Member Avatar
HI, I am using zend guard for encryption of my php code. I would like to ask that is there a way to automate the process through command prompt or gui that we can zip the files of the source code and encrypted code in seperate folders automatically. Thanks in …
by saadi06 2 in Software Development ()
Member Avatar
I saw someone getting an assignment to implement the Vigenere Cipher, so I decided, just for the frig of it, to implement the Caesar Cipher. The algorithm below, however, doesn't account for spaces and punctuation. How can I account for those without redoing the whole thing? from random import choice …
by Mickey_2 9 in Programming ()
Member Avatar
Hi, Daniweb, it's been a while. I'm looking to do a mobile ssh-client (well, not quite a full client) that stores sensitive login information encrypted by a pattern-lock. However, I know very little about encryption. Can anyone recommend a good learning path - and by path, I mean Encryption for …
by DeanMSands3 57 in Computer Science ()
Member Avatar
**Do you anybody know when the full version of Windows 10 will arrived**
by AmritaHasan11 in Microsoft Windows ()
Member Avatar
Hi Dw. Is it possible to search through "*.COM", "*.exe" files and check if they are encrypted and so check which encryption was used in VB.NET?
by Mr.M 32 in Software Development ()
Member Avatar
News has broken this weekend that the personal data, including bank account details, of some 2.4 million customers of the Carphone Warehouse may have been compromised following a breach that the mobile phone retail giant is calling "a sophisticated cyber-attack." The company also warns that encrypted credit card data of …
by happygeek 1,631 in Mobile and Wearables ()
Member Avatar
Another month, another flaw related to the historical US export restrictions on cryptography; this time in the form of LogJam. It hits SSL 3.0 and TLS 1.0 which supported reduced-strength DHE_EXPORT ciphersuites, restricted to primes no longer than 512 bits, meaning that a man-in-the-middle attack is possible to force the …
by happygeek 1,631 in Community Center ()
Member Avatar
which kind of password encryption is this mqqemZ0=
by blueguy777 in Web Development ()
Member Avatar
It all started pretty well, with the announcement by Mozilla at the end of last month that the Firefox web browser would make the Internet a safer place by encrypting everything. That's everything, even those connections where the servers don't even support the HTTPS protocol. Developers of the Firefox browser …
by happygeek 1,631 in Web Development ()
Member Avatar
Hi,so I am supposed to encrypt a text file chosen by a user at the moment I have completed most of it (offset factor/shift), I have got each separate character from the text file and put it into a list and converted it into ASCII, I am wondering how you …
by joshuawilson11 in Software Development ()
Member Avatar
In his essay '[A Few Thoughts on Cryptographic Engineering](http://blog.cryptographyengineering.com/2013/12/how-does-nsa-break-ssl.html)' Matthew Green, a cryptographer and research professor at Johns Hopkins University, asks "how the hell is NSA breaking SSL?" If this is news to you, following the Edward Snowden revelations in The Guardian, then you obviously haven't read the New York …
by happygeek 1,631 in Hardware and Software ()
Member Avatar
How are keys and passwords stored in a computer to make them secure? If encryption is used to secure keys and passwords - won't there need to be a key or password for it also? Will that one be encrypted as well? It seems to me that eventually there will …
by Sphinx'LostNose in Software Development ()
Member Avatar
With just about everybody snooping around your emails today with the excuse of hunting the bad guys, coding to keep some resemblance of privacy is getting important. I will start out with some simple encryption examples to get this started. You are invited to give us your thoughts and codes. …
by vegaseat 1,720 in Software Development ()
Member Avatar
American technology companies are by implication evil, and aiding terrorist groups such as Islamic State/ISIS according to a number of highly influential but terribly ill-informed Western players. Apple and Google have become the command and control networks of choice for terrorists and implementing full-device encryption by default will help Islamic …
by happygeek 1,631 in Community Center ()
Member Avatar
# BlowFish? # BlowFish was the brain child of Bruce Schneier back in 93. Since BlowFish was released to the public domain, Bruce Schneier has released new encryption algorythems, TwoFish and ThreeFish. BlowFish is an increddibly popular and very strong algorythem. Because it conforms to Kerckhoffs's Principal [Explained Here](http://en.wikipedia.org/wiki/Kerckhoffs's_principle), even …
by J.C. SolvoTerra 109 in Software Development ()
Member Avatar
Email encryption uses digital certificates to authenticate, encrypt and decrypt the message. When a message is encrypted, the public key to decrypt it is sent along with the message to the recipient, the recipient then uses the public key to decrypt the message. If the message was intercepted couldnt the …
by iConqueror 27 in Computer Science ()
Member Avatar
Is it possible to create an encryption algorith using C#?
