detect » Page 2 » Developer.Team

SQLabs SQLiteSync v1.5.0

SQLabs SQLiteSync v1.5.0
SQLabs SQLiteSync v1.5.0


SQLiteSync smart visualization technology is also able to detect BLOB columns and very large TEXT columns and display all of them in a preview panel. SQLiteSync is able to apply differences in data, tables, indexes, trigger and views. Synchronization code can be applied directly to the databases or an optional SQL text script can be generated.
Read more

Dotfuscator Professional for .NET v4.31.1.6114

Dotfuscator Professional for .NET v4.31.1.6114
Dotfuscator Professional for .NET v4.31.1.6114


Dotfuscator is a .NET Obfuscator & much more. It provides enterprise-grade app protection, greatly reducing the risk of piracy, intellectual property theft and tampering. Our layered obfuscation, encryption, watermarking, auto-expiry, anti-debug, anti-tampering and alerting and defense technology provides protection for hundreds of thousands of applications around the world.
Read more

TMS Web Controls Pack 1.3.5.1 D7-D10.2 Tokyo

TMS Web Controls Pack 1.3.5.1 D7-D10.2 Tokyo
TMS Web Controls Pack 1.3.5.1 D7-D10.2 Tokyo


Makes building and uploading updates easy, reliable and fast UpdateBuilder is a timesaving tool to make building updates for the TWebUpdate component easier. UpdateBuilder can generate the correct .INF file that contains the specification of what parts of the application need to be downloaded and how. It will also compress files if specified or build complete CAB files that contain the updated application. On top of that, it can automatically upload the update to the server.
Read more

UnHackMe 9.50 Build 650

UnHackMe 9.50 Build 650
UnHackMe 9.50 Build 650


UnHackMe - First BootWatch AntiRootkit! Now it is the must have tool for you! UnHackMe is specially designed to detect and remove Rootkits (a new generation of Trojan programs - invisible Trojans). A rootkit is a program that a hacker uses to mask intrusion and obtain administrator-level access to a computer or computer network. The intruder installs a rootkit on a computer using a user action or by exploiting a known vulnerability or cracking a password. The rootkit installs a backdoor giving the hacker a full control of the computer. It hides their files, registry keys, and process names, and network connections from your eyes. Your antivirus could not detect such programs because they use compression and encryption of its files. The sample software is Hacker Defender rootkit. UnHackMe allows you to detect and remove Rootkits.
Read more

hbTAPI Components 10.2

hbTAPI Components 10.2
hbTAPI Components 10.2 | 12 Mb


The Telephony API (TAPI) is one of the most complex APIs of Microsoft Windows. hbTapi Components abstracts the API to some Delphi components which can be easily controlled by your application. hbTapi Components works through Microsoft's Telephony API to provide hardware-independence, this makes it easy to work with telephony devices from many manufacturers. It can be used with any TAPI compliant telephony hardware: low cost modems, ISDN adapters, professional telephony cards and switches etc.
Read more

Basic and Low-level Python Network Attacksining

Basic and Low-level Python Network Attacksining
Basic and Low-level Python Network Attacks


Create basic and low-level network attacks with Python quickly and easily. Use the Scapy library to make networking tools, including clients and servers Write your own Custom Tools to break into vulnerable websites. The ultimate guide that teaches you how to use Python to protect your systems against sophisticated cyber attacks and Make defenses that distract and confuse attackers, or that detect suspicious network activity.
Read more

UnHackMe 9.20 Build 620

UnHackMe 9.20 Build 620
UnHackMe 9.20 Build 620


UnHackMe - First BootWatch AntiRootkit! Now it is the must have tool for you! UnHackMe is specially designed to detect and remove Rootkits (a new generation of Trojan programs - invisible Trojans). A rootkit is a program that a hacker uses to mask intrusion and obtain administrator-level access to a computer or computer network. The intruder installs a rootkit on a computer using a user action or by exploiting a known vulnerability or cracking a password. The rootkit installs a backdoor giving the hacker a full control of the computer. It hides their files, registry keys, and process names, and network connections from your eyes. Your antivirus could not detect such programs because they use compression and encryption of its files. The sample software is Hacker Defender rootkit. UnHackMe allows you to detect and remove Rootkits.
Read more

Wise Care 365 Pro 4.71 Build 454 Multilingual + Portable

Wise Care 365 Pro 4.71 Build 454 Multilingual + Portable
Wise Care 365 Pro 4.71 Build 454 Multilingual + Portable


Wise Care 365 is an all-in-one PC tune-up utility. It will keep your Windows secure, clean and fast. Wise Care 365 is a full collection of Wise Disk Cleaner and Wise Registry Cleaner. However, with other attractive and exciting features, it is far more than that. Wise Care 365 will keep your PC in tiptop shape and at peak performance! What you need to do is just one click when you use Wise Care 365. And your old PC will turn into a brand new and blazing fast one after Wise Care 365′s automatic cleanup and tuneup. Wise Care 365 can detect more hidden invalid registry issues than CCleaner, which is accredited by Gizmos and PCWorld. The scanning speed of Wise Care 365 is twice as fast as CCleaner, not to mention Advanced System Care Pro 5. All the features in Wise Care 365 are highly reviewed by PCWorld, PCAdvisor, ComputerBild, CHIP, CNET, ZDNet, and so on.
Read more