1,159 Topics
![]() | |
Hi Friends, I am vikas from india , i have just now joined the community and i am very happy to find all technical gurus in the community , i am pursuing engneering in electronics and communication (4 year cource). i have some problem and i hope here i will … | |
I am trying my first encryption program and I want to convert the letters to numbers then do an equation to change the numbers. Then when the encryption is done it should be a bunch of random numbers then the decryption should come back to normal (what the user input … | |
Hi guys, I am working on an encryption/decryption vigenere cipher at present. Ive been reading and writing to text files using integer arrays and then modding them together in order to get the full ASCII character set. the problem i am facing is, when i am encrypting, the spaces dissapear … | |
Hi people, I am wantng to read a key in as an argument that will duplicate itself to the exact character length as the plaintext , read from a text file. E.g. key = deceptive Then i need it to repeat until the end of the plaintext file length as … | |
Sorry this is kind of long. I am trying to get my notebook (a DELL C610 Latitude) to connect to the internet via a WBR-1310 D-Link wireless router. I also have a Dell mini tower optiplex gxa 333Mhz P2 wired into LAN1. Both PC's are running win2kproSP4 (legal versions). I … | |
ok, i'm trying to do a simple DES program... and i need help to do the permutation that's my first simple code, i need to chance the order of bits of 3 chars i have the table table={11,15,3,7,12,5,8,17,24,21,4,1,6,9,2,13,10,14,23,18,20,19,22,16} //24 bits i have idea how to do about 8 bits[a simple … | |
Hi, I am experiencing a problem when trying to make a wireless network connection when the networks WEP encryption is on. I am using a PCMCIA wireless adapter on an HP notebook running XP SP2. The connection displays that it 'acquiring network address' and that it is not connected every … | |
Hi All, I'm a librarian working on a project that involves compiling online resources for web creative folks. Because I have little hands-on experience, I figured the best way to find out what is useful to Web Developers is to ask the experts! If you have favorite resources that fall … | |
hi plz help me overcome a few errors in my encryption project.... thanks [CODE]#include <iostream.h> #include <stdlib.h> #include <fstream.h> #include <stdio.h> #include <string.h> #include <dos.h> #include <conio.h> char passwrd[6]="",pw[7]; char pass[7],code; void genpassword(); void getpassword(); void doCrypt(char *cool) { int cryp; //the main int this function uses char x; //to … | |
![]() | Following this [url]http://support.microsoft.com/kb/301070[/url] So it works fine on text file, but fails on anything like word or excel files. Try it and you'll see! Why? Does it need to read/written in binary. Any help is greatly appreciated. |
(Using NASM on Ubuntu 7.10) I'm messing with a simple linear transposition encryption program. It added 5 to each character in the string excluding the linefeed character. I thought I would jumble it a little more by make it add 1 the the first character 2 to the second and … | |
i am using vb.net as my front end and excel and access as my backend for databases i have the connectivity code of both ends data retrieving has been done but now i need to encrypt the data in my database and then retrieve it and decrypt it in vb.net … | |
Hi all this is the 2nd exercise I can't seem to figure out how to do.Exercise goes like this : One method of encryption is this : We pair the letters of the alphabet to the numbers 0-25. Assuming we have a text "T" and a keyword "K" of "V" … | |
Thaks in advance for reading my thread.... my boss given meonly five days time to implement 128-bit encryption code... and we prepared some code in java... and thats not giving the exact ouput of encrypted and decrypted text .... Please Provide any 128-bit Encryption code snippets so that i can … | |
Thaks in advance for reading my thread.... Just now we have decided that have to implement 128-bit encryption code... and we prepared some code in java... and thats not giving the exact ouput of encrypted and decrypted text .... Please Provide any 128-bit Encryption code snippets so that i can … | |
Hey guys, I'm a long time lurker, and first time poster. Please be kind. Anyways, for one of my classes, Principles of Algorithm Design 1, we had an assignment where we had to create a program that would encrypt and then de-encrypt a message by offsetting the characters by a … | |
