English version 去汉语版本 Русская версия Deutsche Version

Download software tagged by virtual port

The most popular program: Quick Slide Show 2.00
Download Quick Slide Show 2.00
more info
We recommend: Softick PPP 3.03
Download Softick PPP 3.03
more info
Best Security Tips Toolbar 5.7.2.2 by BestSecurityTips LLC
2010-09-14
BST Toolbar is the easiest way to ensure your computer security while browsing the Internet, or reading emails. We offer you daily security news, tips and tools about: Adware, Spyware, Anti-Virus, Firewalls, Linux, Windows and Security Incidents.
2007-10-28
SimpleTerm Gold is an advanced RS232 data analyser / visual scripter. View and send (all 256) ASCII/Binary data in an easy to read colour coded sequence. Macros and Visual Scripting support.
2007-10-30
Paessler WMI Tester is a tool for quickly and easily testing the accessibility of WMI counters. "Windows Management Instrumentation" is the latest technology from Microsoft for monitoring and managing Windows based systems.
42Tags 1.2.0.66 by 42Tags
2007-11-05
42Tags is an easy to use document imaging software for scanning and managing your documents by using tags. Included features: scan (TWAIN scanner), tag, search, attach, multi-page handling, PDF, ADF and auto-completions. Going paperless is now easy.
QK SMTP Server 7.41.6 by QKsoft Inc.
2007-11-24
QK SMTP Server is a powerful but easy-to-use smtp server software, which can send mails from localhost to the recipients' mailboxes directly at an amazingly high speed. Arrived or not, you will get a feedback instantly.
DeviceLock 6.2.1 by SmartLine Inc.
2007-12-30
DeviceLock gives network administrators control over which users can access what devices (floppies, serial and parallel ports, Magneto-Optical disks, CD-ROMs, USB and FireWire drives, ZIPs, Bluetooth, etc.) on a local computer.
US-State Anti-virus Adware Spyware Bot 1.4.19 by Anti-virus Adware Spyware Bot
2008-01-27
US-State Anti-virus Adware Spyware Bot - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
Swift Anti Binder Keyloggers Spy 1.3.73 by Anti Binder Keyloggers Spy
2008-08-10
Swift Anti Binder Keyloggers Spy - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
Swift Clean BHOs Binder Trojan Horses 1.1.11 by Clean BHOs Binder Trojan Horses
2008-03-06
Swift Clean BHOs Binder Trojan Horses - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
0.027