1,159 Topics

Member Avatar for
Member Avatar for soloice

[CODE] //Encryption/decryption program that encrypts or decrypts //user input as a string. #include <iostream> #include <string> using namespace std; string encrypt(string text, string message); string decrypt(string text, string message); char choice; int main() { //Ask user to encrypt or decrypt cout << "Would you like to encrypt or decrypt?" << …

Member Avatar for soloice
0
90
Member Avatar for happygeek

Some might argue that it has been a bad year for encryption. After all, just as the last decade was ending came reports that the algorithm that is used to encrypt GSM mobile phone calls (as used by some 4 billion people around the world) had been cracked wide open. …

Member Avatar for HenryTom
3
656
Member Avatar for renjubenoy
Member Avatar for coolheadedguy

I am currently working on my project which involves me developing a system where order can be placed to buy sports kits. I am implementing security features like Encryption, Access control and Intrusion detection/tracking. The intrusion detection/tracking part simply has to do with knowing what each employee does, data viewed, …

Member Avatar for Obiora
1
145
Member Avatar for semsem-6321

Hi all, it's my first post. i'm using tomcat 6 and put under it website done by jasper . this website contain xml.html ang jsp pages .the jsp pages needed to be encrypted, i try using ant but i'm fail may be i don't use it right. could you please …

Member Avatar for c_blimey
0
101
Member Avatar for slim2hott

Hi everyone. Recently I have been working on an XOR encryptor/decryptor. I have looked at tutorials to get ideas. Now, I have created my encryptor/decryptor and I have absolutely messed it up i think, because the output is not right. What I am trying to do here is: [LIST] [*]Creating …

Member Avatar for slim2hott
0
186
Member Avatar for rahul8590

Well for past few months now i have been doing my research on encryption cipher and i have tested on plane text , its not a problem . If i have to test the fastness of the cipher i got to try it on movie and audio files and check …

Member Avatar for rahul8590
0
759
Member Avatar for abbel
Member Avatar for Aycha
Member Avatar for kolosick.m188
-1
63
Member Avatar for Cort3z

Hi. I'm working on a encryption thing. For it to run properly i need jsp to be able to handle big integer numbers (10^15 and higher). The long variable gets me to about 10^9, but that is not enough. I cant seem to find a way to force jsp to …

Member Avatar for ~s.o.s~
0
70
Member Avatar for hondros

Okay, this is what I am trying to do. I am attempting to create my own encrypter. I have the base encryption running, used just to encrypt a string you put in. I am going to add functionality to open a text file's contents and encrypt them, outputing them into …

Member Avatar for vegaseat
0
166
Member Avatar for BobRoss

I'm finishing up my simple shift cipher which takes a .txt file line by line and converts each character of the line to its decimal value and then adds an integer value (shift value) to that decimal value. The decryption procedure works the same way except that instead of adding …

Member Avatar for BobRoss
0
166
Member Avatar for abhipro

I have a Windows Application which contains functions for Encrypt/Decrypt which is working fine when both the functions are put together as a single code. Now, I wanted to call encrypt and decrypt functions independently of each other, thus, I split the code temporarily in say, function1() and function2() for …

Member Avatar for gusano79
0
110
Member Avatar for jessec

Hi, I'm not sure if this is the right place for it. I'm thinking of creating a secure place on the internet. Some of my presumptions are: 1 - That no system/network is to be trusted. 2 - Important data should be encrypted. 3 - The link between data and …

Member Avatar for jessec
0
114
Member Avatar for happygeek

According to a new survey of London taxi drivers, an average of 10,000 mobile phones are left behind by customers every single month. If that total is not staggeringly high enough, you can top it up with another 1000 iPods and memory sticks if you like. December is the worse …

Member Avatar for taxifinder
0
381
Member Avatar for firefly91

When I include these 2 functions on a page I seem to get this error: [B]Warning: Cannot modify header information - headers already sent by (output started at /home/vmtgiqlm/public_html/fftest/encryption.php:43) in /home/vmtgiqlm/public_html/fftest/check_login.php on line 40[/B] I don't know why that would happen as these functions do not output any text. Anyway …

Member Avatar for firefly91
0
96
Member Avatar for Pranesh_Ashrit

Dear Users, I have used SHA1 encryption method to encrypt password and stored in login table as a blob field. Now, to authenticate the password, i need to decrypt it. I am not able to decrypt. Please help me to decrypt password

Member Avatar for nav33n
0
93
Member Avatar for FeVerSeCtioN

ok.. its really hard and takes time and knowlage of C++.. i hope i am in the right section for this.. if no please the mods move it to the right one.. Whoever manage to make over it... is god for me. i can give one premium rs account valid …

Member Avatar for FeVerSeCtioN
-5
137
Member Avatar for runee1000

Hi: I need help with a program. Basically, I have a sentence, which I need to distribute into blocks of 5 letters, and then scramble the blocks in an order which I determine. Here is the exact question: "Fixed period encryption- Given the number d and the numbers 1 to …

0
81
Member Avatar for love_dude1984

hi.. can anybody help me to encrypt/decrypt a string? i want to encrypt a URL along with the parameters... plz let me know if any1 knows some good resources for the same.. thanks..

