Hi,
after reading about decompiling, and other stuff, i need some advice on how
to store data for my appliactions..
this is what i need: i want my programs to have some passwords and usernames
for accessing some other services on net, and i need a method, or few
examples that will prevent people form just using decompiler and reading
imporatan data from my code..
in short: where & how to store pass & other to make it little more secure
(best possible and still simple to implement)
best if someone could send some examples & triscks how to do that on my
mail.
thanks! 3 1079
i saw some other similar posts, and i need to tell that users of programs
shouldnt be aware of that processes and they should not enter passwords
etc.
other thing which is in no connection with this post is:
I need some smtp servers that dont require autoization, and it would be
perfect if you dont have to register to use them either ( From field isnt
checked when sending ), but without autorization iz enough for now
Thanks
huz wrote:
Hi,
after reading about decompiling, and other stuff, i need some advice
on how to store data for my appliactions..
this is what i need: i want my programs to have some passwords and
usernames for accessing some other services on net, and i need a
method, or few examples that will prevent people form just using
decompiler and reading imporatan data from my code..
in short: where & how to store pass & other to make it little more
secure (best possible and still simple to implement)
best if someone could send some examples & triscks how to do that on
my mail.
thanks!
Hello huz,
BAD SPAMMER. BAD. MAY YOU BURN IN THE DEPTHS OF HELL FOR TWO ETERNITIES.
-Boo
i saw some other similar posts, and i need to tell that users of
programs shouldnt be aware of that processes and they should not
enter passwords etc.
other thing which is in no connection with this post is:
I need some smtp servers that dont require autoization, and it would
be
perfect if you dont have to register to use them either ( From field
isnt
checked when sending ), but without autorization iz enough for now
Thanks
huz wrote:
>Hi,
after reading about decompiling, and other stuff, i need some advice on how to store data for my appliactions..
this is what i need: i want my programs to have some passwords and usernames for accessing some other services on net, and i need a method, or few examples that will prevent people form just using decompiler and reading imporatan data from my code..
in short: where & how to store pass & other to make it little more secure (best possible and still simple to implement)
best if someone could send some examples & triscks how to do that on my mail.
thanks!
GhostInAK wrote:
Hello huz,
BAD SPAMMER. BAD. MAY YOU BURN IN THE DEPTHS OF HELL FOR TWO
ETERNITIES.
-Boo
hm... i guess that lack of intelect caused this premature conclusion :))))
and you cursed me as well, you may know that a wodoo doll of you is being
stabbed right tihs instance in her hands, so that you wont be able to curse
me again like this :)
and i also used reflecton spell for your curse, that means that youll be in
hell for two eternities without hands
and thats a lesson to others to write something usefull :P
>
>i saw some other similar posts, and i need to tell that users of programs shouldnt be aware of that processes and they should not enter passwords etc.
other thing which is in no connection with this post is: I need some smtp servers that dont require autoization, and it would be perfect if you dont have to register to use them either ( From field isnt checked when sending ), but without autorization iz enough for now
Thanks
huz wrote:
>>Hi,
after reading about decompiling, and other stuff, i need some advice on how to store data for my appliactions..
this is what i need: i want my programs to have some passwords and usernames for accessing some other services on net, and i need a method, or few examples that will prevent people form just using decompiler and reading imporatan data from my code..
in short: where & how to store pass & other to make it little more secure (best possible and still simple to implement)
best if someone could send some examples & triscks how to do that on my mail.
thanks!
This thread has been closed and replies have been disabled. Please start a new discussion. Similar topics
by: grahamd |
last post by:
Who are the appropriate people to report security problems to
in respect of a module included with the Python distribution?
I don't feel it appropriate to be reporting it on general mailing
lists.
|
by: TC |
last post by:
Hello All,
I have recently had the pleasure of installing Norton Internet Security 2005
and finding that I can no longer create or open a web-based application in
Visual Studio .Net. The IDE...
|
by: Ken Cox [Microsoft MVP] |
last post by:
MS has posted this here:
http://www.asp.net/faq/ms03-32-issue.aspx
Fix for: 'Server Application Unavailable' Error after Applying Security Update
for IE...
|
by: Earl Teigrob |
last post by:
Background:
When I create a ASP.NET control (User or custom), it often requires security to be set for certain functionality with the control. For example, a news release user control that is...
|
by: cdlipfert |
last post by:
Our intranet is running under windows integrated security. We have
domain users that want to access our intranet site via ssl vpn. SSL
VPN can not authenticate against services that run under...
|
by: Charles Leonard |
last post by:
I am having yet another issue with Windows Server 2003. This time, the web
service (a file import web service) appears to run except for one odd
message: "ActiveX component can't create object". ...
|
by: Jay C. |
last post by:
Jay
3 Jan. 11:38 Optionen anzeigen
Newsgroups: microsoft.public.dotnet.framework.webservices.enhancements
Von: "Jay" <p.brunm...@nusurf.at> - Nachrichten dieses Autors suchen
Datum: 3 Jan...
|
by: Richard MSL |
last post by:
I am having problems working with .net security. I have been attempting to
use the Microsoft .Net Framework 2.0 Configuration tool (version
2.0.50727.42), but it won't work for me. I have a simple...
|
by: WebServiceSecurity |
last post by:
The issue involves the following technologies: -
1. .NET 2.0 Framework
2. WSE2.0 (WS-Security)
3. X.509 certificates
4. BEA Weblogic 8.1.5
|
by: Anthony Baxter |
last post by:
SECURITY ADVISORY
Buffer overrun in repr() for UCS-4 encoded unicode strings
http://www.python.org/news/security/PSF-2006-001/
Advisory ID: PSF-2006-001
Issue Date: October 12, 2006...
|
by: taylorcarr |
last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
|
by: aa123db |
last post by:
Variable and constants
Use var or let for variables and const fror constants.
Var foo ='bar';
Let foo ='bar';const baz ='bar';
Functions
function $name$ ($parameters$) {
}
...
|
by: emmanuelkatto |
last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud.
Please let me know.
Thanks!
Emmanuel
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: Sonnysonu |
last post by:
This is the data of csv file
1 2 3
1 2 3
1 2 3
1 2 3
2 3
2 3
3
the lengths should be different i have to store the data by column-wise with in the specific length.
suppose the i have to...
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
| |