1 [General] 2 Name=Gibson Research Corporation 3 GroupCount=1 4 SoftwareCount=28 5 6 [Group0] 7 Name=All Utilities 8 ShowAll=1 9 10 [Software0] 11 exe=am.exe 12 help= 13 url=https://www.grc.com/smgassembly.htm 14 exe64= 15 group=0 16 Name=ASPI ME Media Demo 17 ShortDesc=Demo of on-the-fly audio synthesis 18 LongDesc=A small executable demonstration that synthesizes a complex polyphonic sound, using a software FM synthesizer, while unscrambling a sliding tile puzzle. After the puzzle is solved, the resulting wave file is played. 19 20 [Software1] 21 exe=clickey.exe 22 help= 23 url=https://www.grc.com/freeware/clickey.htm 24 exe64= 25 group=0 26 Name=ClicKey 27 ShortDesc=Give your keyboard a bit of sound 28 LongDesc=A simple little utility to add a user-specifiable 'click' sound to any Windows keyboard. 29 30 [Software2] 31 exe=dcombob.exe 32 help= 33 url=https://www.grc.com/freeware/dcom.htm 34 exe64= 35 group=0 36 Name=DCOMbobulator 37 ShortDesc=Tame Windows insecure DCOM facility 38 LongDesc=Ever since Windows 98, a powerful, but unnecessary and rarely used facility known as DCOM (Distributed Component Object Model) has been an integral part of Windows. The DCOMbobulator checks the effectiveness of Microsoft's security patches and allows the user to increase the security of their system by simply turning DCOM off. 39 40 [Software3] 41 exe=dnsbench.exe 42 help= 43 url=https://www.grc.com/dns/benchmark.htm 44 exe64= 45 group=0 46 Name=DNSBench 47 ShortDesc=Advanced DNS Benchmark utility 48 LongDesc=Compare the performance and reliablity of your system's currently configured DNS servers to many publicly available alternatives. 49 50 [Software4] 51 exe=fc.exe 52 help= 53 url=https://www.grc.com/cleartype.htm 54 exe64= 55 group=0 56 Name=Free & Clear Font Demo 57 ShortDesc=Sub-pixel font rendering demo 58 LongDesc=A sub-pixel font rendering demonstration illustrating the technology of splitting LCD pixels for the purpose of enhancing font readability. The details are described on our Free & Clear web site pages. 59 60 [Software5] 61 exe=fix-cih.exe 62 help= 63 url=https://www.grc.com/cih.htm 64 exe64= 65 group=0 66 Name=FIX-CIH Virus Recovery 67 ShortDesc=Total recovery from CIH virus damage 68 LongDesc=Every April, the CIH virus resurfaces and wipes out thousands of hard disk drives by deliberately zeroing their partition, boot, and FAT tables. The first time this happened I wrote this complete post-CIH hard drive recovery utility. 69 70 [Software6] 71 exe=id.exe 72 help= 73 url=https://www.grc.com/tip/id.htm 74 exe64= 75 group=0 76 Name=IDentify ASPI Devices 77 ShortDesc=Simple ASPI device display utility 78 LongDesc=ID checks the visibility of peripheral devices to aid in the diagnosis of ASPI driver problems. Devices shown by ID are visible to the ASPI driver layer and, if they are Iomega drives, can be tested by TIP (Trouble In Paradise). 79 80 [Software7] 81 exe=idserve.exe 82 help= 83 url=https://www.grc.com/id/IDServe.htm 84 exe64= 85 group=0 86 Name=ID Serve 87 ShortDesc=Internet server identification utility 88 LongDesc=Can your favorite web sites be trusted with your personal and confidential financial and other data? With eCommerce activity growing, malicious hackers are becoming more interested in breaking into Internet servers. But many servers are not secure. This utility helps you to easily determine which Internet servers web sites are using. 89 90 [Software8] 91 exe=inspectre.exe 92 help= 93 url=https://www.grc.com/inspectre.htm 94 exe64= 95 group=0 96 Name=InSpectre 97 ShortDesc=Inspect Windows hardware and software for Meltdown and Spectre vulnerabilities 98 LongDesc=The Meltdown and Spectre vulnerbilities which swept the PC industry in early 2018 require both hardware and software updates. The combinations and permutations of CPU's motherboards, BIOS, firmware and Windows versions can be very difficult to untangle and understand. GRC's InSpectre utility makes it all very clear. 99 100 [Software9] 101 exe=ip_agent.exe 102 help= 103 url=https://www.grc.com/x/IPAgentDiscontinued.htm 104 exe64= 105 group=0 106 Name=IP Agent 107 ShortDesc=Usually optional IP determination utility 108 LongDesc=In some situations, our popular ShieldsUP! system may need help determining the user's machine IP address. This most often occurs when the web is accessed through browser-configured proxy servers which also intercept secure connections. Some machines may also have multiple IP addresses which need to be selected. This IP Agent utility solves these IP resolution problems. 