|
![]() |
"We're kind of on the level of crossword puzzle writers... And no one ever goes to them and gives them an award." ~Joe Strummer
sscce.org
There are only two hard things in computer science: cache invalidation, naming things, and off-by-one errors
SCJP 1.4 - SCJP 6 - SCWCD 5 - OCEEJBD 6 - OCEJPAD 6
How To Ask Questions How To Answer Questions
Build a man a fire, and he'll be warm for a day. Set a man on fire, and he'll be warm for the rest of his life.
Originally posted by terry:
I am using the Digest "SHA-1" for encrytion however I need to decrypt this again to logon to machine. How can I decrypt the one way hash - Is there a simple method to do this in Java.
Originally posted by Rob Prime:
If you need to reverse it you'll need a two-way encryption algorithm like Blowfish.
SCJP 1.4 - SCJP 6 - SCWCD 5 - OCEEJBD 6 - OCEJPAD 6
How To Ask Questions How To Answer Questions
There are only two hard things in computer science: cache invalidation, naming things, and off-by-one errors
Originally posted by terry Kiernan:
What approach would you take if you wanted your password encrypted in the file and use it within the Java app
Originally posted by terry Kiernan:
Henry ,
Would you have some sample code to illustrate what you did when you encrypted and stored it off to a file/db using java ?
Thanking you
Build a man a fire, and he'll be warm for a day. Set a man on fire, and he'll be warm for the rest of his life.
SCJP 1.4 - SCJP 6 - SCWCD 5 - OCEEJBD 6 - OCEJPAD 6
How To Ask Questions How To Answer Questions
brevity is the soul of wit - shakepeare. Tiny ad:
The Low Tech Laboratory Movie Kickstarter is LIVE NOW!
https://www.kickstarter.com/projects/paulwheaton/low-tech
|