Results for "Author: craig bonathan"
This program allows simple creation of bezier curves. Given the 'Control Points' (the points which a bezier curve is based upon - two end points and any others to affect the curve), the 'CalculateBezier' function will return the coordinates of a point anywhere along the curve. The front-end to the function just shows you what a bezier curve is, and the large capability of the function to accept as many control points as you want (the front-end limits it to 99, but the function will accept more if necessary). The code is marked at 'Advanced' level because of the complexity of the equations used, although programmers at the 'Intermediate' stage might be able to understand it.
Password protect ANY executable file (.exe). This program allows you to put a password on a program so that everyone has to enter the correct password when it starts up. It will not let anyone run the program without the password. It is simple to use, and you don't even have to have the source code of the program you want to protect.
An update to Naughtz V1. Naughtz is a naughts and crosses game with a difference. Firstly, you can create, load and save your own board layouts. Secondly, there are UFOs which take or place naughts and crosses in random locations (only if you want them to).
Region Maker is an extremely useful and powerful tool that can completely re-shape forms. See the screenshot for an example. Both tool and module allow you to create a window shaped to your desire from a bitmap image, save the data, and re-use it later. All you have to do is create the region data file, which the module or tool does for you, and then call two functions within your program to change what your window looks like completely. All unwanted areas become transparent so you can make all of your programs look the way YOU want them to!
Region Maker is an extremely useful and powerful tool that can completely re-shape forms. See the screenshot for an example. Both tool and module allow you to create a window shaped to your desire from a bitmap image, save the data, and re-use it later. All you have to do is create the region data file, which the module or tool does for you, and then call two functions within your program to change what your window looks like completely. All unwanted areas become transparent so you can make all of your programs look the way YOU want them to!
File Shield is a file protector application. It will encrypt any file and encose it inside another application (lock.exe), where it can then be decrypted and extracted with a correct password. If necessary, the file can be included with its own unique key, which will identify whether the protected file has been altered. Another useful feature is the expiration date system. You may choose to set a date when the program will no longer extract the file. Encryption depends on the password. The password is not included in the executable at all. When a password is entered, a unique key is created for it. You cannot reverse a unique key encryption as it is one-way. This means that if you enter the wrong password, its unique key will not match the one that is in the file, so it will not extract. Since the file is encrypted with the password, only the same password will decrypt it. When the file UID generation is turned off, and on the VERY unlikely event that two passwords (one wrong, and one right) create the same unique key, the file will extract, but the data will be incorrect if the wrong password is used. When the UID generation is turned on, even a password with the same unique key will not extract the file because it would end up with an 'Extraction Error.' The file UID generation does not allow modified files to be extracted, which is definitely an advantage. Any file can be protected with File Shield. When the protected executable is ran and the correct password is entered, it will extract the file, run it (with its associated application if it is a document), and then delete it as soon as the program that opened the file closes.
Code Organiser "beautifies" your code, i.e. automatically indents it properly. You tell it which project to organise, and it will allow you to select which forms, modules or classes to modify. Extremely useful for making code much more readable.
Region Maker is an extremely useful and powerful tool that can completely re-shape forms. See the screenshot for an example, using a partially transparent 3D version of my school's logo. The package includes a tool to create regions (which is the part that defines the shape of the form) from bitmaps and then save them to a file to be used later. The included class module allows you to easily load the region back to any form to reshape it in the way that YOU want it to!
The Alpha-Blend-Image graphics engine allows you to draw pictures to the screen with variable transparency (see screenshot), and if done correctly, can reduce aliasing so much that it isn't visible. It also prevents graphical glitches, such as flickering, by using a buffer. The engine works particularly well for 2D games, such as the one I am working on now (screenshots included in zip file).
Password protect ANY executable file (.exe). This program allows you to put a password on a program so that everyone has to enter the correct password when it starts up. It will not let anyone run the program without the password. It is simple to use, and you don't even have to have the source code of the program you want to protect.
