download windows 10 page free bleepingcomputer Bleeping Computer. Bleeping Computer is a website covering technology news and offering free computer help via its forums, that was created by Lawrence Abrams in 2004. [2] It publishes news focusing heavily on cybersecurity, but also covers other topics including computer software, computer hardware, operating system and general technology. Contents. History Content Legal issues See also References External links. In 2018, Bleeping Computer was added as an associate partner to the Europol NoMoreRansom project [3] for the information and decryption tools provided by the site. History. BleepingComputer was founded in 2004 after Abrams could not find existing technical support sites that could offer easy-to-understand instructions for his friends and family. [2] The domain name bleepingcomputer.com originates from the sounds made by a broken computer and because you want to curse at a computer when it does not work properly. [2] Since the CryptoLocker ransomware attack in September 2013, and a subsequent DDoS of the site due to its reporting on the new , [4] Bleeping Computer has been reporting on new ransomware families as they are released. [5] Content. The articles published at Bleeping Computer are categorized as news articles, tutorials and virus removal guides. Its content includes searchable databases for looking up Windows start-up programs and uninstall entries, as well as a free Internet forum to receive computer help. The site covers news released by researchers and companies, but also performs in-house investigative reporting [6] and analysis of ransomware [7] and malware. [8] Free decryptors to unlock files encrypted by various ransomware families have been released through the forums or the site's news section by third-party researchers. [9] Government agencies have included Bleeping Computer cybersecurity articles and analysis in numerous advisories. [10] [11] Bleeping Computer's reporting has been cited by major media that cover technology and IT security news. [12] The site offers a malware removal training program [13] through its forums that teaches volunteers how to remove Windows infections using various tools, including Combofix, HijackThis, DDS, [14] OTL, GMER, Malwarebytes' Anti-Malware and Rkill, [15] developed by Abrams. In October 2020, there were over 840,000 registered members on the site. Legal issues. In early February 2016, Enigma Software, the developers of the anti-malware suite SpyHunter , filed a lawsuit [16] against Bleeping Computer in response to a negative review of SpyHunter , alleging a campaign to damage the reputation of their company and product. [17] Bleeping Computer requested financial aid from its readers to help pay legal fees arising from the lawsuit. [18] At the beginning of August 2016, Bleeping Computer filed [19] its own lawsuit against Enigma Software for an alleged long-running smear campaign against Bleeping Computer . [19] The lawsuit against BleepingComputer ended in settlement, with BleepingComputer removing Quietman7's posts on Enigma Software's product. [20] See also. Related Research Articles. Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network. A wide variety of malware types exist, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper and scareware. This timeline of computer viruses and worms presents a chronological timeline of noteworthy computer viruses, computer worms, Trojan horses, similar malware, related research and events. Ransomware is a type of malware from that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid. While some simple ransomware may lock the system so that it is not difficult for a knowledgeable person to reverse, more advanced malware uses a technique called cryptoviral extortion. It encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them. In a properly implemented cryptoviral extortion attack, recovering the files without the decryption key is an intractable problem – and difficult to trace digital currencies such as paysafecard or Bitcoin and other cryptocurrencies are used for the ransoms, making tracing and prosecuting the perpetrators difficult. WinFixer was a family of scareware rogue security programs developed by Winsoftware which claimed to repair computer system problems on Microsoft Windows computers if a user purchased the full version of the software. The software was mainly installed without the user's consent. McAfee claimed that "the primary function of the free version appears to be to alarm the user into paying for registration, at least partially based on false or erroneous detections." The program prompted the user to purchase a paid copy of the program. Cryptovirology is a field that studies how to use cryptography to design powerful malicious software. The field was born with the observation that public-key cryptography can be used to break the symmetry between what an antivirus analyst sees regarding malware and what the attacker sees. The antivirus analyst sees a public key contained in the malware, whereas