ALL VCL, WEB, FNC, FMX, LCL .NET and IntraWeb components + Business Tools & Developer Tools Stay always current with our entire product range at a fraction of the price!
- Access to new products upon release
- Access to premium support & updates for 1 year
- Access to previews and betas
- Perpetual licenses to all products
Anti key logging components v.1.1
By Mr Wuul.
Freeware + source 31 Oct 2007Description
TAntiKeyLoggerEdit and TAntiKeyLoggerMemo are components which extends TEdit / TMemo and were designed to defeat keyloggers.The controls work by faking a random number of rubbish keystrokes whenever a real keystroke is entered - these rubbish keystrokes are picked up by the keylogger but ignored by the controls.
Informations
- Status: Fully functional
- Source: Included
- Size: 315kB
Platforms: D2005, D2006, D5, D6, D7
AntiDebugger v.1.03
By Costin Aurelian.
Freeware 19 May 2011Description
Here's a most wanted anti-debugger unit.It covers: anti-antivirus routines, disassembler traps, virtual environments, anti-heuristics etc from Windows 95 to Windows 7.
Having that's the first version, some bugs may occur - none found during tests.
Informations
- Status: Fully functional
- Source: On purchase/registration
- Source price: $2000
- Size: 222kB
Platforms: D2, D2005, D2006, D2007, D2009, D2010, D3, D4, D5, D7, DXE
ARProtector v.1.1
By Albert Research.
Freeware + source 23 Feb 1998Description
TARProtector locks your application after a specified Idle Time. Precisely it triggers an event after this Inactivity Time so you can do any action at your application. 12 hour time compatibility.Informations
- Status: Fully functional
- Source: Included
- Size: 11kB
Platforms: D2, D3
Authentication for Android v.1.3
Description
Delphi and C++ Builder authentication library for Android.- uses Android KeyguardManager API
- available for Delphi 10 - 11
- source code included in registered version
- royalty free distribution in applications
Informations
- Status: With Nag-Screen
- Source: On purchase/registration
- price: $80
- Size: 291kB
Platforms: C10, C10.1, C10.2, C10.3, C10.4, C11, D10, D10.1, D10.2, D10.3, D10.4, D11
BigSpeed Secure Socket Library v.2.0
Description
ActiveX control for secure private networking with 128-bit AES encryption and on-the-fly compression. Implements a flexible message-oriented protocol on top of a single TCP connection. Information is exchanged through typed data packets identified by a command code. Utilizes an elegant event-driven paradigm for easy integration into Windows applications. Can be used both on client and server side, with centralized management of all connections.Informations
- Status: Fully functional
- Source: None
- Size: 785kB
Platforms: D6, D7
Biometrics for Android v.1.1
Description
Delphi and C++ Builder biometrics library for Android.- uses Android Biometrics API
- requires Android 9 Pie (Android API 28) or higher
- available for Delphi/C++ Builder 10 - 11
- source code included in registered version
- royalty free distribution in applications
Informations
- Status: With Nag-Screen
- Source: On purchase/registration
- price: $80
- Size: 527kB
Platforms: C10, C10.1, C10.2, C10.3, C10.4, C11, D10, D10.1, D10.2, D10.3, D10.4, D11
D2Running v.1.0
Description
Simple component to check whether the Delphi IDE is running.Informations
- Status: Fully functional
- Source: Included
- Size: 4kB
Platforms: D2
ISGCSSecure v.1.6
Description
Provide the security your customers need in their Client/Server applications. This Interbase security component provides the tools necessary to maintain secure access to your Client/Server applications.Informations
- Status: Trial (work while IDE is running)
- Source: On purchase/registration
- price: $149
- Size: 2 146kB
Platforms: CB1, CB3, CB4, D2, D3, D4, D5, D6, D7
Magenta Systems Code Signing Trust and Certificate Check component v.1.00
Description
The Magenta Systems Code Signing Trust and Certificate Check component v1.0 functions are designed for Code Signing, aka Microsoft Authenticode.Currently just two functions that check if an EXE, DLL or CAB file has a valid code signing certificate, that the certificate is trusted and that the program is not corrupted. These functions were written to support an remote program updater tool, to ensure the new program was not corrupted, but may also be used to self test a Delphi application for image corruption.
ProgVerifyTrust - simple function to check code signing certificate exists and is valid and not expired, and the program image is not corrupted. This should work with Windows 2000 and later (which have wintrust.dll).
ProgVerifyCert - similar to ProgVerifyTrust, but also extracts the certificate information, names, dates, etc. But this function needs capicom.dll COM object to be installed (from which the CAPICOM_TLB type library is created), which is a free redistributable file, included with this code. Microsoft claims Capicom is deprecated with Windows 7, but the DLL still works.
