Do you have an existing Delphi Legacy Application?
Does it still use Paradox files? Or Old Databases?
Are you looking to Upgrade your software?
Do you have Dedicated Delphi Programmers?
We are Delphi Solution Partners to clients across the globe with expertise from Delphi 5 to Delphi 10.1 Berlin.

3S Project v.0.05

By SoL Project.

Freeware + source 28 Jan 2003

Description

The 3S Project provides a quick and easy way to secure your applications using customized TActionList, users access management... In addition you will find a special component designed to enable fast data exchange between applications using shared memory.

Informations

  • Status: Fully functional
  • Source: Included
  • Exe demo: included
  • Size: 2 361kB

Platforms: D4, D5, D6

CoWindowsAccount v.1.0

By JSoft.

Freeware + source 03 Jan 2003

Description

Occasionally, you may want an application to verify a user's user name and password (hereafter referred to as credentials). You can do this a couple of different ways, depending on the operating system on which the application runs.

This article describes all of the common ways to verify a user's credentials and the special requirements for each method.

Note: Collecting user credentials from a User-mode application can be annoying to the users and can provide a possible security hole in the enterprise computing environment. The Unified Logon requirement (a requirement that the user should only be required to type their credentials one time at the Ctrl+Alt+Del screen), was added to the Microsoft BackOffice logo requirements for these very reasons. It is important to make sure that you really need to gather credentials and that some other method of client/server validation is not more appropriate. Consult the security documentation in the Platform SDK for more information on impersonation and programming secured servers.

Informations

  • Status: Fully functional
  • Source: Included
  • Size: 5kB

Platforms: D3, D4, D5, D6, D7

DWinlock v.2.11

By Kassl GmbH.

Shareware 07 Jan 2005

Description

dWinlock is an easy to use Delphi component to limit the access to Windows (95, 98, ME, NT, 2000, XP). This can be achieved by disabling a variety of key combinations (such as Ctrl+Alt+Del) and by hiding and replacing elements of the Windows desktop.

dWinlock offers the following functions:

  • Disable following keystrokes:
    • Ctrl Alt Del
    • Ctrl Esc
    • Alt Tab
    • Alt Esc
    • Alt F4
    • Win Key
    • Application Key
    • Right Mouse Button
  • Hide or replace following desktop elements:
    • Windows Taskbar
    • Windows Desktop
    • Windows Start Button
    • Tray Icons in the Windows Taskbar
    • Application Links in the Windows Taskbar
    • Replacement of Windows Start menu with own menu
All options can be activated or deactivated during runtime. Therefore it is not necessary to reboot your system after making changes.

Informations

  • Status: With Nag-Screen
  • Source: On purchase/registration
  • price: $69
  • Size: 568kB

Platforms: D4, D5, D6, D7

Ewinlock and Tools v.1.0

By ErtemSoft.

Freeware 12 Sep 2010

Description

Ewinlock is an easy to use toolkit which allows software developers to limit the access to windows systems.

Features:

  • ErtemSoft Winlock provides the following functions:
    • Block Internet Connection
    • Screen Lock
    • System Information
    • Disable keystrokes, for example: Ctrl Alt Del, Ctrl ESC, Alt Tab, Winkey
    • Block Keyboard
    • and more
  • Hide or replace the following the desktop elements:
    • Windows Taskbar
    • Windows Desktop
    • Tray icons
    • Disable Taskbar
  • Windows Tweak:
    • Disable Registry Editor (Regedit)
    • Disable Control Panel
    • Disable Add Remove Program
    • Disable USB Stor
    • Write Protect USB Stor
    • Disable Internet Explorer Options
    • Remove "All Programs" from Start Menu
  • Tools:
    • Hide / Unhide Directory from Windows
    • Change IP Address
    • Change DNS Address
    • Change Internet Explorer Start Page
    • Enable IE Start Page Button
    • Delete Temp Files
    • Delete IE Files (Cookies, password, more).