the attacker sees the public key contained in the malware as well as the corresponding private key since the attacker created the key pair for the attack. The public key allows the malware to perform trapdoor one-way operations on the victim's computer that only the attacker can undo. Malwarebytes Inc. is an American Internet security company that specializes in protecting home computers, smartphones, and companies from malware and other threats, it has offices in Santa Clara, California; Clearwater, Florida; Tallinn, Estonia and Cork, Ireland. Zeus , ZeuS , or Zbot is a malware package that runs on versions of Microsoft Windows. While it can be used to carry out many malicious and criminal tasks, it is often used to steal banking information by man-in-the-browser and form grabbing. It is also used to install the CryptoLocker ransomware. Zeus is spread mainly through drive-by downloads and phishing schemes. First identified in July 2007 when it was used to steal information from the United States Department of Transportation, it became more widespread in March 2009. In June 2009 security company Prevx discovered that Zeus had compromised over 74,000 FTP accounts on websites of such companies as the Bank of America, NASA, Monster.com, ABC, Oracle, Play.com, Cisco, Amazon, and BusinessWeek . Similarly to Koobface, Zeus has also been used to trick victims of technical support scams into giving the scam artists money through pop-up messages that claim the user has a virus, when in reality they might have no viruses at all. The scammers may use programs such as Command prompt or Event viewer to make the user believe that their computer is infected. The CryptoLocker ransomware attack was a cyberattack using the CryptoLocker ransomware that occurred from 5 September 2013 to late May 2014. The attack utilized a trojan that targeted computers running Microsoft Windows, and was believed to have first been posted to the Internet on 5 September 2013. It propagated via infected email attachments, and via an existing Gameover ZeuS . When activated, the malware encrypted certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware's control servers. The malware then displayed a message which offered to decrypt the data if a payment was made by a stated deadline, and it threatened to delete the private key if the deadline passes. If the deadline was not met, the malware offered to decrypt data via an online service provided by the malware's operators, for a significantly higher price in bitcoin. There was no guarantee that payment would release the encrypted content. TeslaCrypt was a ransomware trojan. It is now defunct, and its master key was released by the developers. Locky is ransomware malware released in 2016. It is delivered by email with an attached Microsoft Word document that contains malicious macros. When the user opens the document, it appears to be full of gibberish, and includes the phrase "Enable macro if data encoding is incorrect," a social engineering technique. If the user does enable macros, they save and run a binary file that downloads the actual encryption Trojan, which will encrypt all files that match particular extensions. Filenames are converted to a unique 16 letter and number combination. Initially, only the .locky file extension was used for these encrypted files. Subsequently, other file extensions have been used, including .zepto, .odin, .aesir, .thor, and .zzzzz. After encryption, a message instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information. The Web site contain instructions that demand a payment of between 0.5 and 1 bitcoin. Since the criminals possess the private key and the remote servers are controlled by them, the victims are motivated to pay to decrypt their files. SpyHunter is an anti-spyware computer program for the Microsoft Windows operating system. It is designed to remove malware, such as trojan horses, computer worms, , and other malicious software. The WannaCry ransomware attack was a worldwide cyberattack in May 2017 by the WannaCry ransomware cryptoworm, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin cryptocurrency. It propagated through EternalBlue, an exploit developed by the United States (NSA) for older Windows systems. EternalBlue was stolen and leaked by a group called at least a year prior to the attack. While Microsoft had released patches previously to close the exploit, much of WannaCry's spread was from organizations that had not applied these, or were using older Windows systems that were past their end-of-life. These patches are imperative to an organization's cyber-security but many were not applied because of needing 24/7 operation, risking having applications that used to work break, inconvenience, or other reasons. Marcus Hutchins , also known online as MalwareTech , is a British researcher known for temporarily stopping the WannaCry ransomware attack. He is employed by cybersecurity firm Kryptos Logic. Hutchins is from Ilfracombe in Devon. (Balogh) is a family of encrypting malware that was first