top-image

Archives for Java

Documentum, Java: Encrypt/Decrypt dfc.properties password
Hello, I would like to present a solution in order to encrypt/decrypt the passwords of registry for example the password in the dfc.properties via Java programming with the following Documentum utilities classes: Dfc.properties   To encrypt/decrypt this value via JAVA programming: Java decrypting method:   Java encrypting method:   Test decrypting and encrypting method:       Here, a code found to decrypt BOF and database passwords (https://www.snip2code.com/Snippet/242104/Decrypt-Documentum-database-passwords-) :   That's all!!! Huseyin OZVEREN ...more»
Documentum, Java, API : Encrypt/Decrypt database password in dbpasswd.txt on DCTM server
Hello, I would like to present a solution in order to encrypt/decrypt data base password stored in dbpasswd.txt on DCTM server via API commands and Java API programming. When and why this would be necessary ? Perhaps, if the database password has been forgotten by everybody :)   API commands So, the password of database is stored in the dbpasswd.txt file in the docbase's ...more»
Java – Crypto : Example, Use of SecretKey, PrivateKey, PublicKey, CSV file (CryptoTools, GenericObfuscationFile)
Hello, Through several articles, I would like present the cryptographic mechanisms, types of keys, certificate, types of algorithms ...etc: PRESENTATION : Concepts of Cryptography (concepts, types of keys symmetric/asymmetric, …) The principles of SSL The principles of Signature and Certificate The principles of Hardware Security Module HSM Encoding with base64, base64url, rfc-4648 Encryption with Blowfish (Anonymization) Encryption with AES/CBC, AES/EBC (Encryption of files) Encryption with PBEWithMD5AndDES (Encryption of files) Encryption ...more»
Java – Crypto : KeyStore, JCEKS, SecretKey, PrivateKey, PublicKey, Certificate
Hello, Through several articles, I would like present the cryptographic mechanisms, types of keys, certificate, types of algorithms ...etc: PRESENTATION : Concepts of Cryptography (concepts, types of keys symmetric/asymmetric, …) The principles of SSL The principles of Signature and Certificate The principles of Hardware Security Module HSM Encoding with base64, base64url, rfc-4648 Encryption with Blowfish (Anonymization) Encryption with AES/CBC, AES/EBC (Encryption of files) Encryption with PBEWithMD5AndDES (Encryption of files) Encryption ...more»
Page 5 of 30:« First« 2 3 4 5 6 7 8 »Last »
bottom-img
Copyright ® 2012 Huseyin Ozveren. No reproduction, even partial, can be used from this site and all its contents including text, documents, images, etc.. without the express permission of the author.