Solved

Password field using readln

Posted on 1997-10-13
4
308 Views
Last Modified: 2010-05-18
I want to make a readln statement which will do a password
I want when the person types it in, that the cursor
WON'T move.  No character's should echo.  Thank you
0
Comment
Question by:weinrj
  • 2
  • 2
4 Comments
 

Accepted Solution

by:
berox earned 50 total points
ID: 1216196
You can try to write a interrupt handler for the keyboard interrupt, that will be activated if you want the password to be entered.
You read port[$60] (keyboard) by yourself and give an End of Interrupt (EOI) at the end of the handler than exit procedure without giving control to the original keyboard handler.
After validating the password you restore the old keyboard interrupt.
There are some good documents about the keyboard-port (where I can't tell you right now ), but if there are some kind of problems just let me know.
NO code right now, first try it yourself ...  
0
 

Author Comment

by:weinrj
ID: 1216197
He seems to know what he is talking about, but, I really wanted
the source code.  It is nice that you want me to learn, but,
I just wanted to learn in a different way...Learning by seeing.


0
 

Expert Comment

by:berox
ID: 1216198
It was not my meaning to let you without code, but I just hadn't the time to type in the full code ... so I thought maybe he manage it with the text.
If you really want to have code just give a comment with your email in it , and I will sent you an example.    
0
 

Author Comment

by:weinrj
ID: 1216199
ok,  berox...I am sorry I yelled at you.
My addresses are as follows:
Primary: kaiser@cybernex.net
2nd    : Johann321@aol.com
3rd    : weinrj@bergen.org

k? thanx...bye!
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Get to know the ins and outs of building a web-based ERP system for your enterprise. Development timeline, technology, and costs outlined.
Is your Office 365 signature not working the way you want it to? Are signature updates taking up too much of your time? Let's run through the most common problems that an IT administrator can encounter when dealing with Office 365 email signatures.
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now