Processed through Paypal
No account required.


Donate Bitcoin to this wallet:
1KkUMXvQ2ko3xcJkzitB7WYgoW6m79WFfm
Donate Ethereum to this wallet:
0x40E56922F43637224935CDC35e2c96E0392A8505
Donate Litecoin to this wallet:
LLYAFEyqjH69gkyCEpRjXNyedRCWrVChfL
Facebook Follow @GeekOnTheLoose


CLICK HERE TO SEARCH

 Home » OlderGeeks.com Freeware Downloads » Searching Files   
Search Results
Files
  File Name Rating Downloads
Last Update/Developer
BleachBit 2.0
BleachBit 2.0 BleachBit frees disk space and maintains privacy. Cleans cache, Internet history, temporary files, logs, cookies, Firefox, Google Chrome, Flash, Windows and more. Features simple: just check the boxes quick: clean all applications in one place secure: overwrite files to hide contents powerful: clean 1000+ applicationdq safe: options are clearly labeled to avoid surprises Changes These are the changes since version 1.12: Add drag-and-drop support (thanks to contractor Pavel). Try dropping files onto the main application window. Fix preservation of thumbnails on Google Chrome and Chromium . Fix error Favicons is version 36 or 38 when cleaning Google Chrome and Chromium. Clean site engagement history on Google Chrome and Chromium. Enable secure delete for SQLite. Fix DatabaseError: no such table: moz_favicons for some Firefox profiles. Use HTTPS encryption when automatically checking for software updates. The bleachbit.org web site requires HTTPS encryption. Specific to Linux Add journald cleaner (thanks to tstenner). Add software categories to bleachbit.desktop (thanks to Hugo Lefeuvre). Add appdata.xml file for Linux app stores (thanks to Mailaender). Call apt-get command for apt clean to respect the dpkg lock (reported by Danilo Piazzalunga). Whitelist Bluetooth daemon (reported by Timo Ollech). Fix error when cleaning APT autoremove (reported by vladislavyuzbekov). Fix purging of GTK recently used resources list. ...
5/5 863 Feb 28, 2018
Andrew Ziem
BMP Wrap 2.0
BMP Wrap 2.0 Ever needed to email a file but it keeps on bouncing because it's an illegal attachment? Renaming the file or storing it in a ZIP archive sometimes works, but many ISP can detect that low-tech obfuscation. You need BMP Wrap. BMP Wrap temporarily hides a file inside a valid .BMP image. Once hidden, you can send the BMP file to anybody you wish and they can then extract that file from the BMP image using BMP Wrap. Now you can send EXEs, DLLs, or whatever file format you want, and the destination mail server will never be the wiser. No installation is required - just save the EXE file to your desktop, and then drag the file you want to wrap/unwrap onto the the BMPWrap Icon (a new .BMP file is created, the original file is left unmodified). This program is free & does not include any ad-ware or other malware.
5/5 520 Jan 27, 2017
HCI Design
Crypter Geek 2.0
Crypter Geek 2.0 Encrypt / Decrypt text files by this mysterious encryption tool, No installation required. Warning: Windows Defender and other anti-malware programs may incorrectly detect this as malicious. It is a clean file.
5/5 1,347 Feb 25, 2017
Christos Beretas
DeepSound 2.0
DeepSound 2.0 DeepSound is a steganography tool and audio converter that hides secret data into audio files. The application also enables you to extract secret files directly from audio files or audio CD tracks. DeepSound might be used as copyright marking software for wave, flac, wma, ape, and audio CD. DeepSound also support encrypting secret files using AES-256(Advanced Encryption Standard) to improve data protection. The application additionally contains an easy to use Audio Converter Module that can encode several audio formats (FLAC, MP3, WMA, WAV, APE) to others (FLAC, MP3, WAV, APE). System requirements: - Windows XP/Vista/7/8 - Microsoft .NET Framework 3.5 Documentation: 1 DeepSound 2.0 1.1 Hide data into carrier audio file To hide data into audio file, follow these steps: Select carrier audio file or drag and drop audio file (flac, wav, wma, mp3, ape) into the file explorer. Click to 'Add files' or drag and drop secret files into the panel on the right side of application. Press F3 key or click to encode secret files. You can choose output audio format (wav, flac or ape). DeepSound does not support wma output format. If you want to hide data into wma, hide secret data into wav file and then use external software such as Windows Media Encoder for convert wav to wma lossless file. In settings dialog you can turn On/Off encrypting and set password. Modified audio file will be copied to output directory. Click Ok to start hiding secret files into carrier audio file. 1.2 Extract secret data from audio file or audio CD track To extract secret data from audio file, follow these steps: In the file explorer, select audio file or audio CD track, which contains secret data. If the secret files are encrypted, enter ...
