Processed through Paypal
No account required.


Donate Bitcoin to this wallet:
1KkUMXvQ2ko3xcJkzitB7WYgoW6m79WFfm
Donate Ethereum to this wallet:
0x40E56922F43637224935CDC35e2c96E0392A8505
Donate Litecoin to this wallet:
LLYAFEyqjH69gkyCEpRjXNyedRCWrVChfL
Facebook Follow @GeekOnTheLoose


CLICK HERE TO SEARCH

 Home » OlderGeeks.com Freeware Downloads » Searching Files   
Search Results
Files
  File Name Rating Downloads
Last Update/Developer
LAME 3.100.alpha2
LAME 3.100.alpha2 Bundle compiled with Intel Compiler 12.1. Please note, ALPHA builds should NOT be used for archival, they are for testing only. lame.exe - the command line encoder, used from the Windows command shell lame_enc.dll - LAME encoding library, generally used with CD rippers, etc
0/5 4,144 Dec 09, 2012
LAME
LAME 3.100.alpha2 64bit
LAME 3.100.alpha2 64bit Bundle compiled with Intel Compiler 12.1. Please note, ALPHA builds should NOT be used for archival, they are for testing only. lame.exe - the command line encoder, used from the Windows command shell lame_enc.dll - LAME encoding library, generally used with CD rippers, etc
0/5 4,153 Dec 09, 2012
LAME
LAME 3.99.5
LAME 3.99.5 Bundle compiled with Intel Compiler 12.1. lame.exe - the command line encoder, used from the Windows command shell lame_enc.dll - LAME encoding library, generally used with CD rippers, etc
0/5 4,155 Dec 09, 2012
LAME
LAME 3.99.5 64bit
LAME 3.99.5 64bit Bundle compiled with Intel Compiler 12.1. (For 64bit Windows only.) lame.exe - the command line encoder, used from the Windows command shell lame_enc.dll - LAME encoding library, generally used with CD rippers, etc
0/5 4,159 Dec 09, 2012
LAME
LAME 3.99.5 for older Win32 OSs
LAME 3.99.5 for older Win32 OSs Bundle compiled with VC6/Intel Compiler 9.1. lame.exe - the command line encoder, used from the Windows command shell lame_enc.dll - LAME encoding library, generally used with CD rippers, etc
0/5 4,136 Dec 09, 2012
LAME
Tor Browser Bundle 8.0 for Linux, BSD, and Unix 32bit
Tor Browser Bundle 8.0 for Linux, BSD, and Unix 32bit What is the Tor Browser? The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained. Want Tor to really work? You need to change some of your habits, as some things won't work exactly as you are used to. Use Tor Browser Tor does not protect all of your computer's Internet traffic when you run it. Tor only protects your applications that are properly configured to send their Internet traffic through Tor. To avoid problems with Tor configuration, we strongly recommend you use the Tor Browser. It is pre-configured to protect your privacy and anonymity on the web as long as you're browsing with Tor Browser itself. Almost any other web browser configuration is likely to be unsafe to use with Tor. Don't torrent over Tor Torrent file-sharing applications have been observed to ignore proxy settings and make direct connections even when they are told to use Tor. Even if your torrent application connects only through Tor, you will often send out your real IP address in the tracker GET request, because that's how torrents work. Not only do you deanonymize your torrent traffic and your other simultaneous Tor web traffic this way, you also slow ...
5/5 1,825 Sep 06, 2018
The Tor Project
Tor Browser Bundle 8.0 for Linux, BSD, and Unix 64bit
Tor Browser Bundle 8.0 for Linux, BSD, and Unix 64bit What is the Tor Browser? The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained. Want Tor to really work? You need to change some of your habits, as some things won't work exactly as you are used to. Use Tor Browser Tor does not protect all of your computer's Internet traffic when you run it. Tor only protects your applications that are properly configured to send their Internet traffic through Tor. To avoid problems with Tor configuration, we strongly recommend you use the Tor Browser. It is pre-configured to protect your privacy and anonymity on the web as long as you're browsing with Tor Browser itself. Almost any other web browser configuration is likely to be unsafe to use with Tor. Don't torrent over Tor Torrent file-sharing applications have been observed to ignore proxy settings and make direct connections even when they are told to use Tor. Even if your torrent application connects only through Tor, you will often send out your real IP address in the tracker GET request, because that's how torrents work. Not only do you deanonymize your torrent traffic and your other simultaneous Tor web traffic this way, you also slow ...
