1,159 Topics
![]() | |
I need to write a program to decipher a code and process a set of characters in a text file. this is the text file: >EBC;Iit_is a CaPital Mistake tO_theorize Before_one has DatA123. There are 6 encrypted characters at the beginning of the file. The encryption is based on the … | |
How to enabled encryption using PHP platform so that it can sync with JAVA | |
Hi all, I'm currently working on a RC4 project for my computer security class. I have looked at the [URL="http://en.wikipedia.org/wiki/RC4"]wikipedia page[/URL] for RC4, and I'm trying to adapt that algorithm to my problem. I can get the correct encrypted text when I just cout the values. However, when I try … | |
Wireless is, without doubt, a really great thing. Apart from when it doesn't work that is. If you live in a big old house, for example, then getting your WiFi signal to extend through a few thick walls from one end of the place to the other is not always … | |
this is code for encrypting files using c language. //password encryption program for securing password //pws v 1.0 [B][CODE] #include <conio.h> #include <stdlib.h> #include <stdio.h> //create this directory first D:\Sec_pw (OR as per your system drive names) //file will be overwritten at each execution of program so use once //increase … | |
So, first off lemme explain what a substitution code is in case you don't know. In cryptography, it's a system by which one letter is replaced with another predetermined letter. For example, if "I" turns to "E", and "F" turns to "V", the word "If" would be written as "Ev". … | |
I have a question about software design in general. Bear with me as I attempt to explain my concept, as I am not a software developer or programmer. However, as someone who has worked and troubleshot hardware and software issues for the past 15 years, there is a concept that … | |
I know this can probably be done with Kermit or a similar app, but I'm looking for a very simple terminal that works over HTTP, and just accepts one full text string at a time, then displays the response from the server in a window. Optionally too, I'd like to … | |
Our professor decided to give us a really hard assignment in our 2nd week in the course. I really have no clue where to start. Requirements Writing reusable code to check a user name and password can be a challenging task. Three major things can change between one password checker … | |
HELP ME! I'm a college student and use my computer ALL of the time. All of a sudden this thing called Relevant Knowledge started popping up on my computer. I wanted to get rid of it, so I stupidly clicked the button that said stop receiving these messages or something … | |
Hi. I've been having this problem with Firefox & Chrome where searches are taking me to wrong sites. I've done everything as required with Gmer, Malwarebytes etc. Here are the logs:- GMER One log: GMER 1.0.15.15281 - [url]http://www.gmer.net[/url] Rootkit quick scan 2010-09-20 19:25:09 Windows 6.1.7600 Running: 0g2vzqhn.exe; Driver: C:\Users\BOBBYD~1\AppData\Local\Temp\kwkirpoc.sys ---- … | |
So i guess its easy enough to encrypt text, but what if you wanted to encrypt a video file or some other file that wasn't text? By writing my own program I mean. How does that work, any links? Thanks | |
This is my Cogwheel Encryption Method to encrypt and decrypt strings. Wheel1 is Replace by Wheel2 when Encrypting and Wheel2 is Replace by wheel1 when you are decrypting... To Encrypt a string, just call the EncryptString function [CODE=vb] Text2.Text = EncryptString(Text1.Text) [/CODE] To Decrypt a string, just call the DecryptString … | |
Hello. I am currently working on a little password based file encryption feature for an application I am doing. The following is an incomplete function that I have worked on to encrypt some content and (will eventually) write it to a file. [CODE]public static void encrypt(byte [] data, char [] … | |
I want a java program of ceaser cipher encryption and decryption technique. in which you have to take input(plain text) from input.txt file and encrypt it with program and save the output(cipher text) in output.txt file. again you have to take input from output(Cipher text) and apply decryption program and … | |
Hello, What is the best hashing for password and what is the best encryption for credit card (of course we will need to decrypt it later) ? Also I would like to know, how did people usually generate salt ? I always heard about md5+salt but how did they usually … | |
I'm trying to write a code for class that basically takes a 4 digit input, scrambles the the places of each number so that the first digit is in the third digits place, and add 7 to each number. This is supposed to be simple encryption. I know my functions … | |
