Skip to main content

download Code blocks 13.12 mingw.setup .exe 97 mb


NOTE: A newer version is been updated on the site ... visit here http://vastgk.blogspot.com/2017/07/download-code-blocks-1601-mingwsetup.html










File
DateDownload from
codeblocks-13.12-setup.exe
27 Dec 2013
codeblocks-13.12mingw-setup.exe
27 Dec 2013
codeblocks-13.12mingw-setup-TDM-GCC-481.exe
27 Dec 2013
NOTE: The codeblocks-13.12mingw-setup.exe file includes the GCC compiler and GDB debugger from TDM-GCC (version 4.7.1, 32 bit). The codeblocks-13.12mingw-setup-TDM-GCC-481.exe file includes the TDM-GCC compiler, version 4.8.1, 32 bit. While v4.7.1 is rock-solid (we use it to compile C::B), v4.8.1 is provided for convenience, there are some known bugs with this version related to the compilation of Code::Blocks itself.
IF UNSURE, USE "codeblocks-13.12mingw-setup.exe"!
 \

Linux logoLinux 32-bit:


DistroFileDate Download from
Debian logo
27 Dec 2013
27 Dec 2013

Fedora logo
27 Dec 2013
27 Dec 2013
27 Dec 2013
27 Dec 2013
27 Dec 2013
27 Dec 2013
CentOS logo
27 Dec 2013
27 Dec 2013
27 Dec 2013
27 Dec 2013
CentOS logo
29 Dec 2013
29 Dec 2013
29 Dec 2013

Linux logoLinux 64-bit:

DistroFileDate Download from
Debian logo
27 Dec 2013
27 Dec 2013
Fedora logo
27 Dec 2013
27 Dec 2013
27 Dec 2013
27 Dec 2013
27 Dec 2013

27 Dec 2013
CentOS logo
27 Dec 2013
27 Dec 2013
27 Dec 2013
27 Dec 2013
CentOS logo
29 Dec 2013
29 Dec 2013
29 Dec 2013
NOTE: The Linux packages above are compressed archives (tar.xz or tar.bz2). When you decompress the package you downloaded on your system, you will find all the .rpm or .deb packages required to install Code::Blocks. The packages named *-dbg-* (or *-debuginfo-*) contain the files needed to debug Code::Blocks itself, not needed for the most users.
Important note for Ubuntu users: The contrib-plugins package for debian can not be used on Ubuntu 12.04 and 12.10, due to an incomaptible libhunspell-package. Alternatively you can use the Ubuntu repo provided by our user pasgui.
Note: On RedHat/CentOS 5 and older revisions of 6 (up to 6.2 as far as I know) you need to add repoforge (former rpmforge) to your repolist, to be able to install the needed wxGTK-package. See http://repoforge.org/use for an instruction.

Note: Redhat/CentOS 5 also needs an installed hunspell-package, if you want to install the contrib-plugins. I build the package against hunspell from atomicorp.com, see:http://www6.atomicorp.com/channels/atomic/centos/5EL/. Other packages (if available) might also work.
Note: There seem to be no recent enough boost-packages available for RedHat/CentOS 5, so the NassiShneidermann-plugin is not available in the contrib-plugins for these systems.

Apple logoMac OS X:

FileDateDownload from
CodeBlocks-13.12-mac.zip
27 Dec 2013

Comments

  1. One of the best article ever seen on upc code.Love the concept and idea you presented in your article.Very helpful article.
    Thanks!

    ReplyDelete
  2. It's really very complicated in this busy life to listen news on Television, therefore I simply use the web for that purpose, and obtain the most recent information.

    ReplyDelete
  3. Code Blocks 13.12 Mingw.Setup .Exe 97 Mb >>>>> Download Now

    >>>>> Download Full

    Code Blocks 13.12 Mingw.Setup .Exe 97 Mb >>>>> Download LINK

    >>>>> Download Now

    Code Blocks 13.12 Mingw.Setup .Exe 97 Mb >>>>> Download Full

    >>>>> Download LINK 1Y

    ReplyDelete

Post a Comment

share your thoughts ....

Popular posts from this blog

How to Create Your Own Customized Run Commands

The Run command on Microsoft Windows operating system allows you to directly open an application or document with just a single command instead of navigating to it’s location and double-clicking the executable icon. However, it only works for some of the inbuilt Windows programs such as Command prompt (cmd), Calculator (calc) etc. So, have you ever wondered how to create your own customized Run commands for accessing your favorite programs, files and folders? Well, read on to find out the answer. Creating the Customized Run Command: Let me take up an example of how to create a customized run command for opening the Internet explorer. Once you create this command, you should be able to open the Internet explorer just by typing ie in the Run dialog box. Here is how you can do that. Right-click on your Desktop and select New -> Shortcut. You will see a “Create Shortcut” Dialog box as shown below Click on “Browse”, navigate to: Program Files -> Internet Explorer from y

Dragon Age: Inquisition Digital Deluxe Edition + All DLCs (torrent) Repack Size: 20.1~23.9 GB

Brief : Dragon Age: Inquisition  is an  action role-playing video game  developed by  Bioware Edmonton  and published by  Electronic Arts . The third major game in the  Dragon Age  franchise,  Dragon Age: Inquisition  is the sequel to  Dragon Age: Origins  and  Dragon Age II . The game was released worldwide in November 2014 for  Microsoft Windows ,  PlayStation 3 ,  PlayStation 4 ,  Xbox 360 , and  Xbox One . Repack Size: 20.1~23.9 GB 

