21 Topics

Member Avatar for
Member Avatar for happygeek

Last year, CryptoLocker ransomware [hit the headlines](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/470427/cryptolocker-250k-infections-in-100-days-nets-300000-or-does-it) after infecting hundreds of thousands of computers and encrypting the data, and backups of that data to any connected device, with the promise of decryption on payment of a fee. This kind of IT extortion is profitable for the bad guys as it …

Member Avatar for rproffitt
2
954
Member Avatar for Thomas_32

I have a lot of simple VBScript files that were encrypted. I have lost the originals. The code still works within the intended platform, but now I need to do some maintenance. I used a free, vendor-supplied utility that compiled the VBS into a plug-in, but I don't know what …

Member Avatar for Reverend Jim
0
506
Member Avatar for vegaseat

With just about everybody snooping around your emails today with the excuse of hunting the bad guys, coding to keep some resemblance of privacy is getting important. I will start out with some simple encryption examples to get this started. You are invited to give us your thoughts and codes. …

Member Avatar for Lardmeister
3
1K
Member Avatar for nacedo

I am using Formidalbe Pro on my wordpress site. Users are sending me a form that I make editable by them and by me (Its all managed by Formidable). They have to be logged-in with wordpress to fill the form and edit it. No anonymous access. I want to encrypt …

Member Avatar for diafol
0
267
Member Avatar for RYAnn191

Would this decryption decrypt this encryption? encryption: push eax and eax,0xAA not al mov edx,eax pop eax and eax,0x55 xor ecx,edx xor ecx,eax rol cl,1 rol cl,1 mov eax,ecx sub al,0x20 decryption: add al, 0x20 mov eax, ecx ror cl, 1 ror cl, 1 xor ecx, eax xor ecx, edx …

Member Avatar for Assembly Guy
0
290
Member Avatar for shibu2all

Hi, I don't know if this question makes any sense, but i need to get some answers. I am working on a project, where i am using a file encrytion/decrytion program.Now i have this .java program which is working perfectly from the command prompt and encryting/decryting files Now , the …

Member Avatar for shibu2all
0
331
Member Avatar for davi0011

Hi I was wondering why I have an error in this program every time I try to do a long encryption. For example, encrypting an ebook or long document. I only occurs in the advanced encryption and advanced decryption functions. I'm pretty sure it has something to do with memory …

Member Avatar for davi0011
0
347
Member Avatar for masterjiraya

I wanna try my self as an experience. Scenario: I have a member join and member log-in wherein the pass word is encrypted in the database (MySQL) Now let's say he forgot the password it too lazy to just open your email account for just getting the password recovery. What …

Member Avatar for cereal
0
197
Member Avatar for Bheeman89

Dear Friends, I have a question in security programming. As all of us know, when we have a database with passwords or anything sensitive, we would like to encrypt it so it is not readable by other. Now I want to know, which of the method is secured or less …

Member Avatar for twiss
0
179
Member Avatar for Bheeman89

Hello Friends. Im a final year student for COmputer Security / Forensic. Im planning to do a project which requires me to do encryption and decryption. My possible choice of language would be VB.Net. I was wondering if wad is running in my mind can be executed. Well, I would …

Member Avatar for Bheeman89
0
287
Member Avatar for feoperro

Hi, I'm currently looking at password hashing and from what I've read so far, it seems pretty pointless. I read this [URL="http://phpsec.org/articles/2005/password-hashing.html"]article[/URL] which recommends using MD5 or SHA-1, however I Googled for decrypters and found them witin the first 3 results on Google. I don't quite understand the purpose of …

Member Avatar for feoperro
0
297
Member Avatar for rohitamitpathak

I am working for encryption and decryption using rsa algorithm ,and adding my own concept in rsa, after rsa and padding i m getting a string like- 100011234A12300A12A231A234A981A for different input output string is increase... Is there any technique by use of that i can compact this string [ then …

Member Avatar for rohitamitpathak
0
169
Member Avatar for thunderbird24

hi everyone! this is my encryption routine (using standard call) in x86 Assembler __ASM{ encrypt: push ebp mov ebp,esp mov eax, [ebp+8] mov ecx, [ebp+12] push eax and eax,0xAA not al mov edx,eax pop eax and eax,0x55 xor ecx,edx xor ecx,eax rol cl,1 rol cl,1 mov eax,ecx sub al,0x20 pop …

Member Avatar for rubberman
0
261
Member Avatar for Nevillelajru

hi i am looking for some code and step by step instructions for the c sharp encryption and decryption process. if anyone is willing to send me some instructions i would be grateful. thanks Neville

Member Avatar for Nevillelajru
0
326
Member Avatar for arun_taurean

Hi guys, I'm looking for AES equivalent inverse cipher...Has any one worked on it.. I need a c code for it ... please it's really very urgent..

Member Avatar for jnawrocki
0
1K
Member Avatar for rude04

hello everyone,i need to make an encryption/decryption program and I'm almost finished, the problem is when i tried to add some gui an error about throwing exception keeps showing.. this is the code without the gui and it works just fine because the [B]throws Exception[/B] is in the main.. [CODE] …

Member Avatar for rude04
0
710
Member Avatar for vin24

Hi guys! I just want you to ask if their is an available decrypting software? Would you mind to suggest??? Thanx in advance :)

0
144
Member Avatar for Kontained

Hi all, I'm currently working on a RC4 project for my computer security class. I have looked at the [URL="http://en.wikipedia.org/wiki/RC4"]wikipedia page[/URL] for RC4, and I'm trying to adapt that algorithm to my problem. I can get the correct encrypted text when I just cout the values. However, when I try …

Member Avatar for Kontained
0
3K
Member Avatar for james chaco

I installed flycryptor software on my system to lock certain files and folders. Now the problem is that those files are encrypted and my friend have uninstalled the software .Those files appear somewhat scary to look at and are not opening properly. So is there any way by which i …

Member Avatar for chrishea
0
135
Member Avatar for zinnqu

I have created a encryptor/decryptor that allows you to encrypt/decrypt text in a textbox, or a file. The basis of the system is to allow a user to thoroughly protect data within their system. Is there anyone that would be willing to test the program?

Member Avatar for zinnqu
0
167
Member Avatar for facadie

I have two form. Form 1 and Form 2 In form 1, i have a few textbox and and combo box. and BTNOk [to save] and BTNCancel[when BTNCancel is click, user are prompt whether to save file if there is changes in entry] Form 2 is the file where BTNCancel …

Member Avatar for Geekitygeek
0
214

The End.