Can I encrypt shared files on windows server and allow only authenticated domain users have access to these files?
How do I calculate the p and q parameters from e (publickey), d (privatekey) and modulus? I have BigInteger keys at hand I can copy paste into code. One publickey, one privatekey and a modulus.
Now CAPICOM is deprecated, and MSDN recommends to use .net classes from System.Security.Cryptography. But I have one 开发者_运维技巧Lotus Notes application, which using CAPICOM from LotusScript code
Closed. This question is off-topic. It is not currently accepting answers. Want to improve this question? Update the question so it's on-topic for 开发者_如何学GoStack Overflow.
I was arguing about an S3 like aproach using authorization hash with a secret key as the seed and some data on the request as the message signed with hmac sha1 (Amazon S3 way) vs an other developer su
It is trivial to use a secure hash function like SHA-256, and continuing to use MD5 for security is reckless behavior. However, there are some complexities to hash function vulnerabilities that I woul
I need to run LuaCrypto on win platform. Does anyone know how to do 开发者_运维百科it?I just pushed CMakeLists.txt to my luacrypto fork. That means if you have:
I want to develop a Key generator for my phone applications.Currently I am using an external service to do the job but I am a little concerned that the service might go offline one day hence I will be
Can anyone please identify is there any possible memory leaks in following code. I have tried with .Net Memory Profiler and it says \"CreateEncryptor\" and some other functions are leaving unmanaged m
I am 开发者_StackOverflowbuilding a suite of batch jobs that require regular access to a database, running on a Solaris 10 machine. Because of (unchangable) design constraints, we are required use a c