Introduction
Statistics
Contact
Development
Disclaimer
Help
ftp.icm.edu.pl home page
Here are just two predecessors to utf2any. These programs are very
simple and can be used by hackers who wish to write their own UTF
application.