1,159 Topics
![]() | |
Hi, I am looking for an infrastructure like JCE in java so I can “install” encryption providers. The one I am going to put in now is Bouncy Castle provider and use “PBEWITHMD5AND256BITAES-CBC-OPENSSL” but I want to be able to change the providers and algorithms just by configuration change. I … | |
So here we are with our new Project at school. The question is what is it about? This project is for our thesis in where we(my group) will make a software that can be useful by us and other people. We basically start from scratch but if there are other … | |
We want to use a licensing system for our new software, so we know that our customers are using the same amount of apps that they paid for. The general idea is to get their processor ID and HDD serial number and combine them to make our license string. I … | |
Part of the app I am writing allows users to create an encrypted, password-protected output file that they can email safely to a central store. I can't have the users choose their own password for the encryption as the central store needs to access the contents of all the output … | |
Hi aytul here i m having a problem with my php script actually i need to incorporate variable key lengths in my encryption technique but the following code give me the same keylength in all the cases plz tellme where to change in my script to get variable key length. … | |
Hi everyone, I am running an institution with 10 clients and a server. I have searched and found a cheap and apparently cool software "Total Spy". I want to know, whether the software provides the features that has been described in this [URL="http://www.softwarereviewboffin.com/security-and-encryption/total-spy-review.html"]review[/URL]? On the other hand, if anyone has … | |
Which of these encryption methods is more effective (secure) Vinegere or basic XOR encryption, if the key we use is the same size in both cases? | |
I cannot get my desktop computer on the home network, it has been able to connect to the network before, but it was very unstable and not it just does not work at all. My landlord has fixed the issue that made the network unstable and I am able to … | |
I've just upgraded an existing app from Rails 1.2.5 (Ruby 1.8.5) to Rails 2.3.8. There were several issues to the upgrade including finding and installing a good MySQL gem (dll in my case). This app worked fine on Rails 1.2.5 but I needed to upgrade for security concerns. There are … | |
<?php function get_rnd_iv($iv_len) { $iv = ''; while ($iv_len-- > 0) { $iv .= chr(mt_rand() & 0xff); } return $iv; } function md2_encrypt($plain_text, $password, $iv_len = 16) { $plain_text .= "\x13"; echo "<br>".$plain_text; $n = strlen($plain_text); echo "<br>".$n; if ($n % 16) $plain_text .= str_repeat("\0", 16 - ($n % 16)); … | |
Hi, I want to develop routine based on MAC-ID of LAN card to prevent my s/w from piracy. The program should be able to create encryted text file containing some encryption alogorithm based on MAC-ID of LAN Card. It should be nearly impossible to recover the MAC-ID from the encrypted … | |
Hi all, Any ideas for video file encryption using AES (symmetric) ???????????? I seen only data file encryption. I wanna encrypt video file and decrypt as well ..... Who wants to help such a new beginner ???????/:) PLssssssssssssssss :confused: | |
So i did tons of research for bout 2 hours on google and finally figured out how bit-level works when using XOR, but most of the time, the vars were already declared I wanted to know how to declare them but by user input. This is just an example i … | |
The task is very simple; you have to work on two functions Encrypt and Decrypt. The encrypt function will encrypt the user input string with the help of encryption key. The decrypt function will decrypt the user input string with the help of encryption key. The output will Hints: Encoding: … | |
The task is very simple; you have to work on two functions Encrypt and Decrypt. The encrypt function will encrypt the user input string with the help of encryption key. The decrypt function will decrypt the user input string with the help of encryption key. The output will Hints: Encoding: … ![]() | |
Can anyone help us in our thesis? Our topic is about encryption, but we are still thinking what encryption application we would be working.Can someone give us any idea? Thanks. | |
Working ASA 5505 (just took info off of it just a moment ago). Looks like new, Includes power cable and console cable. I can throw in ethernet cables if you really need them. Has 2 ASDM versions as well as 2 versions of the asa ios as shown below. If … | |
