1,159 Topics

Member Avatar for
Member Avatar for C++Challenged

I need to write a program to decipher a code and process a set of characters in a text file. this is the text file: >EBC;Iit_is a CaPital Mistake tO_theorize Before_one has DatA123. There are 6 encrypted characters at the beginning of the file. The encryption is based on the …

Member Avatar for hardatwork
0
143
Member Avatar for pk.sharma
Member Avatar for masijade
0
32
Member Avatar for Kontained

Hi all, I'm currently working on a RC4 project for my computer security class. I have looked at the [URL="http://en.wikipedia.org/wiki/RC4"]wikipedia page[/URL] for RC4, and I'm trying to adapt that algorithm to my problem. I can get the correct encrypted text when I just cout the values. However, when I try …

Member Avatar for Kontained
0
3K
Member Avatar for happygeek

Wireless is, without doubt, a really great thing. Apart from when it doesn't work that is. If you live in a big old house, for example, then getting your WiFi signal to extend through a few thick walls from one end of the place to the other is not always …

2
444
Member Avatar for pro_rocky

this is code for encrypting files using c language. //password encryption program for securing password //pws v 1.0 [B][CODE] #include <conio.h> #include <stdlib.h> #include <stdio.h> //create this directory first D:\Sec_pw (OR as per your system drive names) //file will be overwritten at each execution of program so use once //increase …

Member Avatar for pro_rocky
0
289
Member Avatar for OneRunner

So, first off lemme explain what a substitution code is in case you don't know. In cryptography, it's a system by which one letter is replaced with another predetermined letter. For example, if "I" turns to "E", and "F" turns to "V", the word "If" would be written as "Ev". …

Member Avatar for OneRunner
0
175
Member Avatar for hulettk

I have a question about software design in general. Bear with me as I attempt to explain my concept, as I am not a software developer or programmer. However, as someone who has worked and troubleshot hardware and software issues for the past 15 years, there is a concept that …

0
54
Member Avatar for frank754

I know this can probably be done with Kermit or a similar app, but I'm looking for a very simple terminal that works over HTTP, and just accepts one full text string at a time, then displays the response from the server in a window. Optionally too, I'd like to …

Member Avatar for frank754
0
145
Member Avatar for NewbieProgram

Our professor decided to give us a really hard assignment in our 2nd week in the course. I really have no clue where to start. Requirements Writing reusable code to check a user name and password can be a challenging task. Three major things can change between one password checker …

Member Avatar for NormR1
0
265
Member Avatar for spage23

HELP ME! I'm a college student and use my computer ALL of the time. All of a sudden this thing called Relevant Knowledge started popping up on my computer. I wanted to get rid of it, so I stupidly clicked the button that said stop receiving these messages or something …

Member Avatar for confusertech
0
602
Member Avatar for digital11

Hi. I've been having this problem with Firefox & Chrome where searches are taking me to wrong sites. I've done everything as required with Gmer, Malwarebytes etc. Here are the logs:- GMER One log: GMER 1.0.15.15281 - [url]http://www.gmer.net[/url] Rootkit quick scan 2010-09-20 19:25:09 Windows 6.1.7600 Running: 0g2vzqhn.exe; Driver: C:\Users\BOBBYD~1\AppData\Local\Temp\kwkirpoc.sys ---- …

Member Avatar for crunchie
0
366
Member Avatar for LevyDee

So i guess its easy enough to encrypt text, but what if you wanted to encrypt a video file or some other file that wasn't text? By writing my own program I mean. How does that work, any links? Thanks

Member Avatar for LevyDee
0
85
Member Avatar for jhai_salvador

This is my Cogwheel Encryption Method to encrypt and decrypt strings. Wheel1 is Replace by Wheel2 when Encrypting and Wheel2 is Replace by wheel1 when you are decrypting... To Encrypt a string, just call the EncryptString function [CODE=vb] Text2.Text = EncryptString(Text1.Text) [/CODE] To Decrypt a string, just call the DecryptString …

