by: Julia Briggs |
last post by:
Could someone post some examples with explanations of how to
encode/encrypt a form posted URL and then decrypt it, so that it is
very hard or currently impossible to break?
so, something like
...
|
by: Spikinsson |
last post by:
I'm looking for a good decrypt/encrypt function, all I want is a function in this form:
char* encrypt(char* normal)
{
...
return encrypted;
}
and
|
by: Mark Hanford |
last post by:
I've been setting up a new MySQL/PHP site which will contain store
some CC details, and have been wondering how to pass the keys.
CC's are written in a similar way to:
INSERT INTO cc (ccName,...
|
by: Andrew Poulos |
last post by:
I've built a javascript driven quiz. Given that client-side scripting is
not secure, is there a way to "obscure" answers so that they are
unavailable to the casual viewer? For example, If I have an...
|
by: Drebin |
last post by:
It's a long story really, but the bottom line is we need to encrypt or
obfuscate a clear-text 9-digit SSN/taxpayer ID into something less than 21
characters. It doesn't need to be super-secure,...
|
by: TJS |
last post by:
Is there a way to encrypt the url string at the application level so code
does not have to be added into every page or control ?
|
by: Kevin Hodgson |
last post by:
I store a users SMTP UserName and Password in a settings class, which is
serialized to an XML Settings File.
I need to encrypt the password string in some manner. Does anyone have any
ideas how...
|
by: Miles Keaton |
last post by:
still doing my switch from MySQL to PgSQL, and can't figure out what
the comparable function would be for this:
In MySQL, to store a big secret (like a credit card number) in the
database that I...
|
by: ffrugone |
last post by:
I need to create a method for a web page I'm building that encrypts a
number from 1 to 1000 into a 4 digit hex code. I know nothing about
cryptography. Can anyone steer me in the right direction?
|
by: Charles Arthur |
last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
|
by: emmanuelkatto |
last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud.
Please let me know.
Thanks!
Emmanuel
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new...
|