5/5 1,838 Sep 06, 2018
The Tor Project
Tor Browser Bundle 8.0 for Mac OS X
Tor Browser Bundle 8.0 for Mac OS X What is the Tor Browser? The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained. Want Tor to really work? You need to change some of your habits, as some things won't work exactly as you are used to. Use Tor Browser Tor does not protect all of your computer's Internet traffic when you run it. Tor only protects your applications that are properly configured to send their Internet traffic through Tor. To avoid problems with Tor configuration, we strongly recommend you use the Tor Browser. It is pre-configured to protect your privacy and anonymity on the web as long as you're browsing with Tor Browser itself. Almost any other web browser configuration is likely to be unsafe to use with Tor. Don't torrent over Tor Torrent file-sharing applications have been observed to ignore proxy settings and make direct connections even when they are told to use Tor. Even if your torrent application connects only through Tor, you will often send out your real IP address in the tracker GET request, because that's how torrents work. Not only do you deanonymize your torrent traffic and your other simultaneous Tor web traffic this way, you also slow down the ...
5/5 2,007 Sep 06, 2018
The Tor Project
Tor Browser Bundle 8.0 for Windows 32bit
Tor Browser Bundle 8.0 for Windows 32bit What is the Tor Browser? The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained. Want Tor to really work? You need to change some of your habits, as some things won't work exactly as you are used to. Use Tor Browser Tor does not protect all of your computer's Internet traffic when you run it. Tor only protects your applications that are properly configured to send their Internet traffic through Tor. To avoid problems with Tor configuration, we strongly recommend you use the Tor Browser. It is pre-configured to protect your privacy and anonymity on the web as long as you're browsing with Tor Browser itself. Almost any other web browser configuration is likely to be unsafe to use with Tor. Don't torrent over Tor Torrent file-sharing applications have been observed to ignore proxy settings and make direct connections even when they are told to use Tor. Even if your torrent application connects only through Tor, you will often send out your real IP address in the tracker GET request, because that's how torrents work. Not only do you deanonymize your torrent traffic and your other simultaneous Tor web traffic this way, you also slow down the entire ...
5/5 4,097 Sep 06, 2018
The Tor Project
Tor Browser Bundle 8.0 for Windows 64bit
Tor Browser Bundle 8.0 for Windows 64bit What is the Tor Browser? The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained. Want Tor to really work? You need to change some of your habits, as some things won't work exactly as you are used to. Use Tor Browser Tor does not protect all of your computer's Internet traffic when you run it. Tor only protects your applications that are properly configured to send their Internet traffic through Tor. To avoid problems with Tor configuration, we strongly recommend you use the Tor Browser. It is pre-configured to protect your privacy and anonymity on the web as long as you're browsing with Tor Browser itself. Almost any other web browser configuration is likely to be unsafe to use with Tor. Don't torrent over Tor Torrent file-sharing applications have been observed to ignore proxy settings and make direct connections even when they are told to use Tor. Even if your torrent application connects only through Tor, you will often send out your real IP address in the tracker GET request, because that's how torrents work. Not only do you deanonymize your torrent traffic and your other simultaneous Tor web traffic this way, you also slow down the entire ...
5/5 101 Sep 06, 2018
The Tor Project
   
Showing rows 1 to 10 of 10 Showing Page 1 of 1  1 


PHCDownload 1.1.2 - Copyright (c) 2005 - 2018 - 0.0303 seconds


Tweets by @GeekOnTheLoose