5/5 1,401 Mar 16, 2016
Jozef Bátora
Leo Folder Locker 2.0
Leo Folder Locker 2.0 Leo Folder Locker is a software to secure your data in a smart, fast , effective and secure way. Although your operating system may offer you the possibility to hide folders, they are easy to find and reveal, since they are not protected by anything else. Thus, they cannot be considered as an option if you need to secure your sensitive data, especially on computers shared by more users at once. Leo Folder Locker comes in handy when these situations occur. This software does not encrypt your data instead it relies on some Windows OS based techniques to lock down folders. This software uses some basic techniques which are pretty good to be used on usual data. This software is not recommended to be used in high sensitivity situations where hard core encryption is required. This software was only designed to be used in general situations. Some of its key features include : Lock Down Mode As a defense from password guessing. Self Destruction Mode to provide a high level security. An Beep System used as an alert. Fully Customizable Settings. A Password Recovery System just in case you forgot yours. A new CLI based easy-to-use UI. A Freeware By Malik Usman Aura.
5/5 901 Jun 20, 2016
Malik Usman Aura
LinCity-NG 2.0
LinCity-NG 2.0 LinCity-NG is a city simulation game. In the game, you are required to build and maintain a city. You can win the game either by building a sustainable economy or by evacuating all citizens with spaceships. Features Unlimited playability Various modes of difficulty Random map generator Many fun power source options Bridges!
5/5 889 Jul 21, 2016
berliosrobot
Little Painter 2.0
Little Painter 2.0 Little Painter is a great painting software for kids. This program is really simple, with a clear interface, big buttons, large set of brushes and colourful stamps. Also including the typical functions of paint. Your kids will love Little Painter. Little Painter supports most popular image formats: BMP, JPEG, GIF, PNG and TGA with an allowance to both load and save images in these formats. Apart from the usual functions such as painting freehand drawing with a pencil, using brushes of various shapes and tool for drawing straight lines, the program lets you download free coloring stencils from the Internet. System requirements: Windows XP/Vista/7/8/10 or Windows Server 2003/2008/2013. Minimum Hardware: Processor speed (MHz): 400 or higher RAM (MB): 256 or higher Free hard disk space: 8MB Display resolution: 1024 x 768 or higher
5/5 537 Aug 14, 2017
LearningForKids.net
Naval Battle 2.0
Naval Battle 2.0 The fantastic battleship table game for your computer. Features Very intuitive graphics animated game It has three types of game mode: Single Player, Two on Same computer and Multi Player Now with an updated and brilliant design It includes a lot of great features
5/5 774 Aug 26, 2016
bruno256
Need For Madness 2.0
Need For Madness 2.0 Need for Madness is a crazy fun packed car game where you can win by racing or wasting the other cars! Perform tricks in the air to get power, it makes your car faster & stronger and is needed whether racing or wasting. It is highly recommended to complete NFM 1 or 2 before going to the multiplayer to get enough practice to be ready for it! The game includes a Car Maker & Stage Maker which allows you to create your very own cars & stages, which can then be published and used in the multiplayer. In the multiplayer you can create or join clans to participate in multiplayer clan battles & wars! Every clan can have its own set of custom cars & stages created by its members through the Car Maker & Stage Maker.
5/5 565 Jan 12, 2018
radicalplay
PySolFC 2.0 for Mac
PySolFC 2.0 for Mac PySolFC is a collection of more than 1000 solitaire card games. It is a fork of PySol Solitaire. There are games that use the 52 card International Pattern deck, games for the 78 card Tarock deck, eight and ten suit Ganjifa games, Hanafuda games, Matrix games, Mahjongg games, and games for an original hexadecimal-based deck. Its features include modern look and feel (uses Ttk widget set), multiple cardsets and tableau backgrounds, sound, unlimited undo, player statistics, a hint system, demo games, a solitaire wizard, support for user written plug-ins, an integrated HTML help browser, and lots of documentation. PySolFC is distributed under the terms of the GNU General Public License.
5/5 902 Jun 22, 2016
PySolFC
PySolFC 2.0 for Windows
PySolFC 2.0 for Windows PySolFC is a collection of more than 1000 solitaire card games. It is a fork of PySol Solitaire. There are games that use the 52 card International Pattern deck, games for the 78 card Tarock deck, eight and ten suit Ganjifa games, Hanafuda games, Matrix games, Mahjongg games, and games for an original hexadecimal-based deck. Its features include modern look and feel (uses Ttk widget set), multiple cardsets and tableau backgrounds, sound, unlimited undo, player statistics, a hint system, demo games, a solitaire wizard, support for user written plug-ins, an integrated HTML help browser, and lots of documentation. PySolFC is distributed under the terms of the GNU General Public License.
