Processed through Paypal
No account required.


Donate Bitcoin to this wallet:
1KkUMXvQ2ko3xcJkzitB7WYgoW6m79WFfm
Donate Ethereum to this wallet:
0x40E56922F43637224935CDC35e2c96E0392A8505
Donate Litecoin to this wallet:
LLYAFEyqjH69gkyCEpRjXNyedRCWrVChfL

  Our merchandise, sold here, helps keep the site alive.  


Facebook Follow @GeekOnTheLoose




 Home » OlderGeeks.com Freeware Downloads » Searching Files   
Search Results
Files
  File Name Rating Downloads
Last Update/Developer
BinText v3.3
BinText v3.3 Finds Ascii, Unicode and Resource strings in a file. A small, very fast and powerful text extractor that will be of particular interest to programmers. It can extract text from any kind of file and includes the ability to find plain ASCII text, Unicode (double byte ANSI) text and Resource strings, providing useful information for each item in the optional "advanced" view mode. Its comprehensive filtering helps prevent unwanted text being listed. The gathered list can be searched and saved to a separate file as either a plain text file or in informative tabular format. Click here to visit the author's website.
5/5 1,242 Oct 23, 2019
packetstormsecurity.com
Repair Tasks v3.3
Repair Tasks v3.3 This project is a utility that makes repairs to the Windows Task schedule. In particular, it fixes problems where opening the Task Scheduler, or trying to configure Windows Backup, results in the message "The task image is corrupt or has been tampered with" (0x80041321). Searching the web reveals that this message has been seen from time to time, and the (rather laborious) set of steps that can be taken to correct it are fairly well-documented. However, it turns out that reverting to Windows 7 from Windows 10 generates this problem in spades. It can leave more than 40 scheduled tasks in a corrupt state. This is because many task registry keys and the task definitions to which they refer are updated by a Windows 10 upgrade, but only the registry keys are restored on reversion, so Task Scheduler finds that, for these tasks, the task registry keys and task definitions are now inconsistent. The general recommendation in response to this reversion problem seems to be to restore the system from backups. However, I'm never sure about overwriting chunks of my system from backups, and would rather go forwards. So, since the fix is well-known, and the main problem is just repeated execution, I decided to write a utility to automate the set of steps required. And now, I'm sharing my work in case it is of use to fellow sufferers, pending Microsoft getting their act together and fixing reversion. Open source is particularly appropriate for this type of project, as the code necessarily delves into system settings, making complete transparency as to what it does crucial. You are encouraged to download the source, which is actually not huge, and understand what it does. However, I also provide a download of the executable, and a description of how to use the program on ...
5/5 2,153 Jun 20, 2016
Dijji
Spybot Identity Monitor v3.3
Spybot Identity Monitor v3.3 Youíve got the right to know! Youíve probably registered on dozens of websites (or more) over the years, giving them your email address, personal data like birth dates and street addresses, and passwords. Spybot Identity Monitor gives you a tool that allows you to check if your information already is in the hand of hackers. Itís your data Ė your deserve to know! What to do ifÖ? If Spybot Identity Monitortells you that a service has leaked your data, you should: Change your password at that service at once. Change your password on all other services where you might have used the same password. Start using a password manager to make sure all those passwords are stored safely. Start using Two Factor Authentication where possible. Spybot Identity Monitor Main View Once started, the program immediately shows an overview of known sources and breaches for the accounts set up. Spybot Identity Monitor Account Details By viewing account details you can get an overview where the account - in this example it's a dummy email address example@example.com - was leaked. Spybot Identity Monitor Breach Details You can view all details of a breach of your data. In this example you'll see that for example@example.com, even phone numbers and employers were leaked. Supports: Windows 7 to 10 Changes: Version 3.3 April 14th, 2019 Our new version now runs on Linux and Mac as well and brings a few more improvements: Pastes from HIBP will be shown as well. Now supports proxies for network communication. Reduced traffic - accounts will only be re-checked online if more breach data is known than the last time. Remember state - you can now "acknowledge" breaches and Identity Monitor will then distinguish between old and new breaches ...
5/5 933 Nov 13, 2019
Safer-Networking Ltd.
WipeFile v3.3
WipeFile v3.3 WipeFile deletes files and folders secure and fast. To do this, WipeFile overwrites the information completely, so there is no way to restore the files or reconstruct the file content. WipeFile supports 14 different wipe methods, e.g. two US Navy standards, the standard of the US Department of Defense, US Air Force and the NATO. System Requirements: WinXP / Vista / Win7 / Win8 / Win10 Microsoft .NET Framework 4 Languages: German, English, Japanese, Russian Click here to visit the author's website.
5/5 512 Nov 25, 2019
Gaijin.at
   
Showing rows 1 to 4 of 4 Showing Page 1 of 1  1 


Copyright (c) 2019


Tweets by @GeekOnTheLoose