Member Avatar for AndreRet
1
501
Member Avatar for bops

Hello. I am currently working on a little password based file encryption feature for an application I am doing. The following is an incomplete function that I have worked on to encrypt some content and (will eventually) write it to a file. [CODE]public static void encrypt(byte [] data, char [] …

Member Avatar for Stefano Mtangoo
0
344
Member Avatar for jalpesh_007

I want a java program of ceaser cipher encryption and decryption technique. in which you have to take input(plain text) from input.txt file and encrypt it with program and save the output(cipher text) in output.txt file. again you have to take input from output(Cipher text) and apply decryption program and …

Member Avatar for brandonrunyon
-3
466
Member Avatar for Dorayaki

Hello, What is the best hashing for password and what is the best encryption for credit card (of course we will need to decrypt it later) ? Also I would like to know, how did people usually generate salt ? I always heard about md5+salt but how did they usually …

Member Avatar for cwarn23
0
80
Member Avatar for NV43

I'm trying to write a code for class that basically takes a 4 digit input, scrambles the the places of each number so that the first digit is in the third digits place, and add 7 to each number. This is supposed to be simple encryption. I know my functions …

Member Avatar for NV43
0
108
Member Avatar for ankur3000

Hey guys, i needed some help with this encryption-decryption program that i am trying to write, as you will notice, i am not very skilled or experienced but i want to grow naturally, so it would be great if you guys could point out the mistakes rather than suggest smth …

Member Avatar for Auraomega
0
125
Member Avatar for adman_2005

The program initially asks the user to insert the secret sentence and the encryption code (an integer number in the range 1-100). Then, the program calls a user-defined function void encrypter (char *, int) that accepts the string pointer and the encryption code. The encryption algorithm is based on the …

Member Avatar for jordan00191
0
419
Member Avatar for dwlamb

I'm new to Classes. For a project to improve my skills I'm stuck. This project is a registration in which: [LIST=1] [*]form data is validated [*]some variable from the form are encrypted [*]some variables from the form are hashed [/LIST] It is getting the Class for hashing to load and …

Member Avatar for Triztian
0
2K
Member Avatar for andydeans

hi, i have applied sha1 encryption to my update password page for users and it is encypting into the database fine. however i have a script that should at login check the encrypted sha1 password in the database and login however it does not work. i am not great with …

Member Avatar for andydeans
0
157
Member Avatar for reginaj

Hello Colleagues, I have not done C programming in years. I need some help in debugging a C program written by someone who has left our team. I have marked the lines having the error with "-->" Your kind assistance is very much appreciated. Here's the code: 1 #include <stdio.h> …

0
46
Member Avatar for dresposure

Hello everybody, I am Pinak. I want to build an apllication regarding encryption. However, I am confused. [B][COLOR="Green"]Should I use Applet or Swing ????? [/COLOR][/B] Can you tell me what is the difference between the two??????:)

Member Avatar for extemer
0
162
Member Avatar for happygeek

When it comes to data storage and retrieval the current buzz is undoubtedly cloud-shaped, so why would anyone want to invest in Network Attached Storage? Two words: cost and capacity. Cloud services are great, but as far as storing and accessing large amounts of data is concerned things can get …

2
1K
Member Avatar for Korakos

Hello! I have i problem i was hoping you could help me with, I have to write a script that will ask the user for a username and password, and validate it through /etc/passwd and /etc/shadow. I've looked all over the place for an answer to this and i just …

Member Avatar for Korakos
0
255
Member Avatar for twistedphrame

Hi, I'm attempting to generate a new cipher key using a string that was negotiated earlier on. On running the code I get the error: Exception in thread "main" java.lang.IllegalArgumentException: Missing argument at javax.crypto.spec.SecretKeySpec.<init>(DashoA13*..) at shared.Cryptographer.makeCipher(Cryptographer.java:254) at client.Main.main(Main.java:60) Java Result: 1 the code is as follow: [CODE] public void makeCipher(String …

Member Avatar for twistedphrame
0
920
Member Avatar for teenybopper

Hello, I need to write a shell script that performs encryption and decryption using AES algorithm. I could not find any resource online, can anyone please help me in the right direction? Thank you for the help!

