Home | 10% - Off! | New | VCL | DB-Aware | Tools | DB Tools | Apps | Samples | .NET | .NET DB-Aware | .NET Tools | .NET Samples | Kylix | Docs | Bold | Discussion | Sites | Tips | DPFL | Authors | Uploads | RSS | Store | Advertisement | About
Components

Buttons and Check Boxes
Bars and Status Bars
Dialogs
Edits, Memos
Forms
Graphics
Grids
Indicators and Gauges
Labels
List and Combo Boxes
ListViews and TreeViews
Menus
Panels
Shapes
Sizers, Scrollers, etc.
Tabbed Components
Effects and Multimedia
Misc. Effects
Sound Effects
Reports
Print VCL
Charts and Graphs
Communications
Internet
System
Files and Drives
Miscellaneous
Tools
LAN and WAN
Installation
Date and Time
Data Compress
Science
Security
Shareware
Crypting Other
User Rights
Hardware
Passwords
Other
Crypting
Component Packs
Property Editors
Experts, IDE etc.
Components > Security > Other  

Companies News:

FastCube VCL 2 released
FastCube VCL 2 released

Desktop OLAP components set which supports Delphi/C++Builder/RAD Studio from version 7 up to XE5


    I. Revolutionary improvements in grids view and work
    II. Optimized and advanced Data analysis
    III. New Cubes possibilities
    IV. Global filter
    V. And much more...

Get more info here

Want to know more ?

 

ARProtector v.1.1FWS 11 k 23 Feb 1998
By Albert Research. TARProtector locks your application after a specified Idle Time. Precisely it triggers an event after this Inactivity Time so you can do any action at your application. 12 hour time compatibility.
 
Fully functional
Source: Included
Download: D2 D3  Homepage

Anti key logging components v.1.1FWS 315 k 31 Oct 2007
By Mr Wuul. TAntiKeyLoggerEdit and TAntiKeyLoggerMemo are components which extends TEdit / TMemo and were designed to defeat keyloggers.

The controls work by faking a random number of rubbish keystrokes whenever a real keystroke is entered - these rubbish keystrokes are picked up by the keylogger but ignored by the controls.
 
Fully functional
Source: Included
Exe-Demo Included

Download: D2005 D2006 D5 D6 D7  Homepage

AntiDebugger v.1.03FW 222 k 19 May 2011
By Costin Aurelian. Here's a most wanted anti-debugger unit.

It covers: anti-antivirus routines, disassembler traps, virtual environments, anti-heuristics etc from Windows 95 to Windows 7.

Having that's the first version, some bugs may occur - none found during tests.
 
Fully functional
Source: On purchase/registration
Source Price: $2000
Exe-Demo Included

Download: D2 D2005 D2006 D2007 D2009 D2010 D3 D4 D5 D7 DXE  Homepage

BigSpeed Secure Socket Library v.2.0FW 785 k 22 Oct 2005
By BigSpeed Computing Inc.. ActiveX control for secure private networking with 128-bit AES encryption and on-the-fly compression. Implements a flexible message-oriented protocol on top of a single TCP connection. Information is exchanged through typed data packets identified by a command code. Utilizes an elegant event-driven paradigm for easy integration into Windows applications. Can be used both on client and server side, with centralized management of all connections.
 
Fully functional
Source: None
Exe-Demo Included
Download: D6 D7  Homepage

D2Running v.1.0FWS 4 k 09 Sep 1997
By Aristide Torrelli. Simple component to check whether the Delphi IDE is running.
 
Fully functional
Source: Included
Download: D2  

ISGCSSecure v.1.6SW 2146 k 05 Jan 2005
By Infinity Software Group. Provide the security your customers need in their Client/Server applications. This Interbase security component provides the tools necessary to maintain secure access to your Client/Server applications.
 
Trial (work while IDE is running)
Source: On purchase/registration
Price: $149
Download: CB1 CB3 CB4 D2 D3 D4 D5 D6 D7  Register NowHomepage

MD5 Libary v.1.0.0.0FW 204 k 21 Dec 2006
By Patrik Abend. MD5 Libary is a small DLL witch includes the known MD5 functions to create MD5 Hash's from Strings and Files.
 
