Solved

Password field using readln

Posted on 1997-10-13
4
332 Views
Last Modified: 2010-05-18
I want to make a readln statement which will do a password
I want when the person types it in, that the cursor
WON'T move.  No character's should echo.  Thank you
0
Comment
Question by:weinrj
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 

Accepted Solution

by:
berox earned 50 total points
ID: 1216196
You can try to write a interrupt handler for the keyboard interrupt, that will be activated if you want the password to be entered.
You read port[$60] (keyboard) by yourself and give an End of Interrupt (EOI) at the end of the handler than exit procedure without giving control to the original keyboard handler.
After validating the password you restore the old keyboard interrupt.
There are some good documents about the keyboard-port (where I can't tell you right now ), but if there are some kind of problems just let me know.
NO code right now, first try it yourself ...  
0
 

Author Comment

by:weinrj
ID: 1216197
He seems to know what he is talking about, but, I really wanted
the source code.  It is nice that you want me to learn, but,
I just wanted to learn in a different way...Learning by seeing.


0
 

Expert Comment

by:berox
ID: 1216198
It was not my meaning to let you without code, but I just hadn't the time to type in the full code ... so I thought maybe he manage it with the text.
If you really want to have code just give a comment with your email in it , and I will sent you an example.    
0
 

Author Comment

by:weinrj
ID: 1216199
ok,  berox...I am sorry I yelled at you.
My addresses are as follows:
Primary: kaiser@cybernex.net
2nd    : Johann321@aol.com
3rd    : weinrj@bergen.org

k? thanx...bye!
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this post we will be converting StringData saved within a text file into a hash table. This can be further used in a PowerShell script for replacing settings that are dynamic in nature from environment to environment.
There are times when we need to generate a report on the inbox rules, where users have set up forwarding externally in their mailbox. In this article, I will be sharing a script I wrote to generate the report in CSV format.
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

696 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question