similar to: Long string in crypting

Displaying 20 results from an estimated 800 matches similar to: "Long string in crypting"

2006 Feb 06
5
Sentry Plugin - Easy Question I don''t doubt
I am looking at adding the Sentry plugin to one of the applications that we are working on. I have a need to store some info that will have to be encrypted and decrypted. I have been going through the docs for the plugin and the AsymetricSentry class looks like the best for what we need to do but I am not sure how to generate the key. The docs say: This is a shortcut for using an
2005 Dec 17
2
Encrypting files
Anyone know of a good (fast) way to encrypt/decrypt uploaded files in RoR? I''ve seen this project: http://ezcrypto.rubyforge.org/ but it only seems to encrypt strings and such. I need to encrypt files once they are uploaded, then decrypt them when they request the file back. Any ideas? Thanks, Mark -- Posted via http://www.ruby-forum.com/.
2006 Apr 23
1
ezcrypto HELP!!!!
I''m using the ezcrypto library for aes encryption, but i''m running into some weird cases that i cant seem to figure out. What i''m doing is trying to encrypt someting in php using standard AES 128. I''m taking the output from php and trying to decrypt it with ruby using ezcrypto. This seems to work for a lot of cases, but it does not work for some others. Any
2008 Dec 13
2
Need Help in converting php encryption decryption code to ruby on rails
Hi guys i found this encryption decryption in php and try to convert it in rails but i am unable to successfully convert it. So plz help me. I you write the whole conversion code then it will be great. PHP code is like this ================ # #/********************************************** #** #** MD5 block cypher #** #** Author..: leapinglangoor [
2006 Jun 09
1
crypto-key.rb
Does anyone know how to implement the crypto-key.rb as found on http://swik.net/Typo/too-biased/Simple+Encryption/ckpz It allows for encryption and decryption of credit card numbers that are stored in a database. I am somewhat new to Rails, and I don''t always know how to use libraries and modules. Thanks, will clark // graphic design www.willclarkdesigns.com/
2015 Jan 26
3
Apache and SSLv3
Hi list, I'm configuring apache with https and I've a question about sslv3 deactivation. Running "openssl ciphers -v" I get a list of cypher suite of openssl like: ECDH-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH/RSA Au=ECDH Enc=AESGCM(128) Mac=AEAD ......... Each lines report relative protocol. Disabling sslv3 with "SSLProtocol all -SSLv3" I can use cypher like:
2011 Mar 07
1
blowfish encrypted url in ruby
How to encrypt and decrypt the url using blowfish in ruby? ex: url= http://localhost:3000?username=vam&paswd=1234&street=hyd&contact=999999999&company=raymarine&city=hyd&state=UP&country=ZP&zip_code=543211 please help its very urgent. Thanks in advance - Vam -- Posted via http://www.ruby-forum.com/. -- You received this message because you are subscribed to
2018 Dec 08
1
"no shared cypher", no matter what I try
Have you tried connecting with openssl c_client, with a cypher list of all? My suspicion is that one of the pair of programs is only using old, weak cyphers [due to age and the other only strong ones. David -------------- next part -------------- An HTML attachment was scrubbed... URL: <https://dovecot.org/pipermail/dovecot/attachments/20181208/4e12a00c/attachment.html>
2015 Jun 04
2
managing logins for different classes of servers
Our environment has several "classes" of servers, such as "development", "production", "qa", "utility", etc. Then we have all our users. There's no obvious mapping between users and server class. Some users may have access to only one class, some may span multiple classes, etc. And for maximum complexity, some classes of machines use local
2004 Aug 06
1
icecast - it is what i search
Hi! I want to realize a realtime DJ Battle where some DJs enter in a virtual cypher and start a HipHop Battle. For example, there are 5 DJs an 5 listener in the Jury. Only one DJ my play at present and the others can only listen. After 2 minutes and a little break another DJ is on the turn and so on. Is icecast what i want? Can i realize it with icecast? thanks, buelent -- buelent caliskan
2015 Sep 24
2
decode http hack attempt?