Warning: Cannot modify header information - headers already sent by (output started at C:\php\xampp\htdocs\db_login.php:9) in C:\pear\pear\Auth\HTTP.php on line 455 Warning: Cannot modify header information - headers already sent by (output started at C:\php\xampp\htdocs\db_login.php:9) in C:\pear\pear\Auth\HTTP.php on line 456 Access Denied [CODE] <?php // Using Auth_HTTP to limit access require_once('db_login.php'); require_once("Auth/HTTP.php"); … | |
Hey guys, this is my first post here as I have been struggling with a problem with my internet for about two weeks now. I'll try to describe the problem in as many details as possible. I have a HP laptop with Windows Vista. Recently I moved to a new … | |
Hello everyone :) (new Daniweb user here) I'm currently experiencing some wlan issues. My computer is using an 3com usb adapter (3CRUSB10075) adapter with newest drivers installed. I've also tried with an SMC wireless PCI adapter, and that was even MORE unstable than the 3com adapter. I got a Linksys … | |
hi there, does anybody know a good encryption method that can be used the C#.NET to encrypt and decrypt the password in C#.NET desktop application? thanxxxxxx | |
Hi all, i'm doing a AES encryption with a library found on sunjava. There is a small problem i hit while making a test. Firstly i used "nv3456789123456o" as my key to encrypt. However, for testing purpose, i'm trying to use a different key to decrypt the message to see … | |
Last year security vendors were warning that botnets were not only not dead, but bouncing back in a big way. One suggested that [URL="http://www.daniweb.com/news/post1080975.html"]botnets would become autonomous and intelligent[/URL], with each node containing inbuilt self-sufficient coding in order to coordinate and extend its own survival, during the course of 2010. … | |
I have tried to start this program but I am so confused with dealing with strings. If any one could take a look and tell me if im on the right path it would be greatly appreciated. Heres the problem and what I have so far: An organization wants to … | |
trying to figure out the reason for memory loss any ideas would be helpful requirements should be done however i need a working file for turn in thanks for help. leak seems to be around line 59-61 i think in demo.cpp Demo.cpp [CODE] /* File Name: Demo.cpp Chapter No. 15 … | |
Back in 1976, along with Stanford University professor Martin Hellman, Whit Diffie produced quite possibly the most important paper in the history of cryptography. That paper, New Directions in Cryptography, laid the groundwork for solving one of the fundamental problems of cryptography, that of key distribution. Now Diffie himself is … | |
I installed flycryptor software on my system to lock certain files and folders. Now the problem is that those files are encrypted and my friend have uninstalled the software .Those files appear somewhat scary to look at and are not opening properly. So is there any way by which i … | |
Steganography- to hide text into text. Very safe to transport information internet. HERE is [URL="http://www.programva.com/en/php-steganography-encryption"]PHP STEGANOGRAPHY example[/URL]. There is a list of phrases , which is mixed with Caesar cypher :). May somebody hnows another sites? | |
I have this code: [CODE]Byte[] OriginalBytes; Byte[] EncryptedBytes; MD5 md5; md5 = new MD5CryptoServiceProvider(); OriginalBytes = UTF8Encoding.Default.GetBytes(OriginalPassword); EncryptedBytes = md5.ComputeHash(OriginalBytes); return BitConverter.ToString(EncryptedBytes); MessageBox.Show("MD5 Hash is: " + EncryptedBytes);[/CODE] However I get the error "A return keyword must not be followed by a object expression." I'm quite new to C# so … | |
I have visited this forum many times in the past and I decided to actually join. My first question - where is the encryption algorithm actually implemented in bluethooth? more specifically bluez. I have been sifting through the bluez code trying to find this, and so far I have only … | |
Hey all! I got a little problem, well actually not so little when I try to go play something the graphic card crashes I get a notice on bottom right that it crashed and restored and sometimes I might get a bsod. It has worked well before, but it suddenly … | |
I am trying to implement a protocol that includes cryptography. What I am supposed to do is encrypt a combination of two public keys and a message. Although I have the message in String format I don’t have the public keys in string format. I am making use of getpublic … | |
