Solved

Password field using readln

Posted on 1997-10-13
4
326 Views
Last Modified: 2010-05-18
I want to make a readln statement which will do a password
I want when the person types it in, that the cursor
WON'T move.  No character's should echo.  Thank you
0
Comment
Question by:weinrj
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 

Accepted Solution

by:
berox earned 50 total points
ID: 1216196
You can try to write a interrupt handler for the keyboard interrupt, that will be activated if you want the password to be entered.
You read port[$60] (keyboard) by yourself and give an End of Interrupt (EOI) at the end of the handler than exit procedure without giving control to the original keyboard handler.
After validating the password you restore the old keyboard interrupt.
There are some good documents about the keyboard-port (where I can't tell you right now ), but if there are some kind of problems just let me know.
NO code right now, first try it yourself ...  
0
 

Author Comment

by:weinrj
ID: 1216197
He seems to know what he is talking about, but, I really wanted
the source code.  It is nice that you want me to learn, but,
I just wanted to learn in a different way...Learning by seeing.


0
 

Expert Comment

by:berox
ID: 1216198
It was not my meaning to let you without code, but I just hadn't the time to type in the full code ... so I thought maybe he manage it with the text.
If you really want to have code just give a comment with your email in it , and I will sent you an example.    
0
 

Author Comment

by:weinrj
ID: 1216199
ok,  berox...I am sorry I yelled at you.
My addresses are as follows:
Primary: kaiser@cybernex.net
2nd    : Johann321@aol.com
3rd    : weinrj@bergen.org

k? thanx...bye!
0

Featured Post

Secure Your Active Directory - April 20, 2017

Active Directory plays a critical role in your company’s IT infrastructure and keeping it secure in today’s hacker-infested world is a must.
Microsoft published 300+ pages of guidance, but who has the time, money, and resources to implement? Register now to find an easier way.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
SetWindowsHookEx capturing unicode (universal) characters ? 1 1,820
JSon parser in Delphi 1 7,215
Embarcadero Interbase 9 774
.dat problems 39 210
Arrow Electronics was searching for a KVM  (Keyboard/Video/Mouse) switch that could display on one single monitor the current status of all units being tested on the rack.
Always backup Domain, SYSVOL etc.using processes according to Microsoft Best Practices. This is meant as a disaster recovery process for small environments that did not implement backup processes and did not run a secondary domain controller that ne…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
A short tutorial showing how to set up an email signature in Outlook on the Web (previously known as OWA). For free email signatures designs, visit https://www.mail-signatures.com/articles/signature-templates/?sts=6651 If you want to manage em…

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question