Download Polar Crypto Component 2.5

sponsored links

Polar Crypto Component 2.5
Polar Crypto Component 2.5 screenshot
Polar Crypto Component with full source code provided at no extra cost!
Price: 239 USD (Buy Now) Hits: 462 visitors Publisher: Polar OS Support: Win2000, Win2003, Win98, WinNT 3.x, WinNT 4.x, WinXP License: Shareware Date added: 29 Oct 2012 Last Update: 15 Jul 2006 Downloads: 9

See full specifications >>

Users rating:
  • Currently 0/5

0/5 (0 votes)

Editor's rating:
  • Currently /5
Visitors Rating:
  • Currently 0/5

0/5 (0 votes)

Your opinion can help!
Add your review now!

Screenshots of Polar Crypto Component

Polar Crypto Component 2.5 screenshotScreenshots

Polar Crypto Component Publisher's description

Polar Crypto Component with full source code provided at no extra cost!

Polar Crypto Component gives your Windows applications the functionality of unbreakable encryption. It enables you to build your own security systems instantly, or to easily integrate it into your existing systems, enhancing their security and performance.
Polar Crypto is a DLL/COM component which can be implemented whenever data security, authenticity and integrity are needed;
-in all applications developed for conducting business transactions with absolute confidentiality
-for digital signature creation and validation
-in e-commerce web applications that store sensitive data (for example; credit card details)
-in desktop applications that encrypt confidential files on your computer or computer network

Features

-full source code completely written in MS Visual C++ included at no extra cost providing further development and/or customizing products
-choose between component and source code when implementing Polar Crypto into your application

-encrypt files, strings, buffers (Encrypt Method, Decrypt Method)
-use 128/256-bit symmetric (AES and Twofish) or 512/1024/2048-bit asymmetric keys (public and private RSA keys)

-digitally sign your data with the RSA private key (Sign Method)
-verify signed data (VerifySignature Method)

-generate a hash value using the SHA-1 & SHA-2 algorithms
-set the Streaming Property to TRUE if you do not have a single data block

-built-in random data generator (Blum, Blum and Shub algorithm)
-set your own seed for an algorithm (RandomGeneratorSeed Property)

-conversion to Base64 or Hex format with the CryptoData Object
-original binary data manipulation

-detect errors in the encryption/decryption process with OnError Event
-check current status of the operation with ProcessingStatus Event

Development environments:
-MS Visual Studio
-all Borland Developer Studio evironments
-any other 32-bit programming environments that support DLL/COM and .NET components
sponsored links



Changes on the new version:
This version has bugs fixed and some features, that lots of our customers requested, implemented.

Members Reviews






Submit Your Review


You need to be signed in to review this program.
Your rating:
*
Title:
*
Your review:
*
Chars left
catcha *





Your review will be listed after a administrator approves it!





sponsored links



Version History
Version 2.5 added on: 28 Oct 2012


sponsored links


Related Tags
    encryption          unbreakable encryption          security          secure information          encryption component          dll encryption component          activex encryption component          full source code      

Button for your site
To link back to this page, please copy code below and insert in your page. All visits come thru this code will add a 10 point vote to this software. Save the image button on your server

Example:
    

Copyright (c) 2006-2015 Free-To-Try.com. All rights reserved.