Member Avatar

Last year, CryptoLocker ransomware [hit the headlines](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/470427/cryptolocker-250k-infections-in-100-days-nets-300000-or-does-it) after infecting hundreds of thousands of computers and encrypting the data, and backups of that data to any connected device, with the promise of decryption on payment of a fee. This kind of IT extortion is profitable for the bad guys as it targets the people who are least likely to be in a position to do anything but pay; the people who are most likely to get infected are the same folk who are least likely to have an offsite backup or know how to get help with such a problem. This …

Member Avatar
2
84
Member Avatar

I have a lot of simple VBScript files that were encrypted. I have lost the originals. The code still works within the intended platform, but now I need to do some maintenance. I used a free, vendor-supplied utility that compiled the VBS into a plug-in, but I don't know what encryption system they used. I'd like to have someone take a look and at least tell me what type of encryption was used, so I can find the utility and/or decrypt the files. Note, nothing illegal is going on here. I worked extensively with a software package years ago, never …

Member Avatar
0
26
Member Avatar

With just about everybody snooping around your emails today with the excuse of hunting the bad guys, coding to keep some resemblance of privacy is getting important. I will start out with some simple encryption examples to get this started. You are invited to give us your thoughts and codes. Hopefully, we can improve the code as time goes on. The first example is very simplistic form of a Caesar cipher, simply increasing the ASCII values by one to encrypt and decreasing by one to decrypt. It would be easy to figure that scheme out by looking at the letter …

Member Avatar
3
161
Member Avatar

I am using Formidalbe Pro on my wordpress site. Users are sending me a form that I make editable by them and by me (Its all managed by Formidable). They have to be logged-in with wordpress to fill the form and edit it. No anonymous access. I want to encrypt the data they send on the database and I want a way that the data could be decrypted by only me and by the user so it can be modifiable... What kind of encryption and how could I manage to implement that ? Here is the Formidable Pro hooks : …

Member Avatar
0
11
Member Avatar

Would this decryption decrypt this encryption? encryption: push eax and eax,0xAA not al mov edx,eax pop eax and eax,0x55 xor ecx,edx xor ecx,eax rol cl,1 rol cl,1 mov eax,ecx sub al,0x20 decryption: add al, 0x20 mov eax, ecx ror cl, 1 ror cl, 1 xor ecx, eax xor ecx, edx and eax, 0x55 pop eax mov edx, eax not al and eax, 0xAA push eax

Member Avatar
0
25
Member Avatar

Hi, I don't know if this question makes any sense, but i need to get some answers. I am working on a project, where i am using a file encrytion/decrytion program.Now i have this .java program which is working perfectly from the command prompt and encryting/decryting files Now , the task at hand is to use this progarm using web interface,(i am using JSP for dynamic web pages), where the user needs to browse and select the file from his local system and on sending the mail to the receiver, the file should get encryted and get stored on a …

Member Avatar
0
28
Member Avatar

Hi I was wondering why I have an error in this program every time I try to do a long encryption. For example, encrypting an ebook or long document. I only occurs in the advanced encryption and advanced decryption functions. I'm pretty sure it has something to do with memory or access violation, according to the code, but a point in the direction to fix it would be greatly appreciated. Thanks. [CODE] #include <iostream> #include <fstream> #include <cstdlib> #include <string> using namespace std; char path1[256], path2[256]; int EnORDe; char a,b; char newline='\r\n'; int pavalue[32]; void Sencrypt(); void Sdecrypt(); void passcode(int …

Member Avatar
0
25
Member Avatar

I wanna try my self as an experience. Scenario: I have a member join and member log-in wherein the pass word is encrypted in the database (MySQL) Now let's say he forgot the password it too lazy to just open your email account for just getting the password recovery. What I thought of is to only show the encrypted password since the admin level cannot see the username. I wanted to show the password the non-encrypted information on password which could be only accessed by customers.

Member Avatar
0
7
Member Avatar

Dear Friends, I have a question in security programming. As all of us know, when we have a database with passwords or anything sensitive, we would like to encrypt it so it is not readable by other. Now I want to know, which of the method is secured or less secured. Is it Iterative Salting (1000x iterative) or Encryption method such as SHA 256, MD5, and all others. Kindly give me your opinion on this please. Thank you.

