|
Your download link is at the very bottom of the page... always. |
Processed through Paypal No account required. Donate Bitcoin to this wallet: 1KkUMXvQ2ko3xcJkzitB7WYgoW6m79WFfm Donate Ethereum to this wallet: 0x40E56922F43637224935CDC35e2c96E0392A8505 Donate Litecoin to this wallet: LLYAFEyqjH69gkyCEpRjXNyedRCWrVChfL |
Files | ||||
File Name | Rating | Downloads | ||
Tor Browser v14.0 Tor Browser v14.0 Protect yourself against tracking, surveillance, and censorship. • Browse Privately. • Explore Freely. • Defend yourself against tracking and surveillance. • Circumvent censorship. Tor Team mission: To advance human rights and freedoms by creating and deploying free and open source anonymity and privacy technologies, supporting their unrestricted availability and use, and furthering their scientific and popular understanding. BLOCK TRACKERS Tor Browser isolates each website you visit so third-party trackers and ads can't follow you. Any cookies automatically clear when you're done browsing. So will your browsing history. DEFEND AGAINST SURVEILLANCE Tor Browser prevents someone watching your connection from knowing what websites you visit. All anyone monitoring your browsing habits can see is that you're using Tor. RESIST FINGERPRINTING Tor Browser aims to make all users look the same, making it difficult for you to be fingerprinted based on your browser and device information. MULTI-LAYERED ENCRYPTION Your traffic is relayed and encrypted three times as it passes over the Tor network. The network is comprised of thousands of volunteer-run servers known as Tor relays. BROWSE FREELY With Tor Browser, you are free to access sites your home network may have blocked. Changes: Read the latest release announcements This download is for the Windows 64bit version (very bottom of page). All other download assets are below: Windows: tor-browser-windows-i686-portable-14.0.exe (32bit) MacOS: tor-browser-macos-14.0.dmg Linux: tor-browser-linux-x86_64-14.0.tar.xz tor-browser-linux-i686-14.0.tar.xz Android: tor-browser-android-aarch64-14.0.apk tor-browser-android-armv7-14.0.apk tor-browser-android-x86_64-14.0.apk tor-browser-android-x86-14.0.apk Google Play Store Click here to visit the author's website. |
5,760 | Oct 24, 2024 The Tor Project |
||
USB Raptor v0.18.84 USB Raptor v0.18.84 Turn any USB flash drive to a computer lock and unlock key! USB Raptor can lock the system once a specific USB drive is removed from the computer and unlock when the drive is plugged in again to any USB port. The utility checks constantly the USB drives for the presence of a specific unlock file with encrypted content. If this specific file is found the computer stays unlocked otherwise the computer locks. To release the system lock user must plug the USB with the file in any USB port. Alternative the user can enable (or disable) two additional ways to unlock the system such is network messaging or password. Features • Automated USB lock and unlock function • Lock file contents are encrypted • Password to override lock (can be enabled by user) • Network command to override lock (can enabled by user) • USB drive serial number check (can be enabled by user) • Unique key for each system (can be enabled by user) • Status report function Features Automated Windows lock/unlock with the use of common USB flash drives Compatible with all types of USB flash drives Robust design Easy to setup and use High security option to verify the serial number of the flash drive Various alternative unlock methods Supports LAN lockdown (and unlock) function Synchronized lock and unlock on LAN for multiple PCs Status report over internet and LAN Supports serial command integration (beta stage) Tray icon based application Option to delay and cancel the lock, to avoid unwanted locks Windows 10, Windows 7, Windows 8 and Windows XP compatible Multi screen ... |
6,195 | Sep 13, 2021 Nikos Georgousis |
||
