5 3296
Oh, i known, if encrypt the string again, it will return the unencrypted
string.
Thank you
"yxq" <ga***@163.ne t> дÈëÏûÏ¢ÐÂÎÅ:ut *************** *@TK2MSFTNGP15. phx.gbl... Hello, I want to encrypt and decrypt using ROT13, found a class to encrypt string, but where is the decrypter?
http://authors.aspalliance.com/brett...sp#CodeSamples
Thank you
In Registry, the
HKEY_CURRENT_US ER\Software\Mic rosoft\Windows\ CurrentVersion\ Explorer\UserAs sist\{75048700-EF1F-11D0-9888-006097DEACF9}\C ount
Key encrypted by ROT13, what meaning about the REG_BINARY value? i guess it
is date/Time
Thank you
"yxq" <ga***@163.ne t> дÈëÏûÏ¢ÐÂÎÅ:%2 *************** *@TK2MSFTNGP09. phx.gbl... Oh, i known, if encrypt the string again, it will return the unencrypted string.
Thank you
"yxq" <ga***@163.ne t> дÈëÏûÏ¢ÐÂÎÅ:ut *************** *@TK2MSFTNGP15. phx.gbl... Hello, I want to encrypt and decrypt using ROT13, found a class to encrypt string, but where is the decrypter?
http://authors.aspalliance.com/brett...sp#CodeSamples
Thank you
Key encrypted by ROT13, what meaning about the REG_BINARY value? i guess it is date/Time
It can hold any binary data, and is returned as a byte array to
managed code.
Mattias
--
Mattias Sjögren [MVP] mattias @ mvps.org http://www.msjogren.net/dotnet/ | http://www.dotnetinterop.com
Please reply only to the newsgroup.
Here's a ROT13 Function that I have converted from one of my old VB6
projects, which you can use. It can be converted a little more, if you want,
but it doesn't need to:
Public Function Rot13(ByVal sInString As String) As String
Dim intPointer As Integer = 1
Dim strNewChar As String
While intPointer <> sInString.Lengt h
System.Windows. Forms.Applicati on.DoEvents()
Select Case Asc(Mid(sInStri ng, intPointer, 1))
Case 65, 97
strNewChar = "N"
Case 66, 98
strNewChar = "O"
Case 67, 99
strNewChar = "P"
Case 68, 100
strNewChar = "Q"
Case 69, 101
strNewChar = "R"
Case 70, 102
strNewChar = "S"
Case 71, 103
strNewChar = "T"
Case 72, 104
strNewChar = "U"
Case 73, 105
strNewChar = "V"
Case 74, 106
strNewChar = "W"
Case 75, 107
strNewChar = "X"
Case 76, 108
strNewChar = "Y"
Case 77, 109
strNewChar = "Z"
Case 78, 110
strNewChar = "A"
Case 79, 111
strNewChar = "B"
Case 80, 112
strNewChar = "C"
Case 81, 113
strNewChar = "D"
Case 82, 114
strNewChar = "E"
Case 83, 115
strNewChar = "F"
Case 84, 116
strNewChar = "G"
Case 85, 117
strNewChar = "H"
Case 86, 118
strNewChar = "I"
Case 87, 119
strNewChar = "J"
Case 88, 120
strNewChar = "K"
Case 89, 121
strNewChar = "L"
Case 90, 122
strNewChar = "M"
Case Else
strNewChar = Mid(sInString, intPointer, 1)
End Select
If IsUpperCase(Mid (sInString, intPointer, 1)) Then
Mid(sInString, intPointer, 1) = strNewChar
Else
Mid(sInString, intPointer, 1) = strNewChar.ToLo wer
End If
intPointer += 1
End While
Return sInString
End Function
I hope this is of help to you
Thank you, but i have Rot13 function.
When you click the desktop icons, the date and time will be loged to
Registry in XP.
HKEY_CURRENT_US ER\Software\Mic rosoft\Windows\ CurrentVersion\ Explorer\UserAs sist\{75048700-EF1F-11D0-9888-006097DEACF9}\C ount
The date and time wrote to binary value(16 bytes)
i.e. 09 00 00 00 07.... (i think the binary value encrypted).
But you can add a key to let XP will not encrypt the keyname and value
HKEY_CURRENT_US ER\Software\Mic rosoft\Windows\ CurrentVersion\ Explorer\UserAs sist\Settings
Add Dword value "NoEncrypt" and set to 1
I dont know how to recover the date and time from the binary value.
