LoginLogin

PRG Encryptor/Decryptor

Root / Submissions / [.]

RaichuBenderCreated:
Download:XK48YPR1
Version:1.0Size:1020 Bytes
Always wanted to lock your source code? Well, now you can. Only people that know the password can access the code of your encrypted PRG file. This makes the PRG file useless unless you know the password. This is a great way of sharing files that you don't want everyone to see, including moderators from SmileBOOM. Known bugs: If you choose a short password (<4), it won't encrypt correctly and may cause data loss. I reccomend that you take a password with at least 8 characters, using different letters, numbers and symbols. In some cases, the spacing gets screwed up. This isn't a big deal, but may cause problems if you want to edit the PRG later.

Instructions:

Run ENCRYPTOR in the folder you want to encrypt/decrypt a file. Then Enter the file name, a password and the output file name. Congratulations, you have successfully encrypted your PRG. NOTE: when you share your encrypted PRG file, don't forget to share the password as well. Please report any bug you encounter in the comments.

What does the code look like when encrypted? I think people at smileboom would be suspicious if someone uploaded a file with just random characters. What if it could make the data look like MML?

Replying to:12Me21
What does the code look like when encrypted? I think people at smileboom would be suspicious if someone uploaded a file with just random characters. What if it could make the data look like MML?
That would be possible, but hard to make.

Replying to:12Me21
What does the code look like when encrypted? I think people at smileboom would be suspicious if someone uploaded a file with just random characters. What if it could make the data look like MML?
Not very hard compared to making the encryptor

"Enter the file name" By the way, you can get a list of files in SB using the FILES command and have a file select menu. I actually made one myself, but it's hard-coded to only allow selection of programs and in any project, because it's for a program launcher. I really need to complete that program sometime. :P Either way, good job! :D

Repeating xor key. Sounds secure. Even Nintendo wouldn't go for that. :p Well, they wouldn't now anyway, lol. https://www.3dbrew.org/wiki/Savegames#Repeating_CTR_Fail

Replying to:12Me21
What does the code look like when encrypted? I think people at smileboom would be suspicious if someone uploaded a file with just random characters. What if it could make the data look like MML?
Smileboom won't delete a program because of suspicion. There is pretty much nothing they can do.

Replying to:MCGamer20000
"Enter the file name" By the way, you can get a list of files in SB using the FILES command and have a file select menu. I actually made one myself, but it's hard-coded to only allow selection of programs and in any project, because it's for a program launcher. I really need to complete that program sometime. :P Either way, good job! :D
Thanks! If I may use your file select menu, please tell me, it would make things easier. :D

This uses an XOR encryption? hm.. sure its serving its´ purpose, maybe you can make a compressor :)

Hey, has anyone thought of converting .wavs into mml?

Replying to:16bitcoder
Hey, has anyone thought of converting .wavs into mml?
Then you end up with this monstrocity https://www.youtube.com/watch?v=RqTVCVwmwF0 If you listen closely you can hear the voices.

Replying to:16bitcoder
Hey, has anyone thought of converting .wavs into mml?
>converting waveforms into music macro language You don't simply convert wavs to MML. MML has fixed instruments. Waveforms don't.

Replying to:DasEtwas
This uses an XOR encryption? hm.. sure its serving its´ purpose, maybe you can make a compressor :)
Yeah, currently I am improving this program by adding multiple types of encryption. Compressing would be cool for in the future.

http://smilebasicsource.com/forum?ftid=508 Your encrypted file may get corrupted by SmileBasic.

Replying to:12Me21
What does the code look like when encrypted? I think people at smileboom would be suspicious if someone uploaded a file with just random characters. What if it could make the data look like MML?
Well, they might try to decode it.

I made an XOR encryptor with some improvements: -no password length restrictions -not affected by CHR$(13) conversion -instead of using each character of the password sequentially, it randomizes them, (using the length of the password as a seed.) This prevents long strings of spaces from becoming a lowercase version of the password. -program is much more compact: