interception » Developer.Team

Microsoft Research Detours Package Pro 3.0 Retail

Microsoft Research Detours Package Pro 3.0 Retail
Microsoft Research Detours Package 3.0 Retail


Detours is a library for intercepting binary functions on ARM, x86, x64, and IA64 machines. Detours is most commmonly used to intercept Win32 APIs calls within an application, such as to add debugging instrumentation. Interception code is applied dynamically at runtime. Detours replaces the first few instructions of the target function with an unconditional jump to the user-provided detour function. Instructions from the target function are placed in a trampoline. The address of the trampoline is placed in a target pointer. The detour function can either replace the target function or extend its semantics by invoking the target function as a subroutine through the target pointer to the trampoline.
Read more

DevArt SecureBridge 6.3.5 Full source D7-DX10

DevArt SecureBridge 6.3.5 Full source D7-DX10
DevArt SecureBridge 6.3.5 Full source D7-DX10 | 6 Mb


SecureBridge represents clients and servers for SSH, SFTP and SSL protocols as a network security solution. It protects any TCP traffic using SSH or SSL secure transport layer protocols, that provide authentication for both client and server, strong data encryption, and data integrity verification. SecureBridge components can be used in conjunction with data access components to prevent data interception or modification in an untrusted network.
Read more

DevArt SecureBridge 6.3.4 Full Source D5-XE8

DevArt SecureBridge 6.3.4 Full Source D5-XE8
DevArt SecureBridge 6.3.4 Full Source D5-XE8 | 12 Mb


SecureBridge represents clients and servers for SSH, SFTP and SSL protocols as a network security solution. It protects any TCP traffic using SSH or SSL secure transport layer protocols, that provide authentication for both client and server, strong data encryption, and data integrity verification. SecureBridge components can be used in conjunction with data access components to prevent data interception or modification in an untrusted network.
Read more