scheme » Page 2 » Developer.Team

Agile.Net Obfuscator 6.4.0.31 Modified

Agile.Net Obfuscator 6.4.0.31 Modified
Agile.Net Obfuscator 6.4.0.31 Modified


Agile.NET obfuscator goes beyond traditional obfuscation methods. In addition to renaming your metadata entities, it also supports advanced obfuscation methods that will harden your overall protection scheme and foil reverse engineering altogether. Agile.NET obfuscator renames all metadata constructs, this includes namespaces, class names, method signatures and fields as well as methods implementation and string values of your assembly. Renaming scheme includes 'unreadable chars' scheme, this method will transform classes, methods and field names to unprintable unicode chars. When decompiled, the result is an extremely difficult to understand source code. Since unprintable chars are used it won't be possible to compile the sources produced after decompilation.
Read more

Workflow Engine.NET v1.5 and v2.3

Workflow Engine.NET v1.5 and v2.3
Workflow Engine.NET v1.5 and v2.3


Add a new workflow functionality. More flexibility in settings. Get transparent and predictable development results! WorkflowEngine.NET is a component that adds workflow functionality to your application. It can be fully integrated with the application, or be implemented as a specific stand-alone service (such as a web service).
Read more

Alternative Dark Editor Themes for Delphi 10.2.2

Alternative Dark Editor Themes for Delphi 10.2.2
Alternative Dark Editor Themes for Delphi 10.2.2


As much as I love the dark theme, I am a bit less excited about the editor colors. The text editor has the same background color as all other panels, which makes it harder to differentiate the various sections of the IDE. Also, the pastel-like editor colors on a not-too-dark background make the text look a bit washed out. Of course, this is all just a matter of taste and you may completely disagree with me.
Read more

Agile.Net Obfuscator 6.4.0.31

Agile.Net Obfuscator 6.4.0.31
Agile.Net Obfuscator 6.4.0.31 | 16 Mb


Agile.NET obfuscator goes beyond traditional obfuscation methods. In addition to renaming your metadata entities, it also supports advanced obfuscation methods that will harden your overall protection scheme and foil reverse engineering altogether. Agile.NET obfuscator renames all metadata constructs, this includes namespaces, class names, method signatures and fields as well as methods implementation and string values of your assembly. Renaming scheme includes 'unreadable chars' scheme, this method will transform classes, methods and field names to unprintable unicode chars. When decompiled, the result is an extremely difficult to understand source code. Since unprintable chars are used it won't be possible to compile the sources produced after decompilation.
Read more

OptimaJet Work Flow Engine .NET 1.5.2 Enterprise

OptimaJet Work Flow Engine .NET 1.5.2 Enterprise
OptimaJet Work Flow Engine .NET 1.5 Enterprise | 1 Mb


8 steps for creating a process scheme

Create Actors, Command, and Timers.
Create the first Activity marked as “Initial”.
Create Activities, in which the document can move from the current Activity. Link the current and new Activities with the help of Transitions.
For each new Activity indicate:
4.1. In the State field - the name of a document’s status.
4.2. If the status can be forcefully moved into a particular state, then check the box “For set state.”
4.3. If a scheme may be updated in this Activity, then check the box “Auto scheme update.”
4.4. Fill in the Action calls in the boxes “Implementation” and “Pre-ExecutionImplementation.” Methods from the “Implementation” box will be called, when the document moves to a respective Activity (in “Pre-Execute” mode, methods from the “Pre-Execution Implementation” box will be called). If you use the constructor functionality to build a concordance history, then you need to add the appropriate methods in the data blocks (in our example, these are UpdateTransitionHistory and WriteTransitionHistory, respectively).
For each new Transition:
5.1. Indicate the value of the Classifier. Use “Direct” or “Reverse” for direct or reverse Transitions, respectively.
5.2. In the “Restrictions” block, indicate Actors with access rights for this Transition. When several Conditions are indicated, they are grouped by AND. This function is available for Trigger type equal Command.
5.3. In the “Triggers” block, indicate the type of operation (as per p. 3.5) that initiates a Transition.
5.4. In the “Condition” block, indicate the type of Condition (as per p. 3.5) that helps define the possibility of a Transition and choose an appropriate Transition Type.
If each new Activity contains possible Transitions, repeat pp. 3–6 for each Activity. If these Activities are final, mark them as “Final.”
Create Parameters and indicate them in the appropriate Commands.
Create Localization.
Read more

SqliteDog 1.0.2165.0 Corporate

SqliteDog 1.0.2165.0 Corporate
SqliteDog 1.0.2165.0 Corporate | 2 Mb


SqliteDog is software designed to manage an SQLite database efficiently. It features "Chrome-like" tabs. It remembers every SQL query typed or loaded (eliminating the burden of saving). It highlights SQL syntax and autocompletes object names. It includes powerful database designer that can create a database scheme from scratch. It restructures the scheme securely keeping all data. It smartly fits column width to content...
Read more

Jetico BCWipe 6.07.5

Jetico BCWipe 6.07.5
Jetico BCWipe 6.07.5 | 6.7 Mb


BCWipe software enables you to confidently erase files that can never be recovered by an intruder. BCWipe embeds itself in Windows and can be activated from the Explorer FILE Menu OR from the context (right click) menu OR from a command-line prompt. BCWipe v.3 is a powerful set of utilities which complies with options to invoke either the US Department of Defense (DoD) standard or the Peter Gutmann wiping scheme. You can also create and use your own customized wiping scheme to wipe sensitive information from storage devices installed on your computer.
Read more

Jetico BCWipe v6.07.4

Jetico BCWipe v6.07.4
Jetico BCWipe v6.07.4 | 6 Mb


BCWipe software enables you to confidently erase files that can never be recovered by an intruder. BCWipe embeds itself in Windows and can be activated from the Explorer FILE Menu OR from the context (right click) menu OR from a command-line prompt. BCWipe v.3 is a powerful set of utilities which complies with options to invoke either the US Department of Defense (DoD) standard or the Peter Gutmann wiping scheme. You can also create and use your own customized wiping scheme to wipe sensitive information from storage devices installed on your computer.
Read more