ALL VCL, WEB, FNC, FMX, LCL .NET and IntraWeb components + Business Tools & Developer Tools Stay always current with our entire product range at a fraction of the price!

  • Access to new products upon release
  • Access to premium support & updates for 1 year
  • Access to previews and betas
  • Perpetual licenses to all products

Anti key logging components v.1.1

By Mr Wuul.

Freeware + source 31 Oct 2007

Description

TAntiKeyLoggerEdit and TAntiKeyLoggerMemo are components which extends TEdit / TMemo and were designed to defeat keyloggers.

The controls work by faking a random number of rubbish keystrokes whenever a real keystroke is entered - these rubbish keystrokes are picked up by the keylogger but ignored by the controls.

Informations

  • Status: Fully functional
  • Source: Included
  • Size: 315kB

Platforms: D2005, D2006, D5, D6, D7

AntiDebugger v.1.03

By Costin Aurelian.

Freeware 19 May 2011

Description

Here's a most wanted anti-debugger unit.

It covers: anti-antivirus routines, disassembler traps, virtual environments, anti-heuristics etc from Windows 95 to Windows 7.

Having that's the first version, some bugs may occur - none found during tests.

Informations

  • Status: Fully functional
  • Source: On purchase/registration
  • Source price: $2000
  • Size: 222kB

Platforms: D2, D2005, D2006, D2007, D2009, D2010, D3, D4, D5, D7, DXE

ARProtector v.1.1

By Albert Research.

Freeware + source 23 Feb 1998

Description

TARProtector locks your application after a specified Idle Time. Precisely it triggers an event after this Inactivity Time so you can do any action at your application. 12 hour time compatibility.

Informations

  • Status: Fully functional
  • Source: Included
  • Size: 11kB

Platforms: D2, D3

Authentication for Android v.1.3

By WINSOFT spol. s r.o..

Shareware 08 Oct 2021

Description

Delphi and C++ Builder authentication library for Android.
  • uses Android KeyguardManager API
  • available for Delphi 10 - 11
  • source code included in registered version
  • royalty free distribution in applications

Informations

  • Status: With Nag-Screen
  • Source: On purchase/registration
  • price: $80
  • Size: 291kB

Platforms: C10, C10.1, C10.2, C10.3, C10.4, C11, D10, D10.1, D10.2, D10.3, D10.4, D11

BigSpeed Secure Socket Library v.2.0

By BigSpeed Computing Inc..

Freeware 22 Oct 2005

Description

ActiveX control for secure private networking with 128-bit AES encryption and on-the-fly compression. Implements a flexible message-oriented protocol on top of a single TCP connection. Information is exchanged through typed data packets identified by a command code. Utilizes an elegant event-driven paradigm for easy integration into Windows applications. Can be used both on client and server side, with centralized management of all connections.

Informations

  • Status: Fully functional
  • Source: None
  • Size: 785kB

Platforms: D6, D7

Biometrics for Android v.1.1

By WINSOFT spol. s r.o..

Shareware 08 Oct 2021

Description

Delphi and C++ Builder biometrics library for Android.
  • uses Android Biometrics API
  • requires Android 9 Pie (Android API 28) or higher
  • available for Delphi/C++ Builder 10 - 11
  • source code included in registered version
  • royalty free distribution in applications

Informations

  • Status: With Nag-Screen
  • Source: On purchase/registration
  • price: $80
  • Size: 527kB

Platforms: C10, C10.1, C10.2, C10.3, C10.4, C11, D10, D10.1, D10.2, D10.3, D10.4, D11

D2Running v.1.0

By Aristide Torrelli.

Freeware + source 09 Sep 1997

Description

Simple component to check whether the Delphi IDE is running.

Informations

  • Status: Fully functional
  • Source: Included
  • Size: 4kB

Platforms: D2

ISGCSSecure v.1.6

By Infinity Software Group.

Shareware 05 Jan 2005

Description

Provide the security your customers need in their Client/Server applications. This Interbase security component provides the tools necessary to maintain secure access to your Client/Server applications.

Informations

  • Status: Trial (work while IDE is running)
  • Source: On purchase/registration
  • price: $149
  • Size: 2 146kB

Platforms: CB1, CB3, CB4, D2, D3, D4, D5, D6, D7

Magenta Systems Code Signing Trust and Certificate Check component v.1.00

By Magenta Systems Ltd.

Freeware + source 12 Jul 2010

Description

The Magenta Systems Code Signing Trust and Certificate Check component v1.0 functions are designed for Code Signing, aka Microsoft Authenticode.

Currently just two functions that check if an EXE, DLL or CAB file has a valid code signing certificate, that the certificate is trusted and that the program is not corrupted. These functions were written to support an remote program updater tool, to ensure the new program was not corrupted, but may also be used to self test a Delphi application for image corruption.

ProgVerifyTrust - simple function to check code signing certificate exists and is valid and not expired, and the program image is not corrupted. This should work with Windows 2000 and later (which have wintrust.dll).

ProgVerifyCert - similar to ProgVerifyTrust, but also extracts the certificate information, names, dates, etc. But this function needs capicom.dll COM object to be installed (from which the CAPICOM_TLB type library is created), which is a free redistributable file, included with this code. Microsoft claims Capicom is deprecated with Windows 7, but the DLL still works.