5/5 918 Jun 22, 2016
PySolFC
RunPE Detector 2.0
RunPE Detector 2.0 Phrozen RunPE Detector is a security program, especially designed to detect and defeat some suspicious processes using a generic method. We at Phrozen Software do things differently, more creatively. So, when we set ourselves the task of creating a novel way of detecting, disabling and removing RATs, we didn't want to take the route every other anti-virus company has done before us. Phrozen Software studied the behaviour of RATs and discovered that hackers virtually always use a technique called RunPE. This technique spawns a legitimate process – often the default browser or a Microsoft system process – and replace it with a malicious program code directly in memory. Your computer is thus tricked and treats the malicious code as a legitimate process. The user and his anti-virus program have no idea that his default browser is effectively turned into a virus. RunPE is a technique that is used in several malicious ways. The two most common are : [1] FWB (Firewall Bypass): As its name suggests, this technique is implemented to bypass or disable the Application Firewall or the Firewall rules. Since most malware needs to connect to a remote Command-and-Control (C&C) Server, it needs to connect to the Internet via the Firewall. Since most users are connected to the Internet at home, normally the installed Firewall would prevent the malware from connecting to the Internet. Using the RunPE technique to hijack a legitimate process that is authorized to reach Internet, any malware could subsequently connect to the C&C without being detected by the Firewall. [2] Malware Packer or Crypter: Generally script kiddies – immature hackers - use a well-known type of malware that is already detected by most anti-virus programs. They then try the obfuscate this malware to evade ...
5/5 1,294 Jun 22, 2017
PHROZEN SAS
Terminal Wings 2.0
Terminal Wings 2.0 Give wings to your insipid Windows Terminal. Have you ever been dreaming about having a marvelous Microsoft Windows Terminal, something that's at the same time beautiful, time saving and better to organize when you need to work on several terminals at the same time. Don’t search furthermore: Terminal Wings is the application you were searching for. Already in its very first version it's very complete and powerful. Imagine what power you could harness in the near future. How does it work? Contrary to other applications which simply try to replicate the same efficiency of the embedded Windows Terminal coded by Microsoft, our Terminal Wings is not such an emulator which “Hooks” the process of a real terminal to 'copy/paste' the screen buffer and display its contents to the custom application frame. It also doesn't create virtual pipes to redirect output/input buffers (stdout ; stdin ; stderror) to capture send and capture terminal commands. The reason we don’t use both above methods is due to the instability of such methods. When you execute regular commands it works pretty fine, but when it comes to use more complex console programs it become quite unstable (depending of the emulator you use). So , what is our solution? Very basically, we do not emulate the Windows Terminal at all, but we use the real one. We Patch the window and associated messages and embed it into our own frame. Well, this might sound very easy, but in effect it is quite complex to code if you want to make it appear very smoothly. Important Notice: At this moment in time, the application is only available for Microsoft Windows 10. Depending on the initial success of this program, we might be tempted to support other Windows versions too. Current Functions Available Multi Tabs : Organise your terminals using ...
5/5 587 Aug 09, 2018
Phrozen Software
ToolTipFixer 2.0
ToolTipFixer 2.0 Ever since Microsoft invented the Windows Shell with explorer.exe back in the days of Windows 95, there's been a bug that's gone from one version of Windows to the next; and with each upgrade it became worse and worse - until Vista where it only rears its ugly head every once in a while instead: tooltips appear behind the taskbar, where you can't read them and they are of no use to you. And there's nothing you can do about it! NST ToolTipFixer patches this bug for once and for all, doing what Microsoft hasn't been able to do in 13 years. ToolTipFixer 2.0 (October 14, 2008) Installer options for service vs. application Minimize memory usage as much as possible Create standalone ToolTipFixer module Remove .NET Dependencies
5/5 535 May 23, 2017
NeoSmart Technologies
Windows Firewall Notifier 2.0
Windows Firewall Notifier 2.0 Windows Firewall Notifier extends the default Windows embedded firewall behavior, allowing it to handle real time connections monitoring, connections map, bandwidth usage monitoring. Requirements WFN requires Windows Vista SP2 or later (Windows 7, 8, 8.1, 10...) with Microsoft .NET 4.5.2 or higher. Windows Server 2008 or later are not officially supported, but WFN should work fine on them. Connections listing Real time connections mapping with routes Bandwidth monitoring Adapters information Windows Firewall status management Notification popup for unknown outgoing connections (optional)
5/5 4,021 Mar 14, 2017
Daniel Pharos
Windows License Key Dump 2.0
Windows License Key Dump 2.0 Windows License Key Dump is the free command-line tool to recover the product/serial Keys of Windows and other popular software. It automatically detects and decrypts the license/serial keys of over 200+ popular software programs including Office, SQL Server, Adobe, Nero and many more. Being a command-line tool makes it useful for penetration testers and forensic investigators.
