119 Discussion / Question Topics

Remove Filter
Member Avatar for
Member Avatar for Destini_1

Wv4gJyLguPzuClVexggQO6r0uLUNI3mMtwXH8yG9wd)jSMjXNbSLrrxUsN39DwmtjRlthSS24axWyEZYFk2u7EJnp2tKyB2CASYri6)rui)9iJidseE6phmADVAJKeCmZZq)vB)ybdnT3Ji5kGafyYuazcv9zim33k

Member Avatar for hes8
0
113
Member Avatar for Steven_40

I am recently joined an innstitute to learn ethical hacking from scratch and i am using Parrot os to learn hacking. IS is it good enough as compared to kali linux or shall I continue with parrot os only?

Member Avatar for Steven_40
0
180
Member Avatar for Scott_22
Member Avatar for Mr.M

Hi DW. Well I'm very much interested in the data protection and also giving the best privacy to the public where we protect your passwords. I've seen something that Firefox had introduced to their browsers with also their Apps. This is called LockWise which is a tool to sync your …

0
1K
Member Avatar for JModak

I create a project encrypt and decrypt data in vb.net how to use this code as a function please help it is work only on a textbox i want to send a string value then return encrypt value and when i send encrypt value then send me decrypt value. [Click …

Member Avatar for rproffitt
0
555
Member Avatar for saadi06

HI, I am using zend guard for encryption of my php code. I would like to ask that is there a way to automate the process through command prompt or gui that we can zip the files of the source code and encrypted code in seperate folders automatically. Thanks in …

0
180
Member Avatar for Mickey_2

I saw someone getting an assignment to implement the Vigenere Cipher, so I decided, just for the frig of it, to implement the Caesar Cipher. The algorithm below, however, doesn't account for spaces and punctuation. How can I account for those without redoing the whole thing? from random import choice …

Member Avatar for Mickey_2
0
281
Member Avatar for DeanMSands3

Hi, Daniweb, it's been a while. I'm looking to do a mobile ssh-client (well, not quite a full client) that stores sensitive login information encrypted by a pattern-lock. However, I know very little about encryption. Can anyone recommend a good learning path - and by path, I mean Encryption for …

Member Avatar for stultuske
0
304
Member Avatar for AmritaHasan11
Member Avatar for Reverend Jim
0
1K
Member Avatar for Mr.M

Hi Dw. Is it possible to search through "*.COM", "*.exe" files and check if they are encrypted and so check which encryption was used in VB.NET?

Member Avatar for Mr.M
0
468
Member Avatar for Christopher_12

i am new in this encryption and decryption i would like to have my encryption appear on my database (currently using microsoft sql server) i create 3 forms : one for the registration which means when u will register, u will be able to access the 3 forms by entering …

Member Avatar for Reverend Jim
0
312
Member Avatar for blueguy777
Member Avatar for ehpratah

Hi i just wanna know if there are way to **decrypt a files that is infected and decrypted by a virus / malware**? all of the files from one of the workstation are encryted as in totaly you cannot open the files.there is a noted in there saying that i …

Member Avatar for Slavi
0
335
Member Avatar for joshuawilson11

Hi,so I am supposed to encrypt a text file chosen by a user at the moment I have completed most of it (offset factor/shift), I have got each separate character from the text file and put it into a list and converted it into ASCII, I am wondering how you …

Member Avatar for joshuawilson11
0
502
Member Avatar for Sphinx'LostNose

How are keys and passwords stored in a computer to make them secure? If encryption is used to secure keys and passwords - won't there need to be a key or password for it also? Will that one be encrypted as well? It seems to me that eventually there will …

Member Avatar for mike_2000_17
0
279
Member Avatar for vegaseat

With just about everybody snooping around your emails today with the excuse of hunting the bad guys, coding to keep some resemblance of privacy is getting important. I will start out with some simple encryption examples to get this started. You are invited to give us your thoughts and codes. …

Member Avatar for Lardmeister
3
1K
Member Avatar for jBat

I'm trying to understand how the function encrypt works (linux), but event with this simple example is not working. Any ideas?. Thank you. #define _XOPEN_SOURCE #include <unistd.h> #include <stdlib.h> #include <iostream> #include <string> int main() { const char key[64] = "12" ; /* bit pattern for key */ char txt[64] …