Can anyone de-cypher the second entry for me? --------------------- httpd Begin ------------------------ Requests with error response codes 403 Forbidden /: 9 Time(s) /?c=4e5e5d7364f443e28fbf0d3ae744a59a: 3 Time(s) I have found the string via Google but have not located any explanation. -- *** e-Mail is NOT a SECURE channel *** Do NOT transmit
2011 Mar 24
4
{OT] Re: Installing IMA (Integrity Measurement Architecture) on CentOS 5.5
Greetings, On 3/24/11, Akemi Yagi <amyagi at gmail.com> wrote: > I should note, however, that they are not for production use. > > Akemi Thanks Akemi very much for your always relevant and brilliant works. </rant> As an Indian, where "veda" repository of knowledge originated, I have always looked at every member of this list as a repository of knowledge.
2006 Feb 19
2
Asynchronous Encryption?
Hi Railers, I''m looking for something to do asynchronous encryption - where the encryption and decryption keys are different. This is for a scenario where I want to be able to store some information in the database that can only be decrypted in a different physical location using a secret private key (which will not be stored on the machine doing the encrypting). I''m trying
2006 Apr 17
2
Encrypting Ogg
Howdy. I have a application I'm developing where I need to encrypt the data inside an OGG stream. I will be using a regular block cypher (AES, or others... configurable); and I would like to encrypt the pages in an OGG stream. I'm thinking that if I sit my decrypter in between the reading application and the encrypted file, you should be able to use all the normal seeking
2015 Feb 07
2
TLS config check
Am 07.02.2015 um 10:10 schrieb SW: > I've just done a test with K9 mail on Android 4.4.2 and this is what I > see in the log: > > ECDHE-ECDSA-AES128-SHA (128/128 bits) > > But when using Thunderbird I see: > > ECDHE-ECDSA-AES128-GCM-SHA256 (128/128 bits) > > I'm happy that Thunderbird is using a secure cipher but is Android? Is > ECDHE-ECDSA-AES128-SHA
2002 Jul 24
2
[Bug 368] TTSSH will not connect to OpenSSH_3.4p1
http://bugzilla.mindrot.org/show_bug.cgi?id=368 ------- Additional Comments From mindrot at regs.nebcorp.com 2002-07-24 12:16 ------- Just make life easier: TeraTerm 2.3 http://hp.vector.co.jp/authors/VA002416/ttermp23.zip TTSSH 1.5.4 plugin http://www.cs.cmu.edu/~roc/ttssh154.zip ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the
2009 May 06
4
Encrypting large amounts of text
Hi, I have an application where I want to be able to encrypt large amounts of text before storing them to my DB (MySQL Text field - might be switched to a Blob). I have an idea of how to do this, but was wondering what the general consensus is within the community regarding the issue. I have come across a couple different plug ins/gems (Stringbox, EzCrypto), but am wondering what other people
2003 Apr 11
2
How often should an encrypted session be rekeyed?
Using OpenSSL, is there a preferred/recommended rate of rekeying an encrypted stream of data? Does OpenSSL handle this for developers behind the scenes? Does it even need to be rekeyed? Thanks in advance. -sc -- Sean Chittenden -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 202 bytes Desc: not available
2018 Dec 08
6
"no shared cypher", no matter what I try
Greetings, I have had to reinstall my email server on another Linux (centos 7.6) VPS, with a newer version of dovecot, other software and a brand new letsencrypt certificate just for email withpostfix and dovecot (that certificate works fine with postfix). Output of dovecot --version and dovecot -n on the new server is below. Now, messages ARE delivered in the right IMAP mailboxes, but when I try
1998 May 30
9
"Flavors of Security Through Obscurity"
This was posted not too long ago on sci.crypt... Enjoy... I think the most relevant information is near the top, but it''s all quite good... :-) -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- There is no intrinsic difference between algorithm and data, the same information can be viewed as data in one context and as algorithm in another. Why then do so many people claim that encryption algorithms