Quantcast
Channel: SecurityXploded Blog » Secure Coding
Browsing latest articles
Browse All 11 View Live

Image may be NSFW.
Clik here to view.

CryptoCode: Generate MD5 Hash using Windows Cryptography Library

Here I have decided to put together series of Crypto sample using Windows Cryptography functions as well as OpenSSL library. This is to make it easier for myself as well as others to find ready [...]

View Article



Image may be NSFW.
Clik here to view.

CryptoCode: Generate SHA1/SHA256 Hash using Windows Cryptography Library

In my previous blog post on ‘Generating MD5 Hash’,  I wrote code example on creating MD5 hash.  Today I will be presenting the direct code sample for generating SHA1 hash using Windows Cryptography...

View Article

Image may be NSFW.
Clik here to view.

CryptoCode: DES Encryption & Decryption using SHA1 Hash Key

In previous posts, I wrote example code for generating MD5 Hash & SHA1 Hash using Windows Cryptography Functions. Here I am going to write about DES encryption/decryption algorithm with SHA1 based...

View Article

Image may be NSFW.
Clik here to view.

CryptoCode: Base64 Decoder

In previous blog posts I had written about MD5 & SHA256 Hash generation algorithms as well as DES Encryption/Decryption methods using Windows Cryptography Functions.  Today I am going to present a...

View Article

Image may be NSFW.
Clik here to view.

Crypto Code: Base64 Encoder

In previous posts I had written about Base64 decoder and other hashing algorithms using Windows Cryptography functions.  In this post I will write simple C program for BASE64 Encoder. . Due to its...

View Article


Image may be NSFW.
Clik here to view.

CryptoCode: Index of All Crypto Articles

Recently I had been writing about code samples for demonstrating the usage of various Cryptography functions such as generating MD5/SHA256 hash generation, encryption of password based on the key,...

View Article

Image may be NSFW.
Clik here to view.

CryptoCode: Create SHA256 Hash using OpenSSL

In the previous CryptoCode series articles, I had written about generating MD5/SHA1/SHA256 hashes, encryption/decryption algorithms using Windows Cryptography functions. Today I am writing about...

View Article

Image may be NSFW.
Clik here to view.

Book of the Month – Android in Action

Lately I was looking for the best & latest book on Android programming and after stumbling through many of the Android books on Amazon I finally got exactly what I was looking for! . The [...]

View Article


Image may be NSFW.
Clik here to view.

Demystifying Compiler Optimization – Difference between Visual C++ 2010 and...

I analyzed some simple source code examples running in visual C++ (without optimization option) and Dev C++. I saw that VC++ code is slightly optimized then DEV C++. The following code shows the...

View Article


Image may be NSFW.
Clik here to view.

Using PEB to Get Base Address of Kernelbase.dll

Process Environment Block (PEB) is a user mode data structure which applies over a whole process. It is designed to be used by the application-mode code in the operating system libraries, such as...

View Article
Browsing latest articles
Browse All 11 View Live


Latest Images