Fully functional
Source: None
Exe-Demo Included
Download: D1 D2 D2005 D2006 D3 D4 D5 D7  Homepage

Magenta Systems Code Signing Trust and Certificate Check component v.1.00FWS 5351 k 12 Jul 2010
By Magenta Systems Ltd. The Magenta Systems Code Signing Trust and Certificate Check component v1.0 functions are designed for Code Signing, aka Microsoft Authenticode.

Currently just two functions that check if an EXE, DLL or CAB file has a valid code signing certificate, that the certificate is trusted and that the program is not corrupted. These functions were written to support an remote program updater tool, to ensure the new program was not corrupted, but may also be used to self test a Delphi application for image corruption.

ProgVerifyTrust - simple function to check code signing certificate exists and is valid and not expired, and the program image is not corrupted. This should work with Windows 2000 and later (which have wintrust.dll).

ProgVerifyCert - similar to ProgVerifyTrust, but also extracts the certificate information, names, dates, etc. But this function needs capicom.dll COM object to be installed (from which the CAPICOM_TLB type library is created), which is a free redistributable file, included with this code. Microsoft claims Capicom is deprecated with Windows 7, but the DLL still works.
 
Fully functional
Source: Included
Exe-Demo Included

Download: D2005 D2006 D2007 D2009 D2010 D7 DXE DXE2 DXE3  Homepage

SecureType v.1.10C 54 k 26 Sep 2005
By Michael Lim Choon Hong. SecureType is the first and the most powerful anti-keyloggers software component in the world which is developed to protect a software/program from the all types of known and unknown keylogger softwares.

To those who are new to keylogging, keyloggers, key loggers, keystroke loggers, key recorders, key trappers, key capture programs, etc. belong to the group of tools that monitor PC user activity. Initially software products of this type were designed solely for recording key stroke information including the system keys, to the special log file (audit trail) being afterwards analyzed by the person who had installed this program. Log file can be sent within the network to the shared place, to the ftp server in the Internet, by e-mail etc. In cybercafes, offices, schools, libraries, etc. people can set up the keyloggers in the computer to grab your online-banking passwords, credit card infos, MSN passwords and so on.

Just with a few line of codes, your applications are safe against deadly Keyloggers such as BlazingTools Perfect Keylogger, Golden Keylogger, etc.

With this component, you can protect your password, credit card numbers, identification numbers and other secret information from being stolen by other people, or you can create an antikeylogger by yourself.

SecureType is less than 50KB and since it is a dynamic link library file, it consumes very less memory and will not affect your application's performance.

SecureType is developed for Windows 2000, XP and 2003. It can be used to protect software/program developed by using

  • Microsoft Visual Basic .NET (tested)
  • Microsoft Visual C# .NET (tested)
  • Microsoft Visual C++ .NET (tested)
  • Visual Basic Applications (4.0, 5.0 and 6.0) (tested)
  • Delphi Applications (5.0, 6.0, 7.0, 8.0 and Delphi .NET 2005) (tested)
  • Microsoft Visual C++ (5.0 and 6.0) (tested)
  • Borland C++ Builder Applications (5.0 and 6.0) (tested)
  • Bloodshed Dev C++ (4.9.9.1) (tested)
  • many more applications (coming soon.)

 
Evaluation (time-limit)
Source: None
Price: $50
Download: CB4 CB5 CB6 D2005 D5 D6 D7  Homepage

Simple AntiCopy Component v.2.12FWS 11 k 19 Aug 1998
By Oleg I. Subachev. Implements only two kinds of checks:
  • check for application's start drive
  • check for application's full path.
"But my main purpose in publishing SACC is to show technique that may be used by any programmer to perform tasks that require storing of some information inside .exe file".
 
