Processed through Paypal
No account required.


Donate Bitcoin to this wallet:
1KkUMXvQ2ko3xcJkzitB7WYgoW6m79WFfm
Donate Ethereum to this wallet:
0x40E56922F43637224935CDC35e2c96E0392A8505
Donate Litecoin to this wallet:
LLYAFEyqjH69gkyCEpRjXNyedRCWrVChfL
Facebook Follow @GeekOnTheLoose


CLICK HERE TO SEARCH

 Home » OlderGeeks.com Freeware Downloads » Searching Files   
Search Results
Files
  File Name Rating Downloads
Last Update/Developer
Attack Surface Analyzer 1.0.0.0 32bit
Attack Surface Analyzer 1.0.0.0 32bit Attack Surface Analyzer takes a snapshot of your system state before and after the installation of product(s) and displays the changes to a number of key elements of the Windows attack surface. Attack Surface Analyzer is developed by the Trustworthy Computing Security group. It is the same tool used by Microsoft's internal product groups to catalogue changes made to operating system attack surface by the installation of new software. This allows: - Developers to view changes in the attack surface resulting from the introduction of their code on to the Windows platform - IT Professionals to assess the aggregate Attack Surface change by the installation of an organization's line of business applications - IT Security Auditors evaluate the risk of a particular piece of software installed on the Windows platform during threat risk reviews - IT Security Incident Responders to gain a better understanding of the state of a systems security during investigations (if a baseline scan was taken of the system during the deployment phase) Supported Operating System Windows 7, Windows 8, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Vista Collection of Attack Surface data: Windows Vista, Windows 7, Windows 8, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012 Analysis of Attack Surface data and report generation: Windows 7, Windows 8, Windows Server 2008 R2, Windows Server 2012. Microsoft .NET Framework 4 is required. Note: To run Attack Surface Analyzer, you will require Administrator privileges on the computer. Collecting attack surface information with .NET Framework 4 installed C1. Download and install Attack Surface Analyzer on a machine with a freshly installed version of a supported operating system, as listed in the System Requirements section. Attack Surface Analyzer works best with a clean (freshly built) system. Not running the Attack Surface Analyzer ...
5/5 1,091 Aug 09, 2018
Microsoft
Attack Surface Analyzer 1.0.0.0 64bit
Attack Surface Analyzer 1.0.0.0 64bit Attack Surface Analyzer takes a snapshot of your system state before and after the installation of product(s) and displays the changes to a number of key elements of the Windows attack surface. Attack Surface Analyzer is developed by the Trustworthy Computing Security group. It is the same tool used by Microsoft's internal product groups to catalogue changes made to operating system attack surface by the installation of new software. This allows: - Developers to view changes in the attack surface resulting from the introduction of their code on to the Windows platform - IT Professionals to assess the aggregate Attack Surface change by the installation of an organization's line of business applications - IT Security Auditors evaluate the risk of a particular piece of software installed on the Windows platform during threat risk reviews - IT Security Incident Responders to gain a better understanding of the state of a systems security during investigations (if a baseline scan was taken of the system during the deployment phase) Supported Operating System Windows 7, Windows 8, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Vista Collection of Attack Surface data: Windows Vista, Windows 7, Windows 8, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012 Analysis of Attack Surface data and report generation: Windows 7, Windows 8, Windows Server 2008 R2, Windows Server 2012. Microsoft .NET Framework 4 is required. Note: To run Attack Surface Analyzer, you will require Administrator privileges on the computer. Collecting attack surface information with .NET Framework 4 installed C1. Download and install Attack Surface Analyzer on a machine with a freshly installed version of a supported operating system, as listed in the System Requirements section. Attack Surface Analyzer works best with a clean (freshly built) system. Not running the Attack Surface Analyzer ...
5/5 1,118 Aug 09, 2018
Microsoft
Kaspersky ScatterDecryptor 1.0.0.0
Kaspersky ScatterDecryptor 1.0.0.0 If your computer is infected with Trojan-Ransom.BAT.Scatter, use the ScatterDecryptor utility for restoring encrypted files. Trojan-Ransom.BAT.Scatter encrypts user files with a public key and changes their extensions. The files can only be decrypted with a unique secret key. ScatterDecryptor restores the files only if the utility contains a certain Trojan-Ransom.BAT.Scatter modification's secret key.
5/5 2,782 Sep 29, 2017
Kaspersky Labs International Ltd.
Kaspersky ScraperDecryptor 1.0.0.0
