148 Topics
| |
Hi. I've developed a bit of an interest in encryption as well as programming in Haskell since I last used this forum. So I decided to build a symmetric block cipher and test its properties to gain more of an understanding of such things. This is for research purposes as … | |
Hi everyone, I'm new to programming (and daniweb) and I'm having a small problem with a Caeser Cipher program I'm writing. messageE = input('\nPlease enter string to encrypt: ') offsetE = int(input('Please enter offset value (1 to 94): ')) encryptedE = '' if offsetE < 1 or offsetE > 94: … | |
Hi, I have tried googling and searching for this but just find endless information about why software/hardware based encryption is the better option; what I need to know is whether there are any problems using BOTH. We want our offsite backups have to be as secure as possible. We previously … | |
Sir, i need ur help, this is audio stego i can`t play my encrypted audio package techmeet1; import javax.swing.*; import java.io.File; import java.awt.*; import java.awt.event.*; import java.net.*; import java.io.*; import java.util.*; import sun.audio.*; import java.applet.*; import java.math.*; class mainframe extends JFrame implements ActionListener, Runnable { JLabel Lfilename, Lmessage, Ldesign, Ltitle; … | |
Well, in my previous thread i needed help deleting arrays, for the codes i use its here: http://www.daniweb.com/software-development/vbnet/threads/426588/how-to-move-arrays-1-place-down- But now i need help saving the arrays, i can save all the arrays to ini file like this: Ini module: Option Strict On Module INIAccess #Region "API Calls" ' standard API … | |
Hello, i just coded for login script now i want to add "sha1" to my code due to security reason but it's showing an invalid login error i don't know the reason but when i use this withouht "sha1" it's working fine but i want to secure password into database … | |
Hi Guys I have an asp.net application developped using C# asp.net 4.0 , It is running perfectly with .net inbuilt server , but it throws an exception when running on IIS server 5.1 (Win XP sp-3) There i have a connection string encryption method , that is the place it … | |
I am using Qt 5.2.1 and I made a program that takes some values and saves them on a text file. What I want is that everybody can see this file and read the content but nobody can edit it. To edit it, you would have to run the program … | |
Hello People! I am quite new to Qt (and programming in general). And I am making a program that requires me to encrypt a file and decrypt it after asking for a password through the program. But I have no Idea where to start. What I already have - A … | |
I have been turning my USB thumb drives into fully encrypted data containers for years now, but readily admit that the prospect of rolling up your sleeves and getting down and dirty with encryption software is not as exciting to everyone as it is to me. However, with removable USB … | |
Hi, i recently begun learning java and encryption. I found some code from a website that is supposed to decrypt lastlogin files found in minecraft. When i try to compile it gives me these errors: C:\Users\CROCCY\Documents\NetBeansProjects\Lastlogin decryptor\src\lastlogin\decryptor\LastloginDecryptor.java:54: error: invalid method declaration; return type required public MineCraftLoginReader() { C:\Users\CROCCY\Documents\NetBeansProjects\Lastlogin decryptor\src\lastlogin\decryptor\LastloginDecryptor.java:87: error: … | |
I am trying to make a program that generates source code for a much larger program for simple reversal encryption. I don't know what I am doing wrong. Here is my code so far: #include<stdio.h> int main() { FILE *fp; fp=fopen("d:\\crypt.h", "w"); fprintf(fp, "char out[8];char cur[8]; char con[255,255,255,255,255,255,255,255];/n if cur==con … | |
So as part of my computer science course, we have been instructed to build an encryption process. I have a good knowledge on different encryption methods (RSA for example), however I am having a hard time trying to create my own. Now, before anyone says it, I know, using homebrew … | |
