Your download link is at the very bottom of the page... always.



Processed through Paypal
No account required.


Donate Bitcoin to this wallet:
1KkUMXvQ2ko3xcJkzitB7WYgoW6m79WFfm
Donate Ethereum to this wallet:
0x40E56922F43637224935CDC35e2c96E0392A8505
Donate Litecoin to this wallet:
LLYAFEyqjH69gkyCEpRjXNyedRCWrVChfL

Buying our over-priced stuff helps us keep things running. Peruse here.



Join our Facebook groupFollow us on TwitterFollow us on InstagramOur RSS Feed




 Home » OlderGeeks.com Freeware Downloads » Searching Files   
Search Results
Files
  File Name Rating Downloads
Last Update/Developer
Permanent Eraser v2.9.1
Permanent Eraser v2.9.1 When you normally delete files on the Mac, the operating system is only forgetting where those particular files are placed, while the data still physically remains on the drive. Beginning with Mac OS X 10.3, Apple enhanced its security by introducing the Secure Empty Trash feature, which follows the U.S. DoD pattern of overwriting data seven times. This feature was then later removed in OS X 10.11 El Capitan. Permanent Eraser provides additional wiping methods such as the 3-pass DoE or 35-pass Gutmann algorithms. This utility overwrites your data multiple times, scrambles the original file name, and truncates the file size to nothing before Permanent Eraser finally unlinks it from the system. Once your data has been erased, it can no longer be read through traditional means. CD/DVD Erasing Permanent Eraser fills in what the Finder forgot! Simply drag a CD-RW or DVD-RW onto Permanent Eraser to erase the disc's contents. Finder Integration Don't want to take up more space in your already cluttered Dock? Instead, drag Permanent Eraser into your Finder's toolbar or sidebar for easy access to wipe away the files you no longer need. Click the icon to empty your Trash, or drag and drop files to erase them. Better Progress Not only has the progress meter's accuracy greatly increased over earlier versions, but it is also displayed from the Dock's icon. Automator + Services Mac OS 10.4+ users get to make use of the bonus Automator Actions and Finder plug-in built to work with Permanent Eraser. Right-click on items you want to destroy and select Services → Erase, or make use of the Erase Trash, Erase Selected Items, or Erase Free Space Automator Actions. International Permanent Eraser has been translated for English, German, French, Italian, Dutch, Swedish, Traditional Chinese, and Welsh. Changes: Permanent Eraser 2.9.1 (18 July 2020) ...
5/5 437 Aug 05, 2020
Edenwaith
RKill v2.9.1
RKill v2.9.1 RKill is a program that was developed at BleepingComputer.com that attempts to terminate known malware processes so that your normal security software can then run and clean your computer of infections. When RKill runs it will kill malware processes and then import a Registry file that removes incorrect file associations and fixes policies that stop us from using certain tools. When finished it will display a log file that shows the processes that were terminated while the program was running. As RKill only terminates a program's running process, and does not delete any files, after running it you should not reboot your computer as any malware processes that are configured to start automatically will just be started again. Instead, after running RKill you should immediately scan your computer using some sort of anti-malware or anti-virus program so that the infections can be properly removed. Click here to visit the author's website.
5/5 5,802 Jan 19, 2020
Bleeping Computer
Universal Radio Hacker v2.9.1
Universal Radio Hacker v2.9.1 The Universal Radio Hacker (URH) is a complete suite for wireless protocol investigation with native support for many common Software Defined Radios. URH allows easy demodulation of signals combined with an automatic detection of modulation parameters making it a breeze to identify the bits and bytes that fly over the air. As data often gets encoded before transmission, URH offers customizable decodings to crack even sophisticated encodings like CC1101 data whitening. When it comes to protocol reverse-engineering, URH is helpful in two ways. You can either manually assign protocol fields and message types or let URH automatically infer protocol fields with a rule-based intelligence. Finally, URH entails a fuzzing component aimed at stateless protocols and a simulation environment for stateful attacks. Download user guide here. Instructional Video: This download is for the Windows 64bit version. If you need the Windows 32bit version, download here. If you need the MacOS version, download here. If you need the Linux version, download here. Changes: v2.9.1 Dec 30, 2020 0c8f383 use *.wav format for demodulated signal export 8af7da3 change separation colors to green and magenta a3eceba fix disappearing separation area in demod view 6a7048c fix #829 7d2e41b fix overflow in AutoInterpretation for certain signals Click here to visit the author's website.
5/5 434 Feb 11, 2021
Dr. Johannes Pohl
   
Showing rows 1 to 3 of 3 Showing Page 1 of 1  1 


Copyright (c) 2021


Tweets by @GeekOnTheLoose