Kaspersky ScraperDecryptor 1.0.0.0 The malicious program Trojan-Ransom.Win32.Scraper encrypts user files to block access to them. After the data has been blocked, the user is required to pay a ransom. To decrypt files affected by Trojan-Ransom.Win32.Scraper, use the ScraperDecryptor utility developed by Kaspersky Lab engineers.
5/5 1,857 Sep 29, 2017
Kaspersky Lab
Policy Plus 1.0.0.0 (updated)
Policy Plus 1.0.0.0 Local Group Policy Editor plus more, for all Windows editions. Goals Policy Plus is intended to make the power of Group Policy settings available to everyone. Run and work on all Windows editions, not just Pro and Enterprise Comply fully with licensing (i.e. transplant no components across Windows installations) View and edit Registry-based policies in local GPOs, per-user GPOs, individual POL files, offline Registry user hives, and the live Registry Navigate to policies by ID, text, or affected Registry entries Show additional technical information about objects (policies, categories, products) Provide convenient ways to share and import policy settings Non-Registry-based policies (i.e. items outside the Administrative Templates branch of the Group Policy Editor) currently have no priority, but they may be reconsidered at a later date. Special considerations for use on Home editions Some administrative templates are present by default on these editions, but many are missing. The newest full package can be downloaded from Microsoft and installed with Help | Acquire ADMX Files. The RefreshPolicyEx native function does nothing on editions without full Group Policy infrastructure, so while Policy Plus can edit the local GPO and apply the changes to the Registry, a reboot or logon/logoff cycle is required for most policy changes to take effect. While the UI allows the creation and editing of per-user GPOs, their settings are ignored by these limited editions of Windows. Edit per-user Registry hives instead. Status Policy Plus is usable on all editions. It can load and save all policy sources successfully. Many more features are still to come, though.
5/5 581 Aug 09, 2018
Ben Nordick
Run as Service 1.0.0.0
Run as Service 1.0.0.0 RunAsService is a command line tool that allows you to setup a regular console application to run as a service. Below you will find descriptions and examples of how to do this. This tool requires that .NET Framework 2.0 be already installed on your computer. If you do not have .NET Framework 2.0 this tool will display a message and not run. You probably already have the .NET Framework 2.0 but if you don't you can download it here: Microsoft Download Center IMPORTANT: Any services you install using this tool will require that this tool remain on that computer in the same location in order for those services to continue functioning. Therefore before installing any services you should make sure this tool is somewhere where it can remain permanently. If you do end up moving this tool use the 'fixservices' action to fix the existing services. (details on how to use 'fixservices' can be found below) RunAsService Typing just the name of the tool without specifying any parameters. Or specifying incorrect paramters will bring you to the help screen. RunAsService install [Name] [Display Name] PathToExecutable Name The name of the service, if none is specified the name will default to the name of the executable. You might choose to give it a different name than the executable to keep some kind of existing convention, make it friendlier or make it easier to use commands like 'net start' and 'net stop' Display Name ...
5/5 209 Jun 22, 2018
Luis Perez
Tomís AD Object Recovery 1.0.0.0
Tomís AD Object Recovery 1.0.0.0 Tomís AD Object Recovery is a free Windows utility for querying your Active Directory for deleted computer, user, group, or other objects and restore them on-the-fly. Have you accidentally removed a user or computer object from your Active Directory? Or, needed that Bitlocker Recovery Key for a deleted computer object? Whatever the reason is that you need to recover a deleted Active Directory object, restoring it does not have to be difficult. Tomís AD Object Recovery provides an innovative user interface that allows you to quickly query all of your deleted Active Directory objects and restore/undelete/recover selected objects with the click of a button. If you have Microsoftís Active Directory Recycle Bin enabled Tomís AD Object Recovery will restore objects with all of its attributes intact. Features Restore deleted Active Directory objects fast and easy through innovative user interface Computer Objects User Objects Group Objects Organizational Units Print Queues Full Volume Encryption Objects (Bitlocker Recovery Keys) Restore AD objects with all attributes intact when Microsoftís Recycle Bin feature is enabled No domain controller downtime Filtering and Highlighted Search Windows LogosLicense: Freeware (End User License Agreement) Requirements: Microsoft .NET Framework 4.5.2
5/5 707 Aug 09, 2018
Tom Andreas Mannerud
   
Showing rows 1 to 7 of 7 Showing Page 1 of 1  1 


PHCDownload 1.1.2 - Copyright (c) 2005 - 2018 - 0.025 seconds


Tweets by @GeekOnTheLoose