scriptik.ru

35343

Compression, Encryption

:

This is an invisible componentwith a simple task to split a file into multiple files of certain size. The mostcommon need for this is when you want to put your (big) file on floppy disks,for backup or any other purposes. The method for reversing the process, theunsplitting, is also included. Very easy to use. New - version 1.03 added a property to reduce the size of the first split file. Useful for setup applications.

  • : Free
  • : Jovan Sedlan
  • : 29.11.2010

A powerful encryption utility that brings military strength encryption with just one click. It is very fast, comfortable and safe!It is simple one click encryption and decryption process.1 click encrypt provides an option to destroy or preserve files after encryption.1 click encrypt can encrypt single files, folders and entire directory trees. 1 click encrypt an option to generate own cipher key to protect your most sensitive data.

  • : Shareware / $39.00
  • : James Lansdown
  • : 06.06.2008

A quick and professional way to add strong encryption to your application. 1Crypt is a function library (DLL) which allows you to easily and securely encrypt files, strings, and buffers using 256-bit Advanced Encryption Standard (Rijndael) encryption. Using strong encryption in your application doesn't have to be complicated.

  • : Shareware / $19.00
  • : Atma Software
  • : 12.04.2011

Convert any application into time-limited shareware. A function library offering a flexible locking system with solid encryption. Generate serial numbers to register your application. Test program included. Easy to implement. Support for VB, C++, Delphi, other languages. AES (Rijndael) 256 bit encryption.

  • : Shareware / $39.00
  • : Atma Software
  • : 30.03.2009

  • : Shareware / $129.95
  • : Ionworx Technology
  • : 06.06.2008

SecureCode is a new software protection designed to provide a high level of security. SecureCode use strong & new techniques protection. With SecureCode you can select any parts of your source code to secure, for example you can protect registration check procedures or main fonctionnality functions or procedures. Your software is protected against patch, because the code is encrypted !Even if a cracker can broke your protection scheme (trial date, days expiration, for example) it's not fully version, because the main fonctions was protected bySecureCode.SecureCode prevent when the Trial Protection is broken, with SecureCode your investments is Safe !

  • : Shareware / $129.95
  • : Ionworx Technology
  • : 20.06.2010

Compression library for compressing file(s) with extreme ratio. Easy beat ZIP, RAR, ACE2 and CAB compression ratio. Fast, optimized for Pentium, but still run on 386 too. DLL size is only 9 kb.

  • : Shareware / $399.00
  • : HolyCode Corp
  • : 07.03.2011

The rock solid compression component that won't cost you an arm and a leg! This ActiveX zip control includes everything you need to get the job done quickly, easily and affordably!

  • : Shareware / $150.00
  • : Abale.com
  • : 12.11.2007

Abbrevia is a compression toolkit for Borland Delphi, C++Builder and Kylix. It supports PKZIP 4, Microsoft CAB, TAR and gzip formats and the creation of self-extracting archives. It includes visual components that simplify the manipulation of ZIP files.

  • : Free
  • : Turbo Power Software
  • : 24.11.2011

ABF Password Recovery is a program to retrieve lost or forgotten passwords for many well known programs and popular file formats. All passwords are recovered instantly. Passwords for programs can be recovered for current installation of Windows only. There are some useful tools inside the program, such as: Password picker, Hidden passwords browser, Personal folder recovery. Program interface is customized, so the users can change it, according to their preferences. The current version supports following programs:Internet Explorer - passwords to HTTP protected items and FTP accounts. Outlook Express - passwords to identities; mail, news, and LDAP accounts. MS Outlook - passwords to mail and LDAP accounts; PST files. The number of supported programs and features will be increased in future releases.

  • : Shareware / $29.95
  • : ABF Software, Inc
  • : 16.02.2007

(for Delphi 7 and C++ Builder 6 too)

Add multiple user/groups of users, authentication and user rights functionality to your Delphi or C++ Builder app.
Fast integration with existing standalone/desktop database/SQL database or 3-tier applications (all at design time w/o any coding).
Control the user access to all GUI components (menus, buttons, edits, tree views, radio groups, etc. every control) as well as to non visual functionalities. Just drag/drop and connect.

With abSecure Enterprise you can:
- Securize standalone/desktop database/SQL database or 3-tier application
- Build the security model of your application at design time with just few mouse clicks,
- Add and remove users on fly,
- Change users profile on fly,
- Add and remove securized items on fly,
- Securize any GUI functionality,
- Set user groups - definable or four predefined (Administrators, Power Users, Users or Groups).

Free, source on purchase/registration

  • : Free
  • : Peter Petrov
  • : 15.05.2011

Control the user access to application GUI components (menus, buttons, edits, tree views, radio groups, etc. every control) as well as to non visual functionalities. Just drag/drop and connect and you get a securized multiuser application. With Security Builder you can:- Build the security model of your Delphi application at design time with just few mouse clicks, - Add and remove users on fly, - Change users profile on fly, Add and remove securized items on fly, Securize your non GUI functionalities, - Set predefined User Groups - Supervisors, Power Users, ...- Much more... Free fully functional, source price $150

  • : Free
  • : Peter Petrov
  • : 16.01.2009

Allows you to control the user access to your application GUI components (menus, buttons, edits, tree views, radio groups, etc. every control) as well as to non visual functionalities. Just drag/drop and connect and you get a securized multiuser application. With Security Builder you can:Build the security model of your Delphi application at design time with just few mouse clicks, Add and remove users on fly, Change users profile on fly, Add and remove securized items on fly, Securize your non GUI functionalities, Set predefined User Groups Supervisors, Power Users, ... Much more... The library consists of three component: abSecurity - control center encapsulating the application security template, implementing all Security Builder functionalities, abActionList - ActionList control providing a connection to abSecurity component and to it's control center functionalities, abAction - an TAction derivative, adding the ability to Enable/Disable and change Visible/Invisible status.

