|
||||||
|
||
|
Home > Symbol software |
Related keywords: font symbol, preview symbol, symbol picker, musical symbol, euro symbol |
|
|
221. | Robosoft 3.0.531 (rudenko.com) | ||
RoboSoft will not work for you if you are not a professional software developer or promoter. Do not download it if you are an amateur software developer and all you need is to submit your product to the 10 most popular download sites. RoboSoft is a comprehensive software promotion system intended for | |||
Updated: 9, 2005 | Rating: 42 | Author: Mykola Rudenko | Size: 1433 kb | Shareware Go to category: Development > Management & Distribution Similar programs | |||
222. | Rt-Science Tools2D for Delphi 2.6.1.3 (rt-science.de) | ||
as bold, italic, underline, strikeout, subscript, superscript and symbol font. This is especially interesting to alter TRtLabels which supports the same styles. *TRtLabel: Label supporting enhanced styles as bold, italic, underline, strikeout, subscript, superscript and symbol font. It can be drawn in any angle. *TRtGraph: The main component of a 2D-plot. Just place on a form | |||
Updated: 2, 2006 | Rating: 0 | Author: Horst Reichert | Size: 7517 kb | Shareware Go to category: Development > Delphi Similar programs | |||
223. | RTCalcExpress 1.0 (tetasoft.ru) | ||
value will be a result of calculating the last substring. The break-symbol is semicolon. In this case, it is possible to calculate the intermediate meanings, which can be saved in global variables. These variables can be use as the arguments of the FDU functions or as elements of the expressions. The | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexandr Storozhko | Size: 282 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
224. | SecureCode 2.0 (aidsoft.com) | ||
registration scheme.The security is internal at your software, it's an advantage for your application to prevent against generic crack. The SecureCode Protection is a based on 2 methods : Runtime Encryption or Runtime Extraction block code, this is a part of your code which will be executed when you insert a good key only else your code cannot be executed (e.g : you can protect | |||
Updated: 9, 2005 | Rating: 16 | Author: Bruno Branciforti | Size: 830 kb | Shareware Go to category: Development > Delphi Similar programs | |||
225. | SecureCode Protection 1.0.2 (aidsoft.com) | ||
SecureCode is a new software protection based on the lastest techniques protection to provide a strong security to protect your software against reverse engineering and illegal copying, confidence that people can only run your application on your terms.SecureCode is not trial protection or registration | |||
Updated: 9, 2005 | Rating: 0 | Author: Bruno Branciforti | Size: 350 kb | Shareware Go to category: Development > Other Similar programs | |||
226. | ShareGuard Copy Protection 3.6 (zappersoftware.com) | ||
is unlocked. (3) Locksmith Program allows YOU use to build your lock(s) and key(s). Many different options to allow customization of your methodology. You can build AND TEST (with your application even), a working lock and key within SECONDS without reading the manual. ShareGuard Locksmith generates message notifying you of possible problems, generates test code and code (C++ | |||
Updated: 9, 2005 | Rating: 0 | Author: William Bradshaw | Size: 11474 kb | Shareware Go to category: Development > Other Similar programs | |||
227. | ShareGuard V1 1 (zappersoftware.com) | ||
is unlocked. (3) Locksmith Program allows YOU use to build your lock(s) and key(s). Many different options to allow customization of your methodology. You can build AND TEST (with your application even), a working lock and key within SECONDS without reading the manual. ShareGuard Locksmith generates message notifying you of possible problems, generates test code and code (C++ | |||
Updated: 9, 2005 | Rating: 0 | Author: William Bradshaw | Size: 2490 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
228. | ShellBrowser Components for Delphi Win32 5.1 (jam-software.com) | ||
The ShellBrowser component set gives a Delphi programmer easy access to the Win32 shell functionality. The TJamShellList, TJamShellTree and TJamShellCombo components look and behave exactly like the corresponding parts of the Explorer. The invisible TShellBrowser component provides an easy interface to the | |||
Updated: 3, 2006 | Rating: 46 | Author: Joachim Marder | Size: 7637 kb | Demo Go to category: Development > Other Similar programs | |||
229. | Shorty 1.001 (natch.co.uk) | ||
Shorty analyses Visual Basic forms identifying duplicate shortcuts and lonely little controls that have no shortcut. When these confused or lost souls are found shortcuts are suggested, or changes in other controls that will free a suitable shortcut. Shorty analyses Visual Basic forms identifying duplicate | |||
Updated: 3, 2005 | Rating: 0 | Author: des fisher | Size: 2301 kb | Shareware Go to category: Development > Basic / VB / VB DotNet Similar programs | |||
230. | SignetSure 1.0 (SignetSure.com) | ||
to your subscribers. You have installed a program on the subscriber's machine that receives your files. This program must be able to authenticate files even against a hacker who has reverse-engineered your program. Scenario Two: You distribute registered software with a datafile that identifies | |||
Updated: 9, 2005 | Rating: 0 | Author: Jim Serwer | Size: 696 kb | Shareware Go to category: Development > Delphi Similar programs | |||
|
Home > Symbol software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|