Processed through Paypal
No account required.


Donate Bitcoin to this wallet:
1KkUMXvQ2ko3xcJkzitB7WYgoW6m79WFfm
Donate Ethereum to this wallet:
0x40E56922F43637224935CDC35e2c96E0392A8505
Donate Litecoin to this wallet:
LLYAFEyqjH69gkyCEpRjXNyedRCWrVChfL

  Our merchandise, sold here, helps keep the site alive.  


Facebook Follow @GeekOnTheLoose




 Home » OlderGeeks.com Freeware Downloads » Searching Files   
Search Results
Files
  File Name Rating Downloads
Last Update/Developer
McAfee Consumer Product Removal tool (MCPR) v10.2.284.0
McAfee Consumer Product Removal tool (MCPR) v10.2.284.0 Running the McAfee Consumer Product Removal tool (MCPR.exe) removes all versions of McAfee consumer products. IMPORTANT: If your McAfee products were preinstalled by the manufacturer of your computer, ensure that you activate your McAfee subscription before uninstalling. Reinstalling from a CD or download only installs your McAfee consumer applications, but might not recover your paid subscription term information. Step 1 - Uninstall your McAfee consumer products using Add/Remove Programs in the Windows Control Panel. Click Start, Settings, Control Panel. Double-click Add or Remove Programs. Select the McAfee SecurityCenter product. Click Remove and follow the steps provided. Windows Vista \ 7 Click Start, Search, type Programs and Features, and click Go. Double-click Programs and Features. Select the McAfee SecurityCenter product. Click Uninstall and follow the steps provided. Step 2 - Download and run MCPR.exe Download the removal tool from Click Save and save the file to a folder on your computer. Navigate to the folder where the file was saved. Make sure all McAfee windows are closed. Double-click MCPR.exe to run the removal tool. Restart your computer after receiving the message CleanUp Successful. Your McAfee product will not be fully removed until the system is restarted. Click here to visit the author's website.
5/5 5,207 Oct 03, 2019
McAfee
McAfee GetSusp v3.0.0.624 32bit
McAfee GetSusp v3.0.0.624 32bit McAfee GetSusp is intended for users who suspect undetected malware on their computer. GetSusp eliminates the need for deep technical knowledge of computer systems to isolate undetected malware. It does this by using a combination of heuristics and querying the McAfee Global Threat Intelligence (GTI) File Reputation database to gather suspicious files. Features Delivered as a single executable file with no installation required. Option to run in different modes – GUI and command line. Leverages GTI File Reputation to determine if the sample is suspicious. Records system and installed McAfee product information date of execution and details of suspected files. GetSusp supports Windows Server 2008 R2 SP1, Windows Server 2012, Windows Server 2016 and Windows 7, 8, 8.1, and 10 (up to RS4). Click here to visit the author's website.
5/5 1,259 Nov 13, 2019
McAfee
EXE McAfee GetSusp v3.0.0.624 64bit
McAfee GetSusp v3.0.0.624 64bit McAfee GetSusp is intended for users who suspect undetected malware on their computer. GetSusp eliminates the need for deep technical knowledge of computer systems to isolate undetected malware. It does this by using a combination of heuristics and querying the McAfee Global Threat Intelligence (GTI) File Reputation database to gather suspicious files. Features Delivered as a single executable file with no installation required. Option to run in different modes – GUI and command line. Leverages GTI File Reputation to determine if the sample is suspicious. Records system and installed McAfee product information date of execution and details of suspected files. GetSusp supports Windows Server 2008 R2 SP1, Windows Server 2012, Windows Server 2016 and Windows 7, 8, 8.1, and 10 (up to RS4). Click here to visit the author's website.
5/5 788 Nov 13, 2019
McAfee
McAfee Rootkit Remover 0.8.9.209
