473,385 Members | 1,528 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,385 software developers and data experts.

Cursor manipulation

I'm new here.[i]

I started a personal password-program, a trial that includes
username, logincounter and password. So my intention is to
hide pwd while tipping. So I'm thinking about two popular ways
to realize, like using cursor manipulation to backup & delete
letters[***] or otherwise to use getch to read them quetly[ ].

Maybe somebody here knows and will tell me about potentially
dis-/advantages of each method. Meaning especially *intern*
events of program/security aspects. Doesn't mean aspects of its
look. AFAIK getch is almost standard, because a lot of compilers
have it, but generally both methods are non standard. So we get
my first note now:

[i] The compiler I use may vary, flexibility is not the point,
right now I'm testing some different compilers on different
platforms.
My actual question especially belongs to intern events of my
program. Fine. Is there anything that should be considerated
before final decision? Thanks for each useful information to
think about.

Jul 22 '05 #1
9 2573
I. Kobrinsky wrote:
I'm new here.[i]

I started a personal password-program, a trial that includes
username, logincounter and password. So my intention is to
hide pwd while tipping. So I'm thinking about two popular ways
to realize, like using cursor manipulation to backup & delete
letters[***] or otherwise to use getch to read them quetly[ ].

Maybe somebody here knows and will tell me about potentially
dis-/advantages of each method. Meaning especially *intern*
events of program/security aspects. Doesn't mean aspects of its
look. AFAIK getch is almost standard, because a lot of compilers
have it, but generally both methods are non standard. So we get
my first note now:

[i] The compiler I use may vary, flexibility is not the point,
right now I'm testing some different compilers on different
platforms.
My actual question especially belongs to intern events of my
program. Fine. Is there anything that should be considerated
before final decision? Thanks for each useful information to
think about.

I am not sure what you mean by cursor manipulation, however using
getch() and couting an * for each character entered, should work.
There should be no additional security aspect than usual input using cin.
Unless the vendor's library is broken or something.


--
Ioannis Vranos

http://www23.brinkster.com/noicys
Jul 22 '05 #2
[Question: between cursor manipulation or getch()]

Ioannis Vranos:
I am not sure what you mean by cursor manipulation, [...]
At last I found some information about cursor manipulation
suitable for invisible pwd-input at internet. Actually I'm
going to learn and make trys to realize different methods.
I'm looking forward how its going on. To get a short overview
what I meant about, you may have a look at following page for
example:
http://ou800doc.caldera.com/en/SDK_c...FieldOpts.html
however using getch() and couting an * for each character
entered, should work.
There should be no additional security aspect than usual input
using cin. Unless the vendor's library is broken or something.


Valuable to know. Well, I'll take your information into my
consideration. Thanks very much for your help & 've a nice X-mas.

Jul 22 '05 #3
On 22 Dec 2004 01:58:06 -0800, "I. Kobrinsky" <Iv************@gmx.net>
wrote in comp.lang.c++:
I'm new here.[i]

I started a personal password-program, a trial that includes
username, logincounter and password. So my intention is to
hide pwd while tipping. So I'm thinking about two popular ways
to realize, like using cursor manipulation to backup & delete
letters[***] or otherwise to use getch to read them quetly[ ].
All input and output in the C++ language is defined in terms of
hardware independent streams, either C++ iostreams or C FILE *
streams. There is no requirement or guarantee provided by the
language that any stream is connected to an interactive device or a
video display. There is no getch() function, nor any cursor control
in the C++ language.
Maybe somebody here knows and will tell me about potentially
dis-/advantages of each method. Meaning especially *intern*
events of program/security aspects. Doesn't mean aspects of its
look. AFAIK getch is almost standard, because a lot of compilers
have it, but generally both methods are non standard. So we get
my first note now:
Your questions about security are something else that is not addressed
by the language. And the fact that you happen to think that something
is "almost standard" does not make it topical here. It is not part of
the language, so it is off-topic.
[i] The compiler I use may vary, flexibility is not the point,
right now I'm testing some different compilers on different
platforms.
My actual question especially belongs to intern events of my
program. Fine. Is there anything that should be considerated
before final decision? Thanks for each useful information to
think about.


