?
Solved

cfx_blowfish parameters?

Posted on 2004-10-13
6
Medium Priority
?
275 Views
Last Modified: 2013-12-24
does anyone have documentation for the bluefish cf tag "cfx_blowfish" ?
i purchased and downloaded / installed ... (and it works great) BUT I'm not able to take advantage of any additional features (encryption strength etc) because the provider did not 'provide' accompanying documentation.

thanks if anyone can help.

Richard
0
Comment
Question by:rcbuchanan
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 8

Assisted Solution

by:CoolATIGuy
CoolATIGuy earned 400 total points
ID: 12304491
0
 

Author Comment

by:rcbuchanan
ID: 12304569
yes, very clever.  that's where i bought the tag.
for 500 points I'm hoping for more information.

what 'other' parameters exist besides 'input' & 'output" !?
are there any?>

R
0
 
LVL 17

Assisted Solution

by:Tacobell777
Tacobell777 earned 80 total points
ID: 12304735
is it really worth spending $100 while CF provide encrypt and decrypt functionality?
0
Get proactive database performance tuning online

At Percona’s web store you can order full Percona Database Performance Audit in minutes. Find out the health of your database, and how to improve it. Pay online with a credit card. Improve your database performance now!

 

Author Comment

by:rcbuchanan
ID: 12304794
I'm not open to a debate - i'm just asking for help on this specific question.
sorry.
0
 
LVL 7

Accepted Solution

by:
INSDivision6 earned 1520 total points
ID: 12304967
One more idiotic suggestion (keep your points for somebody else):

http://www.cftagstore.com/index.cfm?page=emailDeveloper&developerId=1¤tTagId=152

0
 

Author Comment

by:rcbuchanan
ID: 12304999
i give up, i think.
0

Featured Post

Does Your Cloud Backup Use Blockchain Technology?

Blockchain technology has already revolutionized finance thanks to Bitcoin. Now it's disrupting other areas, including the realm of data protection. Learn how blockchain is now being used to authenticate backup files and keep them safe from hackers.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

One of the typical problems I have experienced is when you have to move a web server from one hosting site to another. You normally prepare all on the new host, transfer the site, change DNS and cross your fingers hoping all will be ok on new server…
Introduction This article explores the design of a cache system that can improve the performance of a web site or web application.  The assumption is that the web site has many more “read” operations than “write” operations (this is commonly the ca…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
In this video, Percona Solution Engineer Rick Golba discuss how (and why) you implement high availability in a database environment. To discuss how Percona Consulting can help with your design and architecture needs for your database and infrastr…
Suggested Courses

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question