reverse » Page 3 » Developer.Team

Safengine Protector 2.4.0.0

Safengine Protector 2.4.0.0
Safengine Protector 2.4.0.0


Safengine provides a powerful virtual machine to protect your applications against reverse engineering or unwanted modifications. The protector will convert your sensitive code (in x86 assembly) into a random instruction set which can only be executed by the virtual machine interpreter embedded into your application after protection. These virtual machines are very unique, fully randomized and heavily obfuscated.
Read more

Red Gate SmartAssembly 7.0.8.2472

Red Gate SmartAssembly 7.0.8.2472
Red Gate SmartAssembly 7.0.6.2383


SmartAssembly is an obfuscator that helps protect your application against reverse-engineering or modification, by making it difficult for a third-party to access your source code. If your entire business rests on the IP embodied in your software or you don't want your C# or VB.NET code exposed internationally, then obfuscating your code becomes a necessity, not a luxury.
Read more

Toad Data Modeler 7.0

Toad Data Modeler 7.0
Toad Data Modeler 7.0


Easily create high-quality data models. Toad Data Modeler enables you to rapidly deploy accurate changes to data structures across more than 20 different platforms. It allows you to construct logical and physical data models, compare and synchronize models, quickly generate complex SQL/DDL, create and modify scripts, as well as reverse and forward engineer both databases and data warehouse systems. Toad's data modeling software simplifies database design, maintenance and documentation — at a price your organization can afford.
Read more

Red Gate SmartAssembly 7.0.6.2383

Red Gate SmartAssembly 7.0.6.2383
Red Gate SmartAssembly 7.0.6.2383


SmartAssembly is an obfuscator that helps protect your application against reverse-engineering or modification, by making it difficult for a third-party to access your source code. If your entire business rests on the IP embodied in your software or you don't want your C# or VB.NET code exposed internationally, then obfuscating your code becomes a necessity, not a luxury.
Read more

IDERA ER/Studio Data Architect 18.0.1

IDERA ER/Studio Data Architect 18.0.1
IDERA ER/Studio Data Architect 18.0.1


Data modelers and architects have to respond to multiple levels of data-related business needs. Some key activities that may need their attention include:

Build out a data model as part of a development cycle
Discover and document existing assets across the data landscape
Create and populate a data warehouse
Build out an enterprise data model
Catalog metadata for data governance or data quality initiatives
Perform an impact analysis of new policies or projected changes to models, databases, or data fields
ER/Studio Data Architect helps to address all of these situations, with robust logical and physical modeling, data dictionaries, forward and reverse engineering, and more.
Read more

DB11 - IP2Location™ LITE IP-COUNTRY-REGION-CITY-LATITUDE-LONGITUDE-ZIPCODE-TIMEZONE Database

DB11 - IP2Location™ LITE IP-COUNTRY-REGION-CITY-LATITUDE-LONGITUDE-ZIPCODE-TIMEZONE Database
DB11 - IP2Location™ LITE IP-COUNTRY-REGION-CITY-LATITUDE-LONGITUDE-ZIPCODE-TIMEZONE Database


IP2Location™ LITE IP-COUNTRY-REGION-CITY-LATITUDE-LONGITUDE-ZIPCODE-TIMEZONE Database provides a solution to determine the country, region or state, city, latitude, longitude, ZIP code and time zone of origin for any IP address in a few simple steps. First, retrieve the IP address from the networking protocol or server-side variable of the Web server. Next, translate the IP address to an IP number in decimal format to speed up the database query. Lastly, reverse lookup the IP number from the IP2Location™ database to pinpoint the exact geographical location.
Read more

Abyss Web Server X2 2.12.01 Retail

Abyss Web Server X2 2.12.01 Retail
Abyss Web Server X2 2.12.01 Retail


Despite its small footprint, it supports HTTP/1.1, secure SSL/TLS connections (HTTPS), automated provisioning and renewal of free certificates from Let's Encrypt® (ACME v2), IPv6, on-the-fly HTTP compression, dynamic content generation through CGI/FastCGI scripts, ISAPI extensions, native ASP.NET, HTTP/HTTPS/WebSocket reverse proxying, eXtended Side Includes (XSSI), custom error pages, password protection, IP address control, anti-leeching, bandwidth throttling, and log rotation.
Read more

Mastering Reverse Engineering - Reginald Wong

Mastering Reverse Engineering - Reginald Wong
Mastering Reverse Engineering - Reginald Wong


Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses.

Reginald Wong
Reginald Wong has been in the software security industry for more than 15 years.Currently, Reggie is a lead anti-malware researcher at Vipre Security, a J2 Global company, covering various security technologies focused on attacks and malware. He previously worked for Trend Micro as the lead for the Heuristics team, dealing with forward-looking malware detection. Aside from his core work, he has also conducted in-house anti-malware training for fresh graduates. He is currently affiliated with CSPCert.ph, Philippines' CERT, and is a reporter for Wildlist.org. He has also been invited to speak at local security events, including Rootcon.
Read more

ApexSQL Log 2018 Professional Edition v2018.04.1219

ApexSQL Log 2018 Professional Edition v2018.04.1219
ApexSQL Log 2018 Professional Edition v2018.04.1219


Find out who changed what and when. Review values before and after a change as well as the complete history of row changes, from initial insert to all subsequent updates or deletion. Identify and isolate rogue transactions and easily reverse them to repair damaged data without risk of additional data loss. Easily record loads on production and then replay them on staging, simulating a production environment.
Read more