Home | 10% - Off! | New | VCL | DB-Aware | Tools | DB Tools | Apps | Samples | .NET | .NET DB-Aware | .NET Tools | .NET Samples | Kylix | Docs | Bold | Discussion | Sites | Tips | DPFL | Authors | Uploads | RSS | Store | Advertisement | About

Buttons and Check Boxes
Bars and Status Bars
Edits, Memos
Indicators and Gauges
List and Combo Boxes
ListViews and TreeViews
Sizers, Scrollers, etc.
Tabbed Components
Effects and Multimedia
Misc. Effects
Sound Effects
Print VCL
Charts and Graphs
Files and Drives
Date and Time
Data Compress
Crypting Other
User Rights
Component Packs
Property Editors
Experts, IDE etc.
Components > Security > Other  

Companies News:

HQBird - FirebirdSQL distribution from IBSurgeon
HQBird - FirebirdSQL distribution from IBSurgeon HQbird is an advanced FirebirdSQL distribution from IBSurgeon, it includes replication, monitoring, optimization tools, recovery and database GUI. More details and download
Want to know more ?


Anti key logging components v.1.1FWS 315 k 31 Oct 2007
By Mr Wuul. TAntiKeyLoggerEdit and TAntiKeyLoggerMemo are components which extends TEdit / TMemo and were designed to defeat keyloggers.

The controls work by faking a random number of rubbish keystrokes whenever a real keystroke is entered - these rubbish keystrokes are picked up by the keylogger but ignored by the controls.
Fully functional
Source: Included
Exe-Demo Included

Download: D2005 D2006 D5 D6 D7  Homepage

AntiDebugger v.1.03FW 222 k 19 May 2011
By Costin Aurelian. Here's a most wanted anti-debugger unit.

It covers: anti-antivirus routines, disassembler traps, virtual environments, anti-heuristics etc from Windows 95 to Windows 7.

Having that's the first version, some bugs may occur - none found during tests.
Fully functional
Source: On purchase/registration
Source Price: $2000
Exe-Demo Included

Download: D2 D2005 D2006 D2007 D2009 D2010 D3 D4 D5 D7 DXE  Homepage

ARProtector v.1.1FWS 11 k 23 Feb 1998
By Albert Research. TARProtector locks your application after a specified Idle Time. Precisely it triggers an event after this Inactivity Time so you can do any action at your application. 12 hour time compatibility.
Fully functional
Source: Included
Download: D2 D3  Homepage

BigSpeed Secure Socket Library v.2.0FW 785 k 22 Oct 2005
By BigSpeed Computing Inc.. ActiveX control for secure private networking with 128-bit AES encryption and on-the-fly compression. Implements a flexible message-oriented protocol on top of a single TCP connection. Information is exchanged through typed data packets identified by a command code. Utilizes an elegant event-driven paradigm for easy integration into Windows applications. Can be used both on client and server side, with centralized management of all connections.
Fully functional
Source: None
Exe-Demo Included
Download: D6 D7  Homepage

D2Running v.1.0FWS 4 k 09 Sep 1997
By Aristide Torrelli. Simple component to check whether the Delphi IDE is running.
Fully functional
Source: Included
Download: D2  

ISGCSSecure v.1.6SW 2146 k 05 Jan 2005
By Infinity Software Group. Provide the security your customers need in their Client/Server applications. This Interbase security component provides the tools necessary to maintain secure access to your Client/Server applications.
Trial (work while IDE is running)
Source: On purchase/registration
Price: $149
Download: CB1 CB3 CB4 D2 D3 D4 D5 D6 D7  Register NowHomepage

Magenta Systems Code Signing Trust and Certificate Check component v.1.00FWS 5351 k 12 Jul 2010
By Magenta Systems Ltd. The Magenta Systems Code Signing Trust and Certificate Check component v1.0 functions are designed for Code Signing, aka Microsoft Authenticode.

Currently just two functions that check if an EXE, DLL or CAB file has a valid code signing certificate, that the certificate is trusted and that the program is not corrupted. These functions were written to support an remote program updater tool, to ensure the new program was not corrupted, but may also be used to self test a Delphi application for image corruption.

ProgVerifyTrust - simple function to check code signing certificate exists and is valid and not expired, and the program image is not corrupted. This should work with Windows 2000 and later (which have wintrust.dll).

ProgVerifyCert - similar to ProgVerifyTrust, but also extracts the certificate information, names, dates, etc. But this function needs capicom.dll COM object to be installed (from which the CAPICOM_TLB type library is created), which is a free redistributable file, included with this code. Microsoft claims Capicom is deprecated with Windows 7, but the DLL still works.
Fully functional
Source: Included
Exe-Demo Included

Download: D2005 D2006 D2007 D2009 D2010 D7 DXE DXE2 DXE3  Homepage

MD5 Libary v. 204 k 21 Dec 2006
By Patrik Abend. MD5 Libary is a small DLL witch includes the known MD5 functions to create MD5 Hash's from Strings and Files.
Fully functional
Source: None
Exe-Demo Included
Download: D1 D2 D2005 D2006 D3 D4 D5 D7  Homepage

SecureType v.1.10C 54 k 26 Sep 2005
By Michael Lim Choon Hong. SecureType is the first and the most powerful anti-keyloggers software component in the world which is developed to protect a software/program from the all types of known and unknown keylogger softwares.

To those who are new to keylogging, keyloggers, key loggers, keystroke loggers, key recorders, key trappers, key capture programs, etc. belong to the group of tools that monitor PC user activity. Initially software products of this type were designed solely for recording key stroke information including the system keys, to the special log file (audit trail) being afterwards analyzed by the person who had installed this program. Log file can be sent within the network to the shared place, to the ftp server in the Internet, by e-mail etc. In cybercafes, offices, schools, libraries, etc. people can set up the keyloggers in the computer to grab your online-banking passwords, credit card infos, MSN passwords and so on.

