Processed through Paypal
No account required.


Donate Bitcoin to this wallet:
1KkUMXvQ2ko3xcJkzitB7WYgoW6m79WFfm
Donate Ethereum to this wallet:
0x40E56922F43637224935CDC35e2c96E0392A8505
Donate Litecoin to this wallet:
LLYAFEyqjH69gkyCEpRjXNyedRCWrVChfL

  Our merchandise, sold here, helps keep the site alive.  


Facebook Follow @GeekOnTheLoose




 Home » OlderGeeks.com Freeware Downloads » Searching Files   
Search Results
Files
  File Name Rating Downloads
Last Update/Developer
LAME 3.100.alpha2
LAME 3.100.alpha2 Bundle compiled with Intel Compiler 12.1. Please note, ALPHA builds should NOT be used for archival, they are for testing only. lame.exe - the command line encoder, used from the Windows command shell lame_enc.dll - LAME encoding library, generally used with CD rippers, etc
0/5 5,237 Dec 09, 2012
LAME
LAME 3.100.alpha2 64bit
LAME 3.100.alpha2 64bit Bundle compiled with Intel Compiler 12.1. Please note, ALPHA builds should NOT be used for archival, they are for testing only. lame.exe - the command line encoder, used from the Windows command shell lame_enc.dll - LAME encoding library, generally used with CD rippers, etc
0/5 5,245 Dec 09, 2012
LAME
LAME 3.99.5
LAME 3.99.5 Bundle compiled with Intel Compiler 12.1. lame.exe - the command line encoder, used from the Windows command shell lame_enc.dll - LAME encoding library, generally used with CD rippers, etc
0/5 5,246 Dec 09, 2012
LAME
LAME 3.99.5 64bit
LAME 3.99.5 64bit Bundle compiled with Intel Compiler 12.1. (For 64bit Windows only.) lame.exe - the command line encoder, used from the Windows command shell lame_enc.dll - LAME encoding library, generally used with CD rippers, etc
0/5 5,256 Dec 09, 2012
LAME
LAME 3.99.5 for older Win32 OSs
LAME 3.99.5 for older Win32 OSs Bundle compiled with VC6/Intel Compiler 9.1. lame.exe - the command line encoder, used from the Windows command shell lame_enc.dll - LAME encoding library, generally used with CD rippers, etc
0/5 5,237 Dec 09, 2012
LAME
Tor Browser Bundle v9.0.5 for Linux, BSD, and Unix 32bit
Tor Browser Bundle v9.0.5 for Linux, BSD, and Unix 32bit What is the Tor Browser? The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained. Want Tor to really work? You need to change some of your habits, as some things won't work exactly as you are used to. Use Tor Browser Tor does not protect all of your computer's Internet traffic when you run it. Tor only protects your applications that are properly configured to send their Internet traffic through Tor. To avoid problems with Tor configuration, we strongly recommend you use the Tor Browser. It is pre-configured to protect your privacy and anonymity on the web as long as you're browsing with Tor Browser itself. Almost any other web browser configuration is likely to be unsafe to use with Tor. Don't torrent over Tor Torrent file-sharing applications have been observed to ignore proxy settings and make direct connections even when they are told to use Tor. Even if your torrent application connects only through Tor, you will often send out your real IP address in the tracker GET request, because that's how torrents work. Not only do you deanonymize your torrent traffic and your other simultaneous Tor web traffic this way, you also slow ...
5/5 2,920 Feb 13, 2020
The Tor Project
Tor Browser Bundle v9.0.5 for Linux, BSD, and Unix 64bit
Tor Browser Bundle v9.0.5 for Linux, BSD, and Unix 64bit What is the Tor Browser? The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained. Want Tor to really work? You need to change some of your habits, as some things won't work exactly as you are used to. Use Tor Browser Tor does not protect all of your computer's Internet traffic when you run it. Tor only protects your applications that are properly configured to send their Internet traffic through Tor. To avoid problems with Tor configuration, we strongly recommend you use the Tor Browser. It is pre-configured to protect your privacy and anonymity on the web as long as you're browsing with Tor Browser itself. Almost any other web browser configuration is likely to be unsafe to use with Tor. Don't torrent over Tor Torrent file-sharing applications have been observed to ignore proxy settings and make direct connections even when they are told to use Tor. Even if your torrent application connects only through Tor, you will often send out your real IP address in the tracker GET request, because that's how torrents work. Not only do you deanonymize your torrent traffic and your other simultaneous Tor web traffic this way, you also slow ...
