1,243 Topics

Member Avatar for
Member Avatar for Ahsan_38

Encrypt Sensitive Data: Use encryption to protect sensitive business data, both at rest and in transit, to prevent unauthorized access.

Member Avatar for IS-92
-2
51
Member Avatar for IS-92

Control strings can be considered as an alternative to asymmetric encryption. **Unlike solutions that use public and private secret keys, here, session cryptographic protocols are exchanged implicitly.** In practice, a control string allows both parties (*sender and recipient*) to independently generate a symmetric set of cryptographic primitives (*encryption algorithm, encryption …

Member Avatar for Ritikadas
1
310
Member Avatar for happygeek

A VPN, or Virtual Private Network to be formal, is a method of creating an encrypted data tunnel across the Internet from your device to a destination server. Although savvy home users and enterprises will operate their own VPNs (business-grade routers provide this functionality) for most folk, a VPN comes …

Member Avatar for Cliproxy
6
2K
Member Avatar for Bam_391

In today's digital age, businesses rely heavily on customer data to enhance their operations, personalize experiences, and drive growth. However, the increasing importance of customer data brings along significant cybersecurity challenges. Protecting this data is not only a legal and ethical obligation but also crucial for maintaining customer trust and …

Member Avatar for WilliamOG
2
186
Member Avatar for Johannes C.

**As quantum computing slowly edges closer to disrupting encryption standards, governments are imposing export bans with peculiar undertones. This article explores the reasons behind these restrictions, the basics of quantum computing, and why we need quantum-resistant encryption to secure our digital future. ** ![quantum-end-to-encryption.jpg](https://static.daniweb.com/attachments/4/085ad9800754573666c8e40f1272bd2b.jpg) ## Nations Putting Export Bans on …

0
226
Member Avatar for premdparmar

I'm facing an SSL-related issue in Firefox with the 'SSL_ERROR_NO_CYPHER_OVERLAP' error. It seems there's a problem with encryption algorithms between the browser and the server, hindering the establishment of a secure connection. Any guidance or solutions would be appreciated.

Member Avatar for Dani
1
184
Member Avatar for Initsky

When choosing the best SMTP (Simple Mail Transfer Protocol) server service provider, consider the following factors. First, reliability and uptime are crucial, ensuring your emails are delivered consistently. Look for providers with a track record of high availability. Second, scalability is important to accommodate your growing email volume. Third, check …

-2
20
Member Avatar for BDove

I've been using an OpenVPN service for 2 years now, but it seems it has become too popular and now its very slow and sometimes I get computer UDP attacks from different countries and some sort of attacks that my firewall classified as SQL injection attacks or something like that. …

Member Avatar for Walter_18
0
274
Member Avatar for Mindmade

Hi Guyz, Why is Include high-grade encryption and a reliable SSL in your list of mobile app development security practices is important?

Member Avatar for rproffitt
-1
17
Member Avatar for Initsky

An exceptional SMTP (Simple Mail Transfer Protocol) server is crucial for efficient email communication. Here are the top 10 essential features of such a server: Reliability: An exceptional SMTP server must be highly reliable, ensuring that emails are delivered promptly and without loss. Security: Robust security measures, including encryption and …

Member Avatar for redplanetpk
-2
44
Member Avatar for Initsky

There are several factors to consider when choosing a reliable SMTP server with responsive performance and exceptional customer support. Here are some of the most important ones: Reliability: The SMTP server you choose should be highly reliable and able to handle large volumes of email traffic without experiencing downtime or …

0
46
Member Avatar for Destini_1

Wv4gJyLguPzuClVexggQO6r0uLUNI3mMtwXH8yG9wd)jSMjXNbSLrrxUsN39DwmtjRlthSS24axWyEZYFk2u7EJnp2tKyB2CASYri6)rui)9iJidseE6phmADVAJKeCmZZq)vB)ybdnT3Ji5kGafyYuazcv9zim33k

Member Avatar for hes8
0
125
Member Avatar for MagnusTheRed90

I have a question about encryption. So I have a code sample that has a key size being chosen, something like 32 bits or something, and I am basically either filling the key size buffer with the password and then zeroes, or null bytes, or a word repeated over and …

Member Avatar for adajames
0
142
Member Avatar for NewAccount

Hello everyone, I wrote data arrays at the end of the exe with delimiter. After I compiled, the app it didn't work on Chinese Windows, only on English, I want to configure the app to work on Chinese windows as well, I know it will work if I change the …

Member Avatar for rproffitt
1
309
Member Avatar for Bree_1

Need encrypted voter database for a presidential election in Libya, first of its kind I need an army of programmers or just a few spears to team up

Member Avatar for rproffitt
0
82
Member Avatar for Sagar_9

Hi All, Good Day. Is there any sample code in JAVA for generating encrypted block PIN in the similar fashion as the Hardware Security Module Regards, Sagar

Member Avatar for Sagar_9
0
114
Member Avatar for MagnusTheRed90

Hello, so I have a more complex class in another file, but I have duplicated my trouble on a simpler class which I will show to you. I am trying to base64 encode a path via cipher text, either a good idea or a bad idea. Anyway, I am noticing …

Member Avatar for JamesCherrill
0
109
Member Avatar for Athar_3

Create a Client/Server using DatagramSocket and DatagramPacket Programming and using DiffieHellman (1024) as encryption algorithm.

