TSM Inc.

Company Homepage: http://www.crypto-central.com/

Send e-mail to this Company

  • unlimited number of local/remote databases for backup
  • unlimited number of Windows/Linux servers (FB 2.1, 2.5 and 3.0 are supported)
  • option for managing multiple backups for one database
  • optional ZIP compression and FTP transfer of backups
  • running as an application or as a service
  • lifetime license only USD 20
Company Products

Total 10 products

AecBlowfish

Components > Security > Crypting Other

By TSM Inc..

Freeware 05 Sep 2006

Description

Delphi implementation of the popular and fast 'Blowfish' algorithm by Bruce Schneier. Blowfish is royalty free and does not have any known weaknesses. The algorithm is royalty free.

Features:

  • ECB, CBC, CFB and OFB modes of operation
  • Automatically handles all padding of the input
  • High-level functions for encrypting strings, files, buffers and streams
  • Additional mode for producing CBC-MACs (keyed hashes)
  • Also includes support for base64 encoding and decoding strings
  • Full native Delphi source code included in Corporate version.
Password for installation is "jk3=avn4Dw87305sj3".

Informations

  • Status: Fully functional
  • Source: On purchase/registration
  • Source price: $99
  • Size: 926kB

Platforms: CB3, CB4, CB5, CB6, D3, D4, D5, D6

aecDES

Components > Security > Crypting

By TSM Inc..

Freeware 05 Sep 2006

Description

Delphi implementation of the 'old faithful' of the block encryption algorithms. DES has a relatively short key length of 56 bits, but has stood the test of time to show that the quickest attack on DES is to search the entire keyspace for the correct key. DES is the most thoroughly inspected block ciphers.

Features:

  • ECB, CBC, CFB and OFB modes of operation
  • Automatically handles all padding of the input
  • High-level functions for encrypting strings, files, buffers and streams
  • Additional mode for producing CBC-MACs (keyed hashes)
  • Also includes support for base64 encoding and decoding strings
  • Full native Delphi source code included in Corporate version.
Password for installation is "bog08gG((ihiiH".

Informations

  • Status: Fully functional
  • Source: On purchase/registration
  • Source price: $99
  • Size: 739kB

Platforms: CB3, CB4, CB5, CB6, D3, D4, D5, D6

AecRijndael v.1.16

Components > Security > Crypting

By TSM Inc..

Freeware 20 Jun 2001

Description

Delphi implementation of the new standard algorithm as chosen in the recent AES competition. Rijndael was chosen from a panel of 15 different algorithms from top crypto experts, and has received a large amount of attention from cryptoanalysts in recent months. As of now, this is our recommended algorithm for symmetric encryption. The algorithm is patent and royalty free.

Features:

  • ECB, CBC, CFB and OFB modes of operation
  • Automatically handles all padding of the input
  • High-level functions for encrypting strings, files, buffers and streams
  • Additional mode for producing CBC-MACs (keyed hashes)
  • Also includes support for base64 encoding and decoding strings
  • Full native Delphi source code included in Corporate version.
Password for free installation is "vnsj289+4Sxfl4s04kjsp".

Informations

  • Status: Fully functional
  • Source: On purchase/registration
  • Source price: $99
  • Size: 1 380kB

Platforms: CB3, CB4, CB5, CB6, D3, D4, D5, D6

AecRSA

Components > Security > Crypting Other

By TSM Inc..

Freeware 05 Sep 2006

Description

The original RSA algorithm conveniently packaged as a Delphi component. The RSA component has been a long time in the making, but we hope that you will find that it meets the promises we have made for it.

Features:

  • Supports 512, 1024 and 2048 bit keys
  • Compatibility to standard RSA keys (example program here)
  • Fast implementation
  • Performs Key Generation, Encryption, Decryption, Signing and verification
  • Built in interface for linking with symmetric algorithms
  • Easy to use interface.
Installation password is "hjkDL9l3s0s[39s3fm3".

Informations

  • Status: Fully functional
  • Source: On purchase/registration
  • Source price: $99
  • Size: 773kB

Platforms: CB3, CB4, CB5, CB6, D3, D4, D5, D6

AecSLockPK Shareware Protection v.2.02i

Components > Security > Shareware

By TSM Inc..

Commercial 05 Sep 2006

Description

SLockPK uses the power of public key encryption to protect your software. Recognized by experts as the only secure way to protect software, public key crypto provides a level of security higher than hardware dongles, but using only software.

Features:

  • Public key encryption (RSA) for highest security possible
  • Cryptographic hashing (SHA-1) to lock license to your software
  • Cryptographic hashing (SHA-1) to lock license to a single PC
  • Protects against viruses and cracks
  • Can use optional Internet server to make automatic registrations
  • Delivers adverts (so the other 90% of downloads work for you)
  • Advanced protection against tampering
  • Licenses have an expiry date (software rental or re-registration)
  • Licenses can be created for a single PC or a group of PCs
  • Key generators are impossible
  • Internet server can constantly monitor for cracks
  • Internet server can inform you of downloads and registrations.
Installation password is "97kHKk8zhouhHOhonjfdd".

Informations

  • Status: Fully functional
  • Source: On purchase/registration
  • price: $89
  • Source price: $249
  • Size: 2 341kB

Platforms: CB4, CB5, CB6, D5, D6, D7

AecTwofish v.1.0

Components > Security > Crypting

By TSM Inc..