by iConqueror 27 in Software Development ()
Member Avatar
Hello Daniweb, I'm rebuilding a Flash-based website in PHP/HTML maintaining the same MySQL database. My problem now is, the user passwords are hashed of course - I need to use the same hash in the new application for old users to be able to still log in. But since the …
by Excizted 67 in Software Development ()
Member Avatar
Hi. I've developed a bit of an interest in encryption as well as programming in Haskell since I last used this forum. So I decided to build a symmetric block cipher and test its properties to gain more of an understanding of such things. This is for research purposes as …
by Mushy-pea 36 in Computer Science ()
Member Avatar
Hi, I have tried googling and searching for this but just find endless information about why software/hardware based encryption is the better option; what I need to know is whether there are any problems using BOTH. We want our offsite backups have to be as secure as possible. We previously …
by Ryshad 480 in Hardware and Software ()
Member Avatar
Last year, CryptoLocker ransomware [hit the headlines](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/470427/cryptolocker-250k-infections-in-100-days-nets-300000-or-does-it) after infecting hundreds of thousands of computers and encrypting the data, and backups of that data to any connected device, with the promise of decryption on payment of a fee. This kind of IT extortion is profitable for the bad guys as it …
by happygeek 1,631 in Information Security ()
Member Avatar
Hi Guys I have an asp.net application developped using C# asp.net 4.0 , It is running perfectly with .net inbuilt server , but it throws an exception when running on IIS server 5.1 (Win XP sp-3) There i have a connection string encryption method , that is the place it …
by Sumith Asanka in Web Development ()
Member Avatar
I have been turning my USB thumb drives into fully encrypted data containers for years now, but readily admit that the prospect of rolling up your sleeves and getting down and dirty with encryption software is not as exciting to everyone as it is to me. However, with removable USB …
by happygeek 1,631 in Hardware ()
Member Avatar
Hi, i recently begun learning java and encryption. I found some code from a website that is supposed to decrypt lastlogin files found in minecraft. When i try to compile it gives me these errors: C:\Users\CROCCY\Documents\NetBeansProjects\Lastlogin decryptor\src\lastlogin\decryptor\LastloginDecryptor.java:54: error: invalid method declaration; return type required public MineCraftLoginReader() { C:\Users\CROCCY\Documents\NetBeansProjects\Lastlogin decryptor\src\lastlogin\decryptor\LastloginDecryptor.java:87: error: …
by Arin_1 in Software Development ()
Member Avatar
I am trying to make a program that generates source code for a much larger program for simple reversal encryption. I don't know what I am doing wrong. Here is my code so far: #include<stdio.h> int main() { FILE *fp; fp=fopen("d:\\crypt.h", "w"); fprintf(fp, "char out[8];char cur[8]; char con[255,255,255,255,255,255,255,255];/n if cur==con …
by gruntler in Software Development ()
Member Avatar
So as part of my computer science course, we have been instructed to build an encryption process. I have a good knowledge on different encryption methods (RSA for example), however I am having a hard time trying to create my own. Now, before anyone says it, I know, using homebrew …
by CJMW 5 in Computer Science ()
Member Avatar
Just curious about your thoughts on this subject. **Example:** www.site.com/?id=1 or www.site.com/?id=8adyfa8df614812yasdf (which is also "1", but encrypted) What would you recommend? What do you use? Anyone with pros and/or cons on if you should encrypt your URL data? **My thoughts:** Pros (to encrypting URL data): - Makes it harder …
by minitauros 151 in Web Development ()
Member Avatar
I am using Formidalbe Pro on my wordpress site. Users are sending me a form that I make editable by them and by me (Its all managed by Formidable). They have to be logged-in with wordpress to fill the form and edit it. No anonymous access. I want to encrypt …
by nacedo in Web Development ()
Member Avatar
What is the usage of "**preg_replace('/\\x13\\x00*$/', '', $plain_text);**" ?
by sriramkarthick -1 in Web Development ()
Member Avatar
Does anyone know if there is a way in which I can install my own Encryption Algorithm into a MySQL database?
by squeak24 in Databases ()