Member Avatar for rproffitt
0
53
Member Avatar for tinstaafl

Basically this scheme uses variable offsets, but it generates the bytes on the fly. They aren't truly random, but there aren't any obvious patterns and the output passes all the NIST tests. Since a simple password can be used to do the de/encryption it is much easier to hand off …

Member Avatar for JamesCherrill
2
347
Member Avatar for dltang1999
Member Avatar for Mr.M

Hi DW. Well I'm very much interested in the data protection and also giving the best privacy to the public where we protect your passwords. I've seen something that Firefox had introduced to their browsers with also their Apps. This is called LockWise which is a tool to sync your …

0
1K
Member Avatar for waheed saeed

write a c++ program in which you are required to devolpe a c++ program which encrypts the data of the user after entering his/her message in the character array the user will enter a number a new message will be generated by adding each letter to the number entered by …

Member Avatar for rproffitt
0
306
Member Avatar for Zac18

In this modern and complex World Wide Web, a well planned SEO strategy is essential. An appropriate digital marketing strategy can help you to establish your reach to your targeted audience and exploit the untapped market. Google algorithms are improving and advancing with each passing day which means that a …

Member Avatar for Dani
-1
381
Member Avatar for Aina_1

Hi. Im doing a login form with decryption. So i did a modification to my login code for decryption. Before i did the decryption, the login form is functioning well. But after i edit it to insert decryption code it suddenly cannot connect to database. Im still a begginer in …

Member Avatar for tinstaafl
1
1K
Member Avatar for Xozz

Hello. I have a question: I have a portable harddisc, with files on it. Now I want to encrypt a certain folder on it. It contains a couple of files which take some megs. What's the best way to do this? Thanks in advance, Leon

Member Avatar for dave.anderton.2753
0
352
Member Avatar for Mr.M

As web developers we do take seriously the security of our end users by applying a hash method on their passwords before storing it to the database so should our database be hacked we know that our end user passwords are secure. But what about the browser remembered passwords on …

0
2K
Member Avatar for Dani

It is with deep regret that I inform everyone that it just very recently came to my attention that the DaniWeb database was breached in December 2015. Over a million user profiles, including email addresses and IP addresses, were stolen. Logins and passwords were protected through an additional security layer …

Member Avatar for Alexander_17
3
4K
Member Avatar for JustinRunyon

Hello, have the following program code: #include <stdio.h> #include <stdlib.h> #include <ctype.h> int main (void) { char c; while( (c = getchar()) != '\n') { putchar(c); } putchar ('\n'); return EXIT_SUCCESS; } At the moment he reads in entered characters and outputs them again. I should [write](https://prowritingservice.com/write-my-essay/) it so that …

Member Avatar for nullptr
0
255
Member Avatar for JModak

I create a project encrypt and decrypt data in vb.net how to use this code as a function please help it is work only on a textbox i want to send a string value then return encrypt value and when i send encrypt value then send me decrypt value. [Click …

Member Avatar for rproffitt
0
575
Member Avatar for Zohre_1

Hello I'm try to use a hardware to create key for encryption in mobile devices( in a model at first) this is my question: can i get my keys from TPM? If is it possible, how can i do it?

Member Avatar for Zohre_1
0
647
Member Avatar for UK-1991

Hello, just created a code for login using encrypted password method when user is registering at that time i made a passsword encryption script. But the main problem is that when it comes to verify login how do i veryfy the password as that password is saved as encrypted password …

Member Avatar for tejpal_3
0
2K
Member Avatar for overwraith

The following is the correct way to do encryption. I thought it useful to post for various reasons, most particular being the necessity for our companies to have good security controls. This is very important. If anybody has any other good snippets feel free to post. The user class is …

Member Avatar for overwraith
0
470
Member Avatar for Jon_7

I'm trying to just do something fun for the kids in my class. I want to give the top students a USB Drive as a prize that has a link to a whole bunch of fun learning tools. To make that special, I want to be sure the website can't …

Member Avatar for Jon_7
0
748
Member Avatar for abhijeet P

Hello all, I have a code to encrypt data in C# and I want it to b decrypted in Java... following is the C# code [CODE]string Encrypt(string textToEncrypt, string key) { RijndaelManaged rijndaelCipher = new RijndaelManaged(); rijndaelCipher.Mode = CipherMode.CBC; rijndaelCipher.Padding = PaddingMode.PKCS7; rijndaelCipher.KeySize = 0x80; rijndaelCipher.BlockSize = 0x80; byte[] pwdBytes …

Member Avatar for JamesCherrill
0
9K
Member Avatar for QUang_3

I have a web site. http://jimmy.d2g.nu now I put a DISCLAIMER up because I have found a web site that cloned by HTML site. I heard about some kind of code that encrytions fuck I cant spell. Anywho when people view my Source is there is a way to hide …