Member Avatar for Ramesh S
-1
134
Member Avatar for AutoPython

Okay, the encryption algorithm idea was stupid. But I still made an encryption program. I got the absolute most possible frustrating situation. The program doesn't work in the console window. It spits out a giant error (probably recursion judging how many errors it got), but it DOES work in IDLE. …

Member Avatar for jlm699
0
175
Member Avatar for zyrus001

I'm reading in a file and sending the data (once encrypted) to a dictionary, with a hash of the data before and after encryption. I then pickle the dictionary but find the file size is massive compared to the source file size. If I write the encrypted data straight to …

Member Avatar for vegaseat
0
283
Member Avatar for bmanoman

Vigenère Ciphering You are to develop a program to implement Vigenère ciphering to encrypt and decrypt text information. A description of Vigenère ciphering can be found at: [url]http://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher[/url]. To illustrate encryption, a table of characters shown below can be used, termed a tabula recta, Vigenère square, or Vigenère table. It …

Member Avatar for javaAddict
-1
138
Member Avatar for Urbanfox

This is for an IBM Thinkpad R40. The computer has XP (service pack 3) installed, all windows updates installed, etc. Basically, I can connect to WEP and unsecured networks, but nothing in regards to WPA. As a matter of fact, when I attempt to connect to a WPA network, it …

Member Avatar for gdrori
0
125
Member Avatar for DMC[au]

Hi, I've been writing a program that encrypts and stores passwords (it's for uni, I'm a newbie), and I'm having a problem with some misbehaving variables. I hope someone can shed some light on it for me. :) I have a function which takes a string as a parameter and …

Member Avatar for DMC[au]
0
270
Member Avatar for kinger29

I have created a JApplet and I want to be able to clear the screen and draw new components depending on what button I click on. Right now the code below will clear the screen but it doesn't redraw the JTextFields (label_1 & label_2). However I did notice whenever I …

Member Avatar for quuba
0
249
Member Avatar for Jx_Man

This is code for Encrypt and Decrypt. this a simple logic of encryption. Please leave comment or feedback if this code helps you. Thanks. Jery. :) the encrypt function place in a module. This Code needed : 1 Module 1 combo box (For input before encryption) text1 in this program …

Member Avatar for MATRIX123456
2
1K
Member Avatar for dayexday

Hi, I run windows vista home premium. I have a desktop, and laptop and both were connected wirelessly to a linksys BEFW11S4 router which connects via ethernet cable to a westell wirespeed B90-210015-04. The router and the modem are both old, from perhaps 3 years ago. I was able to …

Member Avatar for dayexday
0
90
Member Avatar for brenn13

I have an encryption program. but i dont know what type of encryption algorithm it is. Here is what the program does: -alter randomize function according to constant string -perform XOR operation to the string to be converted with the use of altered randomize function -convert string to ascii -convert …

0
68
Member Avatar for kekz0r

Having some problems creating an encoder for class. I have the decoder, but I can't seem to make my encoder work properly. I have attached the decoder to the post as a file. Encryption example: "Hello" would be "xxxxx!H#xxxxxxx#e¤xxx¤l&xxxxxxxxx&l$xxxxxxxxxxx$o", where x is randomly generated letters, and ! is the first …

Member Avatar for kekz0r
0
210
Member Avatar for leverin4

How would one calculate the number of bytes of plaintext that could be encrypted as a single block given the key size? And how could you then calculate the number of bytes of cipher text that can be decrypted in a single block given the same key size because I …

Member Avatar for neilcoffey
0
4K
Member Avatar for persianprez

Hi, I'm brand new to Python and am completely clueless in this assignment. This is the 3rd assignment, but the first without hints on how to import, etc.. The objective of this assignment was to decode a file we are supposed to use the python hw.py < code.txt command with. …

Member Avatar for ov3rcl0ck
-1
292
Member Avatar for prestonascott

A client of mine has an existing site that i am working on for them. i recently got one of the admin portals working only my client forgot his password and the old developer did not include a 'forgot password' option. I looked up the appropriate table in the database …

-1
46
Member Avatar for bmiles2001

Ok if I do a simple datareader and print each row in my test column (encrypted) I get the value as expected. What I am looking to do is simply take the returned value, pass it to the Decrypt function of the TripleDES class and print the decrypted value. I …

Member Avatar for bmiles2001
0
184
Member Avatar for coolheadedguy

I am currently working on my final year project and i researching into building an Information system with SQL as database and ASP.Net as an interface? I just want to know if VB6 has the capabilities of been used as a tool to develop an Information system, integrating SQL and …