Member Avatar for griswolf
0
38
Member Avatar for Zandermander

I have a Windows XP SP3 computer, AT&T Uverse with a 2wire router and 2wire usb wireless adapter on my desktop. It was working earlier today just fine, not quite sure what happened but now it will not connect to my WPA encrypted router. I can connect to other wireless …

0
87
Member Avatar for glenak

If there's anyone who knows a thing or two about this, your help would be much appreciated. This is a code I'm working on: [CODE] try { //ask user for short password System.out.print("Enter a password: "); //read in a character at a time, putting them into the buffer while((buf[bufPos++] = …

Member Avatar for javaAddict
0
5K
Member Avatar for Jaydenn

[CODE] using (var sr = new StreamReader(Misc.tempFile)) { using (var sw = new StreamWriter(Misc.path + "test.dat")) { while ((line = sr.ReadLine()) != null) { for (int i = 0; i < detailViewer.SelectedIndices.Count; i++) lineToDelete[i] = Encryption.encrypt(detailViewer.SelectedItems[i].SubItems[0].Text) + "," + Encryption.encrypt(detailViewer.SelectedItems[i].SubItems[1].Text) + "," + Encryption.encrypt(detailViewer.SelectedItems[i].SubItems[2].Text); if (line != lineToDelete[detailViewer.SelectedIndices.Count - 1] …

Member Avatar for Jaydenn
0
222
Member Avatar for Jaydenn

Hello, I'm having problems removing an array of lines from a text file. Heres my code: Ugh, I apologize. I can't get the conventions to correctly show on this post, I'm really sorry. [code] using (var sr = new StreamReader(Misc.tempFile)) { using (var sw = new StreamWriter(Misc.path + "test.dat")) { …

Member Avatar for Geekitygeek
0
140
Member Avatar for xixixi

i jst came up wid an idea n i dnt knw how to proceed furthr....i'd lyk to encrypt data in such a way dats its decrptd in stages. initial stages when overcome wud show irrelevant dat(nt garbage)xtractd frm d original data...decrption methods wud vary in each stage.... more complicated in …

Member Avatar for NewbieXcellence
0
113
Member Avatar for neelm

Write a program in C/C++ for encryption and decryption using Hill Cipher[code]Write a program in C/C++ for encryption and decryption using Hill Cipher[/code]

Member Avatar for hanvyj
-5
58
Member Avatar for hazar

Hi all, I've been looking at the idea of encryption of traffic over the internet, just finished reading a [I]lot[/I] of articles on how public key encryption works. Here is what I understand so far: 1. Large random number is generated, from this a private and public key is generated …

Member Avatar for hazar
0
161
Member Avatar for fluffinator007

Hi All I'm new to the forums, and would like to thank you in advance for any help you can offer. Also, I do apologize at the relative simplicity of this question, I'll just get on with it now. I just set up a wireless network for my home and …

Member Avatar for TheOgre
0
168
Member Avatar for vndlyndstrs

I have 3 computers in this home where I currently live. One mac and one XP machine connect to the WiFi network just fine. The encryption is WPA2 Personal. This 3rd desktop always gets assigned the IP 169.254.228.249, subnet mask 255.255.0.0 and all the other parameters are not there. Windows …

Member Avatar for TheOgre
0
162
Member Avatar for andydeans

hi, i have a site which is secure with a username and password combination with mysql backend database. the encryption is sha1 for the password. what about securing the url? at the moment it displays for example: page_name.php?ID=24 if you modify the ID other users can see other pages they …

Member Avatar for EvolutionFallen
0
105
Member Avatar for FrancoisvdHeide

Hi, I'm trying to write a licensing module of my C# Application. The license file is a basic text file saved on the clien'ts machine which includes an encrypted 64BaseString. Up and until now I've used the Rijndal method for encrypting and decripting the string and matching the license up …

