1,159 Topics

Member Avatar for
Member Avatar for vikas_ry

Hi Friends, I am vikas from india , i have just now joined the community and i am very happy to find all technical gurus in the community , i am pursuing engneering in electronics and communication (4 year cource). i have some problem and i hope here i will …

Member Avatar for Infarction
0
114
Member Avatar for np2100

I am trying my first encryption program and I want to convert the letters to numbers then do an equation to change the numbers. Then when the encryption is done it should be a bunch of random numbers then the decryption should come back to normal (what the user input …

Member Avatar for np2100
0
128
Member Avatar for ivabigun

Hi guys, I am working on an encryption/decryption vigenere cipher at present. Ive been reading and writing to text files using integer arrays and then modding them together in order to get the full ASCII character set. the problem i am facing is, when i am encrypting, the spaces dissapear …

Member Avatar for indienick
0
100
Member Avatar for ivabigun

Hi people, I am wantng to read a key in as an argument that will duplicate itself to the exact character length as the plaintext , read from a text file. E.g. key = deceptive Then i need it to repeat until the end of the plaintext file length as …

Member Avatar for ivabigun
0
102
Member Avatar for ThisIsMe

Sorry this is kind of long. I am trying to get my notebook (a DELL C610 Latitude) to connect to the internet via a WBR-1310 D-Link wireless router. I also have a Dell mini tower optiplex gxa 333Mhz P2 wired into LAN1. Both PC's are running win2kproSP4 (legal versions). I …

0
20
Member Avatar for PacoLoko

ok, i'm trying to do a simple DES program... and i need help to do the permutation that's my first simple code, i need to chance the order of bits of 3 chars i have the table table={11,15,3,7,12,5,8,17,24,21,4,1,6,9,2,13,10,14,23,18,20,19,22,16} //24 bits i have idea how to do about 8 bits[a simple …

0
51
Member Avatar for Neil

Hi, I am experiencing a problem when trying to make a wireless network connection when the networks WEP encryption is on. I am using a PCMCIA wireless adapter on an HP notebook running XP SP2. The connection displays that it 'acquiring network address' and that it is not connected every …

Member Avatar for yashwanta
0
132
Member Avatar for melibrarian

Hi All, I'm a librarian working on a project that involves compiling online resources for web creative folks. Because I have little hands-on experience, I figured the best way to find out what is useful to Web Developers is to ask the experts! If you have favorite resources that fall …

0
4
Member Avatar for anshul.dilli

hi plz help me overcome a few errors in my encryption project.... thanks [CODE]#include <iostream.h> #include <stdlib.h> #include <fstream.h> #include <stdio.h> #include <string.h> #include <dos.h> #include <conio.h> char passwrd[6]="",pw[7]; char pass[7],code; void genpassword(); void getpassword(); void doCrypt(char *cool) { int cryp; //the main int this function uses char x; //to …

Member Avatar for anshul.dilli
0
112
Member Avatar for iamthwee

Following this [url]http://support.microsoft.com/kb/301070[/url] So it works fine on text file, but fails on anything like word or excel files. Try it and you'll see! Why? Does it need to read/written in binary. Any help is greatly appreciated.

Member Avatar for MehdiAnis
0
91
Member Avatar for bitRAKE

(Using NASM on Ubuntu 7.10) I'm messing with a simple linear transposition encryption program. It added 5 to each character in the string excluding the linefeed character. I thought I would jumble it a little more by make it add 1 the the first character 2 to the second and …

Member Avatar for bitRAKE
1
8K
Member Avatar for virus220

i am using vb.net as my front end and excel and access as my backend for databases i have the connectivity code of both ends data retrieving has been done but now i need to encrypt the data in my database and then retrieve it and decrypt it in vb.net …

Member Avatar for shomic.goyal
0
142
Member Avatar for Alexbeav

Hi all this is the 2nd exercise I can't seem to figure out how to do.Exercise goes like this : One method of encryption is this : We pair the letters of the alphabet to the numbers 0-25. Assuming we have a text "T" and a keyword "K" of "V" …

Member Avatar for Dave Sinkula
0
145
Member Avatar for rajveerg22

Thaks in advance for reading my thread.... my boss given meonly five days time to implement 128-bit encryption code... and we prepared some code in java... and thats not giving the exact ouput of encrypted and decrypted text .... Please Provide any 128-bit Encryption code snippets so that i can …

0
56
Member Avatar for rajveerg22

Thaks in advance for reading my thread.... Just now we have decided that have to implement 128-bit encryption code... and we prepared some code in java... and thats not giving the exact ouput of encrypted and decrypted text .... Please Provide any 128-bit Encryption code snippets so that i can …

0
55
Member Avatar for redaqen

Hey guys, I'm a long time lurker, and first time poster. Please be kind. Anyways, for one of my classes, Principles of Algorithm Design 1, we had an assignment where we had to create a program that would encrypt and then de-encrypt a message by offsetting the characters by a …

