473,322 Members | 1,846 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,322 software developers and data experts.

Secure Password Storing for desktop software

I was thinking to create a desktop application, and this app required user login with username and password, since the app not connect with database, I was thinking is there a secure way to store password? One of the way come into my mind is storing in registry?
Aug 26 '12 #1
5 25188
ariful alam
185 100+
You can do this what you thought.

you can also use a configuration file that may store user id and password in encrypt format like in binary, hex, decimal etc.
Aug 26 '12 #2
@ariful alam
If storing in file will it be unsecure?
Aug 26 '12 #3
ariful alam
185 100+
As I said, in file in encrypt format. not as a simple text but as binary, hex, decimal or other technique. moreover you can name the extension of the file to a unknown format whatever u like.
Aug 26 '12 #4
Rabbit
12,516 Expert Mod 8TB
First of all, there's no such thing as 100% secure. And in this scenario, it's not a matter of where you store it but how you store it. The usual method for this is to hash the password and store the hash. A slightly more secure method is to hash it with a salt.
Aug 27 '12 #5
@Rabbit
Yes I understad I just want to listen more suggestion and opinion which method will be more secure. Thanks for your advised.
Aug 27 '12 #6

Sign in to post your reply or Sign up for a free account.

Similar topics

2
by: Kit Truong | last post by:
Hello, When I'm creating database driven asp applications, I store my constants, including my connection string to the database within an asp file called constants.asp. All constants are stored...
3
by: Gordon Knote | last post by:
Hi In my application I need to store a password the user enters (unfortunately not a hash of it, but the password as a plaintext string). Is there any secure way to do so (by Visual Basic .NET) ...
383
by: John Bailo | last post by:
The war of the OSes was won a long time ago. Unix has always been, and will continue to be, the Server OS in the form of Linux. Microsoft struggled mightily to win that battle -- creating a...
0
by: ericellsworth | last post by:
Hi all, I'm wondering if there's a way to remove the password Access (2003) has stored for an ODBC linked table without quitting and reopening the application. I have a set of linked tables...
0
by: Spiffytech | last post by:
I'm trying to retrieve emails via the POP3 protocol from a Windows 2003 POP3 Server. I get a positive response from the server when sending all the commands until the "PASS" command. When I send...
4
by: Alvaro G. Vicario | last post by:
I’m writing a web application that needs to keep passwords in a database. These passwords are for third-party services and are different from the regular login passwords. I don’t like...
0
by: Madni | last post by:
Hi, I have created pdf file using a library "pdflib" in C#.Net development environment.The generated pdf file is password protected (requires "owner password") disallowing some of the...
1
by: pawan123 | last post by:
Hi, I am using VB6 and SQL Server 2000. I want to design a logon form. In this form, how can I use a Password field to store in encrypted form in tbluser table and how can I compare password...
0
by: DolphinDB | last post by:
Tired of spending countless mintues downsampling your data? Look no further! In this article, you’ll learn how to efficiently downsample 6.48 billion high-frequency records to 61 million...
1
isladogs
by: isladogs | last post by:
The next Access Europe meeting will be on Wednesday 6 Mar 2024 starting at 18:00 UK time (6PM UTC) and finishing at about 19:15 (7.15PM). In this month's session, we are pleased to welcome back...
0
by: Vimpel783 | last post by:
Hello! Guys, I found this code on the Internet, but I need to modify it a little. It works well, the problem is this: Data is sent from only one cell, in this case B5, but it is necessary that data...
0
by: jfyes | last post by:
As a hardware engineer, after seeing that CEIWEI recently released a new tool for Modbus RTU Over TCP/UDP filtering and monitoring, I actively went to its official website to take a look. It turned...
0
by: ArrayDB | last post by:
The error message I've encountered is; ERROR:root:Error generating model response: exception: access violation writing 0x0000000000005140, which seems to be indicative of an access violation...
1
by: PapaRatzi | last post by:
Hello, I am teaching myself MS Access forms design and Visual Basic. I've created a table to capture a list of Top 30 singles and forms to capture new entries. The final step is a form (unbound)...
1
by: CloudSolutions | last post by:
Introduction: For many beginners and individual users, requiring a credit card and email registration may pose a barrier when starting to use cloud servers. However, some cloud server providers now...
0
by: af34tf | last post by:
Hi Guys, I have a domain whose name is BytesLimited.com, and I want to sell it. Does anyone know about platforms that allow me to list my domain in auction for free. Thank you
0
by: Faith0G | last post by:
I am starting a new it consulting business and it's been a while since I setup a new website. Is wordpress still the best web based software for hosting a 5 page website? The webpages will be...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.