MsmDownloadToolV4.0InFARHAZ


-*-before: before any text-*-after: any text-*-output-file: output file name-*-output-text-file: output text file name-*-output-comma-delimited-file: output comma delimited file name-*-duplicates: if this is on, the duplicates of the target text will be saved

Output will be as follows:

> before any text – after: any text

5/10/2013 12:35:42 PM

This will print all the text between before and after to the output file, comma delimited or to the clipboard depending on the option chosen.

5/10/2013 12:35:42 PM

If this is on, all the text between before and after from the specified file will be saved to the output file.

5/10/2013 12:35:42 PM

-*-before: before any text-*-after: any text-*-output-file: output file name-*-output-text-file: output text file name-*-output-comma-delimited-file: output comma delimited file name-*-duplicates: if this is on, the duplicates of the target text will be saved

5/10/2013 12:35:42 PM

If this is on, all the text between before and after from the specified files will be saved to the output file.

5/10/2013 12:35:42 PM

-*-before: before any text-*-after: any text-*-output-file: output file name-*-output-text-file: output text file name-*-output-comma-delimited-file: output comma delimited file name-*-duplicates: if this is on, the duplicates of the target text will be saved

5/10/2013 12:35:42 PM

If this is on, all the text between before and after from the specified files will be saved to the output file.

5/10/2013 12:35:42 PM

5/10/2013 12:35:42 PM

-*-before: before any text-*-after: any text-*-output-file: output file name-*-output-text-file: 84e02134c1

Uptime Monitor
Honey for Firefox
Japan Bamboo
Mark Studio
Piano Player
Export Database to Excel for SQL Server
Logspire
Toshiba Password Utility
Stickies
Eject Widget
Resource File Unit
honestech Fireman CD DVD Burner
ZIP CODES
Dolphin Smalltalk
MARVIN
PDFGears
MasterVerb
AbRemote Basic
Instant YouTube Blocker Portable
Perl Portable

Allows to encode and decode key pairs (keys) with strong integrity properties.
Description:
This project has been started because some of my colleagues found it hard to find a software that allows to encode and decode key pairs (keys) with strong integrity properties. Normally, you would encrypt a file with a key, but this could be decrypted later with the same key. To avoid this problem, we use public key cryptography. Keys are usually generated with a strong random number generator. This way, it is impossible to decrypt the data even if you know the key. You can imagine that this technique has a lot of security applications, but these are not the main target of KEYMACRO.
KEYMACRO Key generation algorithm:
With certain algorithms, a Key can be generated in a completely random way, but it might be that the same key will be generated on different machines. Therefore, it is better to use some kind of hashing algorithm. The most important part of a hash function is that it must be deterministic, that means that the same input will generate the same output. This property is called ‘collision resistance’.
We generate our Key with a SHA-1 hashing function. This algorithm has the following properties:
– it is fast
– it generates a 128 bit Key
– it is deterministic
– it is not reversible
We are using the SHA-1 algorithm because it has good resistance against cryptanalysis. A weakness of this algorithm is that the same input will always produce the same output (due to the deterministic properties), but this might be too weak for us. So, we will use only a part of the output of the SHA-1 function to create our key.
We generate a part of 128 bits (80 bits) for that reason:
– 128 bits = 2160 bits
– 1536 bits of 2160 bits = 128 bits
In order to use the remainder of the SHA-1 function, we need to be able to reconstruct the entire hash function. However, the SHA-1 algorithm is very simple, so it is not hard to reconstruct it.
Key generation:
SHA-1 function is a one-way function. With one input, you get one output (SHA-1 function). We use the SHA-1 function to generate the 160 bit key (80 bits of 160 bits = 128 bits). This key is also returned as a 64 bit string:
{6B05F10D47FFA3E7…}
For further information

http://shop.chatredanesh.ir/?p=6069


tu as aimé ? N'oublie pas de partager à tes amis !

Commentaires

commentaires

Choisissez un type de publication
Meme
Téléchargez vos propres images pour créer des memes personnalisés
Vidéo & Embed
Youtube, Vimeo et Vine
Audio
Soundcloud ou Mixcloud
Image
Photo ou Gif
Gif
GIF animé