Here's what I would like to do from with VBA procedure
running in Access 97...
Read a plaintext file on disk (IE, autoexec.bat), encrypt
it and write it to disk (say, c:\encryptd.txt). Recommendations
on the SIMPLEST tools possible to accomplish this. Will
be distributing in A97 runtime environment and do NOT
wish to encounter problems on remote target machines
having REFERENCE issues, etc.
Many thx N advance. 14 2777
MLH <CR**@NorthState.net> wrote in
news:mp********************************@4ax.com: Here's what I would like to do from with VBA procedure running in Access 97...
Read a plaintext file on disk (IE, autoexec.bat), encrypt it and write it to disk (say, c:\encryptd.txt). Recommendations on the SIMPLEST tools possible to accomplish this. Will be distributing in A97 runtime environment and do NOT wish to encounter problems on remote target machines having REFERENCE issues, etc.
Do a FIND for "Visual Basic" on this page: http://userpages.umbc.edu/~mabzug1/cs/md5/md5.html
and see if the options there work. I'd definitely consider just
bundling the MD5 DLL with my runtime app and using its function
directly, assuming the licensing for it allows that.
--
David W. Fenton http://www.bway.net/~dfenton
dfenton at bway dot net http://www.bway.net/~dfassoc
MLH wrote: Will be distributing in A97 runtime environment
HMMOGBWUNAITHOON
On Thu, 27 Oct 2005 20:52:54 -0500, "David W. Fenton"
<dX********@bway.net.invalid> wrote:
MD5 computes a message digest, but is not an encryption technique in
itself.
-Tom. MLH <CR**@NorthState.net> wrote in news:mp********************************@4ax.com :
Here's what I would like to do from with VBA procedure running in Access 97...
Read a plaintext file on disk (IE, autoexec.bat), encrypt it and write it to disk (say, c:\encryptd.txt). Recommendations on the SIMPLEST tools possible to accomplish this. Will be distributing in A97 runtime environment and do NOT wish to encounter problems on remote target machines having REFERENCE issues, etc.
Do a FIND for "Visual Basic" on this page:
http://userpages.umbc.edu/~mabzug1/cs/md5/md5.html
and see if the options there work. I'd definitely consider just bundling the MD5 DLL with my runtime app and using its function directly, assuming the licensing for it allows that.
On Thu, 27 Oct 2005 18:28:11 -0400, MLH <CR**@NorthState.net> wrote: Here's what I would like to do from with VBA procedure running in Access 97...
Read a plaintext file on disk (IE, autoexec.bat), encrypt it and write it to disk (say, c:\encryptd.txt). Recommendations on the SIMPLEST tools possible to accomplish this. Will be distributing in A97 runtime environment and do NOT wish to encounter problems on remote target machines having REFERENCE issues, etc.
Many thx N advance.
1. Nothing is perfect.
2. simplest is use Winzip.
3. Use a different password for every file.
4. Use a long gibberish password.
Now there's an idea. Its certainly cheap enough.
Can I launch a password-based WinZip process
from VBA that will run hidden, read some text file
(MyClearTextFile.txt) and write another file...
c:\WhatEverFileNameIwant.DesiredExtension
?
Any sample code you'd care to share or porint
out?
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx 1. Nothing is perfect. 2. simplest is use Winzip. 3. Use a different password for every file. 4. Use a long gibberish password.
Dunno much about MD5 and would like to ask about the point
you made here. What is the difference between a message
digest and an encrypted message? Would a layman, for instance,
not know the difference?
Better still - what would a text file containing "Hi Tom. How are you
today?" with a CRLF appendage look like if a password of "ABCDE"
was used?
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx MD5 computes a message digest, but is not an encryption technique in itself.
-Tom.
MLH <CR**@NorthState.net> wrote in news:mp********************************@4ax.co m:
Here's what I would like to do from with VBA procedure running in Access 97...
Read a plaintext file on disk (IE, autoexec.bat), encrypt it and write it to disk (say, c:\encryptd.txt). Recommendations on the SIMPLEST tools possible to accomplish this. Will be distributing in A97 runtime environment and do NOT wish to encounter problems on remote target machines having REFERENCE issues, etc.
Do a FIND for "Visual Basic" on this page:
http://userpages.umbc.edu/~mabzug1/cs/md5/md5.html
and see if the options there work. I'd definitely consider just bundling the MD5 DLL with my runtime app and using its function directly, assuming the licensing for it allows that.