Informations

  • Status: Fully functional
  • Source: On purchase/registration
  • Source price: $19
  • Exe demo: included
  • Size: 1 084kB

Platforms: D2005, D2006, D2007, D2009, D2010, D6, D7

Login by parosifre v.2016

By Kaan Kucuk.

Freeware + source 24 Nov 2016

Description

ABBOUT LOGIN BY PAROSIFRE? It is a dll/library and can be used in Delphi/C++ or other dev.tools. Parosifre is a login software for all systems and software. Parosifre includes password and a combination lock. Password and combination lock consisting of 10 digits. Standard is five positions long password letters and supplemented with 5 positions fake password letters. The system generates a random password 5 digits and 5 positions as refrenties key(combination lock) between 0 and 9. Example: Password: Dolphins Combination lock: 12345678 Parosifre: QWoAMlFsLh (system generate random) Enter parosifre: 2385 FEATURES - System generates a random password code by any login - Only one password and combination lock -Another person that knows the password. It is useless. Which passwords that are assigned to which combination code will not found - 3 time wrong input, login blocked. - There is no need to change the password and combination lock to unblock parosifre - To unblock parosifre you enter password and combination lock - Suitable for all media, software, web database - Login with the classic password - Parosifre software useful for all system(software, database and etc.) DOWNLOAD LINK: https://drive.google.com/drive/folders/0B_snV0HNnU58OWpOeFlWQzlyUEU

Informations

  • Status: Fully functional
  • Source: Included
  • Size: 6 159kB

Platforms: CBXE, CBXE2, CBXE4, CBXE5, DXE2, DXE3, DXE4, DXE5, DXE6, DXE64, FM

NTSetOwnership v.2.00

By Kiril Antonov.

Freeware + source 02 Jan 2003

Description

NTSetOwnership is a Delphi component for setting owner of a file or a directory in Windows NT/2000/XP Pro.

To work this component requires the user that calls it to have granted one of the following permissions: Backup Files and Directories or Restore Files and Directories .

This component is usefull also when writing NT sevices because SYSTEM account have such priviledges.

Informations

  • Status: Fully functional
  • Source: Included
  • Size: 6kB

Platforms: CB6, D6, D7

Secure Actions v.1.0

By TheDevShop Ltd..

Shareware 06 Feb 2002

Description

TheDevShop's Secure Action List allow you to easily add user security at the program function level. We layer security on top of the versatile TActionList to allowing you to add user security with a minimum of effort.

Key Features:

  • Simple to Use - Use TSecureActionList as you would TActionList. Set a minimum security level for each Secure Action. Set the user level and your application is secured, all the way down to the control level.
  • Flexible User Level Handling - Simple event OnNeedUserLevel allows you to control getting user level. Be it a file read, a DB lookup or call a security service.
  • No Data Base - Many user security apps require BDE and database connections. We impose no such requirement.
  • Secure at the window control level - With Secure Actions your application is secured at a very precise level, each user function and the corresponding controls are secured.
  • No user login required - Secure Actions get the windows login ID by default. You users never have to login to your app (unless you want).
  • Warnings- Can warn of unsecured actions and program trying to enable security disabled actions.
  • Help and Demo App - download includes a component help an a commented demo application to get you going quickly.

Informations

  • Status: Trial (work while IDE is running)
  • Source: On purchase/registration
  • price: $59
  • Source price: $250
  • Size: 161kB

Platforms: CB5, D5, D6

Security Builder Standard Edition v.1.4.1

By Peter Petrov.

Freeware + source 18 Sep 2004

Description

Add multiuser and user rights functionality to your application with just a few mouse clicks.

Allows to control the user access to your app. GUI components (menus, buttons, check boxes, radio, .., everything connected to an Action) and to any non visual functionality. Just drag, drop and connect.

