Download-Software etikettierte vorbei object relational mapping
Das populärste Programm: Quick Slide Show 2.00
mehr Info |
Wir empfehlen uns: ExportToPDF .NET assembly 1.00.7
mehr Info |
Entry Service 3.1 durch Fusionsoft
2007-12-31
Entry Service provides centralized access to distributed data though a single hierarchy of typed objects (entries). Services group together as one hierarchy. All the entries are accessible through any service running, through one program interface.
wodSmtpServer 2.5.1 durch WeOnlyDo Software
2012-12-05
WeOnlyDo! SmtpServer ActiveX control is a component that can be easily integrated into your applications to provide full non-relaying Smtp (Simple Mail Transfer Protocol) server implementation
Paint online flower 03 09 durch PAINTING AND FUN
2008-01-13
Painting game results like the game on limited edition print by jack vettriano, oldprint.com christmas painting blindmansbluff game ladies , .. A belt wearable by a person a loop formed thereon for receiving an object of predetermined circumferen
wodVPN 2.2.3 durch WeOnlyDo Software
2012-12-05
wodVPN is VPN peer-to-peer ActiveX component that is used to establish Virtual Private Network between two peers. All P2P communication is encrypted and secured. Peers are able to forward local and remote ports, send messages, etc.
wodXMPP 1.5.1 durch WeOnlyDo Software
2013-03-26
wodXMPP is a client component for XMPP/Jabber (Extensible Messaging and Presence Protocol) protocol. It is used to create messaging clients.
DreamCoder for MySQL Enterprise 4.7 durch Mentat Technologies
2009-03-13
DreamCoder for MySQL is a powerful database development and administration solution that provides productivity features for rapidly creating and executing queries, easily database object management and developing SQL code.
US-State Anti-virus Adware Spyware Bot 1.4.19 durch Anti-virus Adware Spyware Bot
2008-01-27
US-State Anti-virus Adware Spyware Bot - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
Swift Anti Binder Keyloggers Spy 1.3.73 durch Anti Binder Keyloggers Spy
2008-08-10
Swift Anti Binder Keyloggers Spy - The term rootkit is used to define a Trojan (or technology) used to hide the presence of a malicious object (process, file, registry key, network port) from the computer user or administrator.
Catalyst Internet Mail .NET 5.0 durch Catalyst Development Corporation
2008-02-25
The Catalyst Internet Mail .NET class enables developers to easily integrate email functionality within their applications. The class implements the standard protocols for sending, receiving and composing Internet e-mail messages.