English version 去汉语版本 Русская версия Deutsche Version

Download software tagged by remote administrator

The most popular program: Quick Slide Show 2.00
Download Quick Slide Show 2.00
more info
We recommend: SQLWave MySQL GUI 3.2
Download SQLWave MySQL GUI 3.2
more info
Swift Anti Binder Keyloggers Spy 1.3.73 by Anti Binder Keyloggers Spy
2008-08-10
Swift Anti Binder Keyloggers Spy - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
Swift Clean BHOs Binder Trojan Horses 1.1.11 by Clean BHOs Binder Trojan Horses
2008-03-06
Swift Clean BHOs Binder Trojan Horses - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
Digital CD OGG ID3 to WAV Copier 1.4.12 by CD OGG ID3 to WAV Copier
2008-08-16
Digital CD OGG ID3 to WAV Copier - If you are a network administrator, find MP3 files that users hide on servers hogging up space.
Advanced Administrative Tools 5.92 by Advanced Administrative Tools
2008-03-13
Advanced Administrative Tools - Have you been port scanned lately? Completely ignoring network security is not smart and ignorance isn't exactly bliss. If you access the Internet via a cable modem, DSL, or even a dial-up connection, someone is always knocking on your virtual front door, giving your system the once-over. Protect your data, privacy and valuable computer system with AA Tools. Advanced Administrative Tools - AATools investigates and gathers information about you...
2008-03-15
CheapestSoft USB Blocker is the best software that helps an individual or a system administrator control USB storage devices(USB FLASH DISK, USB DISK, IPOD, etc.).
Bliss Destroy Bot Binder Adware 1.5.86 by Destroy Bot Binder Adware
2008-08-12
Bliss Destroy Bot Binder Adware - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
Speed Trojans Trojan Horses System Monitor Eliminator 1.1.34 by Trojans Trojan Horses System Monitor Eliminator
2008-01-06
Administrator of such spyware applications can get your important information like passwords, emails etc. The captured information can be used for malicious purpose. Most spy applications run in stealth mode, so user is unaware of their existence.
Bliss AntiSpyware RAT Spoofers Keyloggers 1.4.34 by AntiSpyware RAT Spoofers Keyloggers
2008-08-12
Bliss AntiSpyware RAT Spoofers Keyloggers - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
Ever Discover Password Cracker Viking Hijackers 1.2.90 by Discover Password Cracker Viking Hijackers
2008-02-26
Ever Discover Password Cracker Viking Hijackers - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
0.021