The following is the correct way to do encryption. I thought it useful to post for various reasons, most particular being the necessity for our companies to have good security controls. This is very important. If anybody has any other good snippets feel … Discussion Thread by overwraith in Software Development
2 Months Ago
The following is the correct way to do encryption. I thought it useful to post for various reasons, most particular being the necessity for our companies to have good security controls. This is very important. If anybody has any other good snippets feel … Discussion Thread by overwraith in Software Development
I have to ask. I may be misreading this but it looks like you can decrypt the password. If I'm wrong on that the following doesn't apply. Wasn't the current method to use one way encrption and only store the encrypted value? Then when the user … Reply by rproffitt
2 Months Ago
The following is the correct way to do encryption. I thought it useful to post for various reasons, most particular being the necessity for our companies to have good security controls. This is very important. If anybody has any other good snippets feel … Discussion Thread by overwraith in Software Development
Right, you're referring to the FTP object. But how do we connect to the FTP server? We have to transmit the password's actual text via the ftp client, therefore we need to be able to reconstitue it, hence the symmetric crypto. An FTP credential is … Reply by overwraith
2 Months Ago
The following is the correct way to do encryption. I thought it useful to post for various reasons, most particular being the necessity for our companies to have good security controls. This is very important. If anybody has any other good snippets feel … Discussion Thread by overwraith in Software Development
For FTP, the user has to supply their password again. But isn't FTP considered grossly insecure without going through some SSH tunnel? That is, I recall demo'ing catching the user's password during FTP login over a network. Maybe it's time for FTP to … Reply by rproffitt
2 Months Ago
The following is the correct way to do encryption. I thought it useful to post for various reasons, most particular being the necessity for our companies to have good security controls. This is very important. If anybody has any other good snippets feel … Discussion Thread by overwraith in Software Development
I believe i first saw this FTP stuff in a business application, perhaps there will be an SFTP replacement class at some point. If you have some good code shoot. The symmetric crypto could just as easily be used on a clob of text, but i have found that you … Reply by overwraith
2 Months Ago
The following is the correct way to do encryption. I thought it useful to post for various reasons, most particular being the necessity for our companies to have good security controls. This is very important. If anybody has any other good snippets feel … Discussion Thread by overwraith in Software Development
Just so we're clear, FTP today is considered insecure. https://www.secure-bytes.com/blog/why-ftp-is-insecure/ and many others note the clear text password that means well, it's time is over. Some companies no longer supply FTP uploads/access to update … Reply by rproffitt
2 Months Ago
The following is the correct way to do encryption. I thought it useful to post for various reasons, most particular being the necessity for our companies to have good security controls. This is very important. If anybody has any other good snippets feel … Discussion Thread by overwraith in Software Development
> The following is the correct way to do encryption. What international authority supports this as the correct way to do encryption? What credentials do you have to make that statement? Reply by tinstaafl
2 Months Ago
The following is the correct way to do encryption. I thought it useful to post for various reasons, most particular being the necessity for our companies to have good security controls. This is very important. If anybody has any other good snippets feel … Discussion Thread by overwraith in Software Development
SSH with keys is the way to go. Written and vetted by cryptography experts, battle tested, hugely widespread and supported by all modern deployment mechanisms. Rolling your own encryption routine can be fun, but it [probably won't be that secure](https… Reply by pty
2 Months Ago
For example, you can order dishes on handheld devices that run on your Iphone, Androi, winphone, restaurant, coffee shop, and so on. Any programming language that runs on the above devices, for example simple you have to share yourself with. Discussion Thread by dongtrien in Web Development
