A Simple Password-Checking Routine

A Simple Password-Checking Routine

Developed for a password-reset program, this routine ensures that the user-entered password matches specific password criteria. In this example, the password had to be between 8 and 12 characters long and contain at least one upper case, one lower case, and one numeric character. The order of these didn’t matter, as long as there was one of each.

After doing some testing, I settled on the LIKE operator, which (unlike popular assumptions) isn’t just for database matches.

If (Text1 Like "*[A-Z]*") And _   (Text1 Like "*[a-z]*") And _   (Text1 Like "*[0-9]*") And _   (Len(Text1) > 7 And Len(Text1) < 13) Then   MsgBox "Password has correct usage."Else   MsgBox "Password must be between 8 and 12 characters, " & _   "with one upper case letter, a lower case letter, and one number."End If
Share the Post:
Heading photo, Metadata.

What is Metadata?

What is metadata? Well, It’s an odd concept to wrap your head around. Metadata is essentially the secondary layer of data that tracks details about the “regular” data. The regular

XDR solutions

The Benefits of Using XDR Solutions

Cybercriminals constantly adapt their strategies, developing newer, more powerful, and intelligent ways to attack your network. Since security professionals must innovate as well, more conventional endpoint detection solutions have evolved

AI is revolutionizing fraud detection

How AI is Revolutionizing Fraud Detection

Artificial intelligence – commonly known as AI – means a form of technology with multiple uses. As a result, it has become extremely valuable to a number of businesses across

AI innovation

Companies Leading AI Innovation in 2023

Artificial intelligence (AI) has been transforming industries and revolutionizing business operations. AI’s potential to enhance efficiency and productivity has become crucial to many businesses. As we move into 2023, several