- Report designer improvements
- New data field editor
- Added new transport to S3 (AWS)
By Mr Wuul.
Freeware + source 31 Oct 2007Description
TAntiKeyLoggerEdit and TAntiKeyLoggerMemo are components which extends TEdit / TMemo and were designed to defeat keyloggers. The controls work by faking a random number of rubbish keystrokes whenever a real keystroke is entered - these rubbish keystrokes are picked up by the keylogger but ignored by the controls.Informations
- Status: Fully functional
- Source: Included
- Size: 315 kB
Platforms: D2005, D2006, D5, D6, D7
By Costin Aurelian.
Freeware 19 May 2011Description
Here's a most wanted anti-debugger unit. It covers: anti-antivirus routines, disassembler traps, virtual environments, anti-heuristics etc from Windows 95 to Windows 7. Having that's the first version, some bugs may occur - none found during tests.Informations
- Status: Fully functional
- Source: On purchase/registration
- Source price: $2000
- Size: 222 kB
Platforms: D2, D2005, D2006, D2007, D2009, D2010, D3, D4, D5, D7, DXE
By Albert Research.
Freeware + source 23 Feb 1998Description
TARProtector locks your application after a specified Idle Time. Precisely it triggers an event after this Inactivity Time so you can do any action at your application. 12 hour time compatibility.Informations
- Status: Fully functional
- Source: Included
- Size: 11 kB
Platforms: D2, D3
Description
Delphi and C++ Builder authentication library for Android.Informations
- Status: With Nag-Screen
- Source: On purchase/registration
- price: $80
- Size: 350 kB
Platforms: C10, C10.1, C10.2, C10.3, C10.4, C11, C11.1, CB12, D10, D10.1, D10.2, D10.3, D10.4, D11, D11.1, D12
Description
ActiveX control for secure private networking with 128-bit AES encryption and on-the-fly compression. Implements a flexible message-oriented protocol on top of a single TCP connection. Information is exchanged through typed data packets identified by a command code. Utilizes an elegant event- …Informations
- Status: Fully functional
- Source: None
- Size: 785 kB
Platforms: D6, D7
Description
Delphi and C++ Builder biometrics library for Android.Informations
- Status: With Nag-Screen
- Source: On purchase/registration
- price: $80
- Size: 633 kB
Platforms: C10, C10.1, C10.2, C10.3, C10.4, C11, C11.1, CB12, D10, D10.1, D10.2, D10.3, D10.4, D11, D11.1, D12
Description
Simple component to check whether the Delphi IDE is running.Informations
- Status: Fully functional
- Source: Included
- Size: 4 kB
Platforms: D2
Description
Provide the security your customers need in their Client/Server applications. This Interbase security component provides the tools necessary to maintain secure access to your Client/Server applications.Informations
- Status: Trial (work while IDE is running)
- Source: On purchase/registration
- price: $149
- Size: 2 146 kB
Platforms: CB1, CB3, CB4, D2, D3, D4, D5, D6, D7
Description
The Magenta Systems Code Signing Trust and Certificate Check component v1.0 functions are designed for Code Signing, aka Microsoft Authenticode. Currently just two functions that check if an EXE, DLL or CAB file has a valid code signing certificate, that the certificate is trusted and that the program is not corrupted.Informations
- Status: Fully functional
- Source: Included
- Size: 5 351 kB
Platforms: D2005, D2006, D2007, D2009, D2010, D7, DXE, DXE2, DXE3
By Patrik Abend.
Freeware 21 Dec 2006Description
MD5 Libary is a small DLL witch includes the known MD5 functions to create MD5 Hash's from Strings and Files.Informations
- Status: Fully functional
- Source: None
- Size: 204 kB
Platforms: D1, D2, D2005, D2006, D3, D4, D5, D7
Description
SecureType is the first and the most powerful anti-keyloggers software component in the world which is developed to protect a software/program from the all types of known and unknown keylogger softwares. To those who are new to keylogging, keyloggers, key loggers, keystroke loggers, key recorders, …Informations
- Status: Evaluation (time-limit)
- Source: None
- price: $50
- Size: 54 kB
Platforms: CB4, CB5, CB6, D2005, D5, D6, D7
By Oleg I. Subachev.
Freeware + source 19 Aug 1998Description
Implements only two kinds of checks: check for application’s start drive check for application’s full path. "But my main purpose in publishing SACC is to show technique that may be used by any programmer to perform tasks that require storing of some information inside .exe file".Informations
- Status: Fully functional
- Source: Included
- Size: 11 kB
Platforms: D1, D2, D3, D4
Description
This Library gives you a unique opportunity to add steganography functions in your applications. Using this library you can give your application ability to hide information in Jpeg, Jpeg2000, Wav, Bmp formats and so on, for example with the help of Bmp or Wav Stego routines you can easily add …Informations
- Status: Demo only
- Source: N/A
- price: $99.99
- Size: 834 kB
Platforms: D2006, D2007, D7
By QwertyStudios.
20 Aug 2005Description
With TSpywareScanner you can build your own SpywareAdware scanner in several hours. It has everything you need to create a good hunter for malicious programs and BHOs. TSpywareScanner searches for malicious programs in files, registry and processes and asks what to do or simply deletes spyware without prompt.Informations
- Status: With Nag-Screen
- Source: On purchase/registration
- price: $99
- Source price: $139
- Exe demo: included
- Size: 704 kB
Platforms: D2005, D6, D7