Informations

  • Status: Fully functional
  • Source: Included
  • Size: 5 351kB

Platforms: D2005, D2006, D2007, D2009, D2010, D7, DXE, DXE2, DXE3

MD5 Libary v.1.0.0.0

By Patrik Abend.

Freeware 21 Dec 2006

Description

MD5 Libary is a small DLL witch includes the known MD5 functions to create MD5 Hash's from Strings and Files.

Informations

  • Status: Fully functional
  • Source: None
  • Size: 204kB

Platforms: D1, D2, D2005, D2006, D3, D4, D5, D7

SecureType v.1.10

By Michael Lim Choon Hong.

Commercial 26 Sep 2005

Description

SecureType is the first and the most powerful anti-keyloggers software component in the world which is developed to protect a software/program from the all types of known and unknown keylogger softwares.

To those who are new to keylogging, keyloggers, key loggers, keystroke loggers, key recorders, key trappers, key capture programs, etc. belong to the group of tools that monitor PC user activity. Initially software products of this type were designed solely for recording key stroke information including the system keys, to the special log file (audit trail) being afterwards analyzed by the person who had installed this program. Log file can be sent within the network to the shared place, to the ftp server in the Internet, by e-mail etc. In cybercafes, offices, schools, libraries, etc. people can set up the keyloggers in the computer to grab your online-banking passwords, credit card infos, MSN passwords and so on.

Just with a few line of codes, your applications are safe against deadly Keyloggers such as BlazingTools Perfect Keylogger, Golden Keylogger, etc.

With this component, you can protect your password, credit card numbers, identification numbers and other secret information from being stolen by other people, or you can create an antikeylogger by yourself.

SecureType is less than 50KB and since it is a dynamic link library file, it consumes very less memory and will not affect your application's performance.

SecureType is developed for Windows 2000, XP and 2003. It can be used to protect software/program developed by using

  • Microsoft Visual Basic .NET (tested)
  • Microsoft Visual C# .NET (tested)
  • Microsoft Visual C++ .NET (tested)
  • Visual Basic Applications (4.0, 5.0 and 6.0) (tested)
  • Delphi Applications (5.0, 6.0, 7.0, 8.0 and Delphi .NET 2005) (tested)
  • Microsoft Visual C++ (5.0 and 6.0) (tested)
  • Borland C++ Builder Applications (5.0 and 6.0) (tested)
  • Bloodshed Dev C++ (4.9.9.1) (tested)
  • many more applications (coming soon.)

Informations

  • Status: Evaluation (time-limit)
  • Source: None
  • price: $50
  • Size: 54kB

Platforms: CB4, CB5, CB6, D2005, D5, D6, D7

Simple AntiCopy Component v.2.12

By Oleg I. Subachev.

Freeware + source 19 Aug 1998

Description

Implements only two kinds of checks:
  • check for application's start drive
  • check for application's full path.
"But my main purpose in publishing SACC is to show technique that may be used by any programmer to perform tasks that require storing of some information inside .exe file".

Informations

  • Status: Fully functional
  • Source: Included
  • Size: 11kB

Platforms: D1, D2, D3, D4

Steganography Library v.2.1

By BV-Star.Development.

Commercial 24 Nov 2007

Description

This Library gives you a unique opportunity to add steganography functions in your applications. Using this library you can give your application ability to hide information in Jpeg, Jpeg2000, Wav, Bmp formats and so on, for example with the help of Bmp or Wav Stego routines you can easily add steganographic functions for other lossless formats (flac, tiff etc). It is very easy to use and you do not need any special skills.

Informations

  • Status: Demo only
  • Source: N/A
  • price: $99.99
  • Size: 834kB

Platforms: D2006, D2007, D7

TrasCRC

By Alexander Rodigin.

Freeware + source 31 May 2000

Description

TrasCRC component protects your executable with CRC16 making impossible to modify it either by wish or by accident.

Informations

  • Status: Fully functional
  • Source: Included
  • Size: 9kB

Platforms: D3, D4, D5

TSpywareScanner v.1.1

By QwertyStudios.

Shareware 20 Aug 2005

Description

With TSpywareScanner you can build your own SpywareAdware scanner in several hours. It has everything you need to create a good hunter for malicious programs and BHOs. TSpywareScanner searches for malicious programs in files, registry and processes and asks what to do or simply deletes spyware without prompt. TSpywareScanner has a lot of properties and events which can customize all process of scanning, reporting, database updating and encryption. TSpywareScanner uses external malware database. There is a sample database in this package and a powerful DatabaseEditor program. Upon registration you'll receive another very large malware database. TSpywareScanner can also backup deleted files into special folder to restore them later. This package includes sources of sample spyware scanner build with TSpywareScanner.

Malware types that TSpywareScanner finds and eliminates:

  • Spyware;
  • Adware;
  • BHOs (Browser Helper Objects);
  • Trojans;
  • Trackware;
  • Dialers;
  • Keyloggers.

Informations

  • Status: With Nag-Screen
  • Source: On purchase/registration
  • price: $99
  • Source price: $139
  • Exe demo: included
  • Size: 704kB

Platforms: D2005, D6, D7