With Security Builder you can:

  • Build the security model of your app. at design time with few mouse clicks
  • Add and remove users on fly
  • Change users profile on fly
  • Add/remove securized items on fly
  • Securize non GUI functionalities
  • Predefined User Groups - Supervisors, Power Users, ...
  • Much more...
How it works:
  • Add TabActionList to any form you wish to be secured
  • Use TabActionList designer to select the components to secure - it automatically creates abActions
  • Add TabSecurity to the project (only once, typically on the main app form) then connect any List to TabSecurity (make sure you added the TabSecurity's unit in the uses clause of any securized form)
  • Double click TabSecurity component, and then choose "Rebuild from client lists" (make sure all forms containing TabActionLists are open
  • Before distributing remove soCreateSupervisorIfMissing TbSecurity.Options and include the UserTemplate file in your distribution pack.

Informations

  • Status: Fully functional
  • Source: Included
  • Exe demo: included
  • Size: 1 104kB

Platforms: CB5, CB6, D4, D5, D6, D7

SSecurity v.1.2.2

By Spider13 Software.

Freeware + source 13 Aug 2015

Description

SSecurity makes the identification of users' rights easier on the level of form or menu. In users' management features SSecurity is oriented to user's profiles which can be saved in database. Other sources also can be specified.

Informations

  • Status: Fully functional
  • Source: Included
  • Size: 99kB

Platforms: D2005, D2006, D2007

TLogin Standard Edition v.1.0

By Indra Gunawan.

Shareware 05 Jun 2007

Description

Smart, easy and powerful Delphi VCL accounts for rights and security management.

Features:

  • Very user friendly user interface
  • All Dataset descendants will be supported
  • Simple drag and drop management both Design-time and Run-time
  • User and group management
  • User Rights to control any controls/components available on any forms
  • Exclusive Watch… a thread safe control state monitoring feature to prevent external hook
  • Support both design-time and run-time decrypting the rights and manage accounts
  • Run As feature
  • Store the security description as you like (database, binary file)
  • Synch-Data-Synch support: synchronizing existing users data as well as TLogin known data format.

Informations

  • Status: Partially restricted
  • Source: On purchase/registration
  • price: $59
  • Source price: $75
  • Exe demo: included
  • Size: 1 670kB

Platforms: D2006, D7

TMS IntraWeb Security System v.1.8.1.0

By TMS Software.

Shareware 23 Jul 2015

Description

The TMS Security System facilitates the definition of user rights on a menu or form level. In its user management features the TMS IntraWeb Security System relies on user/group profiles stored in a database.

The users can be grouped and can inherit rights in this way. Thereby you can integrate a highly sophisticated and close grained user management that closes all potential loopholes via shortcuts with minimal effort. Only if the user has been granted the specific right by the administrator he can see or use the specific function assigned by the administrator.

The administrator can configure the rights at run-time thereby preventing a restart of the program when changing assignments. For doing so he can use an easy to handle, intuitive GUI that enables the administrator to create new users or to group or delete them directly from the application.

Informations

  • Status: Trial (work while IDE is running)
  • Source: On purchase/registration
  • price: $90
  • Size: 1 618kB

Platforms: C2k10, C2k9, CBXE, CBXE2, CBXE3, CBXE4, CBXE5, CBXE6, CBXE7, CBXE8, D2009, D2010, DXE, DXE2, DXE3, DXE4, DXE5, DXE6, DXE7, DXE8

TMS Security System v.2.9.0.0

By TMS Software.

Commercial 23 Jul 2015

Description

The TMS Security System facilitates the definition of user rights on a menu or form level. In its user management features the TMS Security System relies on user/group profiles stored in a database.

The users can be grouped and can inherit rights in this way. Thereby you can integrate a highly sophisticated and close grained user management that closes all potential loopholes via shortcuts with minimal effort. Only if the user has been granted the specific right by the administrator he can see or use the specific function assigned by the administrator.

The administrator can configure the rights at run-time thereby preventing a restart of the program when changing assignments. For doing so he can use an easy to handle, intuitive GUI that enables the administrator to create new users or to group or delete them directly from the application.