discovered in 2016. The malware targets Microsoft Windows–based systems, infecting the master boot record to execute a payload that encrypts a hard drive's file system table and prevents Windows from booting. It subsequently demands that the user make a payment in Bitcoin in order to regain access to the system. The Petya malware had infected millions of people during its first year of its release. The maker of the Petya malware was arrested and fined. is a form of encrypting ransomware malware created in 2016. It was initially titled "BitcoinBlackmailer" but later came to be known as Jigsaw due to featuring an image of Billy the Puppet from the Saw film franchise. The malware encrypts computer files and gradually deletes them unless a ransom is paid to decrypt the files. Kirk Ransomware , or Kirk , is malware. It encrypts files on an infected computer and demands payment for decryption in the cryptocurrency . The ransomware was first discovered in 2017, by Avast researcher Jakub Kroustek. Trickbot is computer malware, a trojan for the Microsoft Windows and other operating systems. Its major function was originally the theft of banking details and other credentials, but its operators have extended its capabilities to create a complete modular malware ecosystem. Ryuk is a type of ransomware known for targeting large, public-entity Microsoft Windows cybersystems. It typically encrypts data on an infected system, rendering the data inaccessible until a ransom is paid in untraceable bitcoin. Ryuk is believed to be used by two or more criminal groups, most likely Russian, who target organizations rather than individual consumers. A global wave of cyberattacks and data breaches began in January 2021 after four zero-day exploits were discovered in on-premises Microsoft Exchange Servers, giving attackers full access to user emails and passwords on affected servers, administrator privileges on the server, and access to connected devices on the same network. Attackers typically install a backdoor that allows the attacker full access to impacted servers even if the server is later updated to no longer be vulnerable to the original exploits. As of 9 March 2021, it was estimated that 250,000 servers fell victim to the attacks, including servers belonging to around 30,000 organisations in the United States, 7,000 servers in the United Kingdom, as well as the European Banking Authority, the Norwegian Parliament, and Chile's Commission for the Financial Market (CMF). My Bleeping Computer Software. I access my home computer from work and other places, one of the main problems Ive ran into are that some cd /dvd burners, will eject the disk when its done burning but it wont take the disk back in without rebooting the computer . Closer allows you. . File Name: Closer Author: Mark Seifert Company License: Freeware (Free) File Size: 1.41 Mb Runs on: Windows XP, 98, Me. This little app will let you launch World of Warcraft the simple way. It includes an option to quit the Finder and change the gameplay quality. This app may not run on intel macs. When I get my new computer , I will be making a universal binary (if i. . File Name: World of Warcraft Launcher 1_2_1.zip Author: worldofwarcraft License: Freeware (Free) File Size: 124 Kb Runs on: Mac. Desktop security solution for personal or publicly accessible computers. It disallows unauthorized changes to various settings of the Windows system, such as Control Panel, Desktop, Local Security Policies, Outlook Express account settings and more. File Name: lockmc.zip Author: PC-Safety License: Shareware ($49.95) File Size: 1.88 Mb Runs on: Windows 98, Windows ME, Windows NT, Windows 2000, Windows XP, Windows7, Windows 2003, Windows Vista. Tell Me My Specs! was designed as a very lightweight and easy-to-use software utility that can give you detailed information about your personal computer . Now you can view the details of your CPU, memory, GPU and mainboard in no time at all with. . File Name: Tell Me My Specs! Build 3.exe Author: Matt Hurley License: Freeware (Free) File Size: Runs on: Windows All. If your computer or Internet feels slower than usual, Auslogics might have a remedy - its award winning Auslogics Boost Speed. The program cleans up and defragments disks and the registry, speeds up the Internet, and keeps your PC running error-free. File Name: boost-speed-setup.exe Author: Auslogics Labs Pty Ltd License: Shareware ($59.95) File Size: 14.98 Mb Runs on: Win2000, WinXP, Win7 x32, Win7 x64, Windows 8, Windows 10, WinServer, WinOther, WinVista, WinVista x64. Net Monitor for Classroom is a program that allows a 'view' of a computer monitor of a remote computer , which is connected to the network. The program can be used on networks that use the TCP/IP network protocol. After start, the program displays the. . File Name: advnmpro.exe Author: EduIQ.com License: Shareware ($49.25) File Size: 28.52 Mb Runs on: Win95, Win98, WinME, WinNT 4.x, WinXP, Windows2000, Windows2003. The Network LookOut Administrator allows you to see live screens of remote