dcsimg
TODAY'S HEADLINES  |   ARTICLE ARCHIVE  |   FORUMS  |   TIP BANK
Browse DevX
Sign up for e-mail newsletters from DevX


advertisement
Search the Tips
Tip Bank > Security > Encryption

Encryption

8 of 8     Previous     Next
Understand the AES Encryption Method
by M S Sridhar
Learn how to understand the AES ENCRYPTION method that is supported by MySQL.
Using Symbolic Links in Java
by M S Sridhar
Language: Java, Expertise: Intermediate - Learn about how to keep your real source code safe and the original location hidden with Symbolic links.
Encrypt a Config Section Using .NET's Configuration Providers
by Srinath M S
Language: .NET, Expertise: Advanced — Learn to encrypt a config section using .Net's configuration providers.
Encrypt and Decrypt Configuration File Sections from a Command Line
by Deepak Choudhari
When you're delivering an application or testing it, it's very convenient to be able to encrypt and decrypt sections of a configuration file from a command line.
An Improved szEncryptDecrypt VB6 Funtion
by Scott Likely
The szEncryptDecrypt function in a previous tip did not handle unicode strings properly, but otherwise worked well. The changes in the following version should work for any string by explicitly converting each character to ASCII and back.
Using the SecureString Class
by Srinath MS
NET 2.0's System.Security namespace includes the SecureString class, which lets you create encrypted strings and delete them from memory when they're no longer needed.
Add Two Long Numbers Together Without Causing an Overflow Error
by David Day
This function adds two long numbers together as if they were unsigned, and does not cause an overflow error. You may need this when implementing the SHA-1 Hashing function.
Use Oracle Obfuscation to Encrypt Data Securely
by Sushil Srivastava
Learn how to encrypt data—like passwords and other confidential information—using Oracle Obfuscation techniques.
8 of 8     Previous     Next
Thanks for your registration, follow us on our social networks to keep up-to-date