Solved

Joe Campbell's CRC Algorithm

Posted on 2002-06-24
7
460 Views
Last Modified: 2012-08-14
Hi All,

Is there any Campbell's CRC Algorithm in Visual Basic?

Regards,
Iskandar
0
Comment
Question by:karnaini
7 Comments
 
LVL 1

Expert Comment

by:SiM99
ID: 7106741
I once tried converting a C version of the CRC algorithm to VB... mind if i watch this Q? :)
0
 
LVL 43

Accepted Solution

by:
TimCottee earned 100 total points
ID: 7106797
http://www.freevbcode.com/ShowCode.Asp?ID=2755

Is a VB example of CRC calculation with links etc.
0
 
LVL 45

Expert Comment

by:aikimark
ID: 7107482
Iskandar,

I'm familiar with CRC16 and CRC32 algorithms and their VB implementations.  What is Campbell's CRC?
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 

Author Comment

by:karnaini
ID: 7109475
Hi,

The algorithm is taken from the book "C Programmer's Guide to Serial Communication" by Joe Campbell.

Regards,
Iskandar
0
 
LVL 45

Expert Comment

by:aikimark
ID: 7109531
0
 
LVL 49

Expert Comment

by:DanRollins
ID: 7962974
Hi karnaini,
It appears that you have forgotten this question. I will ask Community Support to close it unless you finalize it within 7 days. I will ask a Community Support Moderator to:

    Accept TimCottee's comment(s) as an answer.

karnaini, if you think your question was not answered at all or if you need help, just post a new comment here; Community Support will help you.  DO NOT accept this comment as an answer.

EXPERTS: If you disagree with that recommendation, please post an explanatory comment.
==========
DanRollins -- EE database cleanup volunteer
0
 
LVL 5

Expert Comment

by:Netminder
ID: 8039006
Per recommendation, force-accepted.

Netminder
EE Admin
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I’ve seen a number of people looking for examples of how to access web services from VB6.  I’ve been using a test harness I built in VB6 (using many resources I found online) that I use for small projects to work out how to communicate with web serv…
Since upgrading to Office 2013 or higher installing the Smart Indenter addin will fail. This article will explain how to install it so it will work regardless of the Office version installed.
As developers, we are not limited to the functions provided by the VBA language. In addition, we can call the functions that are part of the Windows operating system. These functions are part of the Windows API (Application Programming Interface). U…
Get people started with the process of using Access VBA to control Excel using automation, Microsoft Access can control other applications. An example is the ability to programmatically talk to Excel. Using automation, an Access application can laun…

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now