computers. This way, you can always watch what users are doing on the remote computer . Additionally, you have the ability to take control of a remote computer by controlling. . File Name: nmemployees.exe Author: EduIQ.com License: Shareware ($69.95) File Size: 8.74 Mb Runs on: Win95, Win98, WinME, WinNT 4.x, WinXP, Windows2000, Windows2003. The Network LookOut Administrator allows you to see live screens of remote computers. This way, you can always watch what users are doing on the remote computer . Additionally, you have the ability to take control of a remote computer by controlling. . File Name: nladmin.exe Author: EduIQ.com License: Shareware ($59.95) File Size: 7.99 Mb Runs on: WinXP, Windows2000, Windows2003, Windows Vista. Remo Optimizer helps keep your computer as new, like the day you first turned it ON. Scans your computer for potential problems and issues that causes PC slowdowns, freezes, crashes etc. File Name: remo-optimizer.exe Author: Remo Software License: Demo ($29.97) File Size: 3.04 Mb Runs on: Win7 x32, Win7 x64, WinVista, WinVista x64, WinXP. Why did I write it? Because XCOPY was too slow for my needs and was lacking a compare/verify feature, so I decided to write my own utility. Besides being a good JAVA exercise, I knew I would use it every day, and I do use it everyday: I use it to. . File Name: dirdup.exe Author: MiShell Software Systems License: Freeware (Free) File Size: 1.44 Mb Runs on: Windows Vista, XP, 2000, 98, Me. Copy the tcp/ip settings and store them to change network settings easily On my portable computer I always had to change network settings Between work and home. At home I use DHCP and at work I had to enter IP address and other settings. Bleeping Computer Downloads Software. Tansee iPhone Transfer for transfer song/video from iPhone to computer . - Backup songs in iPhone to PC. - Copy iPhone songs to new computer or notebook. - Computer crashed. - Share your iPhone songs with friends. - Copy all songs to new iPhone. . File Name: ipht.exe Author: zunium Inc. License: Shareware ($19.95) File Size: 869 Kb Runs on: Win95, Win98, WinME, WinNT 4.x, Windows2000, WinXP. Computer Repair Free is an advanced system utility for Windows that allows you to safely remove spyware, clean registry, sweep privacy, and clean junk files with a mouse click. File Name: Computer Repair Free Author: Evonsoft License: Freeware (Free) File Size: 3.08 Mb Runs on: WinXP, Windows2000, Windows2003, Windows Vista. Kidview Computer Explorer will keep your kids out of your programs, and it cleverly does it by creating (with your help) a kid-friendly environment that the little whippers can't leave. . File Name: Hoopah-Kidview-Computer-Expl orer.exe Author: tomp4-home-education License: Shareware ($39.95) File Size: 3 Mb Runs on: Win95, Win98, WinME, WinXP, WinNT 3.x, WinNT 4.x, Windows2000, Windows2003. Computer keyboard tracking utility saves url, text email, chat conversation, multilingual password in to a encrypted log file. Keylogger spy software not appears on the desktop, add/ remove program, control panel and not viewed by unauthorized users. File Name: pcdm-bsc-demo.exe Author: Keylogger License: Shareware ($45.00) File Size: 715 Kb Runs on: Win98, WinME, WinNT 3.x, WinNT 4.x, Windows2000, WinXP, Windows2003, Windows Vista. With iPod to Computer Transfer Safe, you can transfer files from iPod to any computer , and sync iPod playlists back to your iTunes at the same time, filling in a missing feature of iTunes. File Name: setup.zip Author: iSafe License: Shareware ($15.95) File Size: 3.86 Mb Runs on: Win95, Win98, WinME, WinNT 3.x, WinNT 4.x, Windows2000, WinXP, Windows2003, Windows Vista. Computer Game Tester. Do you know you can make money playing your favourite computer games? Become a computer game tester and you can make money and play computer games at the same time. Game companies need a lot of beta testers. . File Name: computergametester.exe Author: Gamer Tester Ground License: Shareware ($44.95) File Size: 375 Kb Runs on: Win95, Win98, WinME, WinNT 4.x, WinXP, Windows2000, Windows2003, Windows Vista. Use computer monitoring software to ensure that your employees are working when they are expected to work. Using this tool, you can monitor multiple computers from remote desktop. File Name: computermonitoringsoftware.z ip Author: Computer Monitoring Software License: Shareware ($79.00) File Size: 5.04 Mb Runs on: Win2000, Win7 x32, Win7 x64, Win98, WinServer, WinVista, WinVista x64, WinXP, Win8. transfer music from ipod to computer Ultimate application for transferring songs from an iPod to a Windows based PC.. File Name: ict.exe Author: Tansee Inc. License: Shareware ($19.95) File Size: 819 Kb Runs on: Win98, Windows2000, WinXP, Win2003. Now, it is very much possible to manage computers and servers simultaneously by using a computer management tool. In fact, using this tool you can perform various tasks on computers, which are part of workgroup, current domain or a remote domain. File Name: ladmr.exe Author: Computer Management License: Shareware ($149.00) File