English version 去汉语版本 Русская версия Deutsche Version

Download software tagged by system administrator

The most popular program: Quick Slide Show 2.00
Download Quick Slide Show 2.00
more info
We recommend: TestKing Certified Advanced System Administrator Exam Simulator 2.1
Download TestKing Certified Advanced System Administrator Exam Simulator 2.1
more info
Diskeeper 2008 Administrator 2008 by Diskeeper Corporation
2008-01-24
Diskeeper2008 Administrator Edition saves you time and money by providing complete centralized management of Diskeeper for all machines on your network, including installation, configuration, monitoring, updating, email reports, alerts and more.
2013-02-15
Controls access to files and folders situated on local media of Windows 95/98/ME/NT/2000/XP at Windows kernel level, allocates access to files and folders between users according to predefined schedules, and protects system files and folders.
2013-11-23
Controls access to files and folders situated on local media of Windows 95/98/ME/NT/2000/XP at Windows kernel level, allocates access to files and folders between users according to predefined schedules, and protects system files and folders.
Digital Remove Zombie System Monitor Bot 1.3.84 by Remove Zombie System Monitor Bot
2008-07-26
Digital Remove Zombie System Monitor Bot - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
Bluesea Joke System Monitor Bot Scanner 1.3.73 by Joke System Monitor Bot Scanner
2008-07-27
Bluesea Joke System Monitor Bot Scanner - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
Speed Trojans Trojan Horses System Monitor Eliminator 1.1.34 by Trojans Trojan Horses System Monitor Eliminator
2008-01-06
Administrator of such spyware applications can get your important information like passwords, emails etc. The captured information can be used for malicious purpose. Most spy applications run in stealth mode, so user is unaware of their existence.
Bliss Uninstall System Monitor Adload Trackware 1.4.24 by Uninstall System Monitor Adload Trackware
2008-07-25
Administrator of such spyware applications can get your important information like passwords, emails etc. The captured information can be used for malicious purpose. Most spy applications run in stealth mode, so user is unaware of their existence.
Professional Destroy Trojan Horses Zombie System Monitor 1.3.71 by Destroy Trojan Horses Zombie System Monitor
2008-07-27
Administrator of such spyware applications can get your important information like passwords, emails etc. The captured information can be used for malicious purpose. Most spy applications run in stealth mode, so user is unaware of their existence.
System Monitor Box 1.8.09 by System Monitor Box
2008-07-28
System Monitor Box - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
0.020