5/5 2,933 Feb 13, 2020
The Tor Project
Tor Browser Bundle v9.0.5 for Mac OS X
Tor Browser Bundle v9.0.5 for Mac OS X What is the Tor Browser? The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained. Want Tor to really work? You need to change some of your habits, as some things won't work exactly as you are used to. Use Tor Browser Tor does not protect all of your computer's Internet traffic when you run it. Tor only protects your applications that are properly configured to send their Internet traffic through Tor. To avoid problems with Tor configuration, we strongly recommend you use the Tor Browser. It is pre-configured to protect your privacy and anonymity on the web as long as you're browsing with Tor Browser itself. Almost any other web browser configuration is likely to be unsafe to use with Tor. Don't torrent over Tor Torrent file-sharing applications have been observed to ignore proxy settings and make direct connections even when they are told to use Tor. Even if your torrent application connects only through Tor, you will often send out your real IP address in the tracker GET request, because that's how torrents work. Not only do you deanonymize your torrent traffic and your other simultaneous Tor web traffic this way, you also slow down the ...
5/5 3,154 Feb 13, 2020
The Tor Project
Tor Browser Bundle v9.0.5 for Windows 32bit
Tor Browser Bundle v9.0.5 for Windows 32bit What is the Tor Browser? The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained. Want Tor to really work? You need to change some of your habits, as some things won't work exactly as you are used to. Use Tor Browser Tor does not protect all of your computer's Internet traffic when you run it. Tor only protects your applications that are properly configured to send their Internet traffic through Tor. To avoid problems with Tor configuration, we strongly recommend you use the Tor Browser. It is pre-configured to protect your privacy and anonymity on the web as long as you're browsing with Tor Browser itself. Almost any other web browser configuration is likely to be unsafe to use with Tor. Don't torrent over Tor Torrent file-sharing applications have been observed to ignore proxy settings and make direct connections even when they are told to use Tor. Even if your torrent application connects only through Tor, you will often send out your real IP address in the tracker GET request, because that's how torrents work. Not only do you deanonymize your torrent traffic and your other simultaneous Tor web traffic this way, you also slow down the entire ...
5/5 5,824 Feb 13, 2020
The Tor Project
Tor Browser Bundle v9.0.5 for Windows 64bit
Tor Browser Bundle v9.0.5 for Windows 64bit What is the Tor Browser? The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained. Want Tor to really work? You need to change some of your habits, as some things won't work exactly as you are used to. Use Tor Browser Tor does not protect all of your computer's Internet traffic when you run it. Tor only protects your applications that are properly configured to send their Internet traffic through Tor. To avoid problems with Tor configuration, we strongly recommend you use the Tor Browser. It is pre-configured to protect your privacy and anonymity on the web as long as you're browsing with Tor Browser itself. Almost any other web browser configuration is likely to be unsafe to use with Tor. Don't torrent over Tor Torrent file-sharing applications have been observed to ignore proxy settings and make direct connections even when they are told to use Tor. Even if your torrent application connects only through Tor, you will often send out your real IP address in the tracker GET request, because that's how torrents work. Not only do you deanonymize your torrent traffic and your other simultaneous Tor web traffic this way, you also slow down the entire ...
5/5 1,328 Feb 13, 2020
The Tor Project
   
Showing rows 1 to 10 of 10 Showing Page 1 of 1  1 


Copyright (c) 2019


Tweets by @GeekOnTheLoose