VeraCrypt v1.26.14 VeraCrypt v1.26.14 A free open source disk encryption software for Windows, Mac OSX and Linux. based on TrueCrypt. It adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. It also solves many vulnerabilities and security issues found in TrueCrypt. This enhanced security adds some delay ONLY to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much harder for an attacker to gain access to the encrypted data. VeraCrypt can mount TrueCrypt volumes. It also can convert them to VeraCrypt format. Documentation: https://www.veracrypt.fr/en/Documentation.html FAQ: https://www.veracrypt.fr/en/FAQ.html Features: Available for Linux, MacOSX (10.7+) and Windows. Increased security and many vulnerabilities fixed compared to TrueCrypt Support both UEFI and MBR for Windows system encryption Changes: v1.26.14 (August 25th, 2024): All OSes: Update translations and documentation Implement language selection settings in non-Windows versions. Make codebase compatible with wxWidgets 3.3 in non-Windows versions. Implement detection of volumes affected by XTS master key vulnerability and warn user about it. Update mount failure error messages to mention removal of TrueCrypt support and old algorithms. Windows: Better fix for Secure Desktop issues under Windows 11 22H2 IME is now disabled in Secure Desktop because it is known to cause issues VeraCrypt Expander: Fix expansion of volumes on disks with a sector size different ... |
6,865 | Aug 28, 2024 IDRIX |
||
W10Privacy v5.1.0.1 W10Privacy v5.1.0.1 Free tool to easily find and change privacy settings in Windows 10 and Windows 11. From the author: The by default highly questionable set options concerning privacy and data protection in Windows 10 brought me to the idea to develop this program. Microsoft generously enables everybody to change the concerning settings, but hides them in countless menus, where a normal user does not want to search for! The program should therefore be a help, to display the available settings relatively clearly and to set the desired options if necessary. The primary focus is on settings for Windows 10/11 and its apps (for example the new browser "Edge"). The program will be expanded gradually, if possible and available, with the corresponding Windows 8.1 features in the future. W10Privacy is certainly no programming masterpiece, but it fulfills my intended purpose. The software is still in an early development phase, requests are welcome and may be included in future releases! -Bernd Schuster This program may trigger anti-virus warnings since it changes core Windows settings.. These are false warnings. This program contains no viruses or malware. Read author's statement here. Changes: v5.1.0.1 (04.06.2024) - Added the option to disable the snapshot feature (Recall) in Windows 11 Instructions: https://www.w10privacy.de/english-home/instructions-1/ All Screenshots (download is at the bottom... we promise): Click here to visit the author's website. |
6,609 | Aug 01, 2024 Bernd Schuster |
||
WebCam On-Off v1.4 WebCam On-Off v1.4 Webcams allow us to stay in touch with family and friends, or perhaps record and stream video from your computer to the internet or to a file. When not in use , you may wish to disable your webcam to ensure it is not making unwanted recordings. Malware can take over webcams, so there is potential for spying. Hackers can utilize trojan-horse attacks, enabling them to take control of your webcam, allowing them to record you or take pictures of you without your knowledge. If you’re a parent, you may also wish to disable your webcam for safety reasons. Instant messengers and websites that utilize video aren’t always safe for children, thus disabling your webcam may be the best course of action. If the camera is external, you could always unplug it and hide it, but this can become tiresome if you are frequently in need of it. And what if, as on most laptops, you have a built in camera? The Washington Post highlighted an unnerving study published at Johns Hopkins University which found that a laptop webcam can function in relative secrecy – a slightly more subtle Eye of Sauron, if you will. Webcam spying, particularly the variant that involves disabling LED indicator lights, takes quite a bit of effort, but the practice isn’t limited to the realm of academics. The FBI has publicly acknowledged its ability to employ such techniques when investigating criminal activity. As you can see, disabling your webcam completely is the safest way to protect your privacy. Because of this, we have created “Webcam On-Off” which is both portable and freeware. With it you can easily disable or enable your webcam. Don’t let your home become someone else’s reality TV! What is new on version 1.4 (Friday 4 December 2020) 1.[Fixed] – WebCam On-Off Doesn’t Work on ... |
6,420 | Dec 07, 2020 Sordum.org |
||
