Solved

Encryption of data blocks

Posted on 2001-09-17
3
144 Views
Last Modified: 2010-04-04
  Can any one send me the source code for encrypting the data send over a socket connection?.The data is send in the form of IDataBlock.A commpression demo for compressing IDataBlock is found in the Demos provided with delphi5.I want to create an encryption utility similar to this.
0
Comment
Question by:pradeep_pc
  • 2
3 Comments
 
LVL 3

Expert Comment

by:f15iaf
ID: 6487862
download encryption component you can use to encrypt and decrypt the socket message
0
 

Author Comment

by:pradeep_pc
ID: 6489610
Where will I down load it?..
0
 
LVL 3

Accepted Solution

by:
f15iaf earned 50 total points
ID: 6491759
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

The uses clause is one of those things that just tends to grow and grow. Most of the time this is in the main form, as it's from this form that all others are called. If you have a big application (including many forms), the uses clause in the in…
Introduction The parallel port is a very commonly known port, it was widely used to connect a printer to the PC, if you look at the back of your computer, for those who don't have newer computers, there will be a port with 25 pins and a small print…
In a recent question (https://www.experts-exchange.com/questions/28997919/Pagination-in-Adobe-Acrobat.html) here at Experts Exchange, a member asked how to add page numbers to a PDF file using Adobe Acrobat XI Pro. This short video Micro Tutorial sh…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question