by: Richard |
last post by:
Hi,
Does anybody know where I can find a C# sample that demonstrates how to
encrypt configuration data using the MS Enterprise Library's Configuration
Application Block pattern? - I don't see...
|
by: Washington |
last post by:
Hi,
I am using MD5, SHA1, SHA256, SHA384, SHA512 and results are:
I am using Encryption data with salt example
(http://www.obviex.com/samples/EncryptionWithSalt.aspx)
Everything works and...
|
by: Crirus |
last post by:
Hello
Can someone tell me how is the easyest way to encript some data that I
should send over internet between 2 applications client-server I have?
I dont like someone to catch a clear stream of...
|
by: Charles A. Lackman |
last post by:
Hello,
I just wrote a desktop application that sends and retrieves datasets to
a web service that is being run on my server (Windows Server 2003). Some of
the information contains personal...
|
by: ravi |
last post by:
Folks
Is there way to encrypt a column (integer ) in a table in IBM DB2/ in os390 system. If so can you tell me how to do that
Thanks
--
Ravi
|
by: luanhoxung |
last post by:
hi !!
in my continuous form view, i have a decription field, it is not bound any
fields of the form.
it decribes for my combo box.
my trouble is: when i choose my combo box for new record, the...
|
by: nitinloml |
last post by:
i want to know the different methods for pwd encription
|
by: raghulvarma |
last post by:
I have used viewstate in order to save the information as it is encryped and we could decript the information that it has , Now I want to avoid the property of decription how is it possible?
...
|
by: spike909 |
last post by:
how encription and decription take place in c#?
what methods and functions are used to develop a project in c# corresponding to encription and decription?
|
by: Charles Arthur |
last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
|
by: emmanuelkatto |
last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud.
Please let me know.
Thanks!
Emmanuel
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new...
|