logo
ssh
 

SSH ActiveX

Secure Shell (SSH) is a protocol to log into another computer over a network, to execute commands in a remote machine. It provides strong authentication and secure communications over unsecure channels. It is intended as a replacement for rlogin, rsh, and rcp.

 

SCP ActiveX

MySCP is a COM object which provides simlpe interface to copy files between Windows and Linux/Unix systems over a secure encrypted channel.You can use it with any language which supports the Microsoft COM technolgy.

 

XP_CRYPT

Easy-to-use, affordable, and effective security solution for encrypting column and row data within the MSSQL Server, MSDE and Oracle .

Click Here for Free Trial

 

SQL Shield

SQL Shield is a tool for MSSQL Server which effectively encrypts T-SQL code.
You can hide and protect your intellectual property from being viewed by everyone.
All MS SQL code decryptors simply fail to work!

   Activecrypt Online Help Prev Next
About ActiveCrypt
About
ActiveCrypt overview
How to ...
How to make pair of keys
Create new public key from private
How to decrypt string
How to encrypt string
How to save keys
Free keys
Programmer reference
Hash
Hash overview
Methods
HashFile
HashVariant
Properties
Error
Crypt
Encryption overview
Methods
DecryptFile
DecryptVariant
EncryptFile
EncryptVariant
FreeKey
LoadKeyFromString
LoadKey
Properties
AddCRLF
Error
KeySize
Base64
Base64 overview
Methods
DecodeFile
DecodeVariant
EncodeFile
EncodeVariant
Properties
AddCRLF
Error
Sign
Sign overview
Methods
FreeKey
LoadKey
LoadKeyFromString
MakeVariantSignature
MakeFileSignature
VerifyFileSignature
VerifyVariantSignature
Properties
AddCRLF
Error
RSACrypt (old, use Crypt)
Methods
FreeKey
GenerateCouple
GeneratePublicKey
GetVersion
LoadKeyFromString
LoadKey
PublicEncrypt
PrivateDecrypt
SaveKeyToString
SaveKey
Properties
About
Async
Error
Events
OnDecryptionFinished
OnEncryptionFinished
OnError
OnKeyGenerationFinished
Disclaimer

Save keys

After generating the keys, at least the private key should be saved using the SaveKey or SaveKeyToString function. Otherwise you will not be able to decrypt your data later in NO WAY. Please hold a few copies of your private keys. And please always remember that. If you loose the private key, you loose all your encrypted data. Public key can be created from the private key, but the private key can never be reproduced.

Another aspect you should consider is security and a place where to store keys. The ideal solution would be the following: only the public key should be stored in place where encryption is done (for example web server which accepts user data) . This means that even if a hacker breaks into your server and get the file with the public key he still won't be able to decrypt data.

This HTML Help has been published using the chm2web software.