Binary Search Tree in C++( dynamic memory based )

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 #include<bits/stdc++.h> using namespace std; struct bst { int val; bst * left, * right; }; bst * root = nullptr; void srch ( int num,bst * head) { if (head == nullptr){ cout << " \n Number is not present \a " << endl; return ; } if (head -> val == num) { cout << " \n Number is present \n\a " ; return ; } else { if (num < head -> val) srch(num,head -> left); else srch(num,head -> right);

Input and Output Functions in c

Objectives: Having read this section you should have a clearer idea of one of C's: 1.input functions, called scanf 2.output functions, called printf On The Run: Even with arithmetic you can't do very much other than write programs that are the equivalent of a pocket calculator. The real break through comes when you can read values into variables as the program runs. Notice the important words here: "as the program runs". You can already store values in variables using assignment. That is: a=100; stores 100 in the variable a each time you run the program, no matter what you do. Without some sort of input command every program would produce exactly the same result every time it was run. This would certainly make debugging easy! But in practice, of course, we need programs to do different jobs each time they are run. There are a number of different C input commands, the most useful of which is the scanf command. To read a single integer value into the variable cal

5 Best Popular Posts Widgets For Blogger

Adding the Popular Posts Widget for Blogger Just click on your blog title, access the "Layout" menu, click "Add a Gadget" and choose "Popular Posts". A window will appear asking you to configure the widget by choosing which posts you'll feature (e.g. those that were most viewed in the past 7 days or 30 days or from the beginning of your blog). You'll also be asked to choose how many posts you'll feature in your Popular Posts section and select if you'll show the post title only or along with the image thumbnail and/or the snippet. (Remember that each widget style has different requirements, so follow the styles and instructions carefully to find out if you need the snippet and image thumbnail or not). Popular Posts Style 1 - Box within a box This is an interesting widget style since it uses your snippet and image thumbnail in a unique way. Your snippet is written in opaque text and placed in a small transparent box. This, in turn,

QWERTY-keyboard when this idean came

QWERTY QWERTY   / ˈ k w Éœr t i /  is the most common modern-day  keyboard layout . The name comes from the first six  keys  appearing on the top left letter row of the keyboard and read from left to right: Q-W-E-R-T-Y. The QWERTY design is based on a layout created for the  Sholes and Glidden typewriter  and sold to  Remington  in 1873. It became popular with the success of the Remington No. 2 of 1878, and remains in use on electronic keyboards due to the  network effect  of a standard layout and a belief that  alternatives  fail to provide very significant advantages. [ 1 ]  The use and adoption of the QWERTY keyboard is often viewed as one of the most important case studies in  open standards  because of the widespread, collective adoption and use of the product. [ 2 ] History and purposes [ edit ] Keys are arranged on diagonal columns, to give space for the levers. Main article:  Sholes and Glidden typewriter Still used to this day, the QWERTY layout was devised

Indepth how bitcoin works and bitcoin mining.. full indepth tutorial

Cryptocurrency mining is painstaking, expensive, and only sporadically rewarding Why should I mine? By mining, you can earn cryptocurrency without having to put down money for it. That said, you certainly don't have to be a miner to own crypto.  You can also  buy crypto using fiat currency  (USD, EUR, JPY, etc); you can trade it on an exchange like  Bitstamp  using other crypto (example: Using Ethereum or NEO to buy Bitcoin); you even can earn it by playing video games or by publishing blogposts on platforms that pay its users in crypto. An example of the latter is  Steemit , which is kind of like Medium except that users can reward bloggers by paying them in a proprietary cryptocurrency called Steem.  Steem can then be traded elsewhere for Bitcoin.  In addition to lining the pockets of miners, mining serves a second and vital purpose: It is the only way to release new cryptocurrency into circulation. In other words, miners are basically "min

just more way to disable autorun.inf

Auto run.Inf this is a instruction file associated with the Auto run function. It is a simple text configuration file that instructs the OS (operating system) which executable to start which icon to use which additional menu commands to make available etc Auto run.inf must be located in the root directory of a volume.That is CD,DVD,of Floppy Disk or Pen drive. It is mainly used by the manufacturer on what actions to taken when their CD-ROM when it is inserted. In OS, when autorun.inf is enabled (Normally by default it is enabled ) then by inserting the Cd or DVD the content of the medium is automatically executed. This is to avoid the user intervention and help the low level knowledge of computer literacy people. But Virus programmer taken this as advantage and make virus instruction in autorun.inf text file. TYPICAL AUTORUN.INF A typical autorun.inf file looks like below. [autorun] open=setup.exe icon=setup.exe,0 label=GameProgram SIMPLE METHOD NOT TO GET INFECTED BY AUTORUN.INF:

get free domain for blogger

Get free domain for blogger 1.steps for Blogger= 1. type your blog address and your email id and using comment form 2. Goto your blog ,sign in and then goto layout{for modern interface}or Page element{old blogger interface} 3.click on add new gadget 4. goto html/java script gadget click there 5. copy this codes <a href='http://www.freedomain.co.nr/' title='Free Domain Name'><img alt='Free Domain Name' src='http://szsmnua.imdrv.net/soof62.gif' style='width:88px;height:31px;border:0;'/></a> it look like this 6.and click on save 7. then again follow steps 3-5 8.then now copy this codes <a href="http://vastgk.blogspot.in/" target="_blank"><img border="0" alt="Tips for New Bloggers" width="120" src="http://i154.photobucket.com/albums/s255/ownlblog/tipsbanner80x15.gif" height="15"/> </a> itlook like this 9. click on save