On Fri, 28 Oct 2005 09:28:21 -0400, MLH <CR**@NorthState.net> wrote:
A message digest is a short number (in this case 128 bits) that is
unique for this message. But given that digest, you cannot get the
plaintext back.
With an encrypted text, you (presumably) can get the plaintext back.
-Tom. Dunno much about MD5 and would like to ask about the point you made here. What is the difference between a message digest and an encrypted message? Would a layman, for instance, not know the difference?
Better still - what would a text file containing "Hi Tom. How are you today?" with a CRLF appendage look like if a password of "ABCDE" was used? xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
MD5 computes a message digest, but is not an encryption technique in itself.
-Tom.
MLH <CR**@NorthState.net> wrote in news:mp********************************@4ax.com :
Here's what I would like to do from with VBA procedure running in Access 97...
Read a plaintext file on disk (IE, autoexec.bat), encrypt it and write it to disk (say, c:\encryptd.txt). Recommendations on the SIMPLEST tools possible to accomplish this. Will be distributing in A97 runtime environment and do NOT wish to encounter problems on remote target machines having REFERENCE issues, etc.
Do a FIND for "Visual Basic" on this page:
http://userpages.umbc.edu/~mabzug1/cs/md5/md5.html
and see if the options there work. I'd definitely consider just bundling the MD5 DLL with my runtime app and using its function directly, assuming the licensing for it allows that.
Gotcha. Thx very much. I like polite person's idea.
Dunno if you looked at it. My security objective is
about as important as locking up shed if you keep
some costly tools in it. That is, I'll spring for a pad-
lock - but I'm not going to buy a used, walk-in bank
vault.
Really, I could write a routine to shuffle and cut the
string a few times - like a deck of cards. Honestly,
if I found example code posted that doessomething
like that - I'd probably just go with it.
MLH <CR**@NorthState.net> wrote in
news:72********************************@4ax.com: Gotcha. . . .
Tom is simply wrong.
See http://aspnet.4guysfromrolla.com/articles/103002-1.aspx under
the topic heading "MD5 Encryption - A Brief Summary" for an
explanation of how MD5 encruption is used.
. . . Thx very much. I like polite person's idea. Dunno if you looked at it. My security objective is about as important as locking up shed if you keep some costly tools in it. That is, I'll spring for a pad- lock - but I'm not going to buy a used, walk-in bank vault.
MD5 encyrption is *exactly* what you need.
Really, I could write a routine to shuffle and cut the string a few times - like a deck of cards. Honestly, if I found example code posted that doessomething like that - I'd probably just go with it.
MD5 encryption is exactly what you need.
--
David W. Fenton http://www.bway.net/~dfenton
dfenton at bway dot net http://www.bway.net/~dfassoc
You can, (I think you need to buy an extra bit from WINZIP)
but then it isn't any easier than using other encryption s/w,
sorry I misread your original request
On Fri, 28 Oct 2005 09:22:35 -0400, MLH <CR**@NorthState.net> wrote: Now there's an idea. Its certainly cheap enough. Can I launch a password-based WinZip process from VBA that will run hidden, read some text file (MyClearTextFile.txt) and write another file... c:\WhatEverFileNameIwant.DesiredExtension ?
Any sample code you'd care to share or porint out? xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx 1. Nothing is perfect. 2. simplest is use Winzip. 3. Use a different password for every file. 4. Use a long gibberish password.
On Fri, 28 Oct 2005 15:56:38 -0500, "David W. Fenton"
<dX********@bway.net.invalid> wrote:
The message digest is a 128-bit number. It simply cannot hold all the
information a large plaintext does. It therefore does not encrypt the
plaintext (in the sense that it can be decrypted).
-Tom. MLH <CR**@NorthState.net> wrote in news:72********************************@4ax.com :
Gotcha. . . .
Tom is simply wrong.
See http://aspnet.4guysfromrolla.com/articles/103002-1.aspx under the topic heading "MD5 Encryption - A Brief Summary" for an explanation of how MD5 encruption is used.
. . . Thx very much. I like polite person's idea. Dunno if you looked at it. My security objective is about as important as locking up shed if you keep some costly tools in it. That is, I'll spring for a pad- lock - but I'm not going to buy a used, walk-in bank vault.
MD5 encyrption is *exactly* what you need.
Really, I could write a routine to shuffle and cut the string a few times - like a deck of cards. Honestly, if I found example code posted that doessomething like that - I'd probably just go with it.
MD5 encryption is exactly what you need.