Hey guys, i needed some help with this encryption-decryption program that i am trying to write, as you will notice, i am not very skilled or experienced but i want to grow naturally, so it would be great if you guys could point out the mistakes rather than suggest smth … | |
The program initially asks the user to insert the secret sentence and the encryption code (an integer number in the range 1-100). Then, the program calls a user-defined function void encrypter (char *, int) that accepts the string pointer and the encryption code. The encryption algorithm is based on the … | |
I'm new to Classes. For a project to improve my skills I'm stuck. This project is a registration in which: [LIST=1] [*]form data is validated [*]some variable from the form are encrypted [*]some variables from the form are hashed [/LIST] It is getting the Class for hashing to load and … | |
hi, i have applied sha1 encryption to my update password page for users and it is encypting into the database fine. however i have a script that should at login check the encrypted sha1 password in the database and login however it does not work. i am not great with … | |
Hello Colleagues, I have not done C programming in years. I need some help in debugging a C program written by someone who has left our team. I have marked the lines having the error with "-->" Your kind assistance is very much appreciated. Here's the code: 1 #include <stdio.h> … | |
Hello everybody, I am Pinak. I want to build an apllication regarding encryption. However, I am confused. [B][COLOR="Green"]Should I use Applet or Swing ????? [/COLOR][/B] Can you tell me what is the difference between the two??????:) | |
When it comes to data storage and retrieval the current buzz is undoubtedly cloud-shaped, so why would anyone want to invest in Network Attached Storage? Two words: cost and capacity. Cloud services are great, but as far as storing and accessing large amounts of data is concerned things can get … | |
Hello! I have i problem i was hoping you could help me with, I have to write a script that will ask the user for a username and password, and validate it through /etc/passwd and /etc/shadow. I've looked all over the place for an answer to this and i just … | |
Hi, I'm attempting to generate a new cipher key using a string that was negotiated earlier on. On running the code I get the error: Exception in thread "main" java.lang.IllegalArgumentException: Missing argument at javax.crypto.spec.SecretKeySpec.<init>(DashoA13*..) at shared.Cryptographer.makeCipher(Cryptographer.java:254) at client.Main.main(Main.java:60) Java Result: 1 the code is as follow: [CODE] public void makeCipher(String … | |
Hello, I need to write a shell script that performs encryption and decryption using AES algorithm. I could not find any resource online, can anyone please help me in the right direction? Thank you for the help! | |
I have a Windows XP SP3 computer, AT&T Uverse with a 2wire router and 2wire usb wireless adapter on my desktop. It was working earlier today just fine, not quite sure what happened but now it will not connect to my WPA encrypted router. I can connect to other wireless … | |
If there's anyone who knows a thing or two about this, your help would be much appreciated. This is a code I'm working on: [CODE] try { //ask user for short password System.out.print("Enter a password: "); //read in a character at a time, putting them into the buffer while((buf[bufPos++] = … | |
[CODE] using (var sr = new StreamReader(Misc.tempFile)) { using (var sw = new StreamWriter(Misc.path + "test.dat")) { while ((line = sr.ReadLine()) != null) { for (int i = 0; i < detailViewer.SelectedIndices.Count; i++) lineToDelete[i] = Encryption.encrypt(detailViewer.SelectedItems[i].SubItems[0].Text) + "," + Encryption.encrypt(detailViewer.SelectedItems[i].SubItems[1].Text) + "," + Encryption.encrypt(detailViewer.SelectedItems[i].SubItems[2].Text); if (line != lineToDelete[detailViewer.SelectedIndices.Count - 1] … | |
Hello, I'm having problems removing an array of lines from a text file. Heres my code: Ugh, I apologize. I can't get the conventions to correctly show on this post, I'm really sorry. [code] using (var sr = new StreamReader(Misc.tempFile)) { using (var sw = new StreamWriter(Misc.path + "test.dat")) { … | |
i jst came up wid an idea n i dnt knw how to proceed furthr....i'd lyk to encrypt data in such a way dats its decrptd in stages. initial stages when overcome wud show irrelevant dat(nt garbage)xtractd frm d original data...decrption methods wud vary in each stage.... more complicated in … | |
Write a program in C/C++ for encryption and decryption using Hill Cipher[code]Write a program in C/C++ for encryption and decryption using Hill Cipher[/code] | |
Hi all, I've been looking at the idea of encryption of traffic over the internet, just finished reading a [I]lot[/I] of articles on how public key encryption works. Here is what I understand so far: 1. Large random number is generated, from this a private and public key is generated … | |
