Click here to Skip to main content
Click here to Skip to main content
Add your own
alternative version

.NET Encryption Simplified

, 28 Jan 2007
A simple, string-oriented class for symmetric encryption, asymmetric encryption, and hashing.
THE GETTYSBURG ADDRESS:


Four score and seven years ago our fathers brought forth on this  
continent a new nation, conceived in liberty and dedicated to the  
proposition that all men are created equal. Now we are engaged in  
a great civil war, testing whether that nation or any nation so  
conceived and so dedicated can long endure. We are met on a great  
battlefield of that war. We have come to dedicate a portion of  
that field as a final resting-place for those who here gave their  
lives that that nation might live. It is altogether fitting and  
proper that we should do this. But in a larger sense, we cannot  
dedicate, we cannot consecrate, we cannot hallow this ground.  
The brave men, living and dead who struggled here have consecrated  
it far above our poor power to add or detract. The world will  
little note nor long remember what we say here, but it can never  
forget what they did here. It is for us the living rather to be  
dedicated here to the unfinished work which they who fought here  
have thus far so nobly advanced. It is rather for us to be here  
dedicated to the great task remaining before us--that from these  
honored dead we take increased devotion to that cause for which  
they gave the last full measure of devotion--that we here highly  
resolve that these dead shall not have died in vain, that this  
nation under God shall have a new birth of freedom, and that  
government of the people, by the people, for the people shall  
not perish from the earth.

-------------------------------------

Prepared by Gerald Murphy (The Cleveland Free-Net - aa300)
Distributed by the Cybercasting Services Division of the
  National Public Telecomputing Network (NPTN).

Permission is hereby granted to download, reprint, and/or otherwise
  redistribute this file, provided appropriate point of origin
  credit is given to the preparer(s) and the National Public
  Telecomputing Network.
.

By viewing downloads associated with this article you agree to the Terms of Service and the article's licence.

If a file you wish to view isn't highlighted, and is a text file (not binary), please let us know and we'll add colourisation support for it.

License

This article has no explicit license attached to it but may contain usage terms in the article text or the download files themselves. If in doubt please contact the author via the discussion board below.

A list of licenses authors might use can be found here

Share

About the Author

wumpus1
Web Developer
United States United States
My name is Jeff Atwood. I live in Berkeley, CA with my wife, two cats, and far more computers than I care to mention. My first computer was the Texas Instruments TI-99/4a. I've been a Microsoft Windows developer since 1992; primarily in VB. I am particularly interested in best practices and human factors in software development, as represented in my recommended developer reading list. I also have a coding and human factors related blog at www.codinghorror.com.

| Advertise | Privacy | Mobile
Web03 | 2.8.140821.2 | Last Updated 29 Jan 2007
Article Copyright 2005 by wumpus1
Everything else Copyright © CodeProject, 1999-2014
Terms of Service
Layout: fixed | fluid