English version 去汉语版本 Русская версия Deutsche Version

Download software tagged by receiving blankets

The most popular program: Quick Slide Show 2.00
Download Quick Slide Show 2.00
more info
We recommend: MySQL Move to Another MySQL Database Software 7.0
Download MySQL Move to Another MySQL Database Software 7.0
more info
2007-01-11
Transfer data (tables) from one Oracle database to another quickly. Simply provide the login information for both databases to connect. No SQL knowledge is required.
2007-02-01
SMTP, IMAP, MIME, POP3 - all you need for sending, receiving and processing emails from .NET framework application.
2007-02-01
SMTP over SSL, IMAP over SSL, POP3 over SSL, S/MIME - sending, receiving and processing emails from .NET framework application along with mail signing, encrypting and signature verification.
2007-02-21
Transfer data (tables) from one FoxPro database to another quickly. Simply provide the file location for both databases to connect. No SQL knowledge is required.
2007-03-03
Transfer data (tables) from one MS SQL Server to another quickly. Simply provide the login information for both databases to connect. No SQL knowledge is required.
2007-03-03
Transfer data (tables) from one Oracle database to another quickly. Simply provide the login information for both databases to connect. No SQL knowledge is required.
Catalyst File Transfer Control 5.0 by Catalyst Development Corporation
2007-03-14
The Catalyst File Transfer ActiveX control enables developers to easily integrate file transfer functionality within their applications. The control implements the standard protocols for sending and receiving files over the Internet.
Catalyst Internet Mail Control 5.0 by Catalyst Development Corporation
2007-03-14
The Catalyst Internet Mail ActiveX control enables developers to easily integrate email functionality within their applications. The control implements the standard protocols for sending, receiving and composing Internet e-mail messages.
2019-07-01
Keylogger Spy Monitor spy software can secretly record all keystrokes typed on your PC. It runs invisibly. You can check logging reports by simply receiving emails or opening a web page. Set hotkey and protect it by password.
0.019