How to code information

How to code information

On the basis of the idea of data coding all software of all modern computers is written. All processes on the Internet are also connected with coding process, any digital information represents the binary code. Coding is successfully used also in the course of information protection, separate files on the Internet.

It is required to you

  • - Skills of programming;
  • - Crypditor program.

Instruction

1. Storage of unencrypted information on the server can lead to undesirable information leakage, in particular – keys to a DB or, for example, some important document. Therefore it is better to encrypt all files in advance, i.e. to code. There is a set of programs which will help to protect the necessary data, however many of them either unreliable, or paid. Many data can be protected standard means of PHP. For this purpose the basic base64_encode function will approach (). For the return decoding, respectively, base64_decode is used (). Also exist algorithms md5 () and sha1 (), however they practically do not give in to decoding. In PHP the coding in a JSON format is also widely used. It allows to cipher information in a certain data array and has an appearance of json_encode ($array). For decoding, respectively, json_decode ($array). For coding of data transferred from forms it is possible to use the crypt method (). It ciphers information in one direction. Advantage of this function is that it allows to set own rules.

2. By means of Java Script it is possible to code data of some image without problems. For this purpose there is a javascript function: imageData. Also there is a peculiar algorithm of URI which is capable to assign to each element own identifier. URI has syntax: "URI = URL + URN URL = <схема>://<идентификатор-хоста-ресурса-в-зависимости-от-схемы>URN = <имя-ресурса-на-хосте-в-зависимости-от-схемы-и-контекста>".

3. For coding of passwords from any resources, or in general from the computer, it is possible to use the Crypditor program which uses AES encryption algorithm. Moreover, this program allows to check reliability of the used passwords before their encryption.

Author: «MirrorInfo» Dream Team


Print