Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. Encryption Programs Algorithms

Encryption Programs Algorithms

Scheduled Pinned Locked Moved The Lounge
securityquestionlearning
10 Posts 8 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • A Offline
    A Offline
    Anonymous12345678
    wrote on last edited by
    #1

    I've been working on a personal project for a while and I can see that it has some potential misuses if the source code was ever stolen. Anyways I wanted to encrypt my source code files incase my laptop was ever stolen. Anybody have any suggested on what the strongest encryption program and algorithms are? Also can anybody suggest a good book on the subject? I would like to become more knowledgeable about the subject myself. Thanks in advance.

    L H R Mike HankeyM D 5 Replies Last reply
    0
    • A Anonymous12345678

      I've been working on a personal project for a while and I can see that it has some potential misuses if the source code was ever stolen. Anyways I wanted to encrypt my source code files incase my laptop was ever stolen. Anybody have any suggested on what the strongest encryption program and algorithms are? Also can anybody suggest a good book on the subject? I would like to become more knowledgeable about the subject myself. Thanks in advance.

      L Offline
      L Offline
      Lost User
      wrote on last edited by
      #2

      Truecrypt, that has 256 and 102 bit algorithms available. The main thing is to make your passphrases personal, that only you would know.

      Join the cool kids - Come fold with us[^]

      1 Reply Last reply
      0
      • A Anonymous12345678

        I've been working on a personal project for a while and I can see that it has some potential misuses if the source code was ever stolen. Anyways I wanted to encrypt my source code files incase my laptop was ever stolen. Anybody have any suggested on what the strongest encryption program and algorithms are? Also can anybody suggest a good book on the subject? I would like to become more knowledgeable about the subject myself. Thanks in advance.

        H Offline
        H Offline
        Henry Minute
        wrote on last edited by
        #3

        Depends on your OS but BitLocker[^] might be a possibility. ***WARNING*** Do some research on this, as I vaguely remember reading about some problems with it. If there were, they may have been fixed, or indeed I may be totally misremembering it. :)

        Henry Minute Do not read medical books! You could die of a misprint. - Mark Twain Girl: (staring) "Why do you need an icy cucumber?" “I want to report a fraud. The government is lying to us all.”

        1 Reply Last reply
        0
        • A Anonymous12345678

          I've been working on a personal project for a while and I can see that it has some potential misuses if the source code was ever stolen. Anyways I wanted to encrypt my source code files incase my laptop was ever stolen. Anybody have any suggested on what the strongest encryption program and algorithms are? Also can anybody suggest a good book on the subject? I would like to become more knowledgeable about the subject myself. Thanks in advance.

          R Offline
          R Offline
          Ravi Bhavnani
          wrote on last edited by
          #4

          Here's[^] a freebie if you're interested. /ravi

          My new year resolution: 2048 x 1536 Home | Articles | My .NET bits | Freeware ravib(at)ravib(dot)com

          A 1 Reply Last reply
          0
          • A Anonymous12345678

            I've been working on a personal project for a while and I can see that it has some potential misuses if the source code was ever stolen. Anyways I wanted to encrypt my source code files incase my laptop was ever stolen. Anybody have any suggested on what the strongest encryption program and algorithms are? Also can anybody suggest a good book on the subject? I would like to become more knowledgeable about the subject myself. Thanks in advance.

            Mike HankeyM Offline
            Mike HankeyM Offline
            Mike Hankey
            wrote on last edited by
            #5

            Anonymous12345678 wrote:

            I've been working on a personal project for a while and I can see that it has some potential misuses if the source code was ever stolen.

            We have ways to make you talk. muahahaha

            Never use money to measure wealth! http://www.hq4thmarinescomm.com[^] My Site

            1 Reply Last reply
            0
            • A Anonymous12345678

              I've been working on a personal project for a while and I can see that it has some potential misuses if the source code was ever stolen. Anyways I wanted to encrypt my source code files incase my laptop was ever stolen. Anybody have any suggested on what the strongest encryption program and algorithms are? Also can anybody suggest a good book on the subject? I would like to become more knowledgeable about the subject myself. Thanks in advance.

              D Offline
              D Offline
              Dr Walt Fair PE
              wrote on last edited by
              #6

              Just write it in Visual Basic with lots of Goto's. No real hacker could stand to figure out that code.

              CQ de W5ALT

              Walt Fair, Jr., P. E. Comport Computing Specializing in Technical Engineering Software

              L 1 Reply Last reply
              0
              • D Dr Walt Fair PE

                Just write it in Visual Basic with lots of Goto's. No real hacker could stand to figure out that code.

                CQ de W5ALT

                Walt Fair, Jr., P. E. Comport Computing Specializing in Technical Engineering Software

                L Offline
                L Offline
                leonej_dt
                wrote on last edited by
                #7

                Even better: Write it in INTERCAL with lots of COME FROMs.

                Eduardo León

                G 1 Reply Last reply
                0
                • L leonej_dt

                  Even better: Write it in INTERCAL with lots of COME FROMs.

                  Eduardo León

                  G Offline
                  G Offline
                  Gary R Wheeler
                  wrote on last edited by
                  #8

                  I made the mistake of looking up INTERCAL[^]. I feel so... used.

                  Software Zen: delete this;
                  Fold With Us![^]

                  1 Reply Last reply
                  0
                  • R Ravi Bhavnani

                    Here's[^] a freebie if you're interested. /ravi

                    My new year resolution: 2048 x 1536 Home | Articles | My .NET bits | Freeware ravib(at)ravib(dot)com

                    A Offline
                    A Offline
                    Anonymous12345678
                    wrote on last edited by
                    #9

                    Interesting, what documents did you read to learn how to write that?

                    R 1 Reply Last reply
                    0
                    • A Anonymous12345678

                      Interesting, what documents did you read to learn how to write that?

                      R Offline
                      R Offline
                      Ravi Bhavnani
                      wrote on last edited by
                      #10

                      Just the .NET crypto API docs. /ravi

                      My new year resolution: 2048 x 1536 Home | Articles | My .NET bits | Freeware ravib(at)ravib(dot)com

                      1 Reply Last reply
                      0
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Don't have an account? Register

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups