by: |
last post by:
I'm curious how these two functions work together (when crypt() uses a md5
algo). Currently I know they will produce different output; is this due to
the salt being used behind-the-scenes in md5()?...
|
by: Paul Fournier |
last post by:
Just wondering, does anyone know if the crypt() function in PHP will always
return a 34 character string if not salted? I want to encrypt my user's
passwords into a database and I want to make...
|
by: Marco Herrn |
last post by:
I want to use a crypt function to store crypted passwords. These will be
used to verify mail-user access. Now the crypt() function from the
module crypt is only significant for the first 8...
|
by: Bart Nessux |
last post by:
Does Python have anything similar to Perl's Crypt::PasswdMD5???
I read about the crypt module... but it only does DES. Any plans to add
md5 or other digests to it in the future?
|
by: AdrianK |
last post by:
I'm having a lotta problems installing Crypt::RSA on Linux Linux gogol
2.4.17smt-mono using perl5.005_03.
Main problem at present is that all the tests fail with Crypt::Primes
When I run a trace...
|
by: John Bergstrom |
last post by:
Hello everyone!
I wrote a simple perl program to encrypt a string using
Crypt::OpenSSL::RSA.
Everything as described in the module documentation. The public key
is a valid X.509 encrypted...
|
by: aars |
last post by:
Hello all,
I am creating a user administration system where system administrator
can activate services for a user, like webspace, a mail account or a
subdomain.
I now want to create a...
|
by: steve |
last post by:
Hi,
I have a set of passwords encrypted using perl’s crypt, from a perl
forum being migrated to php.
I like to bring them into php, and use them without changing them.
How do I emulate perl’s...
|
by: Kenjis Kaan |
last post by:
I would like to use the crypt function in a Win32 (ie. C program using
Visual C++ 6.0 compiler). I wrote a little program to see if it will
link but it didn't. So I guess maybe the function isn't...
|
by: amygdala |
last post by:
Hi,
Does anybody now of a custom crypt function that implements sha1? The thing
I like about crypt is that I don't have to worry about (re)generating salt
when querying the database. Or are...
|
by: taylorcarr |
last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
|
by: Charles Arthur |
last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
|
by: ryjfgjl |
last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
|
by: emmanuelkatto |
last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud.
Please let me know.
Thanks!
Emmanuel
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: Sonnysonu |
last post by:
This is the data of csv file
1 2 3
1 2 3
1 2 3
1 2 3
2 3
2 3
3
the lengths should be different i have to store the data by column-wise with in the specific length.
suppose the i have to...
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
|