Compress Files, Handle and Encrypt ZIP Archives in Delphi
Zip, unzip, encrypt and decrypt files with a set of ZIP components for Delphi.
ZIPBlackbox offers developers the ability to quickly implement the complete functionality of a fully featured ZIP archiver in Windows, Linux, MacOS, iOS and Android applications. The available AES-256 encryption and decryption allows creating and managing plain and encrypted ZIP archives. Certificate-based security is used to validate and decrypt ZIP archives. Also ZIPBlackbox includes components to compress and decompress TAR.GZ and BZIP archives.
Download ZIP Components for DelphiThe ZIPBlackbox package is an integral part of SecureBlackbox. Download SecureBlackbox (VCL edition) to quickly implement ZIP compression, encryption and signing in Delphi applications.
Zip and Unzip Files in Delphi with ZIP VCLZIP VCL components implement the complete compression, decompression and management functionality allowing your applications to pack files, unpack ZIP archives and list the content of ZIP files.
Encrypt, decrypt and verify ZIP Archives with ZIP Encryption ComponentsWith ZIP encryption components, you can optionally encrypt ZIP archives or produce encrypted archives on the fly during the compression. The ZIP encryption components feature strong AES256 encryption as well as the ability to use secure certificates to decrypt and to validate signatures of ZIP archives.
Why Choose ZIPBlackbox over Competing Delphi ZIP Components
- Create a fully featured ZIP archiver in minutes;
- Compress and decompress data in RAM or on the disk;
- Supports large archives (over 4 GB);
- Strong AES-256 security;
- Compatible with cryptographic hardware for decrypting of ZIP archives (requires PKIBlackbox);
- Royalty-free license;
- Comprehensive technical support and assistance with your project available from the day you download the free evaluation version.
Download SecureBlackbox (VCL edition), an all-in-one security toolbox that includes the ability to zip, unzip, encrypt and sign files in Delphi.Compression gives an additional level of security and lets you increase transfer speed significantly and reduce the network load and storage space requirements.
Synchronous operation mode gives you a linear programming approach without complicated callback functions. This approach saves your development time and reduces the number of errors.
Asynchronous operation mode, on the other hand, gives you flexibility and complete control over your application communications.Synchronous operation mode gives you a linear programming approach without complicated callback functions. This approach saves your development time and reduces the number of errors. Simple SecureBlackbox components can be used for reliable data transfer no matter what type of proxy or firewall is used to protect the network.
HTTPS proxy access includes support for Basic, Digest and Windows Integrated (NTLM) authentication mechanisms. You can process huge files and not be bound by restrictions of 32-bit environments. This feature works on both 32-bit and 64-bit systems without any limitations. To limit and control network load and bandwidth consumption you can setup maximum upload and download speed for the data transfer components. Transport (SSL, FTP, HTTP, SMTP, POP3, IMAP, WebDAV, LDAP, SSH, SFTP) components can be used in IPv6 networks without any problems, address conversions or packet wrapping. Transport (SSL, FTP, HTTP, SMTP, POP3, IMAP, WebDAV, LDAP, SSH, SFTP) components understand and make use of non-latin domain names (so-called International Domain Names, IDN). In FIPS operation mode SecureBlackbox uses only certified CryptoAPI modules of Windows to perform any cryptographic operations.
FIPS mode is available only on Windows platform. Virtual File System adapters let SecureBlackbox components, which operate with files, work with various backend file storages and not just with "physical" disk.
For example, in WebDAV, SFTP, HTTP(S) and FTP(S) servers you can provide a personal storage space for each connected user.
Out of the box file system adapter and SolFS virtual file system adapter are included and you can easily create your own adapter. With DNSSEC support enabled you protect your socket connection from being fooled by possible DNS cache poisoning and other malicious DNS activities.
DNSSEC requires that the DNS record for the destination server contains a certified signature. Distributed Crypto modules let web site visitors use certificates accessible only on the client system to sign the data, stored on the server (no need to download this data).
This is done with help of client-side modules (Java applet, ActiveX control, Flash applet), embedded into the web page. Cryptographic hardware gains more and more popularity every day. If your software deals with X.509 certificates or PKI in general (RSA keys etc.), it is time to support cryptocards and USB tokens.
To use cryptographic hardware you need a license for PKIBlackbox. SecureBlackbox was written from the ground up by EldoS developers. It doesn't use third-party code to implement its cryptographic functions. This means that you are not bound by CryptoAPI or OpenSSL version when you need to use certain algorithm.
At the same time it's possible to plug third-party security libraries and hardware modules by utilizing the pluggable architecture of SecureBlackbox. No royalties means the licensing procedure which is clear and easy to understand and manage. Pay for the license once and use it for development and deployment with no other payments. We provide free technical support via web-based Forum and HelpDesk. Support is available for everyone, and the requests from clients who purchased a license are given priority. Also you can use our extensive knowledgebase. Cryptographic hardware gains more and more popularity every day. If your software deals with X.509 certificates or PKI in general (RSA keys etc.), it is time to support cryptocards and USB tokens.
Unlike the competitive solutions ZIPBlackbox is fully capable to use the cryptographic hardware (which doesn't export the private key) for signing and decryption of ZIP archives.To use cryptographic hardware you need a license for PKIBlackbox.