Who Stalks My Cam V2.0 Who Stalks My Cam V2.0 It Is No Secret; You Are At The Mercy Of Hackers! Who does not fear about the possibility of being spied upon your Webcam without your knowledge? Have you thought of this frightening threat to your online security? Well, it is no longer a fear but a reality. It is no longer an imagination, or something you can assume. It is happening, and the most worrying thing is that it is very prevalent. Nowadays, hackers have managed to achieve great success in spying on innocent internet users by use different kinds of Malware.One of such malware is the infamous DarkComet RAT. DarkComet RAT is a Remote Access Trojan targeting Microsoft Windows Machines world wide. This dangerous malware opens huge remote possibilities to Hackers, such as Keystroke logging, Listening on your conversations on the Microphone, Recovering passwords, Watching your desktop using your webcam etc. A very huge amount of such Malware exists and represents millions of computers infected world wide. Other techniques exists to spy on you through the webcam, using malicious Website scripts, for example, using your Webcam device, tricking on you to allow Webcam to be broadcasted. At Phrozen Software™, we are aware of your concern about this cyber threat. Definitely, no one wants to be spied upon; No one wants to feel insecure while doing their online activities, and you are no exception. As you may already be aware, at Phrozen Software™ we design different security programs to provide you with the ultimate solution to the problem. Our software are designed differently, not like the regular Antivirus programs. We do not claim to replace an existing antivirus program; All we do is enhance them using generic techniques to avoid yet to be known viruses from impacting on your security until your antivirus is able to get ... |
6,094 | Mar 07, 2017 PHROZEN SAS |
||
WindowsSpyBlocker v4.38.0 WindowsSpyBlocker v4.38.0 An application written in Go and delivered as a single executable to block spying and tracking on Windows systems ⛔️. The approach of this project is to capture and interpret network traffic 🚦 based on a set of tools. Depending on the interactions ⛓ between services and source or destination of traffic, rules are created and sorted by assignment. Configuration file app.conf is generated at first launch : Telemetry and data collection To capture and interpret network traffic, QEMU virtual machines are used on the server virtualization management platform Proxmox VE based on : Windows 10 Pro 64bits with automatic updates enabled. Windows 8.1 Pro 64bits with automatic updates enabled. Windows 7 SP1 Pro 64bits with automatic updates enabled. Traffic dumps are cleaned monthly and compared with the current rules to add or remove some hosts or firewall rules. Tools used to capture traffic : qemu -net dump : capture Wireshark : capture + logs Sysmon : capture + logs Proxifier : logs The data folder contains the blocking rules based on domains or IPs detected during the capture process : data/<type>/extra.txt : Block third party applications (Skype, Bing, Live, Outlook, NCSI, etc.) data/<type>/spy.txt : Block Windows Spy / Telemetry recommended data/<type>/update.txt : Block Windows Update data/hosts/[extra|spy|update]_v6.txt : Handle IPv6 blocking for hosts Firewall and Hosts data are the main types. The others are generated from these as : DNSCrypt : a protocol for securing communications between a client and a DNS resolver. OpenWrt : an open source project used on embedded devices to route network traffic. P2P : a plaintext IP data format ... |
4,346 | Sep 28, 2021 CrazyMax |
||
WinGuard Pro 2014 8.9.2.3 WinGuard Pro 2014 8.9.2.3 Secure your computer by password protecting your Windows applications, programs and EXE files. Plus, protect your data with encryption for your files, folders and drives - directly from Windows Explorer. Extra features allow you to disable the Task Keys, Software Installation, Internet Explorer, Mozilla FireFox, Downloading Files, Zip and Self Extracting Files and more. Features: Lock Programs, Applications, EXE Files with a Password Lock any folder with a password Disable Windows at Boot Disable Software Installation and Downloads Password Protect Windows Explorer Password Protect your Web Browser, inc. Internet Explorer, FireFox, Opera and more Parental Time Control It's FREE, no advertising or spyware Works alongside your firewall and anti-virus program Advanced edition also includes: Add your own program for protection Disable Canceling of Password Prompt Configure Multiple User Accounts Password Windows at Boot Password Internet Explorer Disable Software Installation Use Software in Commercial Enviroment |
8,907 | Nov 02, 2013 WGSoft |
||