Just curious about your thoughts on this subject. **Example:** www.site.com/?id=1 or www.site.com/?id=8adyfa8df614812yasdf (which is also "1", but encrypted) What would you recommend? What do you use? Anyone with pros and/or cons on if you should encrypt your URL data? **My thoughts:** Pros (to encrypting URL data): - Makes it harder … | |
I am using Formidalbe Pro on my wordpress site. Users are sending me a form that I make editable by them and by me (Its all managed by Formidable). They have to be logged-in with wordpress to fill the form and edit it. No anonymous access. I want to encrypt … | |
how do i make a live kali usb with persistence and encrypt it so that no one besides me could access it..? any help would be appreciated thnx in advance :-) | |
What is the usage of "**preg_replace('/\\x13\\x00*$/', '', $plain_text);**" ? | |
Does anyone know if there is a way in which I can install my own Encryption Algorithm into a MySQL database? | |
Using the PySide GUI toolkit will make selecting, copying and pasting encrypted and decrypted text somewhat easier. Not ideal yet, but it will be a good start for those of you who are not very familiar with GUI programming. | |
Hi.I have an image(A) and encrypted image(B) .I want to find correlation coefficient for(Horizontal,Vertical,Diagonal) A(~1)and for B(~0)is there any function in matlab for this ?I know corr2 is for calculating the correlation coefficient for two images.but for one image? | |
In today's environment where just about anyone can snoop around your e-mail, it is prudent to securely encrypt your more private writings. This little Python program will make it easier to do so. | |
Would this decryption decrypt this encryption? encryption: push eax and eax,0xAA not al mov edx,eax pop eax and eax,0x55 xor ecx,edx xor ecx,eax rol cl,1 rol cl,1 mov eax,ecx sub al,0x20 decryption: add al, 0x20 mov eax, ecx ror cl, 1 ror cl, 1 xor ecx, eax xor ecx, edx … | |
Hello I need help encrypting just the password from a XML file. The file follows the W3C XML syntax. I think I can achieve it by by encrypting the xml element content like this example: <?xml version='1.0'?> <PaymentInfo xmlns='http://example.org/paymentv2'> <Name>John Smith</Name> <CreditCard Limit='5,000' Currency='USD'> <Number> <EncryptedData xmlns='http://www.w3.org/2001/04/xmlenc#' Type='http://www.w3.org/2001/04/xmlenc#Content'> <CipherData> <CipherValue>A23B45C56</CipherValue> … | |
Microsoft first started warning people that the there was going to be an important change to Windows' certificate requirements back in June. A change that is designed to improve security across the Windows platform by way of increasing the RSA key length to a minimum of 1024 bits for certificates … | |
I've run this code to generate two encrypted passwords from a plaintext password echo crypt("TestingTesting123"); echo "<br />"; echo crypt("TestingTesting123"); The two strings are identical but when I run it I get this output $1$/PGpeshL$UhmiaU/jlaJTWZV8g7Ze4/ $1$MnRnzohZ$zh9VpHPOwYejI.XR76vmC/ Some people have reccomended crypt() as a good password encryptor, but how are you … | |
The line ‘free crypto browser extension for Firefox’ contains six of my favorite words within its seven-word construction, which is not bad going. In case you were wondering, for is the word that doesn’t float my boat, although others such as complexity, ‘key management’ and PGP which usually rub me … | |
I currently have a Ubuntu 12.04 LTS box serving as a network repository for daily workstation backups for our HQ office. Throughout the day the Win7 workstations use Cobian Backup 11 to backup their user folders to their respective samaba shares on this server. At night this server rsyncs all … | |
The goal of my assignment is to create a program that takes a string of words and encodes or decodes the string using a simple substitution cypher. I've gotten a decent amount done but I am stuck at the part where I actually have to encrypt and decrypt using the … | |
Hi, I don't know if this question makes any sense, but i need to get some answers. I am working on a project, where i am using a file encrytion/decrytion program.Now i have this .java program which is working perfectly from the command prompt and encryting/decryting files Now , the … | |
hallo master .. I have a problem, how to make encryption and decryption using the Vigenere cipher in vb.net.? I hope someone can help me the problem. thank's before .. |
The End.