Please view http://www.velasco.com.br/explorer_spy.txt
"Crouchie19 98" <Cr**********@d iscussions.micr osoft.com> дÈëÏûÏ¢ÐÂÎÅ:CC *************** *************** ****@microsoft. com... Here's a ROT13 Function that I have converted from one of my old VB6 projects, which you can use. It can be converted a little more, if you want, but it doesn't need to:
Public Function Rot13(ByVal sInString As String) As String
Dim intPointer As Integer = 1 Dim strNewChar As String
While intPointer <> sInString.Lengt h System.Windows. Forms.Applicati on.DoEvents() Select Case Asc(Mid(sInStri ng, intPointer, 1)) Case 65, 97 strNewChar = "N" Case 66, 98 strNewChar = "O" Case 67, 99 strNewChar = "P" Case 68, 100 strNewChar = "Q" Case 69, 101 strNewChar = "R" Case 70, 102 strNewChar = "S" Case 71, 103 strNewChar = "T" Case 72, 104 strNewChar = "U" Case 73, 105 strNewChar = "V" Case 74, 106 strNewChar = "W" Case 75, 107 strNewChar = "X" Case 76, 108 strNewChar = "Y" Case 77, 109 strNewChar = "Z" Case 78, 110 strNewChar = "A" Case 79, 111 strNewChar = "B" Case 80, 112 strNewChar = "C" Case 81, 113 strNewChar = "D" Case 82, 114 strNewChar = "E" Case 83, 115 strNewChar = "F" Case 84, 116 strNewChar = "G" Case 85, 117 strNewChar = "H" Case 86, 118 strNewChar = "I" Case 87, 119 strNewChar = "J" Case 88, 120 strNewChar = "K" Case 89, 121 strNewChar = "L" Case 90, 122 strNewChar = "M" Case Else strNewChar = Mid(sInString, intPointer, 1) End Select
If IsUpperCase(Mid (sInString, intPointer, 1)) Then Mid(sInString, intPointer, 1) = strNewChar Else Mid(sInString, intPointer, 1) = strNewChar.ToLo wer End If
intPointer += 1 End While
Return sInString
End Function
I hope this is of help to you This thread has been closed and replies have been disabled. Please start a new discussion. Similar topics |
by: Nel |
last post by:
Before I try and reinvent the wheel, can anyone help me with a basic routine
to hide email addresses from harvesting.
I currently use pull my page content from a db and run this ereg_replace:
$pagetext=ereg_replace('(?)*@(?)*\.+', '<a href="mailto:\\0"><font
color="#0000FF"><b>\\0</b></font></a>', $pagetext);
This simply replaces any emails within the page text with an <a> tag.
What I would like to do is replace it with:
|
by: Thomas Philips |
last post by:
I'm teaching myself python and in the course of playing around with
dictionaries, I tried to create the following trivial dictionary
{1:'one', 2:'two'}
So I entered
>>> dict(1='one',2='two')
SyntaxError: keyword can't be an expression
As this did not work, I tried
|
by: Yan Yang |
last post by:
Hi,
I have a program and I want to test its execution time. When I run the
program, I can feel it runs about 4 mins, but the gprof only says the
accumlated time is 7.2 secs.
Then I use the command: "date; my program; date" and from the time
difference, I got the time 287 seconds?
I am really confused about these two numbers. Why gprof only accumlated 7.2
|
by: Eirik |
last post by:
This is a little function I wrote, inspired by the thread
"Urgent HELP! required for Caesar Cipher PLEASE"
$ cat /home/keisar/bin/c/ymse/rot13.h
char rot13(char character)
{
int changed;
changed = character - 'a' + 'n';
return changed;
|
by: Jonathan Wilson |
last post by:
Where do the values for $(VCInstallDir), $(FrameworkSDKDir),
$(FrameWorkDir), $(FrameWorkVersion) and $(VSInstallDir) (and any I have
missed) come from?
| |
by: Steven T. Hatton |
last post by:
This is one of the first obstacles I encountered when getting started with
C++. I found that everybody had their own idea of what a string is. There
was std::string, QString, xercesc::XMLString, etc. There are also char,
wchar_t, QChar, XMLCh, etc., for character representation. Coming from
Java where a String is a String is a String, that was quite a shock.
Well, I'm back to looking at this, and it still isn't pretty. I've found...
|
by: zhege |
last post by:
I am a beginner of C++;
I have a question about the std:string and std:cout class;
Two pieces of code:
--------------------------------
#include <iostream>
#include <string>
using namespace std;
int main()
|
by: Jamie |
last post by:
Hello Newsgroup:
This is my little rant about security and why we have home directories.
You may choose to ignore it or disagree with it, that is your perogative
and I won't care, but... this little rant needs to be said in the 21'st
century, as we seem to have forgotten about it.
Many PHP packages and cgi scripts ask you to store database settings
and passwords in web space.
|
by: Andy Dingley |
last post by:
I'm trying to write rot13, but to do it in a better and more Pythonic
style than I'm currrently using. What would you reckon to the
following pretty ugly thing? How would you improve it? In
particular, I don't like the way a three-way selection is done by
nesting two binary selections. Also I dislike stating the same
algorithm twice, but can't see how to parameterise them neatly.
Yes, I know of .encode() and .translate().
No, I...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it.
First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it.
Here is my compilation command:
g++-12 -std=c++20 -Wnarrowing bit_field.cpp
Here is the code in...
| |
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth.
The Art of Business Website Design
Your website is...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own....
Now, this would greatly impact the work of software developers. The idea...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules.
He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms.
Adolph will...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
| |
by: bsmnconsultancy |
last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...
| |