Region Maker is an extremely useful and powerful tool that can completely re-shape forms. See the screenshot for an example. Both tool and module allow you to create a window shaped to your desire from a bitmap image, save the data, and re-use it later. All you have to do is create the region data file, which the module or tool does for you, and then call two functions within your program to change what your window looks like completely. All unwanted areas become transparent so you can make all of your programs look the way YOU want them to!
Region Maker is an extremely useful and powerful tool that can completely re-shape forms. See the screenshot for an example. Both tool and module allow you to create a window shaped to your desire from a bitmap image, save the data, and re-use it later. All you have to do is create the region data file, which the module or tool does for you, and then call two functions within your program to change what your window looks like completely. All unwanted areas become transparent so you can make all of your programs look the way YOU want them to!
An update to Naughtz V1. Naughtz is a naughts and crosses game with a difference. Firstly, you can create, load and save your own board layouts. Secondly, there are UFOs which take or place naughts and crosses in random locations (only if you want them to).
File Shield is a file protector application. It will encrypt any file and encose it inside another application (lock.exe), where it can then be decrypted and extracted with a correct password. If necessary, the file can be included with its own unique key, which will identify whether the protected file has been altered. Another useful feature is the expiration date system. You may choose to set a date when the program will no longer extract the file. Encryption depends on the password. The password is not included in the executable at all. When a password is entered, a unique key is created for it. You cannot reverse a unique key encryption as it is one-way. This means that if you enter the wrong password, its unique key will not match the one that is in the file, so it will not extract. Since the file is encrypted with the password, only the same password will decrypt it. When the file UID generation is turned off, and on the VERY unlikely event that two passwords (one wrong, and one right) create the same unique key, the file will extract, but the data will be incorrect if the wrong password is used. When the UID generation is turned on, even a password with the same unique key will not extract the file because it would end up with an 'Extraction Error.' The file UID generation does not allow modified files to be extracted, which is definitely an advantage. Any file can be protected with File Shield. When the protected executable is ran and the correct password is entered, it will extract the file, run it (with its associated application if it is a document), and then delete it as soon as the program that opened the file closes.
The Alpha-Blend-Image graphics engine allows you to draw pictures to the screen with variable transparency (see screenshot), and if done correctly, can reduce aliasing so much that it isn't visible. It also prevents graphical glitches, such as flickering, by using a buffer. The engine works particularly well for 2D games, such as the one I am working on now (screenshots included in zip file).
Region Maker is an extremely useful and powerful tool that can completely re-shape forms. See the screenshot for an example, using a partially transparent 3D version of my school's logo. The package includes a tool to create regions (which is the part that defines the shape of the form) from bitmaps and then save them to a file to be used later. The included class module allows you to easily load the region back to any form to reshape it in the way that YOU want it to!
This program allows simple creation of bezier curves. Given the 'Control Points' (the points which a bezier curve is based upon - two end points and any others to affect the curve), the 'CalculateBezier' function will return the coordinates of a point anywhere along the curve. The front-end to the function just shows you what a bezier curve is, and the large capability of the function to accept as many control points as you want (the front-end limits it to 99, but the function will accept more if necessary). The code is marked at 'Advanced' level because of the complexity of the equations used, although programmers at the 'Intermediate' stage might be able to understand it.
Code Organiser "beautifies" your code, i.e. automatically indents it properly. You tell it which project to organise, and it will allow you to select which forms, modules or classes to modify. Extremely useful for making code much more readable.
This program allows simple creation of bezier curves. Given the 'Control Points' (the points which a bezier curve is based upon - two end points and any others to affect the curve), the 'CalculateBezier' function will return the coordinates of a point anywhere along the curve. The front-end to the function just shows you what a bezier curve is, and the large capability of the function to accept as many control points as you want (the front-end limits it to 99, but the function will accept more if necessary). The code is marked at 'Advanced' level because of the complexity of the equations used, although programmers at the 'Intermediate' stage might be able to understand it.
Password protect ANY executable file (.exe). This program allows you to put a password on a program so that everyone has to enter the correct password when it starts up. It will not let anyone run the program without the password. It is simple to use, and you don't even have to have the source code of the program you want to protect.