Member Avatar for tinstaafl
0
154
Member Avatar for Hopp3r

So I've come across a problem more than once and it'd be a ton of help if I could get this figured out! So there are several instances where I've wanted to open a file with notepad or notepad++ to change values or something (mainly with videogames). The problem that …

Member Avatar for gerbil
0
488
Member Avatar for berserk

i have an issue, my code works wonderfully for the pupose its designed for however for security reasons i need th epages page my login page to have either randomized links or just links that cannot be bookmakred too so that one can bypass the login page. My login page …

Member Avatar for berserk
0
462
Member Avatar for iConqueror

Email encryption uses digital certificates to authenticate, encrypt and decrypt the message. When a message is encrypted, the public key to decrypt it is sent along with the message to the recipient, the recipient then uses the public key to decrypt the message. If the message was intercepted couldnt the …

Member Avatar for Hiroshe
0
259
Member Avatar for iConqueror
Member Avatar for Excizted

Hello Daniweb, I'm rebuilding a Flash-based website in PHP/HTML maintaining the same MySQL database. My problem now is, the user passwords are hashed of course - I need to use the same hash in the new application for old users to be able to still log in. But since the …

Member Avatar for Excizted
0
228
Member Avatar for Mushy-pea

Hi. I've developed a bit of an interest in encryption as well as programming in Haskell since I last used this forum. So I decided to build a symmetric block cipher and test its properties to gain more of an understanding of such things. This is for research purposes as …

Member Avatar for Mushy-pea
1
300
Member Avatar for danae.gordon9

Hi everyone, I'm new to programming (and daniweb) and I'm having a small problem with a Caeser Cipher program I'm writing. messageE = input('\nPlease enter string to encrypt: ') offsetE = int(input('Please enter offset value (1 to 94): ')) encryptedE = '' if offsetE < 1 or offsetE > 94: …

Member Avatar for vegaseat
0
258
Member Avatar for Geekitygeek

Hi, I have tried googling and searching for this but just find endless information about why software/hardware based encryption is the better option; what I need to know is whether there are any problems using BOTH. We want our offsite backups have to be as secure as possible. We previously …

Member Avatar for Geekitygeek
0
401
Member Avatar for santi.ayasamy

Sir, i need ur help, this is audio stego i can`t play my encrypted audio package techmeet1; import javax.swing.*; import java.io.File; import java.awt.*; import java.awt.event.*; import java.net.*; import java.io.*; import java.util.*; import sun.audio.*; import java.applet.*; import java.math.*; class mainframe extends JFrame implements ActionListener, Runnable { JLabel Lfilename, Lmessage, Ldesign, Ltitle; …

Member Avatar for JamesCherrill
-1
414
Member Avatar for iFrolox

Well, in my previous thread i needed help deleting arrays, for the codes i use its here: http://www.daniweb.com/software-development/vbnet/threads/426588/how-to-move-arrays-1-place-down- But now i need help saving the arrays, i can save all the arrays to ini file like this: Ini module: Option Strict On Module INIAccess #Region "API Calls" ' standard API …

Member Avatar for DreamForLives
0
439
Member Avatar for Anubhav_1

Hello, i just coded for login script now i want to add "sha1" to my code due to security reason but it's showing an invalid login error i don't know the reason but when i use this withouht "sha1" it's working fine but i want to secure password into database …

Member Avatar for Bob Hensley
0
224
Member Avatar for Sumith Asanka

Hi Guys I have an asp.net application developped using C# asp.net 4.0 , It is running perfectly with .net inbuilt server , but it throws an exception when running on IIS server 5.1 (Win XP sp-3) There i have a connection string encryption method , that is the place it …

0
185
Member Avatar for butterfingerss

I am using Qt 5.2.1 and I made a program that takes some values and saves them on a text file. What I want is that everybody can see this file and read the content but nobody can edit it. To edit it, you would have to run the program …

Member Avatar for panqnik
0
295

The End.