Informations
- Status: Fully functional
- Source: Included
- Size: 5 351kB
Platforms: D2005, D2006, D2007, D2009, D2010, D7, DXE, DXE2, DXE3
MD5 Libary v.1.0.0.0
By Patrik Abend.
Freeware 21 Dec 2006Description
MD5 Libary is a small DLL witch includes the known MD5 functions to create MD5 Hash's from Strings and Files.Informations
- Status: Fully functional
- Source: None
- Size: 204kB
Platforms: D1, D2, D2005, D2006, D3, D4, D5, D7
SecureType v.1.10
Description
SecureType is the first and the most powerful anti-keyloggers software component in the world which is developed to protect a software/program from the all types of known and unknown keylogger softwares.To those who are new to keylogging, keyloggers, key loggers, keystroke loggers, key recorders, key trappers, key capture programs, etc. belong to the group of tools that monitor PC user activity. Initially software products of this type were designed solely for recording key stroke information including the system keys, to the special log file (audit trail) being afterwards analyzed by the person who had installed this program. Log file can be sent within the network to the shared place, to the ftp server in the Internet, by e-mail etc. In cybercafes, offices, schools, libraries, etc. people can set up the keyloggers in the computer to grab your online-banking passwords, credit card infos, MSN passwords and so on.
Just with a few line of codes, your applications are safe against deadly Keyloggers such as BlazingTools Perfect Keylogger, Golden Keylogger, etc.
With this component, you can protect your password, credit card numbers, identification numbers and other secret information from being stolen by other people, or you can create an antikeylogger by yourself.
SecureType is less than 50KB and since it is a dynamic link library file, it consumes very less memory and will not affect your application's performance.
SecureType is developed for Windows 2000, XP and 2003. It can be used to protect software/program developed by using
- Microsoft Visual Basic .NET (tested)
- Microsoft Visual C# .NET (tested)
- Microsoft Visual C++ .NET (tested)
- Visual Basic Applications (4.0, 5.0 and 6.0) (tested)
- Delphi Applications (5.0, 6.0, 7.0, 8.0 and Delphi .NET 2005) (tested)
- Microsoft Visual C++ (5.0 and 6.0) (tested)
- Borland C++ Builder Applications (5.0 and 6.0) (tested)
- Bloodshed Dev C++ (4.9.9.1) (tested)
- many more applications (coming soon.)
Informations
- Status: Evaluation (time-limit)
- Source: None
- price: $50
- Size: 54kB
Platforms: CB4, CB5, CB6, D2005, D5, D6, D7
Simple AntiCopy Component v.2.12
By Oleg I. Subachev.
Freeware + source 19 Aug 1998Description
Implements only two kinds of checks:- check for application's start drive
- check for application's full path.
Informations
- Status: Fully functional
- Source: Included
- Size: 11kB
Platforms: D1, D2, D3, D4
Steganography Library v.2.1
Description
This Library gives you a unique opportunity to add steganography functions in your applications. Using this library you can give your application ability to hide information in Jpeg, Jpeg2000, Wav, Bmp formats and so on, for example with the help of Bmp or Wav Stego routines you can easily add steganographic functions for other lossless formats (flac, tiff etc). It is very easy to use and you do not need any special skills.Informations
- Status: Demo only
- Source: N/A
- price: $99.99
- Size: 834kB
Platforms: D2006, D2007, D7
TrasCRC
Description
TrasCRC component protects your executable with CRC16 making impossible to modify it either by wish or by accident.Informations
- Status: Fully functional
- Source: Included
- Size: 9kB
Platforms: D3, D4, D5
TSpywareScanner v.1.1
By QwertyStudios.
20 Aug 2005Description
With TSpywareScanner you can build your own SpywareAdware scanner in several hours. It has everything you need to create a good hunter for malicious programs and BHOs. TSpywareScanner searches for malicious programs in files, registry and processes and asks what to do or simply deletes spyware without prompt. TSpywareScanner has a lot of properties and events which can customize all process of scanning, reporting, database updating and encryption. TSpywareScanner uses external malware database. There is a sample database in this package and a powerful DatabaseEditor program. Upon registration you'll receive another very large malware database. TSpywareScanner can also backup deleted files into special folder to restore them later. This package includes sources of sample spyware scanner build with TSpywareScanner.Malware types that TSpywareScanner finds and eliminates:
- Spyware;
- Adware;
- BHOs (Browser Helper Objects);
- Trojans;
- Trackware;
- Dialers;
- Keyloggers.
Informations
- Status: With Nag-Screen
- Source: On purchase/registration
- price: $99
- Source price: $139
- Exe demo: included
- Size: 704kB
Platforms: D2005, D6, D7