2 Months Ago
For example, you can order dishes on handheld devices that run on your Iphone, Androi, winphone, restaurant, coffee shop, and so on. Any programming language that runs on the above devices, for example simple you have to share yourself with. Discussion Thread by dongtrien in Web Development
The usual is to start with a web order page. Apps require more time and may be specific to the handheld plus you have to get the owner to install them. Make a web order page and there is no install required and should run on almost any smart device … Reply by rproffitt
2 Months Ago
For example, you can order dishes on handheld devices that run on your Iphone, Androi, winphone, restaurant, coffee shop, and so on. Any programming language that runs on the above devices, for example simple you have to share yourself with. Discussion Thread by dongtrien in Web Development
I really have no clue what you're after. ¯\_(ツ)_/¯ > that run on your Iphone, Androi, winphone, restaurant, coffee shop... ¯\_(ツ)_/¯ > for example simple you have to share yourself with. Reply by gentlemedia
2 Months Ago
For example, you can order dishes on handheld devices that run on your Iphone, Androi, winphone, restaurant, coffee shop, and so on. Any programming language that runs on the above devices, for example simple you have to share yourself with. Discussion Thread by dongtrien in Web Development
I find the software for ordering in the cafe, ... they use Ipad to order food. Employees bring out an Ipad to order food for customers choose the items, when selected will save to SQL Server, do you go to the coffee shop called dish like this ? Reply by dongtrien
2 Months Ago
Hi, I am working on getting MAC address of a newly connected client using C#. I have written server application and when client connects to my server, I want to get MAC addresses of clients and store it in database. I could get IP address of client but … Discussion Thread by siddhesh123 in Software Development
Hi All, Can someone help me out in getting client mac address by using java Thanks in advance Reply by sudharshan_1
2 Months Ago
Hi, I am working on getting MAC address of a newly connected client using C#. I have written server application and when client connects to my server, I want to get MAC addresses of clients and store it in database. I could get IP address of client but … Discussion Thread by siddhesh123 in Software Development
You ask for Java and tag with C# Which is it? Reply by JamesCherrill
2 Months Ago
The following is the correct way to do encryption. I thought it useful to post for various reasons, most particular being the necessity for our companies to have good security controls. This is very important. If anybody has any other good snippets feel … Discussion Thread by overwraith in Software Development
You should never roll your own encryption. You are not a cryptographer. Neither am I, however you may be trained to utilize the crypto API for your day to day business which is vetted by cryptographers. As far as international, you have to make sure your … Reply by overwraith
2 Months Ago
The following is the correct way to do encryption. I thought it useful to post for various reasons, most particular being the necessity for our companies to have good security controls. This is very important. If anybody has any other good snippets feel … Discussion Thread by overwraith in Software Development
I defer to "C# Data Security Practical .NET Cryptography Handbook" as far as credentials go. The only really novel thing I am doing is salting the passwords, which is a sound cryptographic practice since wordlists don't have your salt appended to… Reply by overwraith
2 Months Ago
Hello, l have a table in sql server containing some information such first name,last name, address etc. I want to display the items for a particular row when l search in a textbox. I am running into error messages. Any help here will be appreciated. Here … Discussion Thread by Jim_21 in Software Development
2 Months Ago
Hello, l have a table in sql server containing some information such first name,last name, address etc. I want to display the items for a particular row when l search in a textbox. I am running into error messages. Any help here will be appreciated. Here … Discussion Thread by Jim_21 in Software Development
What are your error messages? Btw. indentation of your code is a bit weird, which makes hard to read. Reply by ddanbe
2 Months Ago
Hello, l have a table in sql server containing some information such first name,last name, address etc. I want to display the items for a particular row when l search in a textbox. I am running into error messages. Any help here will be appreciated. Here … Discussion Thread by Jim_21 in Software Development
