|
Activation all fileds of OrdersCE 2002
|
|
|
FidalgoUT BoldItalic for the Windows Platform
|
|
|
Catalog your DivX, DVD, VCD and VHS movies!Some features:IMdB support: get all the movie info / actor filmography with one click!MicroDVD INI file generatorCovers gallery (using cdcovers.cc file na...
|
|
|
Wherever you go online, use HotLinks to help you to easily find, securely save and access all your crucial online information through either the HotLinks Toolbar or through the HotLinks.com web sit...
|
|
|
Mind4Math is an easy to use teaching assistant for both the classroom educator and the home teacher. We all know that education is an ongoing partnership between teacher and parent. But, there are ...
|
|
|
Are you a fan of classic video games? In 3D Caveman Rocks, the new retro arcade game from MVP, you get tons of video game excitement, in glorious 3D graphics. Caveman is looking for Stonehenge. Cav...
|
|
|
ShufflePlay is anMPEG-1 Layer-3 (*.MP3) file manager, playlist manager, andplayer-frontend integrated into one powerful package. With taggingsupport, you can best manage your MP3 collection. Sear...
|
|
|
This order contains the Unlock password for Waterworld Chart 26260 Psgs Between Acklins Is., Haiti and Caicos Is.. The order will generate an email containing the password to unlock the chart inst...
|
|
|
TingaUT RegularOblique for the Macintosh
|
|
|
4Safe StrongDisk enables to keep secret data on protected disk in Windows 95/98/NT/2000. Protected disk works as a common disk, but all its content is encrypted when written. To mount protected dis...
|
|
|
Actual Windows Minimizer lets you minimize any application to a small icon in the System Tray or to any Screen Edge.
|
|
|
The Camy Collection is a collection of four action-packed arcade-style platform games: Dear Camy, Dear Camy Remix, Camy II - Special Edition and Camy II - Challenging Edition. Collect gems and cool...
|
|
|
You create paintings withadventure! The castle blocks, the Castle Towers and the Turrets snaptogether in the way you design. Then your knights, soldiers and dragons dobattle!
|
|
|
Five great, fun, and clever words games in one package :* Words Twister, form words from the 7 letters provided...* Anagrams, retrieve the 5 words from their shuffled letters...* 3 Words, form up t...
|
|
|
eMail Verifier can save time and money for businesses who send newsletters to their clients, nonprofit organizations who send bulletins to their members, or any person or business that needs to mai...
|
|
|
IvanoCondensedUT Light for the Windows Platform
|
|
|
Small size (czSweep.exe is only 25 kb), efficiency and ease of use make czSweep an attractive file maintainance program. It will recover valuable disk space as well as provide security from unautho...
|
|
|
manage time, billing, calendaring, contacts, events, notes and research from a single repository that automatically integrates with Windows?Office Suites and other popular software.
|
|
|
A user friendly macro system designed to easily and accurately perform repetitive and / or complex tasks. EMac comes with a built-in IDE (Integrated Development Environment) and intuitive Wizards t...
|
|
|
eGems Collector Pro is the fastest, easiest way to gather, access and share facts, resources, data, quotes, graphics and other discrete pieces, or gems of information. Perfect for Internet research...
|
|
|
The SONY PCG-NVRxx series Security Chip w/Password Recovery Service allows for resetting of SONY PCG-NVRxx series BIOS passwords. The package includes instructions. This package includes the replac...
|
|
|
Quality T-shirt with theofficial shepherdmoons.net logo.
|
|
|
SHTML files are HTML files with SSI (Server Side Includes). SSI allows to include a common fragment into several HTML files, etc. Using Client Side SSI, you can convert SHTML files to plain HTML fi...
|
|
|
Great arcade game for Linux with strategic thinking. Your goal is to clear all the bubbles from the board, scoring as many points as possible. Just shoot at them with more bubbles, and when ...
|
|
|
You are a network security agent hired to protect the corporation's mainframe computer. As wave after wave of hackers descends on your company's data will you be fast enough defend it all?
|
|