obstacles. This includes many port scanning mechanisms (both TCP &amp; UDP), OS detection, version detection, ping sweeps, and more. See the documentation page. Powerful: Nmap has been used to scan huge networks of literally hundreds of thousands of machines. Portable: Most operating systems are supported, including Linux, Microsoft Windows, FreeBSD, OpenBSD, Solaris, IRIX, Mac OS X, HP-UX, NetBSD, Sun OS, Amiga, and more. Easy: While Nmap offers a rich set of advanced features for power users, you can start out as simply as "nmap -v -A targethost". Both traditional command line and graphical (GUI) versions are available to suit your preference. Binaries are available for those who do not wish to compile Nmap ...
5/5 4,502 May 16, 2018
Nmap <img src=""border="0">
Tomís AD Bitlocker Password Audit 2.1
Tomís AD Bitlocker Password Audit 2.1 Tomís AD Bitlocker Password Audit is a free Windows utility for querying your Active Directory for all or selected computer objects and returning their recovery password and volume information in a grid-view format giving you a quick overview of the status of your current password recovery capabilities. If you have configured your BitLocker Drive Encryption to back up recovery information for BitLocker-protected drives to Active Directory Domain Services (AD DS) the backed up BitLocker recovery information is stored in a child object of the computer object. Tomís AD Bitlocker Password Audit enumerates all of the computer objects for your entire Active Directory or for a selected Organizational Unit and retrieves and displays the Bitlocker recovery password in a spreadsheet like format that can easily be filtered and sorted. This makes it easy to answer audit questions such as: Iíve just implemented Bitlocker, but how do I know that the recovery passwords are being populating for all of my computers? How can I identify machines that have problems with the Bitlocker process? How can I identify which machines do NOT have a recovery password? Tomís AD Bitlocker Password Audit is used by organizations all over the world to audit their Bitlocker implementations. This latest versions adds support for machines with multiple associated keys including Bitlocker-to-Go and have been verified to be compatible with Microsoft Windows 10. Windows LogosLicense: Freeware (End User License Agreement) Requirements: Microsoft .NET Framework 4.5.2 Bitlocker Active Directory Recovery Password Viewer (included with the Remote Server Administration Toolkit (RSAT)
5/5 898 Jun 28, 2017
Tom Andreas Mannerud <img src=" AD Bitlocker Password Audit1_th.png"border="0">
Tomís AD Object Recovery
Tomís AD Object Recovery Tomís AD Object Recovery is a free Windows utility for querying your Active Directory for deleted computer, user, group, or other objects and restore them on-the-fly. Have you accidentally removed a user or computer object from your Active Directory? Or, needed that Bitlocker Recovery Key for a deleted computer object? Whatever the reason is that you need to recover a deleted Active Directory object, restoring it does not have to be difficult. Tomís AD Object Recovery provides an innovative user interface that allows you to quickly query all of your deleted Active Directory objects and restore/undelete/recover selected objects with the click of a button. If you have Microsoftís Active Directory Recycle Bin enabled Tomís AD Object Recovery will restore objects with all of its attributes intact. Features Restore deleted Active Directory objects fast and easy through innovative user interface Computer Objects User Objects Group Objects Organizational Units Print Queues Full Volume Encryption Objects (Bitlocker Recovery Keys) Restore AD objects with all attributes intact when Microsoftís Recycle Bin feature is enabled No domain controller downtime Filtering and Highlighted Search Windows LogosLicense: Freeware (End User License Agreement) Requirements: Microsoft .NET Framework 4.5.2
5/5 762 Aug 09, 2018
Tom Andreas Mannerud <img src=" AD Object Recovery1_th.png"border="0">
Tomís AD Password Extender
Tomís AD Password Extender Tomís AD Password Extender is a free Windows utility that allows you to select a user account and extend the password expiration date by the amount of days specified in your Group Policy. This is often helpful when you have end-users who are travelling and canít log into the VPN or other Active Directory authenticated system. By extending the expiration you ensure that accounts donít get compromised from having to communicate the password across insecure channels. Have you ever gotten the call from the Road Warrior or frequent business traveler saying: ďI am on the road and I canít log into the VPNĒ? It is a common problem and happens frequently because end-users forget to change their passwords before they leave for that stressful trip. So, what do we do? In some cases we break security protocols by asking them for their password and set the password to be the same. In other cases we set a new password, but now the cached laptop password is different from their domain or VPN password causing confusion. In either case we might have compromised the account as others might have overheard the conversation. In some cases, we even say they are out of luck until they return to the office temporarily preventing them from working and as a result greatly reduces business productivity. This is where Tomís AD Password Extender can help. Simply pull up their account using the intuitive user interface, highlight, and select Extend Password. Requirements: Microsoft .NET Framework 4.5.2 (MD5: DC5D6A9FA8D2874A67E1491BAACE830A )
5/5 541 Aug 09, 2018
Tom Andreas Mannerud <img src=""border="0">
Tomís Hash Explorer 1.2
Tomís Hash Explorer 1.2 Tomís Hash Explorer is a free Windows utility that allows you to easily calculate cryptographic hash values for single or multiple files in order to verify file integrity. Tomís Hash Explorer features an innovative Explorer-like graphical user interface to navigate your file system and calculate cryptographic hash values for either a single file or for all files within a folder. The most popular Hash algorithms are supported, including MD5 Message-Digest Algorithm, SHA1 (160-bits), and SHA2 (256 bits, 384-bits, and 512 bits). Its multi-threaded hash computation engine results in extremely fast results. Features Innovative Explorer-like User Interface Themes/Skins Multi-Threaded Computation Engine Calculate Hash Values using Industry Standard Hash Algorithms Message Digest (MD5) Secure Hashing Algorithm 1 (SHA-1) Secure Hashing Algorithm 2 (SHA 256, SHA 384, SHA 512) Calulate File Entropy using Shannonís Entropy Algorithm Calculate Hash Values or Entropy for Single File or Multiple Files Drag and Drop Save Hash Values to Text File or Copy to Clipboard for easy import into Whitelisting applications Export Full Results Microsoft Excel (XLS) Comma Separated Values File (CSV) Rich Text Format (RTF) Adobe Acrobat Portable Document Format (PDF) Print Full Results Print Preview with Page Setup, Header &amp; Footer, Watermark ďTests show that the MD5 hash value is computed in ...
5/5 886 Jun 28, 2017
Tom Andreas Mannerud <img src=" Hash Explorer1_th.png"border="0">
Showing rows 1 to 8 of 8 Showing Page 1 of 1  1 

PHCDownload 1.1.2 - Copyright (c) 2005 - 2018 - 0.0299 seconds

Tweets by @GeekOnTheLoose