Just with a few line of codes, your applications are safe against deadly Keyloggers such as BlazingTools Perfect Keylogger, Golden Keylogger, etc.

With this component, you can protect your password, credit card numbers, identification numbers and other secret information from being stolen by other people, or you can create an antikeylogger by yourself.

SecureType is less than 50KB and since it is a dynamic link library file, it consumes very less memory and will not affect your application's performance.

SecureType is developed for Windows 2000, XP and 2003. It can be used to protect software/program developed by using

  • Microsoft Visual Basic .NET (tested)
  • Microsoft Visual C# .NET (tested)
  • Microsoft Visual C++ .NET (tested)
  • Visual Basic Applications (4.0, 5.0 and 6.0) (tested)
  • Delphi Applications (5.0, 6.0, 7.0, 8.0 and Delphi .NET 2005) (tested)
  • Microsoft Visual C++ (5.0 and 6.0) (tested)
  • Borland C++ Builder Applications (5.0 and 6.0) (tested)
  • Bloodshed Dev C++ ( (tested)
  • many more applications (coming soon.)

Evaluation (time-limit)
Source: None
Price: $50
Download: CB4 CB5 CB6 D2005 D5 D6 D7  Homepage

Simple AntiCopy Component v.2.12FWS 11 k 19 Aug 1998
By Oleg I. Subachev. Implements only two kinds of checks:
  • check for application's start drive
  • check for application's full path.
"But my main purpose in publishing SACC is to show technique that may be used by any programmer to perform tasks that require storing of some information inside .exe file".
Fully functional
Source: Included
Download: D1 D2 D3 D4  Homepage

Steganography Library v.2.1C 834 k 24 Nov 2007
By BV-Star.Development. This Library gives you a unique opportunity to add steganography functions in your applications. Using this library you can give your application ability to hide information in Jpeg, Jpeg2000, Wav, Bmp formats and so on, for example with the help of Bmp or Wav Stego routines you can easily add steganographic functions for other lossless formats (flac, tiff etc). It is very easy to use and you do not need any special skills.
Demo only
Source: N/A
Price: $99.99
Exe-Demo Included
Download: D2006 D2007 D7  Register NowHomepage

TrasCRC FWS 9 k 31 May 2000
By Alexander Rodigin. TrasCRC component protects your executable with CRC16 making impossible to modify it either by wish or by accident.
Fully functional
Source: Included
Download: D3 D4 D5  

TSpywareScanner v.1.1SW 704 k 20 Aug 2005
By QwertyStudios. With TSpywareScanner you can build your own SpywareAdware scanner in several hours. It has everything you need to create a good hunter for malicious programs and BHOs. TSpywareScanner searches for malicious programs in files, registry and processes and asks what to do or simply deletes spyware without prompt. TSpywareScanner has a lot of properties and events which can customize all process of scanning, reporting, database updating and encryption. TSpywareScanner uses external malware database. There is a sample database in this package and a powerful DatabaseEditor program. Upon registration you'll receive another very large malware database. TSpywareScanner can also backup deleted files into special folder to restore them later. This package includes sources of sample spyware scanner build with TSpywareScanner.

Malware types that TSpywareScanner finds and eliminates:

  • Spyware;
  • Adware;
  • BHOs (Browser Helper Objects);
  • Trojans;
  • Trackware;
  • Dialers;
  • Keyloggers.

With Nag-Screen
Source: On purchase/registration
Price: $99
Source Price: $139
Exe-Demo Included
Download: D2005 D6 D7  Gift for Torry. Thank You !Register NowHomepage

News from our Sponsors

  Complete solution for using Bluetooth, IrDA, WiFi, WiiMote, Kinect and Serial Ports communication in applications
The Wireless Communication Library is the powerful SDK for software developers. The Library includes a complete components set for develop applications which should use Bluetooth, IrDA, WiFi or Serial Port communication. Also WCL provides easy way to connect to a Wii Remote controller. Since version 6.11 WCL supports Microsoft Kinect game controller. The Library can be used with Borland Delphi, Borland Developer Studio, Borland CBuilder, Microsoft Visual Studio .NET, Microsoft Visual C++ and Microsoft Visual Basic 6. The Wireless Communication Library is 100% compatable with Windows XP, Windows Vista, Windows 7 and Windows 8. more... more...

  Components for video and audio processing
RVMedia is a set of Delphi VCL and Lazarus LCL components having the following functions: Receiving video from local web cameras and IP cameras;Configuring IP cameras and controlling their rotation; Reading sound from a microphone;Sending and receiving video and audio data via the Internet; Organizing video chats and video conferences (either as directly connected applications or using a client-server model). more... more...

Advertising on Torry's Delphi Pages


Sort order
Quick Search
Exact phrase

Advertising on Torry's Delphi Pages

Guest Book
Guest Book

Sign-up for Torry newsletter
and get free component pack !



Subscribe to news in RSS 2.0 format!Subscribe to news in RSS 2.0 format!
Bookmark and Share
Up | Home | 10% - Off! | New | VCL | DB-Aware | Tools | DB Tools | Apps | Samples | .NET | .NET DB-Aware | .NET Tools | .NET Samples | Kylix | Docs | Bold | Discussion | Sites | Tips | DPFL | Authors | Uploads | RSS | Store | Advertisement | About
Copyright © Torry's Delphi Pages Torry's Delphi Pages Notes? Comments? Feel free to send...

The Ultimate Source of Object Pascal and Delphi Programming Knowledge.

Copyright © 1996-2015
All trademarks are the sole property of their respective owners
Privacy Policy