Login | Register   
RSS Feed
Download our iPhone app
Browse DevX
Sign up for e-mail newsletters from DevX

By submitting your information, you agree that devx.com may send you DevX offers via email, phone and text message, as well as email offers about other products and services that DevX believes may be of interest to you. DevX will process your information in accordance with the Quinstreet Privacy Policy.

Search the Tips
Tip Bank > Security > Encryption

Encryption - Page 2

21-28 of 28     Previous     Next
Encrypt a String Easily
by Rob Bovey
This quick and dirty encryption/decryption function takes whatever string you pass it, assigns it to a byte array, Xor's each byte by a constant, then returns the string. The offsetting done on every ...
Using Roles Properly
by Joseph Lax
SQL Server 7 has taken great strides in improving its security model. Groups have been done away with and replaced by roles. The practical difference lies in the fact that a user can be a member of ...
Plug the Security Holes
by Joseph Lax
We all know to keep the sa password secret and to share it with as few people as necessary. However, users see no problem with registering their server in Enterprise Manager with the sa id. This ...
It's All a Matter of Trust
by Michiel de
If you're building applets using Microsoft's Visual J++, you might encounter problems the first time you try to run your applet outside of the development environment. Typical examples of this ...
Use Read-Only Attributes When Sharing Code
by Craig Goren
If you set a VB file's DOS attribute to read-only, VB will show ...
Securing a Jet Database the Right Way
by Paul Litwin
< ...
Do You Have Access To A Drive Without Opening A File On That Drive
by A. Nicklas
Assume that you have the full path name of a file, and you need to ...
Encrypted Passwords
by Jeff Bogusz
These two small, simple, and effective functions easily encrypt/decrypt a text password. The functions ...
21-28 of 28     Previous     Next
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.
Thanks for your registration, follow us on our social networks to keep up-to-date