21 Topics
|
|
Last year, CryptoLocker ransomware [hit the headlines](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/470427/cryptolocker-250k-infections-in-100-days-nets-300000-or-does-it) after infecting hundreds of thousands of computers and encrypting the data, and backups of that data to any connected device, with the promise of decryption on payment of a fee. This kind of IT extortion is profitable for the bad guys as it … |
|
I have a lot of simple VBScript files that were encrypted. I have lost the originals. The code still works within the intended platform, but now I need to do some maintenance. I used a free, vendor-supplied utility that compiled the VBS into a plug-in, but I don't know what … |
|
With just about everybody snooping around your emails today with the excuse of hunting the bad guys, coding to keep some resemblance of privacy is getting important. I will start out with some simple encryption examples to get this started. You are invited to give us your thoughts and codes. … |
|
I am using Formidalbe Pro on my wordpress site. Users are sending me a form that I make editable by them and by me (Its all managed by Formidable). They have to be logged-in with wordpress to fill the form and edit it. No anonymous access. I want to encrypt … |
|
Would this decryption decrypt this encryption? encryption: push eax and eax,0xAA not al mov edx,eax pop eax and eax,0x55 xor ecx,edx xor ecx,eax rol cl,1 rol cl,1 mov eax,ecx sub al,0x20 decryption: add al, 0x20 mov eax, ecx ror cl, 1 ror cl, 1 xor ecx, eax xor ecx, edx … |
|
Hi, I don't know if this question makes any sense, but i need to get some answers. I am working on a project, where i am using a file encrytion/decrytion program.Now i have this .java program which is working perfectly from the command prompt and encryting/decryting files Now , the … |
|
Hi I was wondering why I have an error in this program every time I try to do a long encryption. For example, encrypting an ebook or long document. I only occurs in the advanced encryption and advanced decryption functions. I'm pretty sure it has something to do with memory … |
|
I wanna try my self as an experience. Scenario: I have a member join and member log-in wherein the pass word is encrypted in the database (MySQL) Now let's say he forgot the password it too lazy to just open your email account for just getting the password recovery. What … |
|
Dear Friends, I have a question in security programming. As all of us know, when we have a database with passwords or anything sensitive, we would like to encrypt it so it is not readable by other. Now I want to know, which of the method is secured or less … |
|
Hello Friends. Im a final year student for COmputer Security / Forensic. Im planning to do a project which requires me to do encryption and decryption. My possible choice of language would be VB.Net. I was wondering if wad is running in my mind can be executed. Well, I would … |
|
|
Hi, I'm currently looking at password hashing and from what I've read so far, it seems pretty pointless. I read this [URL="http://phpsec.org/articles/2005/password-hashing.html"]article[/URL] which recommends using MD5 or SHA-1, however I Googled for decrypters and found them witin the first 3 results on Google. I don't quite understand the purpose of … |
I am working for encryption and decryption using rsa algorithm ,and adding my own concept in rsa, after rsa and padding i m getting a string like- 100011234A12300A12A231A234A981A for different input output string is increase... Is there any technique by use of that i can compact this string [ then … |
|
hi everyone! this is my encryption routine (using standard call) in x86 Assembler __ASM{ encrypt: push ebp mov ebp,esp mov eax, [ebp+8] mov ecx, [ebp+12] push eax and eax,0xAA not al mov edx,eax pop eax and eax,0x55 xor ecx,edx xor ecx,eax rol cl,1 rol cl,1 mov eax,ecx sub al,0x20 pop … |
|
hi i am looking for some code and step by step instructions for the c sharp encryption and decryption process. if anyone is willing to send me some instructions i would be grateful. thanks Neville |
|
Hi guys, I'm looking for AES equivalent inverse cipher...Has any one worked on it.. I need a c code for it ... please it's really very urgent.. |
|
hello everyone,i need to make an encryption/decryption program and I'm almost finished, the problem is when i tried to add some gui an error about throwing exception keeps showing.. this is the code without the gui and it works just fine because the [B]throws Exception[/B] is in the main.. [CODE] … |
|
Hi guys! I just want you to ask if their is an available decrypting software? Would you mind to suggest??? Thanx in advance :) |
|
Hi all, I'm currently working on a RC4 project for my computer security class. I have looked at the [URL="http://en.wikipedia.org/wiki/RC4"]wikipedia page[/URL] for RC4, and I'm trying to adapt that algorithm to my problem. I can get the correct encrypted text when I just cout the values. However, when I try … |
|
I installed flycryptor software on my system to lock certain files and folders. Now the problem is that those files are encrypted and my friend have uninstalled the software .Those files appear somewhat scary to look at and are not opening properly. So is there any way by which i … |
|
I have created a encryptor/decryptor that allows you to encrypt/decrypt text in a textbox, or a file. The basis of the system is to allow a user to thoroughly protect data within their system. Is there anyone that would be willing to test the program? |
|
I have two form. Form 1 and Form 2 In form 1, i have a few textbox and and combo box. and BTNOk [to save] and BTNCancel[when BTNCancel is click, user are prompt whether to save file if there is changes in entry] Form 2 is the file where BTNCancel … |
The End.