1,159 Topics

Member Avatar for
Member Avatar for qwerty53

Hi, I am looking for an infrastructure like JCE in java so I can “install” encryption providers. The one I am going to put in now is Bouncy Castle provider and use “PBEWITHMD5AND256BITAES-CBC-OPENSSL” but I want to be able to change the providers and algorithms just by configuration change. I …

0
24
Member Avatar for programboy

So here we are with our new Project at school. The question is what is it about? This project is for our thesis in where we(my group) will make a software that can be useful by us and other people. We basically start from scratch but if there are other …

Member Avatar for Nick Evan
0
339
Member Avatar for lolwtf

We want to use a licensing system for our new software, so we know that our customers are using the same amount of apps that they paid for. The general idea is to get their processor ID and HDD serial number and combine them to make our license string. I …

Member Avatar for ghimangi
0
360
Member Avatar for JohnDove

Part of the app I am writing allows users to create an encrypted, password-protected output file that they can email safely to a central store. I can't have the users choose their own password for the encryption as the central store needs to access the contents of all the output …

Member Avatar for ghimangi
0
147
Member Avatar for aytul

Hi aytul here i m having a problem with my php script actually i need to incorporate variable key lengths in my encryption technique but the following code give me the same keylength in all the cases plz tellme where to change in my script to get variable key length. …

0
43
Member Avatar for syedmahtab

Hi everyone, I am running an institution with 10 clients and a server. I have searched and found a cheap and apparently cool software "Total Spy". I want to know, whether the software provides the features that has been described in this [URL="http://www.softwarereviewboffin.com/security-and-encryption/total-spy-review.html"]review[/URL]? On the other hand, if anyone has …

Member Avatar for syedmahtab
0
591
Member Avatar for moni94

Which of these encryption methods is more effective (secure) Vinegere or basic XOR encryption, if the key we use is the same size in both cases?

Member Avatar for TrustyTony
0
559
Member Avatar for matsm

I cannot get my desktop computer on the home network, it has been able to connect to the network before, but it was very unstable and not it just does not work at all. My landlord has fixed the issue that made the network unstable and I am able to …

Member Avatar for matsm
0
178
Member Avatar for Member 785602

I've just upgraded an existing app from Rails 1.2.5 (Ruby 1.8.5) to Rails 2.3.8. There were several issues to the upgrade including finding and installing a good MySQL gem (dll in my case). This app worked fine on Rails 1.2.5 but I needed to upgrade for security concerns. There are …

0
71
Member Avatar for fouzia Qayyum

<?php function get_rnd_iv($iv_len) { $iv = ''; while ($iv_len-- > 0) { $iv .= chr(mt_rand() & 0xff); } return $iv; } function md2_encrypt($plain_text, $password, $iv_len = 16) { $plain_text .= "\x13"; echo "<br>".$plain_text; $n = strlen($plain_text); echo "<br>".$n; if ($n % 16) $plain_text .= str_repeat("\0", 16 - ($n % 16)); …

Member Avatar for chrishea
0
88
Member Avatar for ravimodi

Hi, I want to develop routine based on MAC-ID of LAN card to prevent my s/w from piracy. The program should be able to create encryted text file containing some encryption alogorithm based on MAC-ID of LAN Card. It should be nearly impossible to recover the MAC-ID from the encrypted …

Member Avatar for Banfa
0
79
Member Avatar for octavia

Hi all, Any ideas for video file encryption using AES (symmetric) ???????????? I seen only data file encryption. I wanna encrypt video file and decrypt as well ..... Who wants to help such a new beginner ???????/:) PLssssssssssssssss :confused:

0
59
Member Avatar for p@rse

So i did tons of research for bout 2 hours on google and finally figured out how bit-level works when using XOR, but most of the time, the vars were already declared I wanted to know how to declare them but by user input. This is just an example i …

Member Avatar for p@rse
0
112
Member Avatar for gazzy1

The task is very simple; you have to work on two functions Encrypt and Decrypt. The encrypt function will encrypt the user input string with the help of encryption key. The decrypt function will decrypt the user input string with the help of encryption key. The output will Hints: Encoding: …

Member Avatar for peter_budo
-1
143
Member Avatar for gazzy1

The task is very simple; you have to work on two functions Encrypt and Decrypt. The encrypt function will encrypt the user input string with the help of encryption key. The decrypt function will decrypt the user input string with the help of encryption key. The output will Hints: Encoding: …

Member Avatar for rajarajan2017
-1
219
Member Avatar for ellioth_13

Can anyone help us in our thesis? Our topic is about encryption, but we are still thinking what encryption application we would be working.Can someone give us any idea? Thanks.

