148 Topics

Member Avatar for
Member Avatar for newsguy

Call the National Guard. On second thoughts, call someone else. After all, it is the National Guard which has somehow managed to lose an archival data disk containing five years worth of staff records covering some 15,000 personnel. The US National Guard is now recommending that any current and former …

1
145
Member Avatar for zinnqu

I have created a encryptor/decryptor that allows you to encrypt/decrypt text in a textbox, or a file. The basis of the system is to allow a user to thoroughly protect data within their system. Is there anyone that would be willing to test the program?

Member Avatar for zinnqu
0
167
Member Avatar for exeric90

Okay so lately I have been messing around with encryption. I thought I might give making my own simple encryption program a shot. So I am trying to make it. I am compiling my code in DEV C++ and when it runs, after I enter the message, nothing happens. It …

Member Avatar for jonsca
0
142
Member Avatar for sandorlev

Hello! I've started programming C++ a week ago, so I cannot solve my problems easily. I've started a small project for learning classes, it's about encryption and stuff. I don't really get pointers, although I've read some about them. My problem is that when I use the cipher, it replaces …

Member Avatar for vmanes
0
764
Member Avatar for unknowndevil41
Member Avatar for unknowndevil41
-1
83
Member Avatar for happygeek

Some might argue that it has been a bad year for encryption. After all, just as the last decade was ending came reports that the algorithm that is used to encrypt GSM mobile phone calls (as used by some 4 billion people around the world) had been cracked wide open. …

Member Avatar for HenryTom
3
612
Member Avatar for happygeek

According to a new survey of London taxi drivers, an average of 10,000 mobile phones are left behind by customers every single month. If that total is not staggeringly high enough, you can top it up with another 1000 iPods and memory sticks if you like. December is the worse …

Member Avatar for taxifinder
0
371
Member Avatar for leverin4

How would one calculate the number of bytes of plaintext that could be encrypted as a single block given the key size? And how could you then calculate the number of bytes of cipher text that can be decrypted in a single block given the same key size because I …

Member Avatar for neilcoffey
0
3K
Member Avatar for abhipro

Hi all, I am tying to test the code from the following url [url]http://www.obviex.com/Samples/Encryption.aspx[/url] The following Decrypt code has some issues. It does not give any errors, but the plaintext is not returned either. The corresponding Encrypt code is working fine. [CODE] public static string Decrypt(string cipherText, string passPhrase, string …

Member Avatar for sknake
0
139
Member Avatar for facadie

I have two form. Form 1 and Form 2 In form 1, i have a few textbox and and combo box. and BTNOk [to save] and BTNCancel[when BTNCancel is click, user are prompt whether to save file if there is changes in entry] Form 2 is the file where BTNCancel …

Member Avatar for Geekitygeek
0
214
Member Avatar for Wolf CCMLG

I am having an extremely difficult time with this programming challenge I have to do. I have no idea where to begin on this. I am a beginning programmer ([i]obvious I know[/i]), and here are my instructions for the challenge: [b] "Write a class EncryptableString that is derived from the …

Member Avatar for Alex_
0
880
Member Avatar for happygeek

One third of businesses totally fail to encrypt their sensitive data transfers. That's the conclusion of a new [URL="http://www.computerlinks.co.uk/products/ipswitch/download_library.cfm"]survey[/URL] into file transfer security which noted the huge disparities in attitudes towards data security in general and data security during transfer. According to the 2009 File Transfer Security Survey undertaken by …

0
333
Member Avatar for kernel>panic

I am trying to add a user password protection to my program but it does not work it will quit if password is right or wrong. The file name "setpCS4.dll" is the file the password will be stored in. Thanks for your help.

Member Avatar for VernonDozier
0
666
Member Avatar for kernel>panic

Hi I am just wondering if it would be possible to add compression to this encryption program I have? It will compress the file before it encrypts it for faster encryption time. Thanks for your help.