Informations

  • Status: Trial (work while IDE is running)
  • Source: On purchase/registration
  • price: $85
  • Size: 882kB

Platforms: C2k10, C2k6, C2k7, C2k9, CBXE, CBXE2, CBXE3, CBXE4, CBXE5, CBXE6, CBXE7, CBXE8, D2006, D2007, D2009, D2010, D7, DXE, DXE2, DXE3, DXE4, DXE5, DXE6, DXE7, DXE8

TNTFile Security v.1.0

By David A. Bussey.

Freeware + source 05 Apr 1999

Description

TNTFileSecurity is a non-visual component that allows you to view and edit file and directory access rights on Windows NT 4.0 and Windows 2000 (A.k.a. NT 5.0) NTFS partitions (even remote NTFS drives).

Informations

  • Status: Fully functional
  • Source: Included
  • Size: 18kB

Platforms: D4

TUsers Security Component v.2.0.6.0

By Tools&Comps.

Shareware 21 Sep 2011

Description

The TUsers Security Component is a set of components especially designed to allow developers to easily implement User Authentication and User Rights Management in applications developed with the tools Borland Delphi and C++ Builder. The component allows to control the access of the application through a login screen, where the user's name and password are requested. The component verifies whether the user is valid and reads their access configurations from the security database, applying the user settings in the application.

The TUsers Security Component is very easy to use. With the TUsers in action, you don't even need to write code to have strong protection covering all the application. Just drop the components in your forms, create the security database (with a utility included in the component package), configure a few properties and your application is then protected.

The component has also several properties, methods and events that allow developers to implement all specific security needs of their applications easily and very fast.

The TUsers allows to control the access to all the VCL, including buttons, menu items, Actions, DBGrids, Queries, Tables and Dataset Fields. The TUsers also works with virtually all the 3rd-party components available on the market.

Available Drivers: BDE, ADO, IBX, IBO, DBISAM, ADS, DOA, dbExpress, Apollo, ASTA, SQL-Direct, FIBPlus, mySQLDAC, PostgresDAC, ODAC.

Informations

  • Status: Trial (work while IDE is running)
  • Source: On purchase/registration
  • price: $199.95
  • Size: 1 712kB

Platforms: D2006, D2007, D2009, D2010, D7, DXE, DXE2

TUsersCSLite

By Tools&Comps.

Freeware + source 16 Jan 2003

Description

TUsersCSLite is based is a old version of the component (v1.2) which only protect menu items, but is still very usefull for several situations.

Informations

  • Status: Fully functional
  • Source: Included
  • Size: 1 414kB

Platforms: CB5, CB6, D5, D6, D7

User Control Package v.2.18a

By Rodrigo Cordeiro.

Freeware + source 05 Sep 2006

Description

User management and access control.

Enclosed XPMenu support, supports data access through/to ADO, DBX, IBX, BDE, IBO, FIBPlus, MDO, Zeos, DBISAM, ASTA3, MyDAC and MySQLDAC.

Access control auto-extract TMenu and TActionList itens. Control rights also to other components as TButtons, TDBEdits, TLabels, TFields, etc.

Log/event control with levels support.

Included Indy based component to send some mails to users. (EQ. "forgot password" in login window). Support for user profiles and login images customization.

Informations

  • Status: Fully functional
  • Source: Included
  • Size: 1 164kB

Platforms: D7

Vista Uac Elevation Wrapper v.1

By Ken Schafer.

Freeware + source 27 Mar 2007

Description

Frazzled by Vista's UAC (User Access Control), elevation requirements, and COM?

This complete solution features a COM object and interface wrapper to give the control back to you without having to struggle.

Full Source Code and compiled COM Object included.

Informations

  • Status: Fully functional
  • Source: Included
  • Exe demo: included
  • Size: 269kB

Platforms: D2005, D2006, D2007, D5, D7


More interesting links and pages


All binary option robots reviewed


Find the best promo codes & discounts


Valforex.com Reviews


Breaking News & Headlines


FX Tribune - Breaking Daily News


USA News


DailyCrosswordSolver.com


CodyCrossAnswers.com


Puzzle Shuffle


BestVPNRating.com