Member Avatar for ellioth_13
-1
100
Member Avatar for petraarkanian

Working ASA 5505 (just took info off of it just a moment ago). Looks like new, Includes power cable and console cable. I can throw in ethernet cables if you really need them. Has 2 ASDM versions as well as 2 versions of the asa ios as shown below. If …

Member Avatar for masimk2003
0
328
Member Avatar for cthoes

Warning: Cannot modify header information - headers already sent by (output started at C:\php\xampp\htdocs\db_login.php:9) in C:\pear\pear\Auth\HTTP.php on line 455 Warning: Cannot modify header information - headers already sent by (output started at C:\php\xampp\htdocs\db_login.php:9) in C:\pear\pear\Auth\HTTP.php on line 456 Access Denied [CODE] <?php // Using Auth_HTTP to limit access require_once('db_login.php'); require_once("Auth/HTTP.php"); …

Member Avatar for cthoes
0
79
Member Avatar for Sizzlefish

Hey guys, this is my first post here as I have been struggling with a problem with my internet for about two weeks now. I'll try to describe the problem in as many details as possible. I have a HP laptop with Windows Vista. Recently I moved to a new …

Member Avatar for jvt4
0
182
Member Avatar for Bully

Hello everyone :) (new Daniweb user here) I'm currently experiencing some wlan issues. My computer is using an 3com usb adapter (3CRUSB10075) adapter with newest drivers installed. I've also tried with an SMC wireless PCI adapter, and that was even MORE unstable than the 3com adapter. I got a Linksys …

Member Avatar for netvance
0
203
Member Avatar for judithSampathwa

hi there, does anybody know a good encryption method that can be used the C#.NET to encrypt and decrypt the password in C#.NET desktop application? thanxxxxxx

Member Avatar for sknake
0
157
Member Avatar for AcidG3rm5

Hi all, i'm doing a AES encryption with a library found on sunjava. There is a small problem i hit while making a test. Firstly i used "nv3456789123456o" as my key to encrypt. However, for testing purpose, i'm trying to use a different key to decrypt the message to see …

Member Avatar for jwenting
0
669
Member Avatar for newsguy

Last year security vendors were warning that botnets were not only not dead, but bouncing back in a big way. One suggested that [URL="http://www.daniweb.com/news/post1080975.html"]botnets would become autonomous and intelligent[/URL], with each node containing inbuilt self-sufficient coding in order to coordinate and extend its own survival, during the course of 2010. …

Member Avatar for jollyscoden023
2
170
Member Avatar for bobbyg118

I have tried to start this program but I am so confused with dealing with strings. If any one could take a look and tell me if im on the right path it would be greatly appreciated. Heres the problem and what I have so far: An organization wants to …

Member Avatar for mrnutty
0
104
Member Avatar for theABCasian

trying to figure out the reason for memory loss any ideas would be helpful requirements should be done however i need a working file for turn in thanks for help. leak seems to be around line 59-61 i think in demo.cpp Demo.cpp [CODE] /* File Name: Demo.cpp Chapter No. 15 …

Member Avatar for Ketsuekiame
0
268
Member Avatar for newsguy

Back in 1976, along with Stanford University professor Martin Hellman, Whit Diffie produced quite possibly the most important paper in the history of cryptography. That paper, New Directions in Cryptography, laid the groundwork for solving one of the fundamental problems of cryptography, that of key distribution. Now Diffie himself is …

Member Avatar for Agni
0
582
Member Avatar for james chaco

I installed flycryptor software on my system to lock certain files and folders. Now the problem is that those files are encrypted and my friend have uninstalled the software .Those files appear somewhat scary to look at and are not opening properly. So is there any way by which i …

Member Avatar for chrishea
0
155
Member Avatar for ugniesdebesys

Steganography- to hide text into text. Very safe to transport information internet. HERE is [URL="http://www.programva.com/en/php-steganography-encryption"]PHP STEGANOGRAPHY example[/URL]. There is a list of phrases , which is mixed with Caesar cypher :). May somebody hnows another sites?

0
111
Member Avatar for painejake

I have this code: [CODE]Byte[] OriginalBytes; Byte[] EncryptedBytes; MD5 md5; md5 = new MD5CryptoServiceProvider(); OriginalBytes = UTF8Encoding.Default.GetBytes(OriginalPassword); EncryptedBytes = md5.ComputeHash(OriginalBytes); return BitConverter.ToString(EncryptedBytes); MessageBox.Show("MD5 Hash is: " + EncryptedBytes);[/CODE] However I get the error "A return keyword must not be followed by a object expression." I'm quite new to C# so …

Member Avatar for painejake
0
203
Member Avatar for Craig.