5/5 4,282 Feb 10, 2014
Security Xploded
Windows USB Blocker 2.0
Windows USB Blocker 2.0 Windows USB Blocker is the free tool to quickly Block or Unblock USB Storage Devices on any Windows system. USB devices are one of the primary causes for spreading virus/malware from one system to another without the user knowledge. Often it is risky to allow others to insert USB stick (often infected with virus) into your system. Hence it is always advised to disable USB when you are not around. In such cases, Windows USB Blocker tool will help you to instantly block USB and safeguard your system from these viruses. Beauty of this tool is that it will block only USB Storage devices like USB Sticks or Portable Disks. However normal USB devices like wireless keyboard/mouse plugs, bluetooth/wireless/internet dongles will continue to work without any problem. It has cool GUI interface and very simple to use for everyone. With just one click you can instantly Block or Unblock USB on your system. It is fully portable and does not require JAVA or .NET components. It is successfully tested on all platforms starting from Windows XP to Windows 8. Features Free Tool to block or unblock USB Blocks only USB Storage Devices (USB Sticks/Disks) Simple tool with cool GUI interface Displays current USB block status No need to log off or restart the system Fully portable, does not require any .NET or other dependencies Includes Installer for local installation & un-installation Works on both 32-bit & 64-bit systems from Windows XP to Windows 8 Changelog: Version 2.0 : 10th Feb 2015 Integrated Uninstaller into Windows Add/Remove Programs, now you can uninstall it in a standard way.
0/5 1,960 Feb 13, 2015
SecurityXploded
Winkey Finder 2.0 Beta 1
Winkey Finder 2.0 Beta 1 Win Keyfinder 2.0 retrieves your Microsoft Windows 7, Windows 8, Windows 8.1, windows XP, windows 2000, windows ME, 98, 2003 and .NET both 32bit and 64bit Operating system Product keys from the registry and display it for you. It does not generate any product key it merely displays the key stored in registry. It also retrieves Microsoft Office Product key stored in registry. Here are some features of Win Keyfinder 2.0: View Windows 8 and Windows 8.1 Product CD Key View/change XP Key View Windows 7 Product/CD Keys. View Windows Vista Product Key View/Change MS office Key View Win98 Key view Win2000 Key View .Net Key View Win2003 Key Check Activation Status (WinXP) / Coming soon Win 7/Vista Save Your Product Key By Encrypting It De-Crypt your saved encrypted key Support for MS Office Product keys
0/5 1,914 Mar 13, 2015
Winkey Finder
WMI Explorer 2.0
WMI Explorer 2.0 WMI Explorer is a utility intended to provide the ability to browse and view WMI namespaces/classes/instances/properties in a single pane of view and is inspired by the PowerShell based WMI Explorer written by Marc. As someone who works with Configuration Manager (SCCM), I spend a lot of time in wbemtest trying to find things which is very time consuming. I started this project with the intention to combine the features of currently available WMI Explorers, and to make it easier and quicker to find what you're looking for in WMI. WMI Explorer is a utility intended to provide the ability to browse and view WMI namespaces/classes/instances/properties in a single pane of view and is inspired by the PowerShell based WMI Explorer written by Marc. As someone who works with Configuration Manager (SCCM), I spend a lot of time in wbemtest trying to find things which is very time consuming. I started this project with the intention to combine the features of currently available WMI Explorers, and to make it easier and quicker to find what you're looking for in WMI. Requirements * Microsoft .NET Framework 4.0 Full or .NET Framework 4.5.1 * Minimum display resolution: 1024x768 * Administrator rights to view some WMI objects * (Optional) Internet access for automatic update check Features * Browse and view WMI objects in a single pane of view. * Connect as alternate credentials to remote computers. * Asynchronous and Synchronous mode for enumeration. * Method execution. * SMS (Configuration Manager) mode providing additional functionality for Configuration Manager. * Filter classes and instances matching specified criteria. * View classes/instances in Managed Object Format (MOF). * Search classes, methods and properties for names matching specified criteria. * Run WQL queries. * Automatic generation of WQL query for the selected Class/Instance. * Automatic script creation (PowerShell and VBS). * Highlighting enumerated objects. * Display property descriptions and possible enumeration values (if available). * Display methods descriptions ...
5/5 1,023 May 06, 2016
Vinpa
   
Showing rows 1 to 19 of 19 Showing Page 1 of 1  1 


PHCDownload 1.1.2 - Copyright (c) 2005 - 2018 - 0.032 seconds


Tweets by @GeekOnTheLoose