Hey frenz, I recently messed up with my system..... A few months ago i encrypted certain files and folders on one of my NTFS partitioned drives E: in XP Pro..... I don't know that all encryption keys and certificates will be stored in my (user) profile and in my OS-installed … | |
Some time ago I had to re-install my entire operating system due to some error. I used a program called winternals to save all of my files to a backup since my OS would not boot. Before this had happened I had some files that where "Encrypted to secure content" … | |
I've got a toshiba laptop that won't accept the passphrase to connect to my wireless network. It gives me a error about that the key has to be 24bit encryption or something else. I'm not sure what this is telling me. My other computers in my house connect to the … | |
dear all, i need your help regarding to my final year project title. i was proposed a topic which is named cleversecure encryption system to my supervisor but he said that my system is too simple. it is because i only plan to do the encryption and decryption on the … | |
Can someone provide me with VB code of International Data Encryption Algo IDEA. I will be using it for cryptanalysis. | |
Hey, I want to write a function with the following signature - BOOL checkPassword( char * input ); In this function I want to be able to check this password against the stored windows password in the SAM database. I'm completely new to this idea, so I would like to … | |
Recently I made a java servelet program that interacts with the oracle database n performs just the basic operations of data addition and retrieval. My problem is that I want the data to be stored in an encrypted format also can encryption of bitmap files in the database is also … | |
How do I go about creating a windows application that converts strings to sha1 encrypted? All I want this program to do is have a user type in their password, click a command button "Convert" and have a label come up with the now SHA1 encrypted string. NOTE: THis is … | |
hi :icon_eek: Parents, youth and daughters This file config and r3aea directory sites I want to help break encryption zend :icon_sad: Please If disengagement encryption Please help my site config Encrypted zend ? Help me to lift the encryption zend config and r3aea ? Please :) If disengagement encryption zend … | |
i have a form which i have to protect with a password. this form is called from a user form which does not have any passwords on it. which means anyone can access it. in order to accomplish the security i placed a password in an access database but the … | |
Hello! I have just purchased a Abit Airpace wireless internet card. It works fine, and it gets the internet realy well, but it has RUBBISH download speeds. I use Steam to play my games ([url]www.steampowered.com)[/url], such as Counterstrike Source and Half Life 2, and it is downloading at under 20kb/s! … | |
Below are the thoughts from a computer professional who has spent the last 10 years supporting Mac, Windows, and Linux computers in a variety of network applications. By no means will this general tips section be exhaustive -- that is what a good book is all about. I am also … | |
i am trying to write a program that takes information from a file and reads it and then does some kind of encryption, simple as adding one to it I have it reading the file, but how would i go about readings the characters as int's and then adding a … | |
All We are looking for people with Cisco Wireless Access Points who are interested in beta testing software that will produce Security reports for Audits and Compliance. The reports test compliance with PCI DSS requirements: 11.1 Detects rogue APs 3.4 Shows encryption used in APs 4.1.1 Shows dates of last … | |
I am trying to write an interface to another vendor. There spec requires the use of cast-128 encryption. I am trying to use an open-source version but am not getting the same results that they do. I think it has to do with the s-Boxes. I think that they may … | |
Hello I'm looking for some free cryptography library under VB6, concret 3DES encryption. Can somebody hep me ? Thanks | |
i am new to c++ and have been asked to create an encryption programme using the zig zag (rail fence) cipher. this will be saved to a file, and when it is opened the file will be decrypted. a user will type in a message. The message is then read … | |
Hi All, I am getting problem in installing application on Vista platform. We have one application named "Computerease"which correctly installed on all the machine except vista with creating proper shortcuts on desktop.However the application installtion completed in Vista machine but shortcut is not created on desktop and after completion of … | |
