I didn’t take it as overreactive. But I have always felt that security measures
should be tempered with the value (or if you like vulnerability) of what is
being secured. You wouldn’t want to institute Fort Knox for example to protect
your piggy bank. Neither would you necessarily need bit level
On Fri, Feb 6, 2015 at 12:43 PM, Richard Gaskin
wrote:
> Security is one of those funny areas in life where the more I learn the
> more I feel I don't really know much at all, or at least not as much as the
> 160+ IQ hacker whose botnet is trying to break into my systems.
The Anthem IT folks pr
Mark Wieder wrote:
> Richard-
>
> Thursday, February 5, 2015, 9:38:56 AM, you wrote:
>
>> (as Mark Wieder is probably typing a reply to this as I'm writing
>> )
>
>
Was I wrong? :)
Even just in principle?
After all, both you and Kyle are partially to blame for my paranoia:
with all that I've
Richard-
Thursday, February 5, 2015, 9:38:56 AM, you wrote:
> (as Mark Wieder is probably typing a reply to this as I'm writing
> )
--
-Mark Wieder
ahsoftw...@gmail.com
This communication may be unlawfully collected and stored by the National
Security Agency (NSA) in secret. The parties to
Bob Sneidar wrote:
> I am not using a web server for this, I am communicating directly
> with the SQL server. I understand that most people regard this as
> a major no-no, but the information being stored is not confidential,
> just names and addresses along with copier and network information.
> Richard wrote:
>
> PS: Annoyance report: If I run that script above as a single line in
> the Message Box, a la:
>
> get binaryDecode("h*", sha1digest(tSomeString), tHex); put tHex
>
> ...the Message Box shows "true", but when I run it in a button it shows
> the expected hex string.
>
>
I am not using a web server for this, I am communicating directly with the SQL
server. I understand that most people regard this as a major no-no, but the
information being stored is not confidential, just names and addresses along
with copier and network information. At some point I intend to s
Bob Sneidar wrote:
> No I am encrypting the password using the encrypt command before
> storing it in mySQL.
Does the system handle authentication, or is it just storing the
password for some other system?
If the password will be decrypted on the server (as Mark Wieder is
probably typing a r
No I am encrypting the password using the encrypt command before storing it in
mySQL.
encrypt thePassword using aes128 with thePassKey
put it into thePassword
get empty
Works fine on a LAN, but not sure what would happen if I passed this through a
20 year old router.
Bob S
> On Feb 5, 2015
Bob Sneidar wrote:
> The issue is whether or not the aes128 hash can pass unmolested
> over the internet. I suppose I could just binary encode/decode
> it for good measure.
Most hashes return binary values directly, but it's common to convert
them to hex for general storage and transport, e.g.:
It’s a simple password entered in the ask password dialog. The issue is whether
or not the aes128 hash can pass unmolested over the internet. I suppose I could
just binary encode/decode it for good measure.
Bob S
> On Feb 4, 2015, at 18:29 , kee nethery wrote:
>
> Need more details.
>
> Wh
Bob-
Wednesday, February 4, 2015, 1:40:15 PM, you wrote:
> ...an SQL server that I will access through the Internet?
Hint... don't do that.
--
-Mark Wieder
ahsoftw...@gmail.com
This communication may be unlawfully collected and stored by the National
Security Agency (NSA) in secret. The par
Need more details.
What are you encrypting? What is the hash of? Need some idea of what you are
attempting to do to answer your question.
Kee Nethery
> On Feb 4, 2015, at 1:40 PM, Bob Sneidar wrote:
>
> Hi all.
>
> I’m using encrypt/decrypt with aes128 cipher. Am I going to need to encode
13 matches
Mail list logo