javacryptohelper.blogspot.com
Java Crypto Helper: Byte value and Hex String value converter.
http://javacryptohelper.blogspot.com/2008/12/byte-value-and-hex-string-value.html
Little Java help from Sashika. Wednesday, December 24, 2008. Byte value and Hex String value converter. This java coding is a simple one which anyone can use to try the previously posted encryption and decryption program. The Convertor class has two methods. First one is convertHexToByte () method and the second one is convertByteToHex () method. 160; . 160; . Author Sashika Nimantha Perera. Public class Convertor {. 160; . 160; . 160; . If(sHexString = null) return null;.
javacryptohelper.blogspot.com
Java Crypto Helper: Simple key encryption/decryption java example
http://javacryptohelper.blogspot.com/2008/12/simple-key-encryptiondecryption-java.html
Little Java help from Sashika. Thursday, December 11, 2008. Simple key encryption/decryption java example. In my internship period, i was assign to a Software Security Module development project. And it has to be developed in java. So in the middle of the development i had to face lot's of programming problems. But finally, i've managed to complete my project. So i thought to share my java programming experiences on using java.Crypto class with people who are in all around the world. Public class Crypto {.
javacryptohelper.blogspot.com
Java Crypto Helper: How the ATM system works.
http://javacryptohelper.blogspot.com/2009/02/how-atm-system-works.html
Little Java help from Sashika. Tuesday, February 24, 2009. How the ATM system works. After publishing some complex java codes, I thought to put a bit general post this time. It’s about how a normal Automated Teller Machine (ATM) works. Actually this is the place where all the data encryption and decryption processes are used .We all use ATMs regularly, without having any idea about how it works. I think this post will give you a very little idea about how it works. Asela I. Suwandarathne. Just drop by to...
aboutsamarinda.blogspot.com
All About Samarinda: SOLUTIONS TO PROTECT BORNEO ORANG-UTAN
http://aboutsamarinda.blogspot.com/2012/05/solutions-to-protect-borneo-orang-utan.html
Tuesday, May 29, 2012. SOLUTIONS TO PROTECT BORNEO ORANG-UTAN. 10:10 Posted by Muhammad Isnaeni SKM. Business as usual or. In managing natural resources. Changes can be made. As one of the. Because the process is. Infrastructure Business Opportunity Info. On 21 August 2012 at 01:50 said. On 25 October 2012 at 17:22 said. We hope we can protect orang utan for today and so on. On 13 February 2013 at 21:52 said. One native to Indonesia to be extinct. Subscribe to: Post Comments (Atom).
aboutsamarinda.blogspot.com
All About Samarinda: TRANS STUDIO SAMARINDA
http://aboutsamarinda.blogspot.com/2014/07/trans-studio-samarinda.html
Friday, July 11, 2014. 08:24 Posted by Muhammad Isnaeni SKM. Kemacetan yang terjadi selama ini masih menjadi PR besar bagi aparat pemerintah dan ditambah lagi dengan adanya Trans Studio Samarinda di tengah kota. Kebayang dah, kalo mau lewat di sekitar area tersebut, sekarang saja, jika jam kantor dan anak sekolah, wiiih, motor dan mobil jalan lambat.cepetan jalan kaki rasanya. Heran juga, pihak Trans Studio koq mau membangun nya di tengah kota gitu yaaak? Subscribe to: Post Comments (Atom).
javacryptohelper.blogspot.com
Java Crypto Helper: February 2009
http://javacryptohelper.blogspot.com/2009_02_01_archive.html
Little Java help from Sashika. Tuesday, February 24, 2009. How the ATM system works. After publishing some complex java codes, I thought to put a bit general post this time. It’s about how a normal Automated Teller Machine (ATM) works. Actually this is the place where all the data encryption and decryption processes are used .We all use ATMs regularly, without having any idea about how it works. I think this post will give you a very little idea about how it works. Subscribe to: Posts (Atom).
javacryptohelper.blogspot.com
Java Crypto Helper: December 2008
http://javacryptohelper.blogspot.com/2008_12_01_archive.html
Little Java help from Sashika. Wednesday, December 31, 2008. How a double length key used with DESede (Triple DES) algorithm. In Triple DES encryption algorithm, the encryption process is very simple but it’s very hard to reverse the process. That is why the triple DES encryption algorithm becomes as one of the most powerful encryption algorithm in modern programming world. I concatenated the double length keys first 8 bytes portion with the double length key and make a new triple length key. So by t...
javacryptohelper.blogspot.com
Java Crypto Helper: How a double length key used with DESede (Triple DES) algorithm.
http://javacryptohelper.blogspot.com/2008/12/how-double-length-key-used-with-desede.html
Little Java help from Sashika. Wednesday, December 31, 2008. How a double length key used with DESede (Triple DES) algorithm. In Triple DES encryption algorithm, the encryption process is very simple but it’s very hard to reverse the process. That is why the triple DES encryption algorithm becomes as one of the most powerful encryption algorithm in modern programming world. I concatenated the double length keys first 8 bytes portion with the double length key and make a new triple length key. So by t...