Wipe v2020.15 Wipe v2020.15 This powerful program can remove a lot of gigabytes of garbage on your computer and recover many free disk space. In addition, it will protect your privacy on the Internet - it removes records about personal activity on PC. You will be able to delete browser history and cache, index.dat files, registry, internet cookies files, autocomplete-history, temporary internet files and many many other items. This program also erases any other tracks of personal activity which you made when used your PC, and no matter in which program: Windows, Internet Explorer, FireFox, Chrome, Opera or any other... To prevent recovery of deleted data the program uses the following security methods: DoD 5220.22-M method, Gutmann method ( full 35 steps ), Russian GOST and other. You can also customize cleaning process and choose which items to remove and which is not. Or you can view detailed information about areas where garbage located on your computer. Requirement Windows XP, Vista, 7, 8, 10 .NET framework 3.5 09 August 2020 • Wipe 2020.15 In this release we are improving main function of the software (cleaning of garbage) by adding even more supported apps. We are also improved english interface of the program. Check out full list of improvements below. NEW FEATURES AND IMPROVEMENTS - Added support for cleaning temporary files, cache, logs and other garbage for the following apps: Mozilla Thunderbird, Sharing MFU of Windows Explorer, Smart Screen Reputation, Store Purchase, Snip and Sketch, The Bat, Get Started Tips, uTorrent, Voice Recorder. - Improved cleaning of Twitter App. - Improved english translations. Click here to visit the author's website. |
9,069 | Aug 10, 2020 Yuri Saprykin |
||
WipeFile v3.6 WipeFile v3.6 WipeFile deletes files and folders secure and fast. To do this, WipeFile overwrites the information completely, so there is no way to restore the files or reconstruct the file content. WipeFile supports 14 different wipe methods, e.g. two US Navy standards, the standard of the US Department of Defense, US Air Force and the NATO. System Requirements: WinXP / Vista / Win7 / Win8 / Win10 Microsoft .NET Framework 4 Languages: English, German, Arabic, Chinese (simplified), French, Hungarian, Italian, Japanese, Korean, Polish, Portuguese, Russian, Spanish Use 7-Zip 32bit or 7-Zip 64bit to unzip this file. Click here to visit the author's website. |
4,658 | May 28, 2021 Gaijin.at |
||
WireGuard v0.1.1 WireGuard v0.1.1 WireGuard® is an extremely simple yet fast and modern VPN that utilizes state-of-the-art cryptography. It aims to be faster, simpler, leaner, and more useful than IPsec, while avoiding the massive headache. It intends to be considerably more performant than OpenVPN. WireGuard is designed as a general purpose VPN for running on embedded interfaces and super computers alike, fit for many different circumstances. Initially released for the Linux kernel, it is now cross-platform (Windows, macOS, BSD, iOS, Android) and widely deployable. It is currently under heavy development, but already it might be regarded as the most secure, easiest to use, and simplest VPN solution in the industry. Simple & Easy-to-use WireGuard aims to be as easy to configure and deploy as SSH. A VPN connection is made simply by exchanging very simple public keys – exactly like exchanging SSH keys – and all the rest is transparently handled by WireGuard. It is even capable of roaming between IP addresses, just like Mosh. There is no need to manage connections, be concerned about state, manage daemons, or worry about what's under the hood. WireGuard presents an extremely basic yet powerful interface. Cryptographically Sound WireGuard uses state-of-the-art cryptography, like the Noise protocol framework, Curve25519, ChaCha20, Poly1305, BLAKE2, SipHash24, HKDF, and secure trusted constructions. It makes conservative and reasonable choices and has been reviewed by cryptographers. Minimal Attack Surface WireGuard has been designed with ease-of-implementation and simplicity in mind. It is meant to be easily implemented in very few lines of code, and easily auditable for security vulnerabilities. Compared to behemoths like *Swan/IPsec or OpenVPN/OpenSSL, in which auditing the gigantic codebases is an overwhelming task even for large teams of security experts, WireGuard is meant to be comprehensively reviewable by single individuals. High Performance A combination of extremely high-speed cryptographic primitives and the fact that WireGuard lives ... |
3,371 | Aug 01, 2020 Jason A. Donenfeld |
||
