149 Topics

Member Avatar for
Member Avatar for norajohn

In my opinion, the top 3 blockchain platforms are Ethereum, Binance Smart Chain (BSC), and Solana. Ethereum: Ethereum is the pioneer of smart contract functionality and has the largest developer community in the blockchain space. It offers a robust and flexible platform for building decentralized applications (DApps) and has a …

Member Avatar for Bol`
-1
19
Member Avatar for Destini_1

Wv4gJyLguPzuClVexggQO6r0uLUNI3mMtwXH8yG9wd)jSMjXNbSLrrxUsN39DwmtjRlthSS24axWyEZYFk2u7EJnp2tKyB2CASYri6)rui)9iJidseE6phmADVAJKeCmZZq)vB)ybdnT3Ji5kGafyYuazcv9zim33k

Member Avatar for hes8
0
107
Member Avatar for Steven_40

I am recently joined an innstitute to learn ethical hacking from scratch and i am using Parrot os to learn hacking. IS is it good enough as compared to kali linux or shall I continue with parrot os only?

Member Avatar for Steven_40
0
177
Member Avatar for Scott_22
Member Avatar for tinstaafl

Basically this scheme uses variable offsets, but it generates the bytes on the fly. They aren't truly random, but there aren't any obvious patterns and the output passes all the NIST tests. Since a simple password can be used to do the de/encryption it is much easier to hand off …

Member Avatar for JamesCherrill
2
313
Member Avatar for Mr.M

Hi DW. Well I'm very much interested in the data protection and also giving the best privacy to the public where we protect your passwords. I've seen something that Firefox had introduced to their browsers with also their Apps. This is called LockWise which is a tool to sync your …

0
1K
Member Avatar for JModak

I create a project encrypt and decrypt data in vb.net how to use this code as a function please help it is work only on a textbox i want to send a string value then return encrypt value and when i send encrypt value then send me decrypt value. [Click …

Member Avatar for rproffitt
0
551
Member Avatar for happygeek

Last year, CryptoLocker ransomware [hit the headlines](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/470427/cryptolocker-250k-infections-in-100-days-nets-300000-or-does-it) after infecting hundreds of thousands of computers and encrypting the data, and backups of that data to any connected device, with the promise of decryption on payment of a fee. This kind of IT extortion is profitable for the bad guys as it …

Member Avatar for rproffitt
2
952
Member Avatar for J.C. SolvoTerra

# BlowFish? # BlowFish was the brain child of Bruce Schneier back in 93. Since BlowFish was released to the public domain, Bruce Schneier has released new encryption algorythems, TwoFish and ThreeFish. BlowFish is an increddibly popular and very strong algorythem. Because it conforms to Kerckhoffs's Principal [Explained Here](http://en.wikipedia.org/wiki/Kerckhoffs's_principle), even …

Member Avatar for zen_1
0
1K
Member Avatar for saadi06

HI, I am using zend guard for encryption of my php code. I would like to ask that is there a way to automate the process through command prompt or gui that we can zip the files of the source code and encrypted code in seperate folders automatically. Thanks in …

0
180
Member Avatar for Mickey_2

I saw someone getting an assignment to implement the Vigenere Cipher, so I decided, just for the frig of it, to implement the Caesar Cipher. The algorithm below, however, doesn't account for spaces and punctuation. How can I account for those without redoing the whole thing? from random import choice …

Member Avatar for Mickey_2
0
280
Member Avatar for DeanMSands3

Hi, Daniweb, it's been a while. I'm looking to do a mobile ssh-client (well, not quite a full client) that stores sensitive login information encrypted by a pattern-lock. However, I know very little about encryption. Can anyone recommend a good learning path - and by path, I mean Encryption for …

Member Avatar for stultuske
0
303
Member Avatar for AmritaHasan11
Member Avatar for Reverend Jim
0
1K
Member Avatar for Mr.M

Hi Dw. Is it possible to search through "*.COM", "*.exe" files and check if they are encrypted and so check which encryption was used in VB.NET?