109 110 [Software10] 111 exe=leaktest.exe 112 help= 113 url=https://www.grc.com/lt/leaktest.htm 114 exe64= 115 group=0 116 Name=LeakTest 117 ShortDesc=Personal firewall leakage tester 118 LongDesc=When LeakTest was released, most personal firewalls were easily fooled. Any malicious program could give itself the same name as a trusted program to gain access to the Internet. LeakTest demonstrates and tests for this simple application "masquerading" vulnerability. 119 120 [Software11] 121 exe=letshare.exe 122 help= 123 url=https://www.grc.com/faq-shieldsup.htm 124 exe64= 125 group=0 126 Name=LetShare 127 ShortDesc=Quick and simple NetBIOS enabler 128 LongDesc=When the ShieldsUP! system was first created, I had not discovered how to safely "rebind" network transports as a means for closing the NetBIOS TCP/IP vulnerabilities. So I wrote the LetShare & NoShare utilities to do this quickly and easily (although in a non-standard fashion). Today, the manual rebinding described on the ShieldsUP! pages is the preferred method. LetShare & NoShare still work and can be useful for allowing quick NetBIOS on/off testing. 129 130 [Software12] 131 exe=mousetrap.exe 132 help= 133 url=https://www.grc.com/wmf/wmf.htm 134 exe64= 135 group=0 136 Name=MouseTrap 137 ShortDesc=Check your system for MICE! 138 LongDesc=Quickly check your Windows systems for the presence of potentially dangerous MICE: Metafile Image Code Execution. 139 140 [Software13] 141 exe=mousetrapcmd.exe 142 help= 143 url=https://www.grc.com/wmf/wmf.htm 144 exe64= 145 group=0 146 Name=MouseTrap (Command Line) 147 ShortDesc=Check your system for MICE! 148 LongDesc=Quickly check your Windows systems for the presence of potentially dangerous MICE: Metafile Image Code Execution. 149 150 [Software14] 151 exe=never10.exe 152 help= 153 url=https://www.grc.com/never10.htm 154 exe64= 155 group=0 156 Name=Never10 157 ShortDesc=Easily disabe (or re-enable) automatic Windows 10 upgrading 158 LongDesc=Many people are happy with their current version of Windows and would rather than have Microsoft downloading and installing a three gigabyte upgrade to Windows 10. This simple utility uses Microsoft-approved and provided registry and group policy setting to tell 'Get Windows 10' (GWX) not to. It can be run at any time to re-verify or change those settings. 159 160 [Software15] 161 exe=noshare.exe 162 help= 163 url=https://www.grc.com/faq-shieldsup.htm 164 exe64= 165 group=0 166 Name=NoShare 167 ShortDesc=Quick and simple NetBIOS disabler 168 LongDesc=When the ShieldsUP! system was first created, I had not discovered how to safely "rebind" network transports as a means for closing the NetBIOS TCP/IP vulnerabilities. So I wrote the LetShare & NoShare utilities to do this quickly and easily (although in a non-standard fashion). Today, the manual rebinding described on the ShieldsUP! pages is the preferred method. LetShare & NoShare still work and can be useful for allowing quick NetBIOS on/off testing. 169 170 [Software16] 171 exe=optout.exe 172 help= 173 url=https://www.grc.com/oo-update.htm 174 exe64= 175 group=0 176 Name=OptOut 177 ShortDesc=The original spyware removal tool 178 LongDesc=My discovery that "Aureate/Radiate" advertising spyware had been installed in tens of millions of PCs without their owners' knowledge or permission led me to create OptOut, the first spyware removal tool. When the Lavasoft folks created the much more comprehensive Ad-Aware freeware, I turned spyware policing over to them. This file remains on our site only because so many off-site web links still point to it. 179 180 [Software17] 181 exe=ppp.exe 182 help= 183 url=https://www.grc.com/ppp.htm 184 exe64= 185 group=0 186 Name=Perfect Paper Passwords 187 ShortDesc=GRC's Open, Secure, Remote Authentication System 188 LongDesc=This ZIP file contains the PPP.DLL and PPP.EXE which fully implement the CryptoSystem for GRC's Perfect Paper Passwords, one-time password (OTP) remote Internet service authentication system. These files may be freely used to implement identical or similar authentication systems and they are provided for that purpose. 189 190 [Software18] 191 exe=securable.exe 192 help= 193 url=https://www.grc.com/securable.htm 194 exe64= 195 group=0 196 Name=SecurAble 197 ShortDesc=Display processor's security features 198 LongDesc=Quickly determine, display, and explore the availability and consequences of the state-of-the-art security-related features available in the system's processor. 199 200 [Software19] 201 exe=shootthemessenger.exe 202 help= 203 url=https://www.grc.com/stm/shootthemessenger.htm 204 exe64= 205 group=0 206 Name=Shoot The Messenger 207 ShortDesc=Simple Messenger Service Disable-Enable 208 LongDesc=Windows NT, 2000, and XP hide an hidden Internet server that is running by default. It receives and accepts, among other things, unsolicited network messages that cause pop-up dialog boxes to appear on the desktop. Internet Spammers have discovered this and are spraying pop-up Spam across the Internet. The Windows Messenger server should never have been running by default, and Microsoft has finally fixed that in Windows 2003, but users of previous Windows need to take responsibility for this themselves. 