|
|
HI All,
Could any one please help on below
I want to open and save a pdf file using AcroRd32.exe command line and have to supress the GUI.
If above one is not possible (since most of them told its not possible), Please post if any alternatives with C#/Batch file/Command Line.
Thanks in advance..
Kind Regards,
Naresh M
|
|
|
|
|
|
hi
please tell me how to use a key in md5 encryption algorithm and how can I decript using MD5
|
|
|
|
|
You can't; MD5 is a one-way hash, not an encryption algorithm. There's no way to decrypt it.
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
|
|
|
|
|
Down vote countered.
Those who fail to learn history are doomed to repeat it. --- George Santayana (December 16, 1863 – September 26, 1952)
Those who fail to clear history are doomed to explain it. --- OriginalGriff (February 24, 1959 – ∞)
|
|
|
|
|
It doesn't matter how often you down vote people, that won't change the facts: MD5 is not an encryption algorithm, and the output cannot be decrypted back to regenerate exactly what was input. This is because it is a Hashing algorithm, which "throws away" information when it generate the MD5. It effectively works klice the more primitive SUM for generating a checksum:
byte sum = 0;
foreach (byte b in myData)
{
sum += b;
} Although this generates a "unique" code which can verify that the myData is unchanged (to a limited extent) you cannot take the single byte output and regenerate the exact input from just that.
MD5 (and SHA) work the same way: they use and discard information to get a value that can give you a very high confidence that the data is unchanged, but it can't be "decrypted" back to the original input. Otherwise, we would just store the MD5 of a video file and transfer just 128 bits instead of 700Mb and just "decrypt" it at the destination...
Those who fail to learn history are doomed to repeat it. --- George Santayana (December 16, 1863 – September 26, 1952)
Those who fail to clear history are doomed to explain it. --- OriginalGriff (February 24, 1959 – ∞)
|
|
|
|
|
What you are stating is not true - You can revert MD5 if you don't exceed the maximum of 1 byte
The scariest moment is always just before the Start - Stephen King Die Frauen warten auf die Liebe, und die Männer warten auf die Frauen - Wolf Wondratschek
|
|
|
|
|
Hmm. Yes, that would work.
I must immediately encrypt each byte of my files into MD5...
...hang on, why did they all get 32 times larger?
Those who fail to learn history are doomed to repeat it. --- George Santayana (December 16, 1863 – September 26, 1952)
Those who fail to clear history are doomed to explain it. --- OriginalGriff (February 24, 1959 – ∞)
|
|
|
|
|
While it seems unlikely that you actually meant to ask "how can I generate a pre-image of an MD5 hash", that would be a much more interesting question, so I'll pretend you asked it.
In general, that's still "very hard". That is, given a random MD5 hash x, it's not (yet) feasible to compute a string that would hash to x (though there is an 2123.4 attack, which is better than brute force). By the way, there is obviously an unlimited number of strings that would have the same hash, because there's an infinite number of different strings and only a finite number of MD5 hashes. So in general it's not possible to get the actual original string, but you may find a string that has the same hash, and for short strings there's a very good probability that you would have found the original.
By contrast, generating two strings that have the same MD5 hash is efficiently doable[^] and highly realistic.
If you know something about the key, for example that it's an 8-letter alpha-numeric string, a brute force attack is often very feasible - for this example, it would take several hours on a good GPU. (26+26+10)8 / 10GH/s[^] = about 6 hours, and you could buy a better GPU, or several.
MD5-ed passwords hashes can also be easy, it depends. On the one hand, it's obviously possible to make a long random password, and you won't crack it. But on the other hand, most passwords used in real life are not like that. See for example this article[^] about some of the subtleties of passwords.
|
|
|
|
|
First of all you need to understand difference between Hashing and Encryption. Based on your requirement you need to choose correct method to secure your data. Check this[^] thread to understand why MD5 is irreversible.
|
|
|
|
|
i have create a page which work like browser but when i click on link/button in website to open new page it open in default browser of my computer .how i face this problem.i want open new page in my form
sumit
|
|
|
|
|
Don't repost! We read it the first time...
Those who fail to learn history are doomed to repeat it. --- George Santayana (December 16, 1863 – September 26, 1952)
Those who fail to clear history are doomed to explain it. --- OriginalGriff (February 24, 1959 – ∞)
|
|
|
|
|
It would be nice if you can share whatever you did. We can identify your issue easily. try to post your question descriptive.
Even i suggest to post reason for doing that work. Some people may have different way of doing the same thing with less efforts.
"Sometimes Questions are so nicely formed so we attract to give them answers." I call it An Effective Question.
|
|
|
|
|
i have create a page which work like browser but when i click on link/button in website open new page it open in default browser of my computer .how i face this problem.i want open new page in my form
sumit
|
|
|
|
|
How To Deloyment project in C#
|
|
|
|
|
|
I think you'll have to supply a bit more information - we cant read your mind
what sort of project ?
how many dependencies & 3rd party libs/dlls are there ?
what is the target system - does it have the same C# runtime/framework version ?
Are you talking with a database for example
do you need to do a firewall change request for the deployment machine
(for instance)
The last time I had to do this I simply created an msi and made sure that had all the dependencies/3rd party dll's within it, copied that to the deployment machine, ran it, and off I went - but every situation varies
|
|
|
|
|
I doubt that I understood your question, but lemme give a shot:
If you ask on how to write code in C#, you are best off starting here[^]
If you are asking how written code can be deployed (e.g. how to create a setup to deploy your executable) you should read this[^]
The scariest moment is always just before the Start - Stephen King Die Frauen warten auf die Liebe, und die Männer warten auf die Frauen - Wolf Wondratschek
|
|
|
|
|
|
|
|
Seeing that your question is a bit light on detail, I will just point you at the documentation on MD5[^].
|
|
|
|
|
|
Quote: MD5 is officially "broken" and should not be used for new designs - SHA is preferred
Thanks for this information. I am not aware about that. You deserve Up vote.
|
|
|
|