Tom van Stiphout <no*************@cox.net> wrote in
news:kb********************************@4ax.com: The message digest is a 128-bit number. It simply cannot hold all the information a large plaintext does. It therefore does not encrypt the plaintext (in the sense that it can be decrypted).
I don't know where you're getting this bit about message digests.
However, I re-read what MLH wanted, and he needs 2-way encryption,
so it wouldn't work, as MD5 is only 1-way.
--
David W. Fenton http://www.bway.net/~dfenton
dfenton at bway dot net http://www.bway.net/~dfassoc
MLH wrote: Gotcha. Thx very much. I like polite person's idea. Dunno if you looked at it. My security objective is about as important as locking up shed if you keep some costly tools in it. That is, I'll spring for a pad- lock - but I'm not going to buy a used, walk-in bank vault.
Really, I could write a routine to shuffle and cut the string a few times - like a deck of cards. Honestly, if I found example code posted that doessomething like that - I'd probably just go with it.
A routine to do a "Caesar cipher" is simple to write. This is definitely
not high-end security, but it will keep casual eyes from seeing anything
of value.
This is totally untested and sleazy code, but maybe it will give you
some ideas:
==== Code Begin
Function Encrypt(SomeText As String) As String
' Loop through the input, shifting each character's ASCII value
Dim i As Long
Dim tmp As String
For i = 1 To Len(SomeText)
tmp = tmp + Shift(Mid(SomeText, i, 1))
Next i
Encrypt = tmp
End Function
Function Shift(SomeChar As String) As String
' Shift the input character's ASCII value by 17
' but only if its ASCII value is in [32..126]
Dim n As Integer
n = Asc(SomeChar)
If n >= 32 And n <= 126 Then
n = n + 17
If n > 126 Then n = n - 126 + 32
Shift = Chr(n)
Else
Shift = SomeChar
End If
End Function
==== Code End
? encrypt ("Smartin")
d~r%'z!
The procedure to reverse the "encryption" would be pretty simple to do.
--
Smartin This thread has been closed and replies have been disabled. Please start a new discussion. Similar topics
by: Phil Palmieri |
last post by:
Im using md5 to encrypt and decrypt plain text, this works fine...
When i try to run the same function on a binary file, it does not
decrypt correctly. Is there a way to encrypt binary files...
|
by: Ray Cassick \(Home\) |
last post by:
Ok, time to ask the question here.. I have been battling over this one for
sometime now and just have to ask it.
I have created a few classes that I use to act a security keys. These
classes get...
|
by: Mike Cronin via DotNetMonster.com |
last post by:
Hi there,
Can anyone tell me what level of encryption is used when making an HTTPS
POST request through an instance of the System.Net.HttpWebRequest object?
Thanks much in advance!
Mike...
|
by: helmut woess |
last post by:
Hi,
has anybody knowledge about the safetyness of encrypting stored procs in
SQL-Server 2005 using WITH ENCRYPTION? Or can they be hacked with the same
old tools which exists for SQL 2000?
...
|
by: Bonj |
last post by:
I was in need of an encryption algorithm to the following requirements:
1) Must be capable of encrypting strings to a byte array, and decyrpting
back again to the same string
2) Must have the same...
|
by: Mark Rae |
last post by:
Hi,
Picking your collective brains again, this time regarding the storage of the
key used in symmetric encryption.
Let's say you have a requirement to add encryption to a C# project, so you...
|
by: John Williams |
last post by:
I've written a simple program to do XOR encryption as my first foray
into understanding how encryption works. The code compiles fine, however
it segmentation faults on every run. using gdb to...
|
by: manmit.walia |
last post by:
Hello Everyone,
Long time ago, I posted a small problem I had about converting a VB6
program to C#. Well with the help with everyone I got it converted.
But I overlooked something and don't...
|
by: klenwell |
last post by:
Another request for comments here.
I'd like to accomplish something like the scheme outlined at this page
here:
http://tinyurl.com/3dtcdr
In a nutshell, the form uses javascript to hash...
|
by: CloudSolutions |
last post by:
Introduction:
For many beginners and individual users, requiring a credit card and email registration may pose a barrier when starting to use cloud servers. However, some cloud server providers now...
|
by: taylorcarr |
last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
|
by: Charles Arthur |
last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
|
by: aa123db |
last post by:
Variable and constants
Use var or let for variables and const fror constants.
Var foo ='bar';
Let foo ='bar';const baz ='bar';
Functions
function $name$ ($parameters$) {
}
...
|
by: ryjfgjl |
last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
|
by: emmanuelkatto |
last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud.
Please let me know.
Thanks!
Emmanuel
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
| |