Displaying 20 results from an estimated 800 matches similar to: "Long string in crypting"
2006 Feb 06
5
Sentry Plugin - Easy Question I don''t doubt
I am looking at adding the Sentry plugin to one of the applications
that we are working on. I have a need to store some info that will
have to be encrypted and decrypted. I have been going through the
docs for the plugin and the AsymetricSentry class looks like the best
for what we need to do but I am not sure how to generate the key. The
docs say:
This is a shortcut for using an
2005 Dec 17
2
Encrypting files
Anyone know of a good (fast) way to encrypt/decrypt uploaded files in
RoR? I''ve seen this project: http://ezcrypto.rubyforge.org/ but it
only seems to encrypt strings and such. I need to encrypt files once
they are uploaded, then decrypt them when they request the file back.
Any ideas?
Thanks,
Mark
--
Posted via http://www.ruby-forum.com/.
2006 Apr 23
1
ezcrypto HELP!!!!
I''m using the ezcrypto library for aes encryption, but i''m running into some
weird cases that i cant seem to figure out.
What i''m doing is trying to encrypt someting in php using standard AES 128.
I''m taking the output from php and trying to decrypt it with ruby using
ezcrypto.
This seems to work for a lot of cases, but it does not work for some
others. Any
2008 Dec 13
2
Need Help in converting php encryption decryption code to ruby on rails
Hi guys i found this encryption decryption in php and try to convert
it in rails but i am unable to successfully convert it. So plz help
me. I you write the whole conversion code then it will be great.
PHP code is like this
================
#
#/**********************************************
#**
#** MD5 block cypher
#**
#** Author..: leapinglangoor [
2006 Jun 09
1
crypto-key.rb
Does anyone know how to implement the crypto-key.rb as found on
http://swik.net/Typo/too-biased/Simple+Encryption/ckpz
It allows for encryption and decryption of credit card numbers that
are stored in a database. I am somewhat new to Rails, and I don''t
always know how to use libraries and modules.
Thanks,
will clark // graphic design
www.willclarkdesigns.com/
2015 Jan 26
3
Apache and SSLv3
Hi list,
I'm configuring apache with https and I've a question about sslv3
deactivation.
Running "openssl ciphers -v" I get a list of cypher suite of openssl like:
ECDH-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH/RSA Au=ECDH Enc=AESGCM(128)
Mac=AEAD
.........
Each lines report relative protocol.
Disabling sslv3 with "SSLProtocol all -SSLv3" I can use cypher like:
2011 Mar 07
1
blowfish encrypted url in ruby
How to encrypt and decrypt the url using blowfish in ruby?
ex: url=
http://localhost:3000?username=vam&paswd=1234&street=hyd&contact=999999999&company=raymarine&city=hyd&state=UP&country=ZP&zip_code=543211
please help its very urgent.
Thanks in advance - Vam
--
Posted via http://www.ruby-forum.com/.
--
You received this message because you are subscribed to
2018 Dec 08
1
"no shared cypher", no matter what I try
Have you tried connecting with openssl c_client, with a cypher list of all?
My suspicion is that one of the pair of programs is only
using old, weak cyphers [due to age and the other only strong ones.
David
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://dovecot.org/pipermail/dovecot/attachments/20181208/4e12a00c/attachment.html>
2015 Jun 04
2
managing logins for different classes of servers
Our environment has several "classes" of servers, such as
"development", "production", "qa", "utility", etc. Then we have all
our users. There's no obvious mapping between users and server class.
Some users may have access to only one class, some may span multiple
classes, etc. And for maximum complexity, some classes of machines
use local
2004 Aug 06
1
icecast - it is what i search
Hi!
I want to realize a realtime DJ Battle where some DJs enter
in a virtual cypher and start a HipHop Battle.
For example, there are 5 DJs an 5 listener in the Jury.
Only one DJ my play at present and the others can only listen.
After 2 minutes and a little break another DJ is on the turn
and so on.
Is icecast what i want? Can i realize it with icecast?
thanks,
buelent
--
buelent caliskan
2015 Sep 24
2
decode http hack attempt?