Member Avatar for Narue
0
196
Member Avatar for asgs

Hey frenz, I recently messed up with my system..... A few months ago i encrypted certain files and folders on one of my NTFS partitioned drives E: in XP Pro..... I don't know that all encryption keys and certificates will be stored in my (user) profile and in my OS-installed …

Member Avatar for OmarSH
0
115
Member Avatar for bops

Some time ago I had to re-install my entire operating system due to some error. I used a program called winternals to save all of my files to a backup since my OS would not boot. Before this had happened I had some files that where "Encrypted to secure content" …

Member Avatar for OmarSH
0
196
Member Avatar for bondo

I've got a toshiba laptop that won't accept the passphrase to connect to my wireless network. It gives me a error about that the key has to be 24bit encryption or something else. I'm not sure what this is telling me. My other computers in my house connect to the …

0
64
Member Avatar for bizmey

dear all, i need your help regarding to my final year project title. i was proposed a topic which is named cleversecure encryption system to my supervisor but he said that my system is too simple. it is because i only plan to do the encryption and decryption on the …

Member Avatar for Ramy Mahrous
0
118
Member Avatar for muzammilpn

Can someone provide me with VB code of International Data Encryption Algo IDEA. I will be using it for cryptanalysis.

1
52
Member Avatar for bops

Hey, I want to write a function with the following signature - BOOL checkPassword( char * input ); In this function I want to be able to check this password against the stored windows password in the SAM database. I'm completely new to this idea, so I would like to …

Member Avatar for Ancient Dragon
0
105
Member Avatar for bhuvan.vijayv

Recently I made a java servelet program that interacts with the oracle database n performs just the basic operations of data addition and retrieval. My problem is that I want the data to be stored in an encrypted format also can encryption of bitmap files in the database is also …

0
58
Member Avatar for Slade

How do I go about creating a windows application that converts strings to sha1 encrypted? All I want this program to do is have a user type in their password, click a command button "Convert" and have a label come up with the now SHA1 encrypted string. NOTE: THis is …

Member Avatar for taylorjpt
0
647
Member Avatar for hi-hacker

hi :icon_eek: Parents, youth and daughters This file config and r3aea directory sites I want to help break encryption zend :icon_sad: Please If disengagement encryption Please help my site config Encrypted zend ? Help me to lift the encryption zend config and r3aea ? Please :) If disengagement encryption zend …

Member Avatar for hi-hacker
0
377
Member Avatar for quintoncoert

i have a form which i have to protect with a password. this form is called from a user form which does not have any passwords on it. which means anyone can access it. in order to accomplish the security i placed a password in an access database but the …

Member Avatar for quintoncoert
0
94
Member Avatar for tomf

Hello! I have just purchased a Abit Airpace wireless internet card. It works fine, and it gets the internet realy well, but it has RUBBISH download speeds. I use Steam to play my games ([url]www.steampowered.com)[/url], such as Counterstrike Source and Half Life 2, and it is downloading at under 20kb/s! …

Member Avatar for Spriggan
0
103
Member Avatar for kc0arf

Below are the thoughts from a computer professional who has spent the last 10 years supporting Mac, Windows, and Linux computers in a variety of network applications. By no means will this general tips section be exhaustive -- that is what a good book is all about. I am also …

Member Avatar for dragonlady9947
1
633
Member Avatar for MrMan2787

i am trying to write a program that takes information from a file and reads it and then does some kind of encryption, simple as adding one to it I have it reading the file, but how would i go about readings the characters as int's and then adding a …

Member Avatar for Ancient Dragon
0
105
Member Avatar for WiFi-Owl

All We are looking for people with Cisco Wireless Access Points who are interested in beta testing software that will produce Security reports for Audits and Compliance. The reports test compliance with PCI DSS requirements: 11.1 Detects rogue APs 3.4 Shows encryption used in APs 4.1.1 Shows dates of last …

0
62
Member Avatar for campkev

I am trying to write an interface to another vendor. There spec requires the use of cast-128 encryption. I am trying to use an open-source version but am not getting the same results that they do. I think it has to do with the s-Boxes. I think that they may …

0
64
Member Avatar for Metalpalo

Hello I'm looking for some free cryptography library under VB6, concret 3DES encryption. Can somebody hep me ? Thanks

Member Avatar for ithelp
0
45
Member Avatar for the juice

i am new to c++ and have been asked to create an encryption programme using the zig zag (rail fence) cipher. this will be saved to a file, and when it is opened the file will be decrypted. a user will type in a message. The message is then read …

Member Avatar for Salem
0
773
Member Avatar for virendra_sw

Hi All, I am getting problem in installing application on Vista platform. We have one application named "Computerease"which correctly installed on all the machine except vista with creating proper shortcuts on desktop.However the application installtion completed in Vista machine but shortcut is not created on desktop and after completion of …

Member Avatar for virendra_sw
0
134
Member Avatar for Lance Wassing

Hello Everyone, I have started creating an open source database architecture, with a waa, and much more. There is many features that can blow SQL, and access out of the water, including but not limited to: 1) true multi-dimensionalism, 2) array fields 3)File embedding, of 30 or more formats.. 4) …