Size: 3.87 Mb Runs on: Win2000, Win7 x32, Win7 x64, Win98, WinServer, WinVista, WinVista x64, WinXP. iPod to Computer Transfer is a tool that transfers music from iPod to PC, sync songs from iPod to iTunes. Keywords: iPod to pc, ipod to computer , ipod to itunes, ipod copy, ipod rip, ipod ripping, ipod transfer, ipod software. File Name: ipodtocomputer.exe Author: iPod2Computer, Inc. License: Shareware ($19.95) File Size: 2.17 Mb Runs on: Win95, Win98, WinME, WinNT 4.x, WinXP, Windows2000, Windows2003, Windows Vista. The computer operating systems (OS) map presents functions of Operating Systems and comparison of all major OS. It also provide compelete history of computer OS development since the inception of computers in 1950' till now. File Name: OSmap-demo.zip Author: Javvin Company License: Data only ($19.99) File Size: 142 Kb Runs on: Not Applicable. Web iPhone Downloads - Load up your iPhone with all kinds of free media and take it on the road with you for those long commutes and trips. Take any video or DVD movie and use our handy conversion software. Convert and transfer to your iPod. Download windows 10 page free bleepingcomputer. Autoruns is a free Sysinternals tool from Microsoft that enumerates all the programs that automatically start on a Windows machine. You can then examine this list of programs to see if they should be running or should be disabled. Disabling unnecessary startups allows your computer to run more efficiently by reducing CPU usage and memory consumption. Total Downloads: 420,632 Downloads last week: 292 August 15, 2017. Malwarebytes Anti-Exploit. Publisher: Malwarebytes Version: 1.10.1.41 OS: Windows Category: Security Utilities. Malwarebytes Anti-Exploit is a security program that protects you from zero-day exploits that target browser and application vulnerabilities. This program is meant to run alongside your traditional anti-virus or anti-malware products and provides extra protection against software and Windows vulnerabilities that are discovered, but do not have a patch available to fix them. Total Downloads: 157,521 Downloads last week: 41 October 04, 2017. HitmanPro. Publisher: SurfRight Version: 3.7 OS: Windows Category: Anti-Virus. HitmanPro is an anti-virus program that describes itself as a second opinion scanner that should be used in conjunction with another anti-virus program that you may already have installed. If malware slips past your anti-virus software, HitmanPro will then step in to detect it. Though SurfRite bills themselves as a second opinion scanner that does not mean that you cannot use the program as your primary anti-virus product. This is because its scanning technology not only incorporates its own virus definitions but also has the ability to scan files on your computer with the definitions of 5 other anti-virus vendors. Total Downloads: 1,566,131 Downloads last week: 1,032 September 28, 2017. Show Hidden. Publisher: BleepingComputer Version: 1.0 OS: Windows Category: System Administration. Show Hidden is a small utility that will display all hidden folders, and files if you wish, on your computer. This program will scan all of your fixed and removable drives for folders and files that have the Hidden attribute. When Show Hidden is finished it will create a log that contains a list of all the hidden files and folders that were found. Total Downloads: 81,535 Downloads last week: 29 January 06, 2015. Shortcut Cleaner. Publisher: BleepingComputer Version: 1.4.9.0 OS: Windows Category: Security Utilities. Shortcut Cleaner is a utility that will scan your computer for Windows shortcuts that have been hijacked by unwanted or malicious software. When Shortcut Cleaner finds bad shortcuts, it will automatically clean them so that they do not open unwanted programs. Total Downloads: 1,010,932 Downloads last week: 90 November 27, 2015. bbEditor. Publisher: noahdfear Version: 1.0.4.4 OS: Windows Category: Text Editors. bbEditor is a program designed to create documents using the bbCode formatting syntax. BBCode is commonly used in online forums to format a user's post. This syntax allows formatting options such as bold, underline, italic, code boxes, quotes, font sizes, and font colors. Using a program like bbEditor allows you to easily create formatted content offline that you can post to a forum when finished. Total Downloads: 8,243 Downloads last week: 0 February 12, 2013. Registry Backup. Publisher: Tweaking.com Version: 4.0 OS: Windows Category: Windows Registry. Registry Backup is a free utility that allows you to backup and restore your Windows Registry using Shadow Volume Services. This program will backup all Registry settings including those for each user profile in Windows. In the future, if your Registry becomes corrupt or damaged, you can easily select a previously created Registry backup and restore it. Total Downloads: 56,413 Downloads last week: 94 March 18, 2021. GetServices. Publisher: BleepingComputer OS: Windows Category: System Information. Getservices.zip contains a batch file and the swsc program from