English version 去汉语版本 Русская версия Deutsche Version

Download software tagged by intersection of two triangulations

The most popular program: Quick Slide Show 2.00
Download Quick Slide Show 2.00
more info
We recommend: MS Powerpoint Join (Merge, Combine) Multiple Presentations Software 7.0
Download MS Powerpoint Join (Merge, Combine) Multiple Presentations Software 7.0
more info
2024-02-25
EAN-13 barcode is a 13-digit machine-readable ISBN number with start code consisting of two bars and two spaces. ISBN-13 barcode is created using barcode software program which converts ISBN number into series of bars and spaces for scanning.
Network SpeedCard 1.2 by Declan Software
2005-10-25
Network SpeedCard is a simple dual-player card game that is played over a LAN, or peer-to-peer linked pair of PCs that have the TCP/IP protocol configured. The game can also be played over the Internet.
Encoder Wizard ActiveX 3.0 by Seekford Solutions, inc
2005-10-27
Encoder Wizard is a collection of two ActiveX (ocx) controls, Encoder Wizard and Decoder Wizard. These two controls allow you to fully support the Base64, Quoted- Printable, UUEncode, yEnc, MD5, HMAC MD5, URL, SHA-1, and Binary 2 Hex encoding methods.
Morpheus Photo Mixer 3.00 by Morpheus Software
2006-03-26
Morpheus Photo Mixer is compositing software that mixes up faces and body parts between two photos. Place one person's head onto someone (or something) else's body or combine the funniest features of two people to create a hypothetical third person.
2009-05-28
Combine two or more MS Word files. Specify files to be joined and create a new Word file consisting of content from each file. Word 2000 or higher required.
2006-10-12
The standard security provided by PDF consists of two different methods and two different passwords. A PDF document may be protected by password for opening ('user' password) and the document may also specify operations that should be restricted.
2006-10-09
Divide one field (column) into 2 or more in Microsoft Access. A wizard guides you through the process of selecting a table and field to be split. The values found in the field will be split and new columns will be added accordingly.
2009-12-04
The standard security provided by PDF consists of two different methods and two different passwords. A PDF document may be protected by password for opening ('user' password) and the document may also specify operations that should be restricted.
2007-06-09
Mobile Marketing Pro: create mobile marketing campaigns through delivery and reception of SMS text messages with keywords (also known as two way SMS). SMS Background Music: Let your customers choose the music they want to listen.
0.043