Editor's choice |
xFunction for Windows
JNI proxy for calling native code functions and APIs from Java
FlyTreeView for ASP.NET
Treeview control for ASP.NET with complete support for .NET 3.5
Visustin
Visustin converts source code to flow charts and UML activity diagrams.
Setup Maker
EXE installation setup creator application generate windows executable packages
Best ComboBox
ActiveX ComboBox control with extended features...
.Net Grid
.Net Grid. hierarchy, grouping, serialization, 50000 upd/sec, low CPU consumption
FastReport CLX Site license with discoun
Unlimited number of copies FastReport VCL for developers.
FastReport ...
|
|
Free software system gainings from the greatest in download catalogs! Browse the popular software programs categories, find out the freshest updates of the amazing softwares programs, and acquire forthwith! Do not toss away a luck to acquire the first class tools: employ SoftEmpire to get solutions for free of charge. Meet the aggregation of free programs and app trial versions. take among computer softwares, obtain planners, firewalls, and all other kinds of software for your PC or cellular phones!
Resources for software development: IDE & Editors, programming, testing, configuration management, databases and components. Huge collection of free components and utilities. Free download of all files.
|
SQLStomper
SQLStomper is a SQL Database Explorer, a SQL Statement Generator, a Database Query Tool, and much more all combined into one simple application.
Kenrel for Access Password Recovery
Kernel Recovery for Access Password software effectively restores the passwords and enables you to access password-protected data saved in Access database file.
|
Windows Backup |
Looking for backup software? Try Handy Backup - automatic data backup to DVD, CD, FTP, network, or Online. Client-server enterprise backup software.
|
Top Downloads |
Freeware program to rename files & folders & Multimedia files wi
Hotspot Shield secures your Internet connection from hackers
Protect your computer from viruses and malicious programs.
|
|