Bobbi Flekman that is used to create a list of services installed on your machine for trouble-shooting purposes. You can then use the information in the report to determine if your services are running properly or if there are services that could potentially be malware related. Total Downloads: 27,509 Downloads last week: 8 December 13, 2012. A Thousand Words. Publisher: Andrew Lambert Version: 1.0 OS: Windows Category: Image Capture. A simple, portable screen capture wizard. Total Downloads: 14,799 Downloads last week: 2 August 05, 2013. HashTab. Publisher: Implbits Version: 5.2 OS: Windows Category: System Administration. HashTab adds a new tab to the standard Windows file properties dialog which shows the checksums computed from the file using a number of different algorithms. Download windows 10 page free bleepingcomputer. Malwarebytes Anti- is a free program that can be used to search for and remove rootkits from your computer. When started, Malwarebytes Anti-Rootkit will scan your computer and allow you to remove any rootkits that it finds. Total Downloads: 533,555 Downloads last week: 169 June 30, 2018. Junkware Removal Tool. Publisher: Malwarebytes Version: 8.1.4.0 OS: Windows Category: Security Utilities. Junkware Removal Tool is a security utility that searches for and removes common adware, toolbars, and potentially unwanted programs (PUPs) from your computer. A common tactics among freeware publishers is to offer their products for free, but bundle them with PUPs in order to earn revenue. This tool will help you remove these types of programs. Total Downloads: 10,300,149 Downloads last week: 4,081 November 04, 2017. KeyTweak. Publisher: Travis Krumsick Version: 2.3.0 OS: Windows Category: Keyboard & Mouse Utilities. KeyTweak allows you to remap any key on your keyboard to any other key, or even to disable keys altogether. Total Downloads: 304,812 Downloads last week: 1,381 February 07, 2019. AdwCleaner. Publisher: ToolsLib Version: 8.2.0.0 OS: Windows Category: Security Utilities. AdwCleaner is a free program that searches for and deletes Adware, Toolbars, Potentially Unwanted Programs (PUP), and browser Hijackers from your computer. By using AdwCleaner you can easily remove many of these types of programs for a better user experience on your computer and while browsing the web. Total Downloads: 55,748,099 Downloads last week: 9,693 March 23, 2021. SecurityCheck. Publisher: screen317 OS: Windows Category: Security Utilities. SecurityCheck is a program that searches for installed and running security programs on a user's program. After it is finished, SecurityCheck will then display a log file that contains information about the security programs found on your computer and the status of security services such as Windows Firewall. Total Downloads: 151,914 Downloads last week: 38 May 08, 2014. RogueKiller. Publisher: Adlice Software OS: Windows Category: Anti-Malware. RogueKiller is a security tool that can be used to terminate and remove malicious processes and programs from your computer. RogueKiller has the ability to remove infections such as ZeroAccess, TDSS, rogue anti-spyware programs, and Ransomwares. Total Downloads: 2,478,252 Downloads last week: 691 May 26, 2017. Calibre. Publisher: Kovid Goyal Version: 0.8.69 OS: Windows Category: eBooks. Calibre is a free eBook library management application for Windows with a built-in eBook reader. This programs supports most eBook file formats so that eBooks purchased for a variety of devices will be compatible. Calibre also has the ability to sync your library with most major devices including Kindle, Nook, iPad, and Android devices. Total Downloads: 12,169 Downloads last week: 1 December 04, 2016. HxD Hex Editor. Publisher: Mael Horz Version: 1.7.7.0 OS: Windows Category: Development Utilities. HxD is a free hex editor that allows you to edit the raw binary content of a file or a disk. This enables you to analyze malware, patch programs, repair harddrive tables, perform file comparisons, manipulate save games, and create game trainers and cheats. Total Downloads: 51,380 Downloads last week: 23 December 08, 2012. Everything. Publisher: voidtools Version: 1.2.1.371 OS: Windows Category: Search Tools. Everything is a search engine that replaces the built-in search feature in Windows. Once your files are indexed you can use Everything to quickly search for files by their name. Unfortunately, Everything does not have the ability to search within the contents of the files themselves. Total Downloads: 14,409 Downloads last week: 10 October 10, 2015. Folder Size. Publisher: Mindgems Version: 2.6.0.0 OS: Windows Category: Hard Drive Utilities. Folder Size is a tool that displays how much hard disk space every folder on a drive is using. This allows you to quickly find out what folders are using the most space in the event that you run out of storage on a particular partition. Folder Size also contains numerous other features such as different display charts, various sorting options, and support for CDROM, USB, and floppy media.