|
|
|
Polar Crypto Component gives your Windows applications the functionality of unbreakable encryption. It enables you to build your own security systems instantly, or to easily integrate it into your existing systems, enhancing their security and performance.
Polar Crypto is a DLL/COM component which can be implemented whenever data security, authenticity and integrity are needed;
-in all applications developed for conducting business transactions with absolute confidentiality
-for digital signature creation and validation
-in e-commerce web applications that store sensitive data (for example; credit card details)
-in desktop applications that encrypt confidential files on your computer or computer network
Features
-full source code completely written in MS Visual C++ included at no extra cost providing further development and/or customizing products
-choose between component and source code when implementing Polar Crypto into your application
-encrypt files, strings, buffers (Encrypt Method, Decrypt Method)
-use 128/256-bit symmetric (AES and Twofish) or 512/1024/2048-bit asymmetric keys (public and private RSA keys)
-digitally sign your data with the RSA private key (Sign Method)
-verify signed data (VerifySignature Method)
-generate a hash value using the SHA-1 & SHA-2 algorithms
-set the Streaming Property to TRUE if you do not have a single data block
-built-in random data generator (Blum, Blum and Shub algorithm)
-set your own seed for an algorithm (RandomGeneratorSeed Property)
-conversion to Base64 or Hex format with the CryptoData Object
-original binary data manipulation
-detect errors in the encryption/decryption process with OnError Event
-check current status of the operation with ProcessingStatus Event
Development environments:
-MS Visual Studio
-all Borland Developer Studio evironments
-any other 32-bit programming environments that support DLL/COM and .NET components
|
|
|
SMExport delphi component
decompile flash files
64 bit dll compression
strong disk encryption
image component
SIP Dll
password encryption
-------------------------
|
|
Polar Crypto Light is simple to use, supports the securest, most recommended cryptographic standards and crypto systems. It is an ActiveX control which seamlessly adds encryption features to your Windows applications. It is easy to use, it encrypts strings, buffers and files. It uses public and private RSA keys for encryption/decryption (256-bit symmetric keys for AES) and provides general process information (detecting errors in the encryption/decryption process and reporting the current status of the operation).
Polar Crypto Light is appropriate for you whether you are a beginner or a professional in software development. If you need simple but unbreakable encryption, with absolute confidentiality and digital signature creation and validation, Polar Crypto Light is the appropriate tool for you.
Polar Crypto Component: http://download.polarsoftware.com/products/components/suite/trial/suite52gy77hy359/polarcomponentsuitetrial.zip
Polar Crypto Light Free: http://www.polarsoftware.com/products/cryptolight/polarcryptolightrelease.zip |
|
.Net Decompiler that decompiles/disassembles .Net assemblies and build code flow diagrams from MSIL (MS Intermediate Language) binary format to well-formed and optimized source code (6 languages: MSIL, C#, VB.NET, Delphi.Net J# and managed C++). Spices.Decompiler completely integrated into Spices.Net and offers wide range of services to diplay or decompile to files any scope (Assembly, Namespace, Type, Method or selection of these scopes) of .Net assembly.
Spices.Decompiler: http://www.9rays.net/products/spices.net/download/spicesdc.zip
|
|
|
|