Can anyone de-cypher the second entry for me?
--------------------- httpd Begin ------------------------
Requests with error response codes
403 Forbidden
/: 9 Time(s)
/?c=4e5e5d7364f443e28fbf0d3ae744a59a: 3 Time(s)
I have found the string via Google but have not located any explanation.
--
*** e-Mail is NOT a SECURE channel ***
Do NOT transmit
2011 Mar 24
4
{OT] Re: Installing IMA (Integrity Measurement Architecture) on CentOS 5.5
Greetings,
On 3/24/11, Akemi Yagi <amyagi at gmail.com> wrote:
> I should note, however, that they are not for production use.
>
> Akemi
Thanks Akemi very much for your always relevant and brilliant works.
</rant>
As an Indian, where "veda" repository of knowledge originated, I have
always looked at every member of this list as a repository of
knowledge.
2006 Feb 19
2
Asynchronous Encryption?
Hi Railers,
I''m looking for something to do asynchronous encryption - where the encryption
and decryption keys are different. This is for a scenario where I want to be
able to store some information in the database that can only be decrypted in
a different physical location using a secret private key (which will not be
stored on the machine doing the encrypting).
I''m trying
2006 Apr 17
2
Encrypting Ogg
Howdy.
I have a application I'm developing where I need to encrypt the data
inside an OGG stream. I will be using a regular block cypher (AES, or
others... configurable); and I would like to encrypt the pages in an OGG
stream.
I'm thinking that if I sit my decrypter in between the reading
application and the encrypted file, you should be able to use all the
normal seeking
2015 Feb 07
2
TLS config check
Am 07.02.2015 um 10:10 schrieb SW:
> I've just done a test with K9 mail on Android 4.4.2 and this is what I
> see in the log:
>
> ECDHE-ECDSA-AES128-SHA (128/128 bits)
>
> But when using Thunderbird I see:
>
> ECDHE-ECDSA-AES128-GCM-SHA256 (128/128 bits)
>
> I'm happy that Thunderbird is using a secure cipher but is Android? Is
> ECDHE-ECDSA-AES128-SHA
2002 Jul 24
2
[Bug 368] TTSSH will not connect to OpenSSH_3.4p1
http://bugzilla.mindrot.org/show_bug.cgi?id=368
------- Additional Comments From mindrot at regs.nebcorp.com 2002-07-24 12:16 -------
Just make life easier:
TeraTerm 2.3
http://hp.vector.co.jp/authors/VA002416/ttermp23.zip
TTSSH 1.5.4 plugin
http://www.cs.cmu.edu/~roc/ttssh154.zip
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the
2009 May 06
4
Encrypting large amounts of text
Hi,
I have an application where I want to be able to encrypt large amounts
of text before storing them to my DB (MySQL Text field - might be
switched to a Blob). I have an idea of how to do this, but was
wondering what the general consensus is within the community regarding
the issue.
I have come across a couple different plug ins/gems (Stringbox,
EzCrypto), but am wondering what other people
2003 Apr 11
2
How often should an encrypted session be rekeyed?
Using OpenSSL, is there a preferred/recommended rate of rekeying an
encrypted stream of data? Does OpenSSL handle this for developers
behind the scenes? Does it even need to be rekeyed?
Thanks in advance. -sc
--
Sean Chittenden
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 202 bytes
Desc: not available
2018 Dec 08
6
"no shared cypher", no matter what I try
Greetings,
I have had to reinstall my email server on another Linux (centos 7.6)
VPS, with a newer version of dovecot, other software and a brand new
letsencrypt certificate just for email withpostfix and dovecot (that
certificate works fine with postfix). Output of dovecot --version and
dovecot -n on the new server is below.
Now, messages ARE delivered in the right IMAP mailboxes, but when I
try
1998 May 30
9
"Flavors of Security Through Obscurity"
This was posted not too long ago on sci.crypt... Enjoy... I think the most
relevant information is near the top, but it''s all quite good... :-)
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
There is no intrinsic difference between algorithm and data, the
same information can be viewed as data in one context and as
algorithm in another. Why then do so many people claim that
encryption algorithms