There could still be issues if the program is installed under \Program Files\ and the program needs to write to files residing in the same directory.
Posts by Richard_Pikk
Welcome to our brand new Clickteam Community Hub! We hope you will enjoy using the new features, which we will be further expanding in the coming months.
A few features including Passport are unavailable initially whilst we monitor stability of the new platform, we hope to bring these online very soon. Small issues will crop up following the import from our old system, including some message formatting, translation accuracy and other things.
Thank you for your patience whilst we've worked on this and we look forward to more exciting community developments soon!
Clickteam.
A few features including Passport are unavailable initially whilst we monitor stability of the new platform, we hope to bring these online very soon. Small issues will crop up following the import from our old system, including some message formatting, translation accuracy and other things.
Thank you for your patience whilst we've worked on this and we look forward to more exciting community developments soon!
Clickteam.
-
-
Have him try to disable User Account Control (UAC) temporarily and see if it works afterwards.
-
So if you were to hash (SHA-1) a salted passphrase, then proceed to rehash the output (again with a salt) a large number of times, you could produce a key with the same entropy as the passphrase but with a higher computational overhead required to brute-force?
-
It could be used in cases where a password is required to read some encrypted data, like in programs that people use to store their PIN numbers, banking information and other passwords. The user inputs a master password which is used to decrypt a stored encryption key that in turn unlocks the data. Because the master password isn't necessarily exactly 16 characters long, the input could be hashed and the first 128 bits of the hash used as the key.
-
On the topic of hashes for keys, do you see any method of doing this in MMF2 using the RAW output?
-
Ah, okay. Not having read the paper, does it imply that their attack cannot work for some reason against AES 128?
-
Surely those breaks were timing attacks or other exploits requiring code execution privileges on the machine performing the encryption, and not attacks on the ciphertext itself. Unless there's some error in the implementation, the 256-bit key will yield a stronger ciphertext.
I think that there's also a common tactic in use where the hash from a passphrase is used as the encryption key, which would weaken the cipher because the hash is made up of fewer character types (SHA1 is only letters and numbers). I'm not a cryptography expert by any means, but I think a longer key would be good in these cases.
-
Yes. I think in such cases it would be best to check the contents of the input in a condition to prevent the AES object from performing its actions unless the key is correct, and also to implement some routine to warn the user if they type in a key that is not the requred length.
Just to make sure, the key for AES 128 must be exactly 16 characters (128 bit) long.
-
It was the same thing for me in your example, the actions referencing the String Generator object could not be viewed or edited. With the newer version of the object the example behaved as intended.
The reason I chose the Len method is because it will also prevent the use of keys shorter than 16 characters, which will no doubt happen at some point if users are allowed to specify their own keys.
-
I have downloaded the String Generator object from the link you provided, and I now experience the same issues you did. I now doubt it had anything to do with the build.
-
Heh, your .MFA with the String Generator object in it won't work here. It doesn't crash, it just fails to produce any output. Perhaps we have different versions of the String Generator object. Without a doubt this object was involved somehow in the crashing of my example application, the error object even references the strgenobj.mfx file.
I cannot say why your application wouldn't work before with the Blowfish object, unless the key somehow contained some illegal character or were not 16 characters in length. I'm glad it worked out, though.
-
Okay, that's bizarre. There are only two events to the entire program, both activated by the buttons.
Maybe there's something with the String Generator object and build 251? I still use build 249.
I have made a new version, replacing the String Generator with the Blowfish object to generate the keys.
Please login to see this link.
-
I currently use the AES Fusion object, and I find it works very well. However there are those who question the use of the 128-bit algorithm since the industry standard is now AES 256 Rijndael, which as far as I know has yet to be defeated.
Are there any plans for an object using this algorithm?
-
I made a quick example that I think does what you're looking for: Please login to see this link.
-
You could probably read the following value from the registry:
ProductName
It's in the following key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion
-
Perfect!
For future reference (event order):
1. Binary object - Resize binary (set to number of bytes)
2. Binary Quickload - Load binary (path to file, memory address (get address from Binary object), starting byte, number of bytes to load (same as size of Binary object)).
3. Read bytes from Binary object.
Thanks, Looki!
-
I'm trying to read binary data from some files and is able to do that with the Binary object alone. But I want to be able load a sequence of bytes from a large file without loading all of it into memory. As I understand the Binary Quickload object can be used together with the Binary object for this purpose.
But how? Binary Quickload only lets you specify a memory address to where it will load the bytes, and I try to specify the address for the Binary object but no data appears. Does anyone know how to do this?
-
The Lacewing Server object can either host its own server from within MMF2, or you could use the dedicated Lacewing Server program to set up a stand-alone server.
Please login to see this link.
-
And you can certainly host your own Lacewing server!
-
What you are asking is possible, depending on the type of database. What kind of database do you need to access? The SQL Server object should work with MMF2 Standard, but it is for Microsft SQL Server databases only.