Member Avatar for pty
0
365
Member Avatar for overwraith

I am trying to write some symmetric cryptography for holding an FtpCredential in the database, unfortunately I am having a few problems, one of which is getting back gobbley gook from a crypto decoder. I have trimmed it down to just the bare minimum code. Please look at the SetPassword …

Member Avatar for overwraith
0
287
Member Avatar for happygeek

Last year, CryptoLocker ransomware [hit the headlines](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/470427/cryptolocker-250k-infections-in-100-days-nets-300000-or-does-it) after infecting hundreds of thousands of computers and encrypting the data, and backups of that data to any connected device, with the promise of decryption on payment of a fee. This kind of IT extortion is profitable for the bad guys as it …

Member Avatar for rproffitt
2
982
Member Avatar for a_10

Hello Everyone, I have developed a DBMS and I want to store the credentials for server, and user name securely so that the users don't have to enter the password to the database EVERY time they start the software. My question is, how would I go about doing this? I …

Member Avatar for rproffitt
0
238
Member Avatar for cainam29

I have a code that send an email but how I can prevent it from always sending everytime my page refreshes. function two_dim_array_to_html_table($arr, $colcomments){ $ret = "<table border='1' width='auto' cellpadding='1px' cellspacing='0px' align='center'>\n"; $ret .= "\t<tr>\n"; foreach($arr[0] as $key => $val){ $ret .= "\t\t<th>".$colcomments[$key]."</th>\n"; } $ret .= "\t</tr>\n"; foreach($arr as $row){ …

Member Avatar for urtrivedi
0
1K
Member Avatar for happygeek

Following the recent ransomware attacks that leveraged the WannaCrypt0r malware and NSA-developed EternalBlue vulnerability exploit, there was [plenty of advice](https://happygeek.com/?p=812) that backup, backup, backup was the best mitigation. Data backups are, of course, an important part of any business continuity strategy. However, what happens when your backups are also encrypted …

Member Avatar for Josh Ross
1
526
Member Avatar for happygeek

What has Schrodinger got to do with the complex and paradoxical concept of quantum computing? The answer is that both Erwin and his hypothetical cat relate directly to this subatomic world. In fact, Schrodinger is often referred to as the father of quantum mechanics. ## Erwin who? ## [Erwin Schrodinger](https://en.wikipedia.org/wiki/Erwin_Schr%C3%B6dinger) …

Member Avatar for dkary555
4
2K
Member Avatar for Thomas_32

I have a lot of simple VBScript files that were encrypted. I have lost the originals. The code still works within the intended platform, but now I need to do some maintenance. I used a free, vendor-supplied utility that compiled the VBS into a plug-in, but I don't know what …

Member Avatar for Reverend Jim
0
534
Member Avatar for Aob

I am having a trouble not knowing how to do a java code that will take user string then encrypt it using Elgamal algorithm as following Elgamal algorithm Pseudo code: - Select Q where Q is a prime number - Select α where α is a primitive root of Q …

Member Avatar for Aob
0
5K
Member Avatar for happygeek

I've had my hands on what is being described as the 'most secure hard drive ever made' for a while now. Such are the advantages of being a well known reporter on all things security I guess, I get to play ahead of the crowd. As the first journalist to …

Member Avatar for AssertNull
1
838
Member Avatar for UI

Friends, Mates, Buddies & Pals, I don't want to google or youtube because there's a lot of bad tutorials rampaging the net. And so, how-about you recommending me some text & video tutorials on: CURL Hashing I really need to learn password hashing. Encrypting & decrypting. And web scraping. :thumbsup: …

Member Avatar for Member #120589
0
165
Member Avatar for Sagar_9

Hello All, I'm currently working on a project which requires me to encrypt multiple text files at one go. I am able to retrieve the name of the files through listfiles() but how am i supposed to pass those files to File variable so that the encrypt method can encrypt …

Member Avatar for Sagar_9
0
2K
Member Avatar for HibaPro

i have this line in my Web.Config <add key="localhost2" value="http:\\0.0.0.0\export\" /> in vb Code: <a href='" & ConfigurationSettings.AppSettings("localhost2") & TransactionNo & "\" & fi.Name & "' target='_blank' >" & fi.Name & "</a>" the Publish URL : http://0.0.0.0/export/803/SingleResult.pdf How i can encrypt the 803 value or prevent the user from change …

Member Avatar for HibaPro
0
252
Member Avatar for Stanley_1

Hi team, Please show me how I can encrypt password and padd it with RSA algorithm. Show in java. Assume key is given.

Member Avatar for JamesCherrill
0
76
Member Avatar for J.C. SolvoTerra

# BlowFish? # BlowFish was the brain child of Bruce Schneier back in 93. Since BlowFish was released to the public domain, Bruce Schneier has released new encryption algorythems, TwoFish and ThreeFish. BlowFish is an increddibly popular and very strong algorythem. Because it conforms to Kerckhoffs's Principal [Explained Here](http://en.wikipedia.org/wiki/Kerckhoffs's_principle), even …

Member Avatar for zen_1
0
1K
Member Avatar for Saluki

With the demise of TruCrypt has any found a good replacement? I have been searching for weeks and have yet to find one that has all the same features.

Member Avatar for pritaeas
0
519

The End.