Hello Everyone, I have started creating an open source database architecture, with a waa, and much more. There is many features that can blow SQL, and access out of the water, including but not limited to: 1) true multi-dimensionalism, 2) array fields 3)File embedding, of 30 or more formats.. 4) … | |
All We are looking for people with Cisco Access Points who are interested in beta testing software that will produce Security reports for Audits and Compliance. You will get these reports: [LIST] [*] Show Encryption Used in APs [*] Show changes in security settings in APs [*] Show when WEP … | |
message is: :mmZ\dxZmx]Zpgy encryption method is based upon ASCII codes:?: | |
Hey everyone...here's a preemptive "thank you" for any help you can give. I just bought a Linksys WRT54G router, which I run cable internet through on a computer running Windows XP Professional. On a computer in the next room, I have connected a NETGEAR MA111 USB device (to receive the … | |
When I first became interested in network security I read about data encryption, specifically encryption algorithms associated with the Session layer of the OSI model. I had an idea and although doesn't directly pertain to network communication security, it can however be compared with the Public\Private key distribution concept. My … | |
Hello to all programmers: I have been working on the following program but I am encountering some difficulties any help whatsoever would be greatly appreciated. My instructions are: Write a c++ program, 1. Prompts the user for a choice of encrypt or decrypt, prompts for the input and output filenames … | |
Hello to all [URL="http://www.daniweb.com/techtalkforums/post318952.html#"]programmers[/URL]: I have been working on the following [URL="http://www.daniweb.com/techtalkforums/post318952.html#"]program[/URL] but I am encountering some difficulties any help whatsoever would be greatly appreciated. My difficulty is that when I run the program, it does not perform the encryption nor decryption on the file I type in. Is something … | |
can anyone help me? How to encryption/decryption algorithm for mdb table? Private Sub cmdSearch_Click() On Error Resume Next HighlightText txtSearch, True If txtSearch.Text = "" Then Else Dim con As Connection Dim rs As Recordset On Error Resume Next Set con = CreateObject("adodb.connection") con.Open "Driver={Microsoft Access Driver (*.mdb)};DBQ=" & App.Path … | |
Home Basic: Home Basic is intended for budget users not requiring advanced media support for home use. The Windows Aero theme with translucent effects will not be included with this edition. Home Basic will support up to 8 GB of physical memory. Price: 200$, upgrade: 100$ Home Premium: Containing all … | |
Hi All - Forgive this naieve questions but I am not sure of the answer and know someone can help on Daniweb! If I choose to ENCRYPT my HTML pages (for whole page) will the encryption scrample the text that the robots or crawlers will find? That is - obviously … | |
I've been banging my head for a bit now trying to figure out why this isn't encrypting properly. Unfortunately, there are not a lot of resources out there for using wincrypt.h. I prefer to use the windows api's over having to use some external library to do the same task. … | |
Near completing my password storage program and down to the part where I would like to write the listview data to an XML file (for later encryption). If writing to an XML file won't work, then just outputting the data to a regular text file will work in the interim. … ![]() | |
i am integrating Encryption/Decryption Software (PGP) with VB6 COM Add-In application.....i need to find out the version of "PGP" software programmatically....much obliged if somebody help me out.....Simply speaking how can we find version of a "Software" installed on our computer using VB6 programming. Thanx | |
Hello everyone. I had an idea for an encryption system based on irrational numbers a while ago and wrote down a rough specification. It is basically like this: 1. Decide on an irrational number to define the encryption, e.g. pie, e or an irrational n root of a number. It … | |
I made a small program which will encrypt my files using xor encryption method. It work but to encrypt 11MB file it take like 20 mins. any suggestions on how to make it faster would be nice. This is the function that encrypt (this is a thread): [code] [COLOR=#0000ff][COLOR=#0000ff]public[/COLOR][COLOR=#0000ff]void[/COLOR][COLOR=#000000] encrypt()[/COLOR] … | |
Hi, sorry for the new thread on a topic that has already 2 of them closely spaced. My issue appears to be different enough to warrant a new post. I have a XP Pro desktop with a D-link DI-624 revision A and the firmaware that came with it - there … ![]() |
The End.