#.NET Code Project  
A Convex Hull Algorithm and its implementation in O(n log h) by Eric Ouellet https://t.co/Ym9NdCOBLB
Developers Keep up to date: '.NET Code Project'
 

Reviews

<< | < | 123|> | >>
UserId: 1, 28/09/2015 08:19:00 Delete post| Update post

Check out this amazing RSA 4096 bit cryptosystem.

RSA 4096 bit Image missing

Indeed, the "Medallion" has Risen Again

Ultimate AES and Ultimate 3DES are folder and file recursive encryption software.

Cryptography software for pure encryption and decryption of files and folders.

Recursive folder or single file encryption allows encryption of any file types. Image, Video, word, excel etc.

Please note that when performing Folder encryptions you should make a backup of your folder as files are overwritten. Do not attempt to encrypt Operating System folders as this will delete the folders after encryption and could cause windows errors.

To Encrypt: Type text into the Encrypt Area or alternatively open a Text file into this area. Email attachments are encrypted accordingly, and recoverable by using the keystore.ks file in place under installation directory. Also you should know that keys can be stored anywhere of choice on the drive via the store key menu in the File Menu.

Please use carefully.

The Medallion has spoken wise words. Better a known entity with its limitations, than an unknown one with greater promise. - "(Robert Ludlum)"

UserId: 1, 04/04/2015 12:23:00 Delete post| Update post

RSA 316 bit Infinito CryptoSystem, is a 316 bit RSA Cryptosystem, that can't be matched in power of encryption. It relies on initially first distorting the plain text message by Random Series sub-injection, and adding mutating padding to the messages randomly.

The method of random series injection is unrivalled, if not the most adept and powerful system. This sub-injections of bits into the original message prior to full RSA bit encryption ensures that even if the Key was broken, deciphering the message or decrypting the message to get the original message is impossible. This is because prior to encryption a random series injection distorted the message.With the Revelation by NSA spy leaker Edward Snowden, that NSA and GCHQ agencies have bought into vendor systems, it is imperative to beat this notion that the more money you have the better geared you are to collusion with Major vendors. Well, this RSA 316 Cryptosystem, was designed effectively to put a cutthroat on that specific notion.

It is meant for encrypting text messages strictly, and doesn't do for bulk encryption as RSA was never meant for bulk encryption considering the cost of generating large Big Integer Primes, and the process or cycle of encryption/decryption which is further expensive.

Welcome to the unbreakable RSA 316 bit CryptoSystem only known as "RSA316 Infinito".

You should note that this cryptosystem software generates actual primes, and it is therefore costly and takes up to 2 hours and 35 minutes generating viable keys roughly on tests. Also note that the encryption and decryption cycles are time consuming so you should only encrypt limited amounts of text.

This is bravado from the Medallion himself.

Happy New Year GCHQ plus your friends at NSA. The world is safer now.

UserId: 1, 14/11/2014 02:24:00 Delete post| Update post
Dear Clients/Customers,

Of recent, I have upgraded all the applications on this site with latest additions and patches.

Ultimate 3DES and Ultimate AES, now can progressively store keys to any File (keystore of choice) any where on the computer. Loading keys from any key store on the fly is a given as well. You don't have to rely on the default key store anymore. This gives the distinct advantage of ensuring nobody knows what key store was used to encrypt any communique apart from requesting the key store from the User directly.

Also Email attachments can be encrypted or sent plain, as the choice is with the User of the Application. Extended aspects for Printing of Communiques have been included in Ultimate AES and Ultimate 3DES as well as additions for single File Encryption/Decryption procedures.

RSA Crypto systems have all had a revamp to ensure keys are generated appropriately. Have fun and enter the realms of Espionage my Friend.
<< | < | 123|> | >>
  • RT @RepSwalwell: It’s no hoax - Russia really did interfere with our election, and we’re still investigating the Trump campaign’s role. Let…
    2 days ago
  • RT @BBCWorld: Muslims protest worldwide against Trump https://t.co/2DiqkhaWgX
    2 days ago
  • RT @SenWarren: President Trump’s National Security Advisor pled guilty to a federal crime relating to his contacts with the Russian Governm…
    8 days ago
  • RT @Weinsteinlaw: Unless you want to make @realDonaldTrump very unhappy, DO NOT retweet these photos showing how many more people showed up…
    10 days ago
  • RT @kylegriffin1: Brendan Cox, widower of the late British MP Jo Cox, on MSNBC: “My family is a living consequence of what happens when peo…
    10 days ago