Fully functional
Source: Included
Download: D1 D2 D3 D4  Homepage

Steganography Library v.2.1C 834 k 24 Nov 2007
By BV-Star.Development. This Library gives you a unique opportunity to add steganography functions in your applications. Using this library you can give your application ability to hide information in Jpeg, Jpeg2000, Wav, Bmp formats and so on, for example with the help of Bmp or Wav Stego routines you can easily add steganographic functions for other lossless formats (flac, tiff etc). It is very easy to use and you do not need any special skills.
 
Demo only
Source: N/A
Price: $99.99
Exe-Demo Included
Download: D2006 D2007 D7  Register NowHomepage

TSpywareScanner v.1.1SW 704 k 20 Aug 2005
By QwertyStudios. With TSpywareScanner you can build your own SpywareAdware scanner in several hours. It has everything you need to create a good hunter for malicious programs and BHOs. TSpywareScanner searches for malicious programs in files, registry and processes and asks what to do or simply deletes spyware without prompt. TSpywareScanner has a lot of properties and events which can customize all process of scanning, reporting, database updating and encryption. TSpywareScanner uses external malware database. There is a sample database in this package and a powerful DatabaseEditor program. Upon registration you'll receive another very large malware database. TSpywareScanner can also backup deleted files into special folder to restore them later. This package includes sources of sample spyware scanner build with TSpywareScanner.

Malware types that TSpywareScanner finds and eliminates:

  • Spyware;
  • Adware;
  • BHOs (Browser Helper Objects);
  • Trojans;
  • Trackware;
  • Dialers;
  • Keyloggers.

 
With Nag-Screen
Source: On purchase/registration
Price: $99
Source Price: $139
Exe-Demo Included
Download: D2005 D6 D7  Gift for Torry. Thank You !Register NowHomepage

TrasCRC FWS 9 k 31 May 2000
By Alexander Rodigin. TrasCRC component protects your executable with CRC16 making impossible to modify it either by wish or by accident.
 
Fully functional
Source: Included
Download: D3 D4 D5  


News from our Sponsors

  Develop and debug service applications easy then ever
SvCom is an integrated package of classes and tools for development of service applications and use of NT Security framework. Currently SvCom components work under all flavours of Windows.
  • Deploy NT Service applications under Windows 9x/ME and NT/ 2000/ XP/ 2003/ 2008/ Windows 7 (Unique feature!!!)
  • Develop and debug NT services using either Windows 95/98 or NT/ 2000/ XP/ 2003/ 2008/ Windows 7 - using the same classes and the same function calls (!!!)
  • Advanced service debugging (Extremely useful, when you service is not just "Hello, World!")
  • Many more features...
more... more...


  Delphi XE Handbook: A Guide to New Features in Delphi XE
Delphi XE Handbook is a guide to new features in Delphi XE, covering everything but the DataSnap portion of the product. Written by best-selling Delphi books author Marco Cantù, the book follows the Delphi Handbooks series on 2007, 2009, and 2010, both in scope and in the appraoch. This book on Delphi XE (covering only new features of the product) is 132 pages long and it is avaialble also in print. Here is the list of chapters: 1: Delphi XE IDE 2: Integrated Tooling 3: Compiler and RTL 4: XE Libraries more... more...

Advertising on Torry's Delphi Pages

 

Sort order
Title
Modification
Publication
Quick Search
Exact phrase
Title
Description


Advertising on Torry's Delphi Pages

Guest Book
Guest Book

Subscribe to news in RSS 2.0 format!Subscribe to news in RSS 2.0 format!
Bookmark and Share
Up | Home | 10% - Off! | New | VCL | DB-Aware | Tools | DB Tools | Apps | Samples | .NET | .NET DB-Aware | .NET Tools | .NET Samples | Kylix | Docs | Bold | Discussion | Sites | Tips | DPFL | Authors | Uploads | RSS | Store | Advertisement | About
Copyright  Torry's Delphi Pages Torry's Delphi Pages Maintained by Torry Team. Notes? Comments? Feel free to send...

The Ultimate Source of Object Pascal and Delphi Programming Knowledge.

Copyright © 1996-2014
All trademarks are the sole property of their respective owners
Privacy Policy