Encryption scripts download

[

more than 600 encryption scripts found, showing only first 300 encryption articles

]
«« « 12345678910 » »»
336 336

... very standard way of performing encryption in PHP without extensions.There is not too much ... need to store passwords in ... that does not inherently require any other dependencies.The method of encryption is passed along with the encryption ... itself. This means that the default encryption method can change for the site, or developers can ... specific method.By default keys are based from the hash that ...

... Encrypt and decrypt data using mcrypt function. Check if mcrypt is installed on your ... system. Following algorithms are supported: Blowfish, RC2, Safer-sk64 xtea, Cast-256, RC4, Safer-sk128, DES, ... RC4-iv, Serpent, Enigma, Rijndael-128, Threeway, Rijndael-192, TripleDES, LOKI97, Rijndael-256, Twofish, Panama, Saferplus and Wake. ...

... 100 on an encryption utility. This COM-accessible full-featured encryption library supports all of the .NET encryption types ... VB.NET, and any other language that supports COM or .NET. Supported encryption types include ... RSA and DSA. Features also include: CSP private key storage and retrieval, support for ... DER encoded binary X.509 certificates, and more. Purchase includes unlimited internal developer use, royalty-free distribution, complete MSDN-style ...

... Just another basic algorithmic encryption example.Just another basic algorithmic encryption example. ...

... This code creates self-decrypting encrypted messages robustly. User defined alphabets may be defined at runtime, or hardcoded ... into the code. This is rot-13 encryption handled intuitively. ...

... This COM-accessible full-featured encryption library supports all of the .NET encryption types because ... Supported encryption types include: Symmetric ... DSA Features also include: CSP private key storage and retrieval, support for ...

... Encryption is an innovative one-way encryption algorithm. SGK is similar to other one-way encryption algorithms ... commonly known as digital signature algorithms) in that it cannot be or is difficult ... to decrypt. SGK differs from other such algorithms due to the method it uses. SGK encrypts ... itself by using itself as the encryption key. Therefore, criminals will be theoretically incapable of ...

... Ami-Encryption will scramble text by add fake text in between chunks of real text. ... good alternative to encryption making letters and numbers unreadable with PHP pure ... scripting. Can be used to protect variables like Cookies, Sessions, GET and POST from page ... to page or to MySQL database. Features ...

... Fundamental encryption example code shows the skeleton structure of most encryption algorithms in existance.Fundamental encryption example ... code shows the skeleton structure of most encryption algorithms in existance. ...

... data block can be encrypted using ... specified key.The encrypted data is returned encoded with ... variant of the base64 encoding algorithm that replaces ... can also do the opposite, i.e. decrypt the data with the same key after decoding the base64 ...

... This script helps you to get the octal representation of text.This script helps you to get ... the octal representation of text. ...

... Shows very very simple encryption.Shows very very simple encryption. ...

... Some users will be able to see other users passwords in plain text if they have ... module also provides an API for developers which implement the aes ... decrypt functions.InstallationUnpack in your modules folder ... usually /sites/all/modules/) and enable under Administer ...

... Send your message securely over the internet ... Your recipient must know the secret 'seed' you use to encrypt your message. Without it, ... your message remains ... take your 'seed', which should be ... one time pad against the text of your message. As ...

... 64-bit block size and ... variable key length from 32 up to 448 bits. Limitations ... If the encryption key is lost, so is the data. ...

... slightly reduced strength bulk encryption. In exchange for the reduced strength, ... you get the ability to rsync the encrypted files, so that local changes in the plaintext file ... local changes to the cyphertext file. Demands ...

... Send your messages secure using simple encryption systemSend your messages secure using simple encryption system ...

... Scrambling text by add fake text in between chunks of real text. ... good alternative to encryption making letters and numbers unreadable with PHP pure ... scripting. Can be used to protect variables like Cookies, Sessions, GET and POST from ... scripting. Can be used to protect variables like Cookies, Sessions, GET and POST from ...

... demonstration of AES encryption implemented in javascript. Includes 16 character password ... generation and encrypt/decrypt functions. ...

... Data strings are encrypted with ... key.The class can also do the opposite, i.e. recover the original data decrypting it with the same ...

... The MD5 hashing algorithm is applied several times, making it much ... harder revert to the original string. Demands ...

... an audio file or an image as your encryption key, or you can just use ... simple password. This program includes three encryption modes: Standard, Binary, and Text. Binary and Text modes ... are ment to improve encryption for ... small key such as ...

... 64-bit private key block cipher, in the tradition of DES.However, unlike DES, ... against differential and linear cryptanalysis, and has no key complementation weaknesses or weak keys. In addition, its ... key size can be any multiple of 64 bits, whereas the DES key is limited to 56 ... bits. The purpose of encryption is to conceal information from prying eyes. Given ...

... protect your messages using ROT13 encryptionROT13 Encryption ... protect your messages using ROT13 encryption ...

... Ole Automation Procedures'.It does this via sp ... Ole Automation Procedures ...

... class encrypt and decrypts text strings using pure PHP, thus without any special encryption extensions.It uses ... simple algorithm that is strong enough for normal usage. ...

... AES (Advanced Encryption Standard) is ... symmetric-key encryption standard used by the U.S. government. The included ... and works in any environment.A working sample is included with the package.The keys and vectors in the ... dll source file are factors that determine uniqueness of the encryption. ... Change them before any usage to avoid leaks or hacks. ...

... given PHP script can be parsed and the names of used variables can be replaced with more ... obfuscated names. The new names of the replaced variables can be retrieved by looking at ...

... use for simulation the secure morse device.User can input the texts and will be ... encrypt with stream cipher algorithm. The enchipered text will be convert to morse sound. Demands ...

... The module implements the basic XTEA block encryption algorithm ... Python encryption algorithm with no external dependencies. The implementation is relatively ... small volumes of data. Note that the XTEA algorithm has not been subjected to extensive analysis. For ... known and well tested algorithm/implementation. The security of the algorithm is entirely based ...

Scripting encryption programming is written in computer programming languages that is typically interpreted and can be typed directly from a keyboard. Encryption scripts are often distinguished from executable files. This encryption scripts are safe to use virus free and spyware free.

«« « 12345678910 » »»