important typographic shareware downloads
Search results for «important typographic»:
MainType 4.0
… ust want to view and install fonts as well as advanced features for graphic designers and typographers. In order to find the right fonts for your needs, MainType includes sort and filter functionality as well as a font information pane which reveals important typographic data.
It supports all p…
Stock Icons 1.0
… icon is available in four different sizes and six different extensions. application icons, business icons, corporate icons.
Specially designed for software and web developers and adaptable to multiple typographic palettes and style guides.…
Important E-Mail 1.1
… given to family and friends to stamp their e-mails as important.
Option to popup the e-mail so that you can view and confirm if the e-mail is important.
Minimizes to a tray icon which will notify you about the current status of your e-mail.…
Secret Notes 2.1.0
… your data to ensure that only you have access to it.
When you create a new Secret Notes file, you will be asked to enter a Master Password. This is the only Password that will allow access to your Secret Notes file.
Limitations
15 days trial…
Smart Mail Checker 1.13
… ile.
If the program finds a match with an existing rule among incoming messages, you will hear the sound the path to which is specified in the rule.
Limitations
14 days trial…
ReminderAll Professional 3.2.5
… you of important days and holidays.
ReminderAll Professional features
All-in-one organizer
reminder
show all holidays
important days
phones
world time
hide folders
and more...
Requirements
.NET Framework
Limitations
30 days…
ReminderAll Standard 3.2.5
… dard is a useful program that will remind you of important days and holidays.
ReminderAll Standard features
reminder
show all holidays
important days
phones
world time
hide folders
Requirements
.NET Framework
Limitations
30 days…
DataSafe PS Net 3.0
… how important it is to make backups.
And that's what DataSafe PS .Net is all about. It makes backups, backups, and more backups. So you can sleep and work easier knowing your important data is safe and sound in a secure location.
Limitations
3…
Computer Security 1.5
… lcomed quests".
Encryption is done using one of over 20 algorithms like Twofish, Cast128, Blowfish or Shaphire II. A special algorithm is used for secure erase that overwrites every bit of information with a random number of layers of data.…
Superior SQL Builder 2.1
… or components (including the Query Builder) programmatically from your own code.
The ability to instantly generate equivalent SQL scripts for each of your database servers.
Requirements
Requires Microsoft .NET Framework and MDAC 2.7 or above.…
Related: important typographic typographic data all important important when more important