I have visited this forum many times in the past and I decided to actually join. My first question - where is the encryption algorithm actually implemented in bluethooth? more specifically bluez. I have been sifting through the bluez code trying to find this, and so far I have only …

0
103
Member Avatar for Silvershaft

Hey all! I got a little problem, well actually not so little when I try to go play something the graphic card crashes I get a notice on bottom right that it crashed and restored and sometimes I might get a bsod. It has worked well before, but it suddenly …

Member Avatar for caperjack
0
341
Member Avatar for whimsical1987

I am trying to implement a protocol that includes cryptography. What I am supposed to do is encrypt a combination of two public keys and a message. Although I have the message in String format I don’t have the public keys in string format. I am making use of getpublic …

0
69
Member Avatar for dyladalyla

hi all i have some confusion about actors in use case. im doing my final year project and now i have to write my thesis/documentation. of course for system design i need a use case. im developing a web based file encryption application with usage of TPM specification. TPM stand …

Member Avatar for RobertGrabe
0
578
Member Avatar for initialone1

hi guys, im currently working on an assignment where i have to create a secure chat room program, it works by one main chat server and then each client can log in and send messages to the server and the server will send the messages back to everyone that is …

Member Avatar for peter_budo
0
74
Member Avatar for nerdinator

Hi. I am trying to create this password storing desktop application. So,I'll need to save all the usernames and passwords the user wants to store in a file and encrypt it,so no one can read from it. I can write an encryption class,but I'm afraid it will become very basic …

Member Avatar for thelamb
0
96
Member Avatar for reanopp

Hi guys, We have some sensitive information in a Visual C#.NET app (an app that needs to be distributed to end-users). Examples of this information would be a connection string for a MySQL database on our servers, and encryption keys that the program uses to decrypt some datafiles. When the …

Member Avatar for reanopp
0
98
Member Avatar for Slade

This article will inform you more about forms Authentication using ASP .NET and Visual Basic .net (VB .NET). Before I continue I must stress that the web.config is xml and must be used with extreme sensitivity in mind. All tags must be closed etc. or else you will end up …

Member Avatar for kvprajapati
0
3K
Member Avatar for theblastedfool

Hey guys, I am working on this encryption/decryption project and I have just finished writing the encryption part of the code. I complied it and ran it. The first part worked well. However once I chose to encrypt a file ( I didnt choose decrypt because it was not completed), …

Member Avatar for theblastedfool
0
96
Member Avatar for zawpai

Hi, Who can anyone give me the simplest method for encryption and decryption for text file? I saw a lot of methods in other website. So, I choose the simplest one, but it gives me some errors when I do it. This is the reference link. [url]http://www.vb6.us/tutorials/basic-encryption-xor-tutorial[/url] [CODE]Dim strResult As …

Member Avatar for abu taher
0
194
Member Avatar for Ashwin1985

Any suggestions / code examples for Encryption/Decryption of files(any file format) in java. command line args -

Member Avatar for peter_budo
0
481
Member Avatar for ConCon

Hi all. I've been having this problem and I was hoping someone could catch something I didn't. So here it goes: I have developed a registration system using PHP and mySQL, with usernames and passwords being encrypted by salt and md5 (and display names getting no encryption) on PHP's end …

Member Avatar for colweb
0
96
Member Avatar for mystb

Hi everyone, I'm trying to code a program that uses RSA to encrypt your message. I assume you know it but if you don't know let me explain simply: [QUOTE]Your enter a word (actually it is a sentence but for now a word) then program will convert letters to numbers …

Member Avatar for mystb
0
300
Member Avatar for z 4

This def has too many IF, i don't know how to optimize this code for more simplier and professional. Please take a look. [CODE]def cfg_wlan(self, wlan_cfg): """ Configure a new wlan for Zone Director. Input: a dictionary, supplied in DUT.py Output: none """ if wlan_cfg['auth'] == "PSK": auth = "open" …

Member Avatar for Gribouillis
0
113
Member Avatar for elmaami
Member Avatar for jcao219
0
50
Member Avatar for jjacob
Member Avatar for kvprajapati
-2
38
Member Avatar for icestorm

Hi, I am new to encryption and have read a lot but still don't know what I'm doing. Just to clarify when using the keys is it just for a handshake between the client and server to allow access or does it affect the caesar cipher as well? because after …

0
71
Member Avatar for dragonstar4681

Hello everyone. This is my first post on here so please forgive if there are mistakes. I have been searching the forum and other sites to get some answer, but not luck yet. Below is a program that basically asks for names, ids, alias, etc of agents and then writes …

Member Avatar for daviddoria
0
102
Member Avatar for z_jun

Hi, I'm having problems with decryption of a string when it's long. The following are my codes for encryption and decryption. It works well when the string is short (20 chars) but throws an exception when it is about 30 chars. The problem I have is that when I tested …

0
34
Member Avatar for elmaami

Hi all I want a help from you about how to make web server and client ,send and receive data over network securely by using encryption algorithms like DES,3DES and hash techniques. I want the encryption to use a shared secret key which is valid for one session.This is generated …

0
37
Member Avatar for pinsickle

I am planning on starting a project during summer break. I am going to create a employee clock in system for my work place (and anywhere else that wants it.) I figured it'd be good to get some practical experience before I graduate. The actual structure of the program I …

Member Avatar for aminit
0
105

The End.