Member Avatar for Infarction
0
204
Member Avatar for WiFi-Owl

All We are looking for people with Cisco Access Points who are interested in beta testing software that will produce Security reports for Audits and Compliance. You will get these reports: [LIST] [*] Show Encryption Used in APs [*] Show changes in security settings in APs [*] Show when WEP …

Member Avatar for DimaYasny
0
114
Member Avatar for tan_vir
Member Avatar for ~s.o.s~
0
54
Member Avatar for fireboy63

Hey everyone...here's a preemptive "thank you" for any help you can give. I just bought a Linksys WRT54G router, which I run cable internet through on a computer running Windows XP Professional. On a computer in the next room, I have connected a NETGEAR MA111 USB device (to receive the …

Member Avatar for jbop15
0
205
Member Avatar for Lazaro Claiborn

When I first became interested in network security I read about data encryption, specifically encryption algorithms associated with the Session layer of the OSI model. I had an idea and although doesn't directly pertain to network communication security, it can however be compared with the Public\Private key distribution concept. My …

Member Avatar for Lazaro Claiborn
0
144
Member Avatar for hellokitkat

Hello to all programmers: I have been working on the following program but I am encountering some difficulties any help whatsoever would be greatly appreciated. My instructions are: Write a c++ program, 1. Prompts the user for a choice of encrypt or decrypt, prompts for the input and output filenames …

Member Avatar for John A
0
493
Member Avatar for hellokitkat

Hello to all [URL="http://www.daniweb.com/techtalkforums/post318952.html#"]programmers[/URL]: I have been working on the following [URL="http://www.daniweb.com/techtalkforums/post318952.html#"]program[/URL] but I am encountering some difficulties any help whatsoever would be greatly appreciated. My difficulty is that when I run the program, it does not perform the encryption nor decryption on the file I type in. Is something …

Member Avatar for Salem
0
152
Member Avatar for kugan80

can anyone help me? How to encryption/decryption algorithm for mdb table? Private Sub cmdSearch_Click() On Error Resume Next HighlightText txtSearch, True If txtSearch.Text = "" Then Else Dim con As Connection Dim rs As Recordset On Error Resume Next Set con = CreateObject("adodb.connection") con.Open "Driver={Microsoft Access Driver (*.mdb)};DBQ=" & App.Path …

Member Avatar for kugan80
0
158
Member Avatar for Dortz

Home Basic: Home Basic is intended for budget users not requiring advanced media support for home use. The Windows Aero theme with translucent effects will not be included with this edition. Home Basic will support up to 8 GB of physical memory. Price: 200$, upgrade: 100$ Home Premium: Containing all …

Member Avatar for jbennet
0
332
Member Avatar for jeepj27

Hi All - Forgive this naieve questions but I am not sure of the answer and know someone can help on Daniweb! If I choose to ENCRYPT my HTML pages (for whole page) will the encryption scrample the text that the robots or crawlers will find? That is - obviously …

Member Avatar for MidiMagic
0
169
Member Avatar for herykl

I've been banging my head for a bit now trying to figure out why this isn't encrypting properly. Unfortunately, there are not a lot of resources out there for using wincrypt.h. I prefer to use the windows api's over having to use some external library to do the same task. …

0
55
Member Avatar for hkinser

Near completing my password storage program and down to the part where I would like to write the listview data to an XML file (for later encryption). If writing to an XML file won't work, then just outputting the data to a regular text file will work in the interim. …

Member Avatar for iamthwee
0
92
Member Avatar for ikhalid

i am integrating Encryption/Decryption Software (PGP) with VB6 COM Add-In application.....i need to find out the version of "PGP" software programmatically....much obliged if somebody help me out.....Simply speaking how can we find version of a "Software" installed on our computer using VB6 programming. Thanx

Member Avatar for ~s.o.s~
0
93
Member Avatar for Mushy-pea

Hello everyone. I had an idea for an encryption system based on irrational numbers a while ago and wrote down a rough specification. It is basically like this: 1. Decide on an irrational number to define the encryption, e.g. pie, e or an irrational n root of a number. It …

Member Avatar for Rashakil Fol
0
64
Member Avatar for ashneet

I made a small program which will encrypt my files using xor encryption method. It work but to encrypt 11MB file it take like 20 mins. any suggestions on how to make it faster would be nice. This is the function that encrypt (this is a thread): [code] [COLOR=#0000ff][COLOR=#0000ff]public[/COLOR][COLOR=#0000ff]void[/COLOR][COLOR=#000000] encrypt()[/COLOR] …

Member Avatar for Lord Soth
0
116
Member Avatar for Conticreative

Hi, sorry for the new thread on a topic that has already 2 of them closely spaced. My issue appears to be different enough to warrant a new post. I have a XP Pro desktop with a D-link DI-624 revision A and the firmaware that came with it - there …

Member Avatar for Dukane
0
68

The End.