Hi All I'm new to the forums, and would like to thank you in advance for any help you can offer. Also, I do apologize at the relative simplicity of this question, I'll just get on with it now. I just set up a wireless network for my home and … | |
I have 3 computers in this home where I currently live. One mac and one XP machine connect to the WiFi network just fine. The encryption is WPA2 Personal. This 3rd desktop always gets assigned the IP 169.254.228.249, subnet mask 255.255.0.0 and all the other parameters are not there. Windows … | |
hi, i have a site which is secure with a username and password combination with mysql backend database. the encryption is sha1 for the password. what about securing the url? at the moment it displays for example: page_name.php?ID=24 if you modify the ID other users can see other pages they … | |
Hi, I'm trying to write a licensing module of my C# Application. The license file is a basic text file saved on the clien'ts machine which includes an encrypted 64BaseString. Up and until now I've used the Rijndal method for encrypting and decripting the string and matching the license up … | |
Hello i will like to have an explanation to this task: Make a midlet (called "NetworkSettings") that has List (IMPLICIT type called "mainList") as its main view. "mainList" contains following items: "Encryption", "Basic data" and "Summary" (actually items will describe views). When user selects one of those items from "mainList" … | |
I'm creating a control panel and am currently developing the user authentication system. Is using php sessions the most secure method of doing this? I know I can't use SSL encryption or any of those fancy things because not only does it cost more money, but I'm going to use … | |
Hi I've attempted to create a little app which encrypts and decrypts a file using the XOR cipher. However, it only encrypts/decrypts the first few lines and I'm not sure where I'm going wrong. Advice appreciated. Ricky My code: [CODE]//XOR Encryption #include <stdio.h> #include <string.h> //XOR Encryption key char XORkey … | |
Hey guys, my name is Ross. Im new to programming and i need some help with assembler. I have a menu with a number of options that the user can do. 1. The first one is the user must input a string of characters up to the limit of 25 … | |
This is a User Defined Function to perform simple encryption on an input string. This is performed by transposing the ASCII value of each character in the string by the increment value (@increment in the parameter list) Pass the function the string you wish encrypted and the increment value, which … | |
Hello I have a company laptop (HP 8530w) with Checkpoint Pointsec HDD encryption and 32bit Vista. I want to use win7 booted from an external eSATA drive. For that to work first of all I had to remove the internal HDD, because win7 install has already fucked my system up … | |
[ATTACH=RIGHT]16335[/ATTACH]On August 1, [URL="http://www.tombom.co.uk/blog/?p=262"]Defcon attendee Chris Paget showcased the vulnerability of the AT&T network[/URL] by eavesdropping on cell phone calls in front of a live audience. Paget warned attendees ahead of time what he planned to do: [I]1. If you’re in an area where your cellphone calls might be intercepted, … | |
On Sunday an [URL="http://www.tra.ae/news_TRA_Announces_the_Suspension_of_Blackberry_Messenger%2C_Blackberry_E_mail_and_Blackberry_Web_Browsing_Services_in_the_UAE_from_October_11%2C_2010-180-1.php"]official statement[/URL] was released by the Telecommunications Regulatory Authority for the United Arab Emirates (UAE) confirming that certain mobile features for the BlackBerry device including mobile email, messaging, and mobile web browsing will be blocked by government authorities. [ATTACH=right]16330[/ATTACH]The ban will officially go into effect beginning on … | |
Hello i am developing a encryption/decryption Application in which i am first converting string into its ascii values then reversing this ascii values and then generating the hex values of this reversed ascii values... I have completed the encryption part as i am able to convert the string into hex … | |
1. Define a structure called cricket that will describe the following information Player name Team name Batting average Using cricket, declare an array player with 10 elements and write a program to read the information about all the 10 players and print a team wise list containing names of players … | |
can anyone give me the source code of CAST 128 encryption algorithm written in c++ language?... I really need this for my thesis. | |
I just got a used Cisco 851 router from ebay and ready to play around with it. i connected it to my computer com port and start seeing something from the putty serial connection. i see something like this repeating and repeating.. what does that mean? Translating "stipp2.srv.hcvlny.cv.net"...domain server (255.255.255.255) … |
The End.