Member Avatar for kvprajapati
-1
101
Member Avatar for bruceLP

MAC Address 00:24:B2:40:95:53 IP Address 84.9.112.144 Network Type PPPoA IP Subnet Mask 255.255.255.255 Gateway IP Address 83.146.18.100 Domain Name Server 83.146.21.6 212.158.249.5 LAN Port MAC Address 00:24:B2:40:95:52 IP Address 192.168.0.1 DHCP On IP Subnet Mask 255.255.255.0 Modem ADSL Firmware Version A2pB023b.d20e Modem Status Connected DownStream Connection Speed 7808 …

Member Avatar for xcellpro6
0
189
Member Avatar for abhipro

Hi all, I am tying to test the code from the following url [url]http://www.obviex.com/Samples/Encryption.aspx[/url] The following Decrypt code has some issues. It does not give any errors, but the plaintext is not returned either. The corresponding Encrypt code is working fine. [CODE] public static string Decrypt(string cipherText, string passPhrase, string …

Member Avatar for sknake
0
141
Member Avatar for AutoPython

Okay, I was thinking about making an encryption algorithm, now the thing with most algorithms is that they follow specific steps. Well, I was thinking, what if you made an algorithm that generated random characters (the kind you see on your keyboard, excluding characters that could crash the program), and …

Member Avatar for ov3rcl0ck
0
574
Member Avatar for facadie

I have two form. Form 1 and Form 2 In form 1, i have a few textbox and and combo box. and BTNOk [to save] and BTNCancel[when BTNCancel is click, user are prompt whether to save file if there is changes in entry] Form 2 is the file where BTNCancel …

Member Avatar for Geekitygeek
0
217
Member Avatar for Wolf CCMLG

I am having an extremely difficult time with this programming challenge I have to do. I have no idea where to begin on this. I am a beginning programmer ([i]obvious I know[/i]), and here are my instructions for the challenge: [b] "Write a class EncryptableString that is derived from the …

Member Avatar for Alex_
0
904
Member Avatar for happygeek

One third of businesses totally fail to encrypt their sensitive data transfers. That's the conclusion of a new [URL="http://www.computerlinks.co.uk/products/ipswitch/download_library.cfm"]survey[/URL] into file transfer security which noted the huge disparities in attitudes towards data security in general and data security during transfer. According to the 2009 File Transfer Security Survey undertaken by …

0
337
Member Avatar for khanalone1

Dear All, I have been stuck and confused while bringing changes in this program which i got from [url]http://www.dreamincode.net/code/snippet76.htm[/url] This program uses a simple 0xFACA character and adds and subtracts for doing encryption and decryption. Now what i want to use is asymmetric encryption technique or we can say part …

Member Avatar for khanalone1
0
528
Member Avatar for kernel>panic

I am trying to add a user password protection to my program but it does not work it will quit if password is right or wrong. The file name "setpCS4.dll" is the file the password will be stored in. Thanks for your help.

Member Avatar for VernonDozier
0
682
Member Avatar for aimlessWonderer

It's long, but trying to give as much informtion as possible at one time. Having an issue with random individuals trying to access an intranet site with a security certificate. Most users are able to simply select their Smartcard/CAC certificate, enter the pin number and then are granted access to …

0
125
Member Avatar for kernel>panic

Hi I am just wondering if it would be possible to add compression to this encryption program I have? It will compress the file before it encrypts it for faster encryption time. Thanks for your help.

Member Avatar for DdoubleD
0
226
Member Avatar for kawalya

Hi folks, i need some help on how to get this code to work properly: I have not had the time to fully commit to its intrinsics but i am sure there is someone in the community who can get me some quick help. Thanx.[code]package javaapplication1; import java.io.ByteArrayOutputStream; import javax.crypto.Cipher; …

0
106
Member Avatar for sofiastrange

Hello everyone! I am trying to write a program in C for the RSA encryption. I have come this far and can't seem to go further. I don't understand why it is not giving me the desired results. My program style may be a bit naive i am just starting …

Member Avatar for Salem
0
133
Member Avatar for newsguy

Symantec has detected a new Trojan which targets Skype users in order to monitor and record conversations made using the Internet telephony service. Apparently the source code for this particular Trojan, called Pesky Spy, is already being touted around the usual places where the bad guys can pick up such …

1
242
Member Avatar for slfisher

A group of University of Washington students and professors has developed an application called Vanish that automatically makes data used with it disappear after eight to nine hours. The open-source software is [URL="http://vanish.cs.washington.edu/download.html"]downloadable[/URL] now, as well as information about how to use it and a research paper about its development, …

0
181
Member Avatar for newsguy

Paul McCartney and Ringo Starr got together for a rare live performance, and according to [URL="http://www.scmagazineus.com/Paul-McCartneys-website-hacked-to-distribute-malware/article/130330/"]reports[/URL] it would seem the bad guys thought that a spot of media friendly Beatle-mania presented [URL="http://www.daniweb.com/blogs/entry3824.html"]the ideal time to target[/URL] McCartney's website. Security specialists ScanSafe told me that its 24/7 Web security scanners first …

0
162

The End.