protocols » Page 15 » Developer.Team

DockLight 2.0.5 RS232 Terminal / RS232 Monitor

DockLight 2.0.5 RS232 Terminal / RS232 Monitor
DockLight 2.0.5 RS232 Terminal / RS232 Monitor | 3 Mb


Docklight is a testing, analysis and simulation tool for serial communication protocols (RS232, RS485/422 and others). It allows you to monitor the communication between two serial devices or to test the serial communication of a single device. Docklight significantly increases productivity in a broad range of industries, including automation and control, communications, automotive, equipment manufacturers, and embedded / consumer products. Docklight is easy to use and runs on almost any standard PC using Windows 8, Windows 7, Windows Vista or Windows XP operating system.

Simulating serial protocols
Logging RS232 data
Detecting specific data sequences
Responding to incoming data
Read more

DevArt SecureBridge 6.3.4 Full Source D5-XE7

DevArt SecureBridge 6.3.4 Full Source D5-XE7
DevArt SecureBridge 6.3.4 Full Source D5-XE7 | 13 Mb


SecureBridge represents clients and servers for SSH, SFTP and SSL protocols as a network security solution. It protects any TCP traffic using SSH or SSL secure transport layer protocols, that provide authentication for both client and server, strong data encryption, and data integrity verification. SecureBridge components can be used in conjunction with data access components to prevent data interception or modification in an untrusted network.
Read more

VSO Downloader Ultimate 4.1.1.25

VSO Downloader Ultimate 4.1.1.25

VSO Downloader Ultimate 4.1.1.25 | 29 Mb


VSO Downloader is a program that automatically detects and downloads video clips that are playing in your web browser. The interface of the application is simple and intuitive. To get started, make sure that streaming monitoring is enabled. The moment you load a video in the web browser, VSO Downloader will automatically start downloading it.
Read more

SecureBridge 6.3.4 for Delphi/BCB Full Source

SecureBridge 6.3.4 for Delphi/BCB Full Source
SecureBridge 6.3.4 for Delphi/BCB Full Source | 47 Mb


SecureBridge represents clients and servers for SSH, SFTP and SSL protocols as a network security solution. It protects any TCP traffic using SSH or SSL secure transport layer protocols, that provide authentication for both client and server, strong data encryption, and data integrity verification. SecureBridge components can be used in conjunction with data access components to prevent data interception or modification in an untrusted network.
Read more

EurekaLog 7.0.7.113 RC 5 Professional

EurekaLog 7.0.7.113 RC 5 Professional
EurekaLog 7.0.7.113 RC 5 Professional | 116 Mb


EurekaLog is the new Delphi and C++Builder exception tracer tool that gives your application (GUI, Console, Web, etc.) the power to catch all exceptions, memory leaks and detect infinite-loops and deadlocks. It generates a detailed log with the call stack at the point that raised the exception, showing unit, class, method and line number, (see this example), and displays it on screen and optionally sends it back to you via email or to a Web Server (using the HTTP-S/FTP protocols or sending directly to your preferred "Web Bug Tracker" software), thus helping speed up the process of bug-location and resolution by a factor of 10!
Read more

VanDyke SecureCRT 7.2.4.524

VanDyke SecureCRT 7.2.4.524
VanDyke SecureCRT 7.2.4.524 | 30 Mb


SecureFX is a flexible, secure file transfer application with a visual interface that is easy to learn. SecureFX offers advanced features like site synchronization and automation to help web designers and network administrators streamline everyday tasks.
Read more

SecureBridge 6.2.3 XE6

SecureBridge 6.2.3 XE6
SecureBridge 6.2.3 XE6 | 6 Mb


SecureBridge represents clients and servers for SSH, SFTP and SSL protocols as a network security solution. It protects any TCP traffic using SSH or SSL secure transport layer protocols, that provide authentication for both client and server, strong data encryption, and data integrity verification. SecureBridge components can be used in conjunction with data access components to prevent data interception or modification in an untrusted network.
Read more