Member Avatar
With just about everybody snooping around your emails today with the excuse of hunting the bad guys, coding to keep some resemblance of privacy is getting important. I will start out with some simple encryption examples to get this started. You are invited to give us your thoughts and codes. …
by vegaseat 1,720 in Software Development ()
Member Avatar
Last year, CryptoLocker ransomware after infecting hundreds of thousands of computers and encrypting the data, and backups of that data to any connected device, with the promise of decryption on payment of a fee. This kind of IT extortion is profitable for the bad guys as it targets the people …
by happygeek 1,608 in Information Security ()
Member Avatar
I am using Formidalbe Pro on my wordpress site. Users are sending me a form that I make editable by them and by me (Its all managed by Formidable). They have to be logged-in with wordpress to fill the form and edit it. No anonymous access. I want to encrypt …
by nacedo in Web Development ()
Member Avatar
Would this decryption decrypt this encryption? encryption: push eax and eax,0xAA not al mov edx,eax pop eax and eax,0x55 xor ecx,edx xor ecx,eax rol cl,1 rol cl,1 mov eax,ecx sub al,0x20 decryption: add al, 0x20 mov eax, ecx ror cl, 1 ror cl, 1 xor ecx, eax xor ecx, edx …
by RYAnn191 in Software Development ()
Member Avatar
Hi, I don't know if this question makes any sense, but i need to get some answers. I am working on a project, where i am using a file encrytion/decrytion program.Now i have this .java program which is working perfectly from the command prompt and encryting/decryting files Now , the …
by shibu2all -1 in Web Development ()
Member Avatar
Hi I was wondering why I have an error in this program every time I try to do a long encryption. For example, encrypting an ebook or long document. I only occurs in the advanced encryption and advanced decryption functions. I'm pretty sure it has something to do with memory …
by davi0011 in Software Development ()
Member Avatar
I wanna try my self as an experience. Scenario: I have a member join and member log-in wherein the pass word is encrypted in the database (MySQL) Now let's say he forgot the password it too lazy to just open your email account for just getting the password recovery. What …
by masterjiraya -3 in Web Development ()
Member Avatar
Dear Friends, I have a question in security programming. As all of us know, when we have a database with passwords or anything sensitive, we would like to encrypt it so it is not readable by other. Now I want to know, which of the method is secured or less …
by Bheeman89 in Software Development ()
Member Avatar
Hello Friends. Im a final year student for COmputer Security / Forensic. Im planning to do a project which requires me to do encryption and decryption. My possible choice of language would be VB.Net. I was wondering if wad is running in my mind can be executed. Well, I would …
by Bheeman89 in Software Development ()
Member Avatar
Hi, I'm currently looking at password hashing and from what I've read so far, it seems pretty pointless. I read this article which recommends using MD5 or SHA-1, however I Googled for decrypters and found them witin the first 3 results on Google. I don't quite understand the purpose of …
by AshtonHogan -3 in Web Development ()
Member Avatar
I am working for encryption and decryption using rsa algorithm ,and adding my own concept in rsa, after rsa and padding i m getting a string like- 100011234A12300A12A231A234A981A for different input output string is increase... Is there any technique by use of that i can compact this string [ then …
by rohitamitpathak in Computer Science ()
Member Avatar
hi everyone! this is my encryption routine (using standard call) in x86 Assembler __ASM{ encrypt: push ebp mov ebp,esp mov eax, [ebp+8] mov ecx, [ebp+12] push eax and eax,0xAA not al mov edx,eax pop eax and eax,0x55 xor ecx,edx xor ecx,eax rol cl,1 rol cl,1 mov eax,ecx sub al,0x20 pop …
by thunderbird24 in Software Development ()
Member Avatar
hi i am looking for some code and step by step instructions for the c sharp encryption and decryption process. if anyone is willing to send me some instructions i would be grateful. thanks Neville
by Nevillelajru in Software Development ()
Member Avatar
Hi guys, I'm looking for AES equivalent inverse cipher...Has any one worked on it.. I need a c code for it ... please it's really very urgent..
by arun_taurean -9 in Software Development ()
Member Avatar
hello everyone,i need to make an encryption/decryption program and I'm almost finished, the problem is when i tried to add some gui an error about throwing exception keeps showing.. this is the code without the gui and it works just fine because the throws Exception is in the main.. import …
by rude04 in Software Development ()
Member Avatar
Hi guys! I just want you to ask if their is an available decrypting software? Would you mind to suggest??? Thanx in advance :)
by vin24 in Microsoft Windows ()
Member Avatar
Hi all, I'm currently working on a RC4 project for my computer security class. I have looked at the wikipedia page for RC4, and I'm trying to adapt that algorithm to my problem. I can get the correct encrypted text when I just cout the values. However, when I try …
by Kontained in Software Development ()
Member Avatar
I installed flycryptor software on my system to lock certain files and folders. Now the problem is that those files are encrypted and my friend have uninstalled the software .Those files appear somewhat scary to look at and are not opening properly. So is there any way by which i …
by james chaco in Information Security ()
Member Avatar
I have created a encryptor/decryptor that allows you to encrypt/decrypt text in a textbox, or a file. The basis of the system is to allow a user to thoroughly protect data within their system. Is there anyone that would be willing to test the program?
by zinnqu 7 in Software Development ()
Member Avatar
I have two form. Form 1 and Form 2 In form 1, i have a few textbox and and combo box. and BTNOk [to save] and BTNCancel[when BTNCancel is click, user are prompt whether to save file if there is changes in entry] Form 2 is the file where BTNCancel …
by facadie -9 in Software Development ()