exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 2 of 2 RSS Feed

Files from Vector Development

First Active1999-08-17
Last Active1999-08-17
guideonv110.exe
Posted Aug 17, 1999
Authored by Vector Development

Guideon v1.10 allows you to defeat the Microsofft GUID and maintain your privacy. Microsoft Office applications include an identifier called a GUID (Globally Unique Identifier). This identifier is unique to each machine. As a result, any document could be traced back to its original creator. Guideon lets you remove these identifiers from the files with no ill effects to the data files. Features: Replaces GUID with either zeros or an optional string you specify. Can make backup copies in case something unforseen should occur. Can log it's actions to a file you specify. Can replace the GUID on all Office files in a given directory or even drive. Detects office files based on content not name so it will even fix Document Templates. Optional logging of the orignal GUID. Support for running from the command line allowing, macros or batch files to call it. This release includes bugfixes and code optimizations.

SHA-256 | d2d9fc4b7bfc24a5dfefdd0b23bb1d9fc39d928f43a60a9979fc8eb6a4df2e51
guideonv1.exe
Posted Aug 17, 1999
Authored by Vector Development

Guideon allows you, the user to take control back over your identity. Microsoft Office applications include an identifier called a GUID (Globally Unique Identifier). This identifier is unique to each machine. As a result, any document could be traced back to its original creator. Guideon lets you remove these identifiers from the files with no ill effects to the data files. Features: Replaces GUID with either zeros or an optional string you specify. Can make backup copies in case something unforseek should occur. Can log it's actions to a file you specify. Can replace the GUID on all Office files in a given directory or even drive. Detects office files based on content not name so it will even fix Document Templates. Optional logging of the original GUID. Support for running from the command line allowing, macros or batch files to call it.

tags | exploit
SHA-256 | 0641662a307049cccae92a97bfacc52254ceeefec096c58cba9ddea26ed55ece
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close