hi all i have some confusion about actors in use case. im doing my final year project and now i have to write my thesis/documentation. of course for system design i need a use case. im developing a web based file encryption application with usage of TPM specification. TPM stand … | |
hi guys, im currently working on an assignment where i have to create a secure chat room program, it works by one main chat server and then each client can log in and send messages to the server and the server will send the messages back to everyone that is … | |
Hi. I am trying to create this password storing desktop application. So,I'll need to save all the usernames and passwords the user wants to store in a file and encrypt it,so no one can read from it. I can write an encryption class,but I'm afraid it will become very basic … | |
Hi guys, We have some sensitive information in a Visual C#.NET app (an app that needs to be distributed to end-users). Examples of this information would be a connection string for a MySQL database on our servers, and encryption keys that the program uses to decrypt some datafiles. When the … | |
This article will inform you more about forms Authentication using ASP .NET and Visual Basic .net (VB .NET). Before I continue I must stress that the web.config is xml and must be used with extreme sensitivity in mind. All tags must be closed etc. or else you will end up … | |
Hey guys, I am working on this encryption/decryption project and I have just finished writing the encryption part of the code. I complied it and ran it. The first part worked well. However once I chose to encrypt a file ( I didnt choose decrypt because it was not completed), … | |
Hi, Who can anyone give me the simplest method for encryption and decryption for text file? I saw a lot of methods in other website. So, I choose the simplest one, but it gives me some errors when I do it. This is the reference link. [url]http://www.vb6.us/tutorials/basic-encryption-xor-tutorial[/url] [CODE]Dim strResult As … | |
Any suggestions / code examples for Encryption/Decryption of files(any file format) in java. command line args - | |
Hi all. I've been having this problem and I was hoping someone could catch something I didn't. So here it goes: I have developed a registration system using PHP and mySQL, with usernames and passwords being encrypted by salt and md5 (and display names getting no encryption) on PHP's end … | |
Hi everyone, I'm trying to code a program that uses RSA to encrypt your message. I assume you know it but if you don't know let me explain simply: [QUOTE]Your enter a word (actually it is a sentence but for now a word) then program will convert letters to numbers … | |
This def has too many IF, i don't know how to optimize this code for more simplier and professional. Please take a look. [CODE]def cfg_wlan(self, wlan_cfg): """ Configure a new wlan for Zone Director. Input: a dictionary, supplied in DUT.py Output: none """ if wlan_cfg['auth'] == "PSK": auth = "open" … | |
Hello I want u to help me about how to encrypt file is sent between web client and web server. Thank u.... | |
can you send me the code for encryption and decryption using elgamal. Thanks Rekha | |
Hi, I am new to encryption and have read a lot but still don't know what I'm doing. Just to clarify when using the keys is it just for a handshake between the client and server to allow access or does it affect the caesar cipher as well? because after … | |
Hello everyone. This is my first post on here so please forgive if there are mistakes. I have been searching the forum and other sites to get some answer, but not luck yet. Below is a program that basically asks for names, ids, alias, etc of agents and then writes … | |
Hi, I'm having problems with decryption of a string when it's long. The following are my codes for encryption and decryption. It works well when the string is short (20 chars) but throws an exception when it is about 30 chars. The problem I have is that when I tested … | |
Hi all I want a help from you about how to make web server and client ,send and receive data over network securely by using encryption algorithms like DES,3DES and hash techniques. I want the encryption to use a shared secret key which is valid for one session.This is generated … | |
I am planning on starting a project during summer break. I am going to create a employee clock in system for my work place (and anywhere else that wants it.) I figured it'd be good to get some practical experience before I graduate. The actual structure of the program I … |
The End.