» Activex technologies
Sections : Programming > Activex technologies

Get & buy Async 2.0.2

Create multi-threaded VB programs and DLLs


Thank you for downloading Async from our download portal.

Current files are located on the following IPs:

Outer mirror site one (

Note: We prefer to use WinZip, WinRar, WinAce, 7zip to extract zip, rar, 7z, ace files. For data iso files we recommend you use freeware Daemon Toos lite.

Note: All files listed on this site are tested by the ESET Smart Security. If you like to test this file by another security software we recommend you select some in our antivirus section.

Sponsored download:

Development of the Async was probably finished, try the other options

Synopsis - Visual Programming Tool 2.0.3 your own DLLs and SQL databases...Control external Windows applications with macro...

Web Bot Programming Library 1.0.0
...with this free ActiveX web bot component...

GIPALS32 - Linear Programming Library 3.5
...power of linear programming solver and simplicity...external components or DLL are required...

Pocket Programming Language FREE 1.62
...runs on all Windows Mobile devices using...Design forms visually on your with the visual form builder...on your Windows Mobile device...

MarshallSoft DUN Dialer for Visual Basic 2.1
MarshallSoft Dialup Networking Component.

Async categories

asynchronous, multi-threaded, activex controls, vb controls, programming, vb multi-threading, visual basic programming, dll, ole, vbx, ocx, custom, windows

Async permissions

This authorization constitutes a license to distribute the trial version (epas202t.exe) of the Async component.

Evans Programming hereby warrants and represents that:

(i) we have full right and power to grant the rights granted herein
(ii) the Software is original and does not infringe any copyright, trademark, or other intellectual property rights or personal or proprietary rights of any person or entity or contain any scandalous, libelous or unlawful matter
(iii) the Software does not contain any virus or Trojan Horse or other software routine designed to permit unauthorized access, to disable, erase, or otherwise harm software, hardware, or data.