Member Avatar for gusano79
2
174
Member Avatar for emmas4impact

Hello i will like to have an explanation to this task: Make a midlet (called "NetworkSettings") that has List (IMPLICIT type called "mainList") as its main view. "mainList" contains following items: "Encryption", "Basic data" and "Summary" (actually items will describe views). When user selects one of those items from "mainList" …

Member Avatar for emmas4impact
0
223
Member Avatar for wallance

I'm creating a control panel and am currently developing the user authentication system. Is using php sessions the most secure method of doing this? I know I can't use SSL encryption or any of those fancy things because not only does it cost more money, but I'm going to use …

Member Avatar for ApocDen
0
67
Member Avatar for Ricky65

Hi I've attempted to create a little app which encrypts and decrypts a file using the XOR cipher. However, it only encrypts/decrypts the first few lines and I'm not sure where I'm going wrong. Advice appreciated. Ricky My code: [CODE]//XOR Encryption #include <stdio.h> #include <string.h> //XOR Encryption key char XORkey …

Member Avatar for Ricky65
0
354
Member Avatar for MinimalStress

Hey guys, my name is Ross. Im new to programming and i need some help with assembler. I have a menu with a number of options that the user can do. 1. The first one is the user must input a string of characters up to the limit of 25 …

0
112
Member Avatar for ApocDen

This is a User Defined Function to perform simple encryption on an input string. This is performed by transposing the ASCII value of each character in the string by the increment value (@increment in the parameter list) Pass the function the string you wish encrypted and the increment value, which …

0
314
Member Avatar for jakab.oers

Hello I have a company laptop (HP 8530w) with Checkpoint Pointsec HDD encryption and 32bit Vista. I want to use win7 booted from an external eSATA drive. For that to work first of all I had to remove the internal HDD, because win7 install has already fucked my system up …

Member Avatar for ermali
0
169
Member Avatar for CatRambo

[ATTACH=RIGHT]16335[/ATTACH]On August 1, [URL="http://www.tombom.co.uk/blog/?p=262"]Defcon attendee Chris Paget showcased the vulnerability of the AT&T network[/URL] by eavesdropping on cell phone calls in front of a live audience. Paget warned attendees ahead of time what he planned to do: [I]1. If you’re in an area where your cellphone calls might be intercepted, …

0
371
Member Avatar for Niki_Fears

On Sunday an [URL="http://www.tra.ae/news_TRA_Announces_the_Suspension_of_Blackberry_Messenger%2C_Blackberry_E_mail_and_Blackberry_Web_Browsing_Services_in_the_UAE_from_October_11%2C_2010-180-1.php"]official statement[/URL] was released by the Telecommunications Regulatory Authority for the United Arab Emirates (UAE) confirming that certain mobile features for the BlackBerry device including mobile email, messaging, and mobile web browsing will be blocked by government authorities. [ATTACH=right]16330[/ATTACH]The ban will officially go into effect beginning on …

0
384
Member Avatar for andy_aphale

Hello i am developing a encryption/decryption Application in which i am first converting string into its ascii values then reversing this ascii values and then generating the hex values of this reversed ascii values... I have completed the encryption part as i am able to convert the string into hex …

Member Avatar for vb5prgrmr
0
221
Member Avatar for bunty_kkp

1. Define a structure called cricket that will describe the following information Player name Team name Batting average Using cricket, declare an array player with 10 elements and write a program to read the information about all the 10 players and print a team wise list containing names of players …

Member Avatar for Nick Evan
0
243
Member Avatar for jiglypop

can anyone give me the source code of CAST 128 encryption algorithm written in c++ language?... I really need this for my thesis.

Member Avatar for mrnutty
0
62
Member Avatar for k2k

I just got a used Cisco 851 router from ebay and ready to play around with it. i connected it to my computer com port and start seeing something from the putty serial connection. i see something like this repeating and repeating.. what does that mean? Translating "stipp2.srv.hcvlny.cv.net"...domain server (255.255.255.255) …

Member Avatar for cguan_77
0
426

The End.