- Feature Articles
- CodeSOD
- Error'd
- Forums
-
Other Articles
- Random Article
- Other Series
- Alex's Soapbox
- Announcements
- Best of…
- Best of Email
- Best of the Sidebar
- Bring Your Own Code
- Coded Smorgasbord
- Mandatory Fun Day
- Off Topic
- Representative Line
- News Roundup
- Editor's Soapbox
- Software on the Rocks
- Souvenir Potpourri
- Sponsor Post
- Tales from the Interview
- The Daily WTF: Live
- Virtudyne
Admin
It is sort of obvious who the vendor is from performing a seach on FieldSmartConfiguration. I won't repeat it here but you can look it up if you want.
Looking at the pages returned by the search, I found this bit of text:
"(vendor's name) compression algorithm converts your GIS, customer, and various other data sets into the FieldSmart format, increasing the speed at which you can navigate, search and route around your mapping data."
Looks like a really high tech compression algorithm to me... ;-)
Admin
No use this ClVzZSBmaXJlZm94IGFuZCBpbnN0YWxsIHRoZSAiTGVldCBrZXkiIGFkZG9uLiBJdCBhbGxvd3Mg aW5saW5lIGRlY29kaW5nIGFuZCBlbmNvZGluZyBvZiBiYXNlNjQgd2l0aCBhIHNpbXBsZSByaWdo dCBjbGljayBtZW51Lg==
Admin
I believe by this definition, English is an encryption scheme as you clearly need the special knowledge of "reading English" to understand it.
I'm pretty sure that using general language definitions for technical terminology on a technical site could be your error.
I'm pretty sure we're about to invoke Godwin's Law though.
Admin
Admin
Admin
The point is (WRT Base64), that by changing the values 6,8 the algorithm remains the same - irrespective of whether we are still encoding base64 (that's just our name for the algorithm). Similarly, in ROT13 we simply shift 13 characters - in the Caeser Cipher we shift 3 characters - it's still the same algorithm, just with a different key.
I find it hard to distinguish between algorithm and key in this situation. by defining an algorithm, we are in affect defining a key - because there will always be some fixed value (possibly 1) in that algorithm that can be changed, thus I reject the claim that the distinction between Encryption and Encoding is the presence (or lack thereof) of a key...
I think the problem is that Encryption and Encoding have different contexts. Encryption is the act of trying to hide something by changing it into an unrecognizable form (that still has sufficient pattern to be restored to it's former glory). Encoding is the act of trying to change something to guarantee that it can reliably be stored/sent (with the obvious requirement that it can still be restored). So it seems that it's all intent-dependent. Encoding can be Encryption, and Encryption can be Encoding - it's all in the eye of the beerholder (though as someone before me points out, you wouldn't exactly encode using RSA if you were keen on efficiency, nonetheless it is an approach that people could take).
Put simply, people here are arguing at a technical level, concepts which really differ on a non-technical level. But I'm sure I won't convince them any different
Admin
Arguing the semantics that the two terms are essentially the same is to remove all purpose in having specific words at all.
For example, FindLaw defines encryption as "the conversion of data into a form not readily understood by unauthorized people, called cipehertext. Decryption is the conversion of encrypted data back into its original form, so it can be understood. Encryption can be as simple as substituting numbers for letters, or as complex as rearranging data bits using computer algorithms."
Base64's intent/purpose/use/whatever is not to prevent unauthorized access. Could someone use it for that purpose... if they are stupid...sure... but thats it is not the purpose of Base64.
Admin
[quote user="Anon"][quote user="EvanED"I agree in the sense that there is a very different connotation to each. I disagree in the sense that I think it would be quite hard to come up with a definition that draws a sharp line between the two (or separating out a subset of encodings as "not encryption")[/quote]
No, it's very easy to come up with a sharp line. If some data is transformed into some other form with the purpose of hiding it, then it's encryption. If data is transformed for the purpose of transporting or storing it, it's encoding. Whether or not an encryption is strong or not is beside the point. Sometimes you might do both to the same set of data.
XML, ASCII, Unicode are encodings. They are designed for ease and efficiency of storage and transmission of information.
RSA is encryption, regardless of whether or not it's breakable. Nobody would use RSA just for transporting or storing data unless they also intended to hide it from prying eyes.[/quote]
Bingo!! +1
Admin
I hasnt license routine because users are so stupid that cannot run the software alone not even one day without support. My software is very complicated to configure also.
+1
Admin
class Crypografy : Enconding class Apple : Food, Fruit why this is very dificult for people understand.
Admin
why? tell it was for fun tell. please!
Admin
こんにちは。。。
Admin
Was this an iSoft product?
Admin
Thijs is a Dutch form of Matthew, so I'd bet on him being from either the Netherlands, the Dutch speaking part of Belgium (Flanders), or maybe South Africa.
That tells you nothing about where he works. But if I had to make an educated guess about where I could grab a macchiato with Thijs at his nearest Starbucks, I'd book a plane to Schiphol (Amsterdam airport).
Admin
Here's a complete program to decode Base64, if you really need one:
KGxldCBsb29wICgobmV4dC1jaGFyIChyZWFkLWNoYXIpKQ0KCSAgICAgKHJlc3VsdCAnKCkpKQ0K ICAgIChpZiAoZW9mLW9iamVjdD8gbmV4dC1jaGFyKQ0KCShieXRlcy0+c3RyaW5nL3V0Zi04DQoJ IChiYXNlNjQtZGVjb2RlIChzdHJpbmctPmJ5dGVzL3V0Zi04IChsaXN0LT5zdHJpbmcgKHJldmVy c2UgcmVzdWx0KSkpKSkNCgkobG9vcCAocmVhZC1jaGFyKSAoY29ucyBuZXh0LWNoYXIgcmVzdWx0 KSkpKQ0K
Admin
Admin
Admin
Admin
No the unbreakable quadruple ROT-13
Admin
any symetric encryption are using a secret. That secret can be found. If the business case is, not a lot of pirated version of the software. The customer will not accept the tool to "phone home" to validate the xml or get a key. Then this is a realy good solution.
Admin
Back in the 80's a certain large three-letter-named mainframe manufacturer that is no longer making hardware offered a "software" upgrade for their printers that made them go significantly faster. A UK based engineer reverse engineered the patch from a machine core dump (that ironically came off the printer) and figured out that the "patch" was a bunch of NOPs that overwrote the delay loop that had originally been added to address timing issues between the mainframe and the printer. Said engineer and employer received the attentions of the manufacturer's legal representatives.
Admin
No doubt management was savvy enough to sign a contract that prevented anyone but the vendor from making any changes to the software. Common, especially in government.
Admin
thanks for info
Addendum 2024-04-25 09:20: I connected with a team of dedicated software developers on a website, and together, we've successfully launched my trading platform online. Their commitment to excellence and innovative approach to software development sloboda-studio.com have been pivotal in bringing my vision to life. With their expertise, we've built a robust and scalable platform that caters to the diverse needs of traders in today's dynamic market. Thanks to their support, I'm confident that my trading platform is poised for success, empowering users to achieve their financial goals with ease.