Freeware 04 Jan 1999

Description

Twofish is the AES candidate from the team lead by Bruce Schneier, author of the famous Blowfish algorithm. Twofish is designed for maximum speed and flexibility and is set to become the leading algorithm for the next decade. One advantage of Twofish over other AES candidates is that the algorithm is not now, nor never will be under any patent restrictions

Features:

  • Offers encryption using 128, 192 or 256-bit keys
  • ECB, CBC, CFB and OFB modes of operation
  • Automatically handles all padding of the input
  • High-level functions for encrypting strings, files, buffers and streams
  • Additional mode for producing CBC-MACs (keyed hashes)
  • Also includes support for base64 encoding and decoding strings
  • Full native Delphi source code included in Corporate version.
Password for installation is "Vpz86f7IGvo8vp".

Informations

  • Status: Fully functional
  • Source: On purchase/registration
  • Source price: $99
  • Size: 779kB

Platforms: CB3, CB4, CB5, CB6, D3, D4, D5, D6

DataMail

Applications in Delphi and BCB > Internet > Mail

By TSM Inc..

Shareware 02 Aug 1999

Description

DataMail allows you to quickly and easily create a mail distribution using a similar method to the "MailMerge" function in Microsoft Word. Where the Word MailMerge allows you to create printed letters, DataMail lets you do the same for eMail, meaning you can stay in contact with a large number of contacts quickly and easily.

DataMail is different from an internet mailing list in that you can selectively eMail your contacts and that you can change the text of the mail according to fields in a database. DataMail uses a connection to your mail server to send mails at up to speeds of 10k mails per hour. The speed is of course dependant on the speed of your internet connection and the speed of your mail server.

Informations

  • Status: Evaluation (time-limit)
  • Source: N/A
  • price: $20
  • Size: 368kB

Platforms: NT4, W2K, W95, W98,

Password Guardian

Applications in Delphi and BCB > Security > Passwords

By TSM Inc..

Freeware 21 Sep 1998

Description

Password Guardian keeps track of your passwords. Password Guardian uses Blowfish encryption which has stood the test of time and has proved itself to be reliable. There are no known methods of breaking Blowfish encryption, an important point as many will have heard by now that DES (Data Encryption Standard) has been broken in the very recent past. Password Guardian also ensures that no passwords can be leaked out of the system: Passwords are only ever stored in encrypted form, only being decrypted in memory for display. After the passwords are used, they are destroyed by overwriting them (referred to as 'burning' them) before freeing the memory where they are stored.

Informations

  • Status: Fully functional
  • Source: None
  • Size: 218kB

Platforms: NT4, W2K, W95, W98,

TElliptic Curve

Components > Security > Crypting Other

By TSM Inc..

Freeware 05 Sep 2006

Description

Delphi implementation of Elliptic Curve public key encryption. Elliptic Curves offer the best public key security with the smallest possible key length. The elliptic curve problem is considered to be significantly harder to solve than RSA, and can therefore offer a comparable level of strength in much shorter bit lengths.

Features:

  • 160 bit keylength - roughly equivalent to 1024 bit RSA
  • Very fast
  • Performs Encryption, Decryption, Signing and verification
  • Performs key generation for symmetric encryption
  • Full native Delphi source code included in Corporate version.
Installation password is "sdfw2ertIGiuij%".

Informations

  • Status: Fully functional
  • Source: On purchase/registration
  • Source price: $99
  • Size: 503kB

Platforms: CB3, CB4, CB5, CB6, D3, D4, D5, D6

TMD5

Components > Security > Crypting

By TSM Inc..

Freeware 05 Sep 2006

Description

Delphi implementation of the MD5 message digest algorithm. MD5 provides a 128 bit cryptographically secure hash (Message Digest) of a given input. MD5 was one of the first generally accepted cryptographically secure hashes, and is still widely in use today.

Features:

  • 160 bit hash length
  • Offers high-level functions for producing the hash of a string, file or stream
  • Full native Delphi source code included in Corporate (with source) version.
Installation password is "JHHJGJudzfugUG5".

Informations

  • Status: Fully functional
  • Source: On purchase/registration
  • Source price: $99
  • Size: 728kB

Platforms: CB3, CB4, CB5, CB6, D3, D4, D5, D6

News from our Sponsors

Complete solution for using Bluetooth, IrDA, WiFi, WiiMote, Kinect and Serial Ports communication in applications

The Wireless Communication Library is the powerful SDK for software developers.

The Library includes a complete components set for develop applications which should use Bluetooth, IrDA, WiFi or Serial Port communication. Also WCL provides easy way to connect to a Wii Remote controller. Since version 6.11 WCL supports Microsoft Kinect game controller.

The Library can be used with Borland Delphi, Borland Developer Studio, Borland CBuilder, Microsoft Visual Studio .NET, Microsoft Visual C++ and Microsoft Visual Basic 6. The Wireless Communication Library is 100% compatable with Windows XP, Windows Vista, Windows 7 and Windows 8.

more …


Components for video and audio processing

RVMedia is a set of Delphi VCL and Lazarus LCL components having the following functions:

Receiving video from local web cameras and IP cameras;Configuring IP cameras and controlling their rotation;
Reading sound from a microphone;Sending and receiving video and audio data via the Internet;
Organizing video chats and video conferences (either as directly connected applications or using a client-server model).

more …

More interesting links and pages


All binary option robots reviewed


Find the best promo codes & discounts