Member Avatar for DdoubleD
0
222
Member Avatar for slfisher

A group of University of Washington students and professors has developed an application called Vanish that automatically makes data used with it disappear after eight to nine hours. The open-source software is [URL="http://vanish.cs.washington.edu/download.html"]downloadable[/URL] now, as well as information about how to use it and a research paper about its development, …

0
179
Member Avatar for happygeek

Is it good news from Sun Microsystems, if you are in the market for a generic communication protocol between a key manager and an encrypting device? Sun has announced what it claims to be the [URL="http://opensolaris.org/os/project/kmsagenttoolkit/"]release[/URL] of the first such protocol into an open source community as part of the …

0
178
Member Avatar for newsguy

Hey, now that is pretty cool! Hot on the heels of a [URL="http://www.itwire.com/content/view/21585/53/"]report[/URL] suggesting that some 280 million people around the world have suffered some kind of data loss (through theft or incompetence mainly) during the last three years, Dell just might have the answer. It would appear to be …

0
152
Member Avatar for newsguy

According to Russian forensic security experts and 'password recovery' specialists ElcomSoft, the days of protecting documents and files with 40-bit encryption are now officially over. It has now released a product which uses Thunder Tables technology to unlock password-protected documents that have been created using Microsoft Word. In fact, it …

0
283
Member Avatar for slfisher

Effective Wednesday, October 1, each business in Nevada must encrypt customers’ personal information when it is transmitted outside the business’ secure network, such as when it's transmitted over wifi. Initially passed in October 2007, it was said to have been the [URL="http://www.privsecblog.com/archives/state-legislation-some-state-data-encryption-requirements-more-effective-than-others.html"]first law[/URL] of this type. The Commonwealth of Massachusetts …

0
124
Member Avatar for happygeek

[URL="ttp://www.kaspersky.com"]Kaspersky Lab[/URL] is warning the public at large to be on the lookout for a new version of the blackmail virus Gpcode which has started to appear in the wild. This particularly nasty twist on the virus format encrypts your files using an RSA encryption algorithm, this time with a …

Member Avatar for Jenova
0
318
Member Avatar for happygeek

[URL="http://www.pgp.com"]PGP Corporation [/URL] will announce on Wednesday the availability of numerous application upgrades across its entire portfolio. I have persuaded them to let me break the embargo and bring the news to DaniWeb members a couple of days early. With global organizations increasingly facing highly publicized data breaches, regulatory pressures, …

0
221
Member Avatar for happygeek

Although the Firefox Version 2.0 Beta is not actually released until Tuesday 11th, you can download the feature complete Windows public release candidate 1 build right now from the [URL="http://ftp.mozilla.org/pub/mozilla.org/firefox/nightly/bonecho-beta1-candidates/rc1/firefox-2.0b1.en-US.win32.installer.exe"]Mozilla FTP server[/URL]. Linux and Mac versions are also available, early reports suggesting that it works just fine with Intel based …

Member Avatar for AN | Patrick
0
256
Member Avatar for happygeek

Here’s a question for you: being a clued up Internet user which browser client do you favour when it comes to being totally safe and secure on the web? The answer I know you are shouting loudly at the screen is ‘Firefox you freakin’ idiot’. But at the risk of …

Member Avatar for skymap
0
287
Member Avatar for kc0arf

Happy Birthday to Firefox! Mozilla.org today confirmed that November 9, 2004 was when it's popular web browser Firefox, was released at version 1.0 Today, the software is at revision level 1.0.7 (Mac, Windows, Linux), and the company is working on 1.5. The announcement website: [url]http://www.mozilla.org/press/mozilla-2005-11-9.html[/url] mentions a contest to "extend" …

0
173
Member Avatar for kc0arf

Security researchers announced a new vulnerability for users of the Firefox 1.0.6 browsers on a Unix or Linux platform. The problem revolves around a security bug that could allow hackers to execute arbitrary shell commands if they can trick the user into accepting a malicious link on a website. The …

0
192
Member Avatar for kc0arf

The Mozilla Foundation ([url]www.mozilla.org[/url]) has announced that Firefox 1.5 Beta 1 is due on September 8. Firefox is an alternative web browser to IE developed by the Mozilla foundation, the group of people who brought us Netscape and other fine utilities. Firefox is available for Windows, Macintosh (both OS 9 …

Member Avatar for benna
0
217
Member Avatar for Danny

I never realized how much publicity a handful of software developers could create with the release of one application. But they sure have made waves. [url=http://www.spreadfirefox.com]SpreadFirefox.com[/url], the Mozilla Foundation’s official promotion site for its Firefox web browser, reported today that over 80 million downloads have been made of the browser. …

Member Avatar for benna
0
291
Member Avatar for kc0arf

According to Information Week (July 25, 2005), Firefox is facing a release delay. The article mentions that the Mozilla foundation has delayed the release of the next major version of Firefox until September. The current version of Firefox is 1.0.6 Firefox is a major alternative to Internet Explorer, the default …

Member Avatar for Nerd
0
243

The End.