WPD v1.5.2042 WPD v1.5.2042 Privacy dashboard for Windows A small but powerful portable tool that works through the Windows API. WPD is the most convenient way to configure various privacy settings in Windows. Features Privacy management Customize Group Policy, Services, Tasks and other settings responsible for data collection and transmission. IP Blocker Block telemetry IP's using rules from the @crazy-max repository. Appx uninstaller Easy remove pre-installed Microsoft Store garbage or any other app. Portable, freeware No ads, command line arguments support. Requirements Windows 7, 8-8.1, 10, 11 .NET Framework 4.5+ Documentation https://wpd.app/docs/ Changes: 1.5.2042 RC 1 Added Support for Windows 11. New privacy settings. New settings for blocking Windows updates. Dark theme. Updated The user interface has been significantly updated. Build-in blocking rules. Localization. Changed The localization file now has a .json extension. Fixed Possible fix for "helper" crash. Known issues Localization: some new strings are not translated Click here to visit the author's website. |
5,022 | Jan 04, 2024 WPD Team |
||
Zer0 v0.24.0.27 Zer0 v0.24.0.27 Secured file deletion made easy. Zer0 is a user friendly file deletion tool with a high level of security. With Zer0, you'll be able to delete files and to prevent file recovery by a 3rd person. So far, no user reported an efficient method to recover a file deleted by Zer0. Features User friendly HMI : Drag'n'drop, 1 click and the job is done ! High security file deletion algorithm Multithreaded application core : Maximum efficiency without freezing the application. Internationalization support. Click here to visit the author's website. |
3,181 | Sep 10, 2021 KC Softwares |
||
zhcrypt v2.0 zhcrypt v2.0 Tiny GUI front end to hcrypt.exe, a command line file encryption tool. Zhcrypt is simply a tiny front end to hcrypt.exe, one of the utilities found within the Hcrypto suite found on Sourceforge. Hcrypt.exe is a Windows command line utility that will encrypt and decrypt files offering a variety of common and uncommon algorithms, including AES-128, AES-192, AES-256, Blowfish, CAST-128, CAST-256, DES, TripleDES, DESX, GOST, DEA, KASUMI, MARS, MISTY1, Noekeon, RC2, RC5, RC6, SAFER-SK, SEED, Serpent, Skipjack, Square, TEA, Twofish, and XTEA. Features encrypt / decrypt AES-128, AES-192, AES-256, Blowfish, CAST-128, CAST-256, DES, TripleDES, DESX, GOST, DEA, KASUMI, MARS, MISTY1, Noekeon, RC2, RC5, RC6, SAFER-SK, SEED, Serpent, Skipjack, Square, TEA, Twofish, and XTEA Super easy to use Click here to visit the author's website. |
1,759 | Sep 16, 2022 Dana Booth |
||
ZHider v2.00 ZHider v2.00 A free, portable program to instantly hide windows (programs) with a quick keystroke. Windows are hidden completely from view and from the task bar without a trace. Hidden windows can easily be brought back into view with another quick keystroke that toggles their visibility from hidden to visible. Handy for a wide range of practical uses including removing annoying, clutter windows (too many instant messages?), holding secret messages for yourself that you don't want to save or close, protecting privacy if someone wanders by, and yes -- even hiding windows from employers. Features: • Global hotkeys arranged for discreet use and with keystroke combinations that allow you use from virtually any keyboard (101-keys, remote connections, etc.). • Instant hide-and-add feature allows you to hide a window instantly and keep it in a list of windows to toggle hide/unhide (with another hotkey). • Launches and operates silently and with great stealth: no windows, sounds, or even system tray icon is visible. • List mode displays a fully-detailed list of all windows added to the list and a feature-rich interface for hiding, unhiding, and removing windows. You can even view the class name and window ID of each window! • No bulky install / uninstall software package. You can grab-and-go, launch from a disk, etc. without ever modifying the Windows system registry, installing files to system directories, or risking detection by modifying the existing file system. • The program file can be renamed for complete discretion. • Tiny size makes the program fast to load and easy to hide. • Includes optional Task Manager stealth, masking not only itself but any hidden applications from detection • Allows command-line instructions for launching processes silently with full support for UNC-coded network paths and environment variable expansion Included Files: • Filename: ZHIDER.EXE Primary program file. Launch from anywhere. You ... |
1,252 | May 22, 2023 Peter Souza IV |
OlderGeeks.com Copyright (c) 2024