by: Harold Crump |
last post by:
Greetings,
I have a requirement of storing some .xml files on a web server.
The files will contain financial information like credit card numbers,
so I would like to encrypt them.
The files...
|
by: c duden |
last post by:
I am attempting to encrypt some text and be able to decrypt it at a later
time. I have two methods to do this:
public static Byte EncryptText(string textToEncrypt, string
encryptionHash)
{...
|
by: Cliff |
last post by:
We are trying to connect to 3 different Oracle databases using MS
Access as the front-end and ODBC as the connection. The problem that
we are having is that 1 of the databases requires a...
|
by: OFM |
last post by:
I am running an oracle database with the application written in PHP.
I would like to be able to have the option to encrypt data residing in
certain columns in certain tables i.e. encrypt the SSNO...
|
by: dmalhotr2001 |
last post by:
I was wondering whether anyone ever dealt with encryption that are visa
compliant with credit card numbers:
On 3.4 of this document...
|
by: Kyriakos Petrakos |
last post by:
Hello to everyone,
Recently, I came across a scenario which required some data encryption routines applied to general binary files. I decided to use the managed code provided by .NET that...
|
by: Dave Cullen |
last post by:
Hello C
I have a project that requires a calculated "key" to be used in a security
access application. The customer supplies a secret 8 byte number that gets
combined with the serial number of...
|
by: TeenuSusan |
last post by:
Hii All,
I want to do Triple DES Encryption using C language.Can anybody help me...
|
by: j1mb0jay |
last post by:
I have created some simple string encryption in C# to be able to store
passwords in a database without them being stored in plain text.
I have attached a encrypted passage from a book I like....
|
by: gchq |
last post by:
Hi there
There is no problem encypting and decrypting a credit card number, but whilst encrypting the expiry date seems to work it blows out on decryption with "Invalid length for a Base-64 char...
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: Sonnysonu |
last post by:
This is the data of csv file
1 2 3
1 2 3
1 2 3
1 2 3
2 3
2 3
3
the lengths should be different i have to store the data by column-wise with in the specific length.
suppose the i have to...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new...
|
by: conductexam |
last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The...
|