Описание: This professional-grade product includes multiple encoder components for the generation and integration of PDF417 barcode symbols. In this package, IDAutomation provides font encoders and graphic encoders. Font encoders return a text string, that when printed or displayed with the PDF417 font, create the PDF417 bar-code symbol. Graphic encoders simply return a graphic of the symbol. Encoders provided include: .NET DLL, Forms Control, ASP.NET Web Component, ActiveX DLL, Crystal Reports UFL, Java Class Library, Java Servlet, Native VB Module for Visual Basic, Excel and Access and the Native Crystal Reports Formula. The native formulas provided allow PDF417 barcodes to be created without any DLLs or libraries.
Загрузить IDAutomation PDF417 Font and Encoder 6.11 на mirsofta.ru
IDAutomation UPC EAN Barcode Fonts - The IDAutomation UPC/EAN Font Advantage Package is a professional, advanced font set with tools, macros and source code that uses a single font file to create UPC-A, UPC-E, EAN-8, EAN-13, EAN-14, JAN, ISBN and Bookland bar codes. This package uses IDAutom
IDAutomation Aztec Font and Encoder - IDAutomation's Aztec symbology barcode fonts allow printing of two dimensional Aztec barcodes from MS Windows or any computer with a Java VM with TrueType, BDF, FON, PostScript or PCL laserjet soft fonts.
IDAutomation MaxiCode Font and Encoder - This product enables printing of 2D MaxiCode barcodes from a font. TrueType, PostScript and PCL fonts are supplied with examples for Excel, Word, Access, VB and Crystal Reports. Includes Signed ActiveX Control with CAB.
Protaxis BestFonts 1.1: everything about your fonts - Are you tired of searching suitable fonts, copying font files and other nasty font-relative stuff? There is a small utility for everyday use named «Protaxis BestFonts». Using this program, you can do anything you like with fonts installed on your system. First, you can view all your fonts and test them on any custom text. For
Tonino File Encoder - reliable encoding and hiding of sensitive data - Hiding an encrypted file inside another file is a popular method of data protection. Not only does the file become impossible to open, but also nearly impossible to locate, since it seamlessly integrates into the structure of another file. This trick has been used for years and has proven to be very efficient