Member Avatar for Mr.M
0
462
Member Avatar for Christopher_12

i am new in this encryption and decryption i would like to have my encryption appear on my database (currently using microsoft sql server) i create 3 forms : one for the registration which means when u will register, u will be able to access the 3 forms by entering …

Member Avatar for Reverend Jim
0
309
Member Avatar for happygeek

News has broken this weekend that the personal data, including bank account details, of some 2.4 million customers of the Carphone Warehouse may have been compromised following a breach that the mobile phone retail giant is calling "a sophisticated cyber-attack." The company also warns that encrypted credit card data of …

Member Avatar for happygeek
1
547
Member Avatar for happygeek

Another month, another flaw related to the historical US export restrictions on cryptography; this time in the form of LogJam. It hits SSL 3.0 and TLS 1.0 which supported reduced-strength DHE_EXPORT ciphersuites, restricted to primes no longer than 512 bits, meaning that a man-in-the-middle attack is possible to force the …

2
334
Member Avatar for blueguy777
Member Avatar for ehpratah

Hi i just wanna know if there are way to **decrypt a files that is infected and decrypted by a virus / malware**? all of the files from one of the workstation are encryted as in totaly you cannot open the files.there is a noted in there saying that i …

Member Avatar for Slavi
0
335
Member Avatar for happygeek

It all started pretty well, with the announcement by Mozilla at the end of last month that the Firefox web browser would make the Internet a safer place by encrypting everything. That's everything, even those connections where the servers don't even support the HTTPS protocol. Developers of the Firefox browser …

1
440
Member Avatar for joshuawilson11

Hi,so I am supposed to encrypt a text file chosen by a user at the moment I have completed most of it (offset factor/shift), I have got each separate character from the text file and put it into a list and converted it into ASCII, I am wondering how you …

Member Avatar for joshuawilson11
0
498
Member Avatar for happygeek

In his essay '[A Few Thoughts on Cryptographic Engineering](http://blog.cryptographyengineering.com/2013/12/how-does-nsa-break-ssl.html)' Matthew Green, a cryptographer and research professor at Johns Hopkins University, asks "how the hell is NSA breaking SSL?" If this is news to you, following the Edward Snowden revelations in The Guardian, then you obviously haven't read the New York …

Member Avatar for Tcll
3
918
Member Avatar for Sphinx'LostNose

How are keys and passwords stored in a computer to make them secure? If encryption is used to secure keys and passwords - won't there need to be a key or password for it also? Will that one be encrypted as well? It seems to me that eventually there will …

Member Avatar for mike_2000_17
0
277
Member Avatar for vegaseat

With just about everybody snooping around your emails today with the excuse of hunting the bad guys, coding to keep some resemblance of privacy is getting important. I will start out with some simple encryption examples to get this started. You are invited to give us your thoughts and codes. …

Member Avatar for Lardmeister
3
1K
Member Avatar for happygeek

American technology companies are by implication evil, and aiding terrorist groups such as Islamic State/ISIS according to a number of highly influential but terribly ill-informed Western players. Apple and Google have become the command and control networks of choice for terrorists and implementing full-device encryption by default will help Islamic …

Member Avatar for Warrens80
4
943
Member Avatar for jBat

I'm trying to understand how the function encrypt works (linux), but event with this simple example is not working. Any ideas?. Thank you. #define _XOPEN_SOURCE #include <unistd.h> #include <stdlib.h> #include <iostream> #include <string> int main() { const char key[64] = "12" ; /* bit pattern for key */ char txt[64] …

Member Avatar for tinstaafl
0
152
Member Avatar for Hopp3r

So I've come across a problem more than once and it'd be a ton of help if I could get this figured out! So there are several instances where I've wanted to open a file with notepad or notepad++ to change values or something (mainly with videogames). The problem that …

Member Avatar for gerbil
0
485
Member Avatar for berserk

i have an issue, my code works wonderfully for the pupose its designed for however for security reasons i need th epages page my login page to have either randomized links or just links that cannot be bookmakred too so that one can bypass the login page. My login page …

Member Avatar for berserk
0
457
Member Avatar for iConqueror

Email encryption uses digital certificates to authenticate, encrypt and decrypt the message. When a message is encrypted, the public key to decrypt it is sent along with the message to the recipient, the recipient then uses the public key to decrypt the message. If the message was intercepted couldnt the …

Member Avatar for Hiroshe
0
259
Member Avatar for iConqueror

The End.