From a language point of view, there is nothing at all that can be
considered here when selecting between different non-standard and
platform specific extensions.

--
Jack Klein
Home: http://JK-Technology.Com
FAQs for
comp.lang.c http://www.eskimo.com/~scs/C-faq/top.html
comp.lang.c++ http://www.parashift.com/c++-faq-lite/
alt.comp.lang.learn.c-c++
http://www.contrib.andrew.cmu.edu/~a...FAQ-acllc.html
Jul 22 '05 #4
On Wed, 22 Dec 2004 13:34:09 +0200, Ioannis Vranos
<iv*@remove.this.grad.com> wrote in comp.lang.c++:
I. Kobrinsky wrote:
I'm new here.[i]

I started a personal password-program, a trial that includes
username, logincounter and password. So my intention is to
hide pwd while tipping. So I'm thinking about two popular ways
to realize, like using cursor manipulation to backup & delete
letters[***] or otherwise to use getch to read them quetly[ ].

Maybe somebody here knows and will tell me about potentially
dis-/advantages of each method. Meaning especially *intern*
events of program/security aspects. Doesn't mean aspects of its
look. AFAIK getch is almost standard, because a lot of compilers
have it, but generally both methods are non standard. So we get
my first note now:

[i] The compiler I use may vary, flexibility is not the point,
right now I'm testing some different compilers on different
platforms.
My actual question especially belongs to intern events of my
program. Fine. Is there anything that should be considerated
before final decision? Thanks for each useful information to
think about.

I am not sure what you mean by cursor manipulation, however using
getch() and couting an * for each character entered, should work.


And what exactly does "getch()" do? Where is it defined by the C++
standard? What if some particular function by that name calls
abort()?
There should be no additional security aspect than usual input using cin.
Unless the vendor's library is broken or something.


Please stop providing off-topic answers to off-topic questions.

--
Jack Klein
Home: http://JK-Technology.Com
FAQs for
comp.lang.c http://www.eskimo.com/~scs/C-faq/top.html
comp.lang.c++ http://www.parashift.com/c++-faq-lite/
alt.comp.lang.learn.c-c++
http://www.contrib.andrew.cmu.edu/~a...FAQ-acllc.html
Jul 22 '05 #5
-> Jack Klein!
On 22 Dec 2004 01:58:06 -0800, "I. Kobrinsky" <Iv************@gmx.net> wrote in comp.lang.c++:
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^^
Mr. Klein, Short Your Introduction roman! Quickly!
Do I have to print usenet-netiquette at Your brow??
How long are Jack Klein member of this Newsgroup?
Cant exist! Until now nobody else made sure to get
rebuke you and get linked up to newusers/netiquette??
Your questions about security are something else that
is not addressed
Shut down! Of course security is a very important aspect of
any language.You are not a well developer it seems, otherwise
you never would speak such words. Jack, where to hell have u
lived until now? Get up from your zweet Microsoft Dornröschen
sleep and take a watch at reality!

Nobody, not any developer at thoose days should fuck of security
aspects. Its NOT just a part of later patches & updates. Make
programs going work right, in other words make them secure is
*the* *basicly* question of _any_ development.
[oh my dear... this boy stucked up ~1900.]
--

Jack Klein
Home: http://JK-Technology.Com
FAQs for
comp.lang.c http://www.eskimo.com/~scs/C-faq/top.html
comp.lang.c++ http://www.parashift.com/c++-faq-lite/
alt.comp.lang.learn.c-c++
http://www.contrib.andrew.cmu.edu/~a...FAQ-acllc.html


^^^^^^^^^^^^^^^^^^^What the HELL is ....!??????!^^^^^^^^^^^^^

Can't believe! Its toooo much!! Get short, babe!
Every reply you post, you active stealing OUR space at server!
Some case of Killfile it seems...