McAfee Rootkit Remover 0.8.9.209 McAfee Rootkit Remover is a stand-alone utility used to detect and remove complex rootkits and associated malware. Currently it can detect and remove ZeroAccess, Necurs and TDSS family of rootkits. McAfee Labs plans to add coverage for more rootkit families in future versions of the tool. How do you use RootkitRemover? Download the latest version of RootkitRemover When prompted, choose to save the file to a convenient location on your hard disk, such as your Desktop folder. When the download is complete, navigate to the folder that contains the downloaded RootkitRemover file, and run it. It is best to run the tool in Administrator mode. The tool then runs a window which shows the status of the process. The various stages are: Initializing Scanning Cleaning When the process is completed, it prompts the user to press any key to exit the tool. It is recommended to reboot the system and perform a full scan with the McAfee VirusScan to remove remnants of the infection that might still be left on the system. Frequently Asked Questions Q: What is the need for the RootkitRemover tool? A: RootkitRemover is not a substitute for a full anti-virus scanner. It is designed to detect and remove specific rootkit infections. Q: How to use the RootkitRemover tool? A: The tool can be run by either double clicking it or through the command-line. It is advisable to run a full system scan using McAfee VirusScan after removing any infection with the tool. Q: How do I save the scan results to a log file? A: The tool is designed to automatically save the report in the same folder as the tool is placed. Q: Why do I need to rescan with McAfee VirusScan? Would I need ...
5/5 2,458 Nov 13, 2019
McAfee Labs
McAfee Stinger 32bit with Real Protect v12.1.0.3360
McAfee Stinger 32bit with Real Protect v12.1.0.3360 McAfee Stinger is a standalone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but a specialized tool to assist administrators and users when dealing with infected system. Details on new or enhanced signatures added with each Stinger build are listed in the Readme details. Stinger now includes Raptor - a real-time behavior detection technology that monitors suspicious activity on an endpoint. Raptor leverages machine learning and automated behavioral based classification in the cloud to detect zero-day malware in real-time. Stinger Release Notes Build Number: 12.1.0.3360 Build Date: 14-Nov-2019 Stinger 32bit MD5: 38f362e176cb170e62d8040ae312c03e SHA1: faedd03da0d2d28ea6c3b4a9a1e3ee145091aefe Stinger-ePO 32bit MD5: 0622f432d1e06a45358c7c7fd5c70076 SHA1: 41706b74202d7fabb3dbc3c774681548d04fc8f5 Stinger 64bit MD5: cbbdaf901f7a6ed04fe493f06e8901e7 SHA1: 5b169ea90fd94125232127ce2f87b3a0a7299a75 Stinger-ePO 64bit MD5: b2bcb9dd337f8b215bc552d150f1a821 SHA1: f7279ced29dfc86175174735266748498ec6a366 Enhanced detections are those that have been ...
5/5 6,087 Nov 14, 2019
McAfee Security Products and Services
McAfee Stinger 64bit with Real Protect v12.1.0.3360
McAfee Stinger 64bit with Real Protect v12.1.0.3360 McAfee Stinger is a standalone utility used to detect and remove specific viruses. It is not a substitute for full anti-virus protection, but a specialized tool to assist administrators and users when dealing with infected system. Details on new or enhanced signatures added with each Stinger build are listed in the Readme details. Stinger now includes Raptor - a real-time behavior detection technology that monitors suspicious activity on an endpoint. Raptor leverages machine learning and automated behavioral based classification in the cloud to detect zero-day malware in real-time. Stinger Release Notes Build Number: 12.1.0.3360 Build Date: 14-Nov-2019 Stinger 32bit MD5: 38f362e176cb170e62d8040ae312c03e SHA1: faedd03da0d2d28ea6c3b4a9a1e3ee145091aefe Stinger-ePO 32bit MD5: 0622f432d1e06a45358c7c7fd5c70076 SHA1: 41706b74202d7fabb3dbc3c774681548d04fc8f5 Stinger 64bit MD5: cbbdaf901f7a6ed04fe493f06e8901e7 SHA1: 5b169ea90fd94125232127ce2f87b3a0a7299a75 Stinger-ePO 64bit MD5: b2bcb9dd337f8b215bc552d150f1a821 SHA1: f7279ced29dfc86175174735266748498ec6a366 Enhanced detections are those that have been ...
5/5 6,098 Nov 14, 2019
McAfee Security Products and Services
   
Showing rows 1 to 6 of 6 Showing Page 1 of 1  1 


Copyright (c) 2019


Tweets by @GeekOnTheLoose