209 210 [Software20] 211 exe=sib.exe 212 help= 213 url=https://www.grc.com/smgassembly.htm 214 exe64= 215 group=0 216 Name=Small Is Beautiful 217 ShortDesc=Windows assembly language starter kit 218 LongDesc=I write all of my Windows and other utilities in 100% pure assembly language. This results in the smallest, fastest, and most efficient programs possible. I created the "Small is Beautiful" kit to help interested assembly language programmers get started writing Windows programs in pure assembly language. 219 220 [Software21] 221 exe=socketlock.exe 222 help= 223 url= 224 exe64= 225 group=0 226 Name=SocketLock 227 ShortDesc=Disable WinXP and 2000 raw sockets 228 LongDesc=As part of my struggle to convince Microsoft not to ship Windows XP with full raw sockets, I created this "SocketLock" utility. It easily enables and disables the system's raw socket capabilities to show that, contrary to Microsoft's claims, raw sockets are not, and never were, needed by any applications or users. 229 230 [Software22] 231 exe=sockettome.exe 232 help= 233 url= 234 exe64= 235 group=0 236 Name=SocketToMe 237 ShortDesc=Check your Windows OS for raw sockets 238 LongDesc=I worked quite hard (and failed) to convince Microsoft not to ship Windows XP with full raw socket capabilities built-in. This "SocketToMe" utility lets any Windows user determine the level of raw socket support currently available to the logged on user. 239 240 [Software23] 241 exe=sqrl.exe 242 help= 243 url=https://www.grc.com/sqrl/sqrl.htm 244 exe64= 245 group=0 246 Name=Secure Quick Reliable Login 247 ShortDesc=SQRL sign-in app for Windows. 248 LongDesc=A fully working, super secure system for eliminating all usernames, eMail, passwords, authenticators for website account sign-in. 249 250 [Software24] 251 exe=tip.exe 252 help= 253 url=https://www.grc.com/tip/clickdeath.htm 254 exe64= 255 group=0 256 Name=Trouble In Paradise 257 ShortDesc=Check Iomega drive operation 258 LongDesc=Iomega ZIP and JAZ drives suffer from a head positioning problem (servo stiction) that can actively and permanently damage perfectly good ZIP and JAZ drive media. TIP (Trouble In Paradise) provides an early warning system when a user's drives are beginning to damage its media. 259 260 [Software25] 261 exe=unpnp.exe 262 help= 263 url=https://www.grc.com/UnPnP/UnPnP.htm 264 exe64= 265 group=0 266 Name=UnPlug n' Pray 267 ShortDesc=Universal Plug & Play management 268 LongDesc=At the end of 2001, Microsoft revealed a critical defect in Windows XP and ME: Windows' Universal Plug and Play service (UPnP) would allow a malicious hacker to remotely take over any system that was running and exposing the UPnP service to the Internet. This UnPlug n' Pray utility lets anyone check for the presence of the dangerous UPnP service in their system, then easily and safely enable and disable it as needed. 269 270 [Software26] 271 exe=wizmo.exe 272 help= 273 url=https://www.grc.com/wizmo/wizmo.htm 274 exe64= 275 group=0 276 Name=Wizmo 277 ShortDesc=Steve's multipurpose Windows gizmo 278 LongDesc=Wizmo is a multipurpose miscellaneous Windows utility that provides an array of single-click functions that are missing from Windows. Triggered by a single mouse click, it can do things like power down your system's displays, activate your screen saver, change or mute the audio volume, restart, reboot, or shutdown your system, and much more. It even includes a rather cool built-in "Graviton" screen saver that simulates the motion of any number of mutually gravitationally attracted celestial objects. Check out Wizmo's web page for the current (and growing) complete list of Wizmo's capabilities and features. 279 280 [Software27] 281 exe=xpdite.exe 282 help= 283 url=https://www.grc.com/xpdite/xpdite.htm 284 exe64= 285 group=0 286 Name=XPdite 287 ShortDesc=Crucial Windows XP Vulnerability Fixer 288 LongDesc=Windows XP has always contained an extremely serious vulnerability which allows any malicious hacker to cause the files contained in any directory to be deleted. This vulnerability can be cured by installing XP's large (50 to 140 MB) Service Pack 1 — which is preferable whenever possible. But this free and lightweight XPdite utility fixes the problem quickly and easily for systems not yet running Service Pack 1. A silent running option also makes it ideal for corporate deployment.