by: Randell D. |
last post by:
Folks,
I use md5 hash with some of my cookies and occassionally a hidden form
field - I know the physical data on my network is insecure (unless being
served via https) but I was wondering if...
|
by: Rafal 'Raf256' Maj |
last post by:
Hello,
where can I find ready to use functions for hasing into md5 and sha1 ?
I.e. ansi C code like:
void makeMd5(unsigned char* input, long size, unsigned char* output) {
....
}
Ready to...
|
by: Chang |
last post by:
How to get SHA1 or MD5 of a big file (+5MB - 20GB) as I can't read 20GB into
memory.
--
Chang.
|
by: Michael H |
last post by:
Hi all,
I guess I don't fully understand how a SHA1 hash value is calculated
in C# / .NET for a large file... I'm trying to calculate SHA1 values
for large files that are much larger than my...
|
by: Dil via .NET 247 |
last post by:
Fresher to .NET
Aiming to produce a resulting hash of length 24 CHARACTERS, using MD5 or SHA1 Algorithms.
According to the Class Libraries, the hash size for the SHA1 algorithm is 160 bits, and...
|
by: Marcus |
last post by:
Hello,
I have read several online tutorials advocating storing a sha1() hashed
password in a column of type BLOB. As far as I can tell, sha1() always
returns a string of 40 characters,...
|
by: VAISH |
last post by:
Hi
I am using C# (.NET) to do the following
I am trying to canonicalize the xml and signing the xml using sha1. Please read the scenario below
I have form with few fields, when I click save...
|
by: sathyashrayan |
last post by:
Dear group,
For a log-in page I have created a mysql db and user registers
with a user name and password. The password field is encrypted with
$passwd = sha1($_REQUEST);
I insert the...
|
by: amygdala |
last post by:
Hi,
Does anybody now of a custom crypt function that implements sha1? The thing
I like about crypt is that I don't have to worry about (re)generating salt
when querying the database. Or are...
|
by: php.developer2007 |
last post by:
I want to know to decode sha1 encoded url into normal url.
Example
www.example.com/<sha1 code>/index1.htm
I want this to
www.example.com/index1.htm
|
by: taylorcarr |
last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
|
by: Charles Arthur |
last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
|
by: aa123db |
last post by:
Variable and constants
Use var or let for variables and const fror constants.
Var foo ='bar';
Let foo ='bar';const baz ='bar';
Functions
function $name$ ($parameters$) {
}
...
|
by: ryjfgjl |
last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
|
by: emmanuelkatto |
last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud.
Please let me know.
Thanks!
Emmanuel
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
|