  • : Shareware / $150.00
  • : Peter Petrov
  • : 31.05.2011

What is that password? - you think and start falling into despair. Cheer up! Accent Password Recovery will recover the lost password and you will be able to work with your spreadsheet again. This friendly and easy-to-use software features a wide range of effective password recovery tools.The program can employ three methods of password recovery:Brute force attack. The program tries all passwords matching the specified criteria one by one until it finds a valid password. This is the most reliable but also the slowest method (it may take years to recover the correct password).Mask-based attack. In fact, this is also a kind of brute force attack, but the number of passwords the program must try is sufficiently smaller due to the use of a mask - part of the password you remember for sure. The program will try all possible passwords that include the mask. This method is sufficiently faster than the brute force attack, but you must remember some part of the password to be able to use it.Dictionary attack. If you used some common word or word combinations as your password, chances are it is included in the password dictionaries you can find on the Internet (you can download one of them at the Accent Excel Password Recovery Web-site). The program tries all passwords from the dictionary until it finds a match. This is the fastest password recovery method. As we have already mentioned, the program has a user-friendly interface: you can always see what is going on at the moment, you can control the recovery process, modify settings and specify various search parameters to make the recovery more efficient.

  • : Shareware / $25.00
  • : Denis Gladysh
  • : 25.01.2009

Accent Word Password Recovery will help you recover lost or forgotten MS Word passwords, including the modification passwords to MS Word documents. You can simply let the program try all possible variants, or speed up the process by using a certain mask (if you vaguely remember what your password might be) or employing a dictionary attack (the current dictionary includes over 1,000,000 words and can be downloaded at the manufacturer's site).

  • : Shareware / $25.00
  • : Denis Gladysh
  • : 16.09.2010

AceEncryptX Control is a royalty free tiny secure encryption COM object for Internet file delivery and MS Windows 95/NT/98. It uses DES/Blowfish symmetric block ciphers with variable-length key, making it best component for international e-commerce.

  • : Shareware / $29.00
  • : ICN Software
  • : 25.06.2008

  • : Shareware / $30.00
  • : Michal Strehovsky
  • : 06.09.2007

ACProtect is an application that allows you to protect Windows executable files(PE files) against piracy. Using public keys encryption algorithms (RSA) to create and verify the registration keys and unlock some RSA key locked code. It has an Embedded Protector against file dumping and unpackers. It also has many anti-debug tricks with specialized API system. Mutual communication between loader and application can also be achieved!Special ACProtect Technics:Metamorph Engine;CodeReplace Engine;Embedded Protector ;Dynamic En/DecryptRSA-Lock CodesShareIt Keygen Program Auto Made

  • : Shareware / $149.00
  • : RISCO SOFTWARE
  • : 31.03.2010

ACProtect is an application that allows you to protect Windows executable files(PE files) against piracy. Using public keys encryption algorithms (RSA) to create and verify the registration keys and unlock some RSA key locked code. It has an Embedded Protector against file dumping and unpackers. It also has many anti-debug tricks with specialized API system. Mutual communication between loader and application can also be achieved!Special ACProtect Technics:Metamorph Engine- Metamorph decryption routines and several encrypted layers. The code being protected varies every time you protect your application.CodeReplace Engine - ACProtect can replace some of the protected program's code with its own codes without function loss and speed loss. This feature combine the protect code and the program code more closer and prevent cracker from dump the original program;Embedded Protector - You can specify the place in your application to embed the inner cryptor. With the embedded cryptor, your application can not be cracked even though the cracker know the original entry point (OEP) when rebuilding your Import table.Dynamic En/Decrypt- Important code of ur program can be decrypted before running and encrypt again after finished running.RSA-Lock Codes - With RSA keys system a cracker can not write a KeyGen (or KeyMaker) for your product without the RSA private key (the RSA private key is only in the author's hand). You may also specify some code to be locked by the RSA keys, the cracker won't have the proper key.dat on the proper machine, without it the protected code can not decrypt.ShareIt Keygen Program Auto Made- ACProtect can generate ShareIt.com compatible keygen program to fill shareware author's need. The Keygen program can generate registration Codes,and ShareIt.com will send it to registered customer.

  • : Shareware / $149.00
  • : RISCO SOFTWARE
  • : 28.09.2008

ctivLicense Online is a professional and robust anti-piracy solution based on product activation technology online designed to verify if your software products have been legitimately licensed, it's quick, easy and reliable, the activation can be done in few minutes via the Internet or by Telephone. This is a way to check software's licenses and control the number of times your software can be activated or made functional through serial number registration on multiple computers.ActivLicense Online verifies that a program's product key has not been used on other computers than intended by the software's license. You need to create a Activation Account with Username ID and Product Key (that you have selected) after send directly to your customer. The End-User can choose to activate your product over the Internet or by Telephone. In the Activation process, the identity of the copy of the software and the information of the machine that the copy is installed to is sent to the server.

  • : Shareware / $199.00
  • : B.Bruno
  • : 26.12.2009