Jul 22 '05 #6

I. Kobrinsky wrote:
Can't believe! Its toooo much!! Get short, babe!
Every reply you post, you active stealing OUR space at server!
Some case of Killfile it seems...


I'll be happy to get our newsfeed up so I can killfile this twit.
I wish grouple allowed that.

Brian

Jul 22 '05 #7
Jack Klein:
On Wed, 22 Dec 2004 13:34:09 +0200, Ioannis Vranos
<iv*@remove.this.grad.com> wrote in comp.lang.c++:
-> Hey, Jack, look my last post, its not needed in this Newsgroup!

[help from Ioannis] Please stop providing off-topic answers to off-topic questions.
Right, *my* mistake. Sry, was not my intention.

--
Jack Klein
Home: http://JK-Technology.Com
FAQs for
comp.lang.c http://www.eskimo.com/~scs/C-faq/top.html
comp.lang.c++ http://www.parashift.com/c++-faq-lite/
alt.comp.lang.learn.c-c++
http://www.contrib.andrew.cmu.edu/~a...FAQ-acllc.html


Short it up, trough the half!

Jul 22 '05 #8

Default User wrote:
I. Kobrinsky wrote:
Can't believe! Its toooo much!! Get short, babe!
Every reply you post, you active stealing OUR space at server!
Some case of Killfile it seems...


I'll be happy to get our newsfeed up so I can killfile this twit.
I wish grouple allowed that.


Good Luck.

Adios!

Jul 22 '05 #9
I. Kobrinsky wrote:

[oh my dear... this boy stucked up ~1900.]

Strictly speaking, getch() is a system extension and thus off topic in
here. Thus Jack is right, but still strict on this matter (since it is a
commonly used extension).

But he is not wrong when he says that it is off topic.


--
Ioannis Vranos

http://www23.brinkster.com/noicys
Jul 22 '05 #10

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

15
by: Philip Mette | last post by:
I am begginner at best so I hope someone that is better can help. I have a stored procedure that updates a view that I wrote using 2 cursors.(Kind of a Inner Loop) I wrote it this way Because I...
6
by: Sam | last post by:
Hi all, This is not an urgent query merely an interested question. But for what would I use a Cursor for? I have looked at the on-line help but I am still unclear why it for what reason it might...
15
by: Blue Ocean | last post by:
Are cursor libraries like Cygwin's (UNIX's?) ncurses.h platform independent? Is there any way to make ISO standard C do the things they do? Examples aren't necessary, I'd just like to know.
1
by: Merdaad | last post by:
In my datagrid, I call my SP and if I only have a simple select statement, everything comes back fine and all rows get displayed in datagrid using datasource and databind But if I use a cursor...
1
by: Jason Huang | last post by:
Hi, In my C# Windows Form MyForm, I do a string manipulation on a TextBox. However, the Cusrsor stays in the beginning of the TextBox. Would someone tell me how set the Cursor in the end of the...
3
by: IW2FIV | last post by:
I'm a really beginner about sql2000. During my test I have created the following query. It's works ok until I do't add the code included in section A, when I add it the i obtain the error: Cursor...
0
by: L'eau Prosper Research | last post by:
Press Release: L'eau Prosper Research (Website: http://www.leauprosper.com) releases new TradeStation 8 Add-on - L'eau Prosper Market Manipulation Profiling Tools Set. L'eau Prosper Market...
0
by: L'eau Prosper Research | last post by:
NEW TradeStation 8 Add-on - L'eau Prosper Market Manipulation Profiling Tools Set By L'eau Prosper Research Press Release: L'eau Prosper Research (Website: http://www.leauprosper.com) releases...
5
by: Spike1980 | last post by:
Hi, I am trying to update a table using cursors... I have a few if clauses... I just put the first if clause and I am trying to update the table, but it gives me an error saying "data...
0
by: Faith0G | last post by:
I am starting a new it consulting business and it's been a while since I setup a new website. Is wordpress still the best web based software for hosting a 5 page website? The webpages will be...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.