Member Avatar
0
12
Member Avatar

Hello Friends. Im a final year student for COmputer Security / Forensic. Im planning to do a project which requires me to do encryption and decryption. My possible choice of language would be VB.Net. I was wondering if wad is running in my mind can be executed. Well, I would make a application where a part of it wil be promting the guest to register and I wanted to store the password in the database. I did some research and came across Salting and Hashing. I was wondering if is it possible to get the password which the user enters, …

Member Avatar
0
5
Member Avatar

Hi, I'm currently looking at password hashing and from what I've read so far, it seems pretty pointless. I read this [URL="http://phpsec.org/articles/2005/password-hashing.html"]article[/URL] which recommends using MD5 or SHA-1, however I Googled for decrypters and found them witin the first 3 results on Google. I don't quite understand the purpose of encrypting if it can just as easily be decrypted again. Can someone please explain why one would need password hashing and tell me if there's an encryption that cannot be decrypted? Thanks, Ashton.

Member Avatar
0
8
Member Avatar

I am working for encryption and decryption using rsa algorithm ,and adding my own concept in rsa, after rsa and padding i m getting a string like- 100011234A12300A12A231A234A981A for different input output string is increase... Is there any technique by use of that i can compact this string [ then easy store in database and retrieve and convert into real form when required]

Member Avatar
0
4
Member Avatar

hi everyone! this is my encryption routine (using standard call) in x86 Assembler __ASM{ encrypt: push ebp mov ebp,esp mov eax, [ebp+8] mov ecx, [ebp+12] push eax and eax,0xAA not al mov edx,eax pop eax and eax,0x55 xor ecx,edx xor ecx,eax rol cl,1 rol cl,1 mov eax,ecx sub al,0x20 pop ebp ret } all im trying to do now is Reverse the "encrypt" Algorithms Effect (need to create a DECRYPT routine) if anyone can help me, it would be much appreciated! thanks x ps..if you need any more information, let me know .

Member Avatar
0
3
Member Avatar

hi i am looking for some code and step by step instructions for the c sharp encryption and decryption process. if anyone is willing to send me some instructions i would be grateful. thanks Neville

Member Avatar
0
6
Member Avatar

Hi guys, I'm looking for AES equivalent inverse cipher...Has any one worked on it.. I need a c code for it ... please it's really very urgent..

Member Avatar
0
12
Member Avatar

hello everyone,i need to make an encryption/decryption program and I'm almost finished, the problem is when i tried to add some gui an error about throwing exception keeps showing.. this is the code without the gui and it works just fine because the [B]throws Exception[/B] is in the main.. [CODE] import java.io.*; import java.security.*; import javax.crypto.*; import javax.crypto.spec.*; import java.util.*; public class FileEncryptor { private static String filename; private static String password; private static FileInputStream inFile; private static FileOutputStream outFile; public static void main(String[] args) throws Exception { // File to encrypt. It does not have to be a text …

Member Avatar
0
4
Member Avatar

Hi guys! I just want you to ask if their is an available decrypting software? Would you mind to suggest??? Thanx in advance :)

0
1
Member Avatar

Hi all, I'm currently working on a RC4 project for my computer security class. I have looked at the [URL="http://en.wikipedia.org/wiki/RC4"]wikipedia page[/URL] for RC4, and I'm trying to adapt that algorithm to my problem. I can get the correct encrypted text when I just cout the values. However, when I try to store those values into an array and then cout those values, its not the same. Could this be because they are stored into a pointer array, maybe printing out the address of the data? Furthermore when I try to decrypt the encrypted text by XOR'ing the encrypted data again …

Member Avatar
0
2
Member Avatar

I installed flycryptor software on my system to lock certain files and folders. Now the problem is that those files are encrypted and my friend have uninstalled the software .Those files appear somewhat scary to look at and are not opening properly. So is there any way by which i can recover those files and folders. Any suggestion will be greatly helpful.......... looking for replies.....

Member Avatar
0
4
Member Avatar

I have created a encryptor/decryptor that allows you to encrypt/decrypt text in a textbox, or a file. The basis of the system is to allow a user to thoroughly protect data within their system. Is there anyone that would be willing to test the program?

Member Avatar
0
7
Member Avatar

I have two form. Form 1 and Form 2 In form 1, i have a few textbox and and combo box. and BTNOk [to save] and BTNCancel[when BTNCancel is click, user are prompt whether to save file if there is changes in entry] Form 2 is the file where BTNCancel is clicked. Display: Do you want to save changes to your setting? BTNYES,BTNNO, BTNCANCEL. QUESTION When I clicked BTNYES in form 2 how can I call BTNOK in form 1 so that it can run the event handler in form 1 BTNOK another question. any idea of how to do …

Member Avatar
0
9

The End.