hi, the error im getting is : ExecuteReader: Connection property has not been initialized. Reply by Jim_21
2 Months Ago
Hello, l have a table in sql server containing some information such first name,last name, address etc. I want to display the items for a particular row when l search in a textbox. I am running into error messages. Any help here will be appreciated. Here … Discussion Thread by Jim_21 in Software Development
It is very obvious you have no conection to the DB. Why is line 35 commented out? Reply by ddanbe
2 Months Ago
I'm trying to print multiple QR images in 1 page, but when i print i receive the last image only, the Code is: int QRLoop = Convert.ToInt32(txtSerialTo.Text) - Convert.ToInt32(txtSerialFrom.Text) + 1; for (int i = 0; i < QRLoop; i++)… Discussion Thread by hatem.ib in Software Development
2 Months Ago
I'm trying to print multiple QR images in 1 page, but when i print i receive the last image only, the Code is: int QRLoop = Convert.ToInt32(txtSerialTo.Text) - Convert.ToInt32(txtSerialFrom.Text) + 1; for (int i = 0; i < QRLoop; i++)… Discussion Thread by hatem.ib in Software Development
What type is pbx? Did you not try to debug and set some breakpoints? Reply by ddanbe
2 Months Ago
I'm trying to print multiple QR images in 1 page, but when i print i receive the last image only, the Code is: int QRLoop = Convert.ToInt32(txtSerialTo.Text) - Convert.ToInt32(txtSerialFrom.Text) + 1; for (int i = 0; i < QRLoop; i++)… Discussion Thread by hatem.ib in Software Development
pbx is a picturebox to save the QR code in it Reply by hatem.ib
2 Months Ago
I'm trying to print multiple QR images in 1 page, but when i print i receive the last image only, the Code is: int QRLoop = Convert.ToInt32(txtSerialTo.Text) - Convert.ToInt32(txtSerialFrom.Text) + 1; for (int i = 0; i < QRLoop; i++)… Discussion Thread by hatem.ib in Software Development
and yes i tried to debug with breakpoints and it was looping perfectly, but it prints only the last image, even i tried to do what loop does manually to check the problem, such as: p.PrintPage += delegate (object sender1, PrintPageEventArgs e1)… Reply by hatem.ib
2 Months Ago
I'm trying to print multiple QR images in 1 page, but when i print i receive the last image only, the Code is: int QRLoop = Convert.ToInt32(txtSerialTo.Text) - Convert.ToInt32(txtSerialFrom.Text) + 1; for (int i = 0; i < QRLoop; i++)… Discussion Thread by hatem.ib in Software Development
When you debugged, what was the value of `QRLoop`? Reply by ddanbe
2 Months Ago
hi can somebody tell me how to call dll made in c# project in the vc++ (VC 6.0) project??? the detail example of vc++ code would help me a lot. thanx n regards. chaitanya. Discussion Thread by chait_anya in Software Development
Hi, Can anyone post an example of this or refer some tutorial? Best Reply by Sajid_11
2 Months Ago
I'm trying to print multiple QR images in 1 page, but when i print i receive the last image only, the Code is: int QRLoop = Convert.ToInt32(txtSerialTo.Text) - Convert.ToInt32(txtSerialFrom.Text) + 1; for (int i = 0; i < QRLoop; i++)… Discussion Thread by hatem.ib in Software Development
QRLoop Valued 16, but it could be changed, it's dynamic Reply by hatem.ib
2 Months Ago
Does anybody know whether System.Data.SqlLite has the capability to do a Change notification callback when one of it's tables is changed? I know that Python can do it by calling the C api, but This is kind of beyond me. I know I have done this before on an… Discussion Thread by overwraith in Software Development
That intermediary service is a good idea. Wow, never thought of that. All it would have to be is a singleton which has a flag has been modified which one would use in whatever db access code you preform. That is inspiring. I went an alternate route, and … Reply by overwraith
1 Month Ago
I have a bootstrap view which I am trying to get a modal working for. Unfortunately the modal is displaying as part of the page, not invisable. So it is displaying with it's content as part of the page. Here is my code: <!-- Placing … Discussion Thread by overwraith in Software Development
This topic is no longer necessary, I figured out how to do it with UI bootstrap, a seperate thread. Resultant html looks vastly different. Reply by overwraith
1 Month Ago
I'm in last year in CSE & my is relating to fingerprint, so i need to help. Discussion Thread by Harsh_11 in Software Development
I don't know what I was thinking. This is much more complete... namespace NHibernateIdentityDAL.Models { [Indexed(Index = "User")] public class User { /// <summary> /// Unique identifier… Reply by overwraith
1 Month Ago