The Wiert Corner – irregular stream of stuff

Jeroen W. Pluimers on .NET, C#, Delphi, databases, and personal interests

  • My work

  • My badges

  • Twitter Updates

    • G+ These are the command-line parameters I assembled to get close to “Ultra” compression from the 7-zip... ift.tt/2ol0NhR 1 hour ago
    • Getting close to 7zip GUI “Ultra” compression from a batch file wiert.me/2018/02/23/get… 1 hour ago
    • RT @Nick_Craver: Nothing of what I planned to do today got done. Nothing. Nothing at all. But we kept the error count under 2.5 million beh… 9 hours ago
    • RT @kellabyte: I really don’t get the harsh criticism around Intel 3D XPoint. Yes they didn’t deliver persisted RAM. They did deliver 8x… 9 hours ago
    • G+ “Some managers just don’t recognize how profound the differences between their people are; others don’t... ift.tt/2FmOJUB 10 hours ago
  • My Flickr Stream

  • Pages

  • All categories

  • Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 1,347 other followers

TEncryptedIniFile: easy to use class for handling app settings with encryption in Delphi – TMS Software Blog

Posted by jpluimers on 2017/10/17

[WayBackTMS Software | Blog | TEncryptedIniFile: easy to use class for handling app settings with encryption

via: [WayBackA new blog has been posted:TEncryptedIniFile: easy to use class for handling app settings with encryption – Michael Thuma – Google+

I wonder how that works with encryption algorithms based on thin Delphi wrappers around proven open source encryption libraries.

–jeroen

PS: Note the G+ link died. Not sure why, but that’s why I archived the original as a WayBack link when writing this post.

4 Responses to “TEncryptedIniFile: easy to use class for handling app settings with encryption in Delphi – TMS Software Blog”

  1. KMorwath said

    “Extra steps could be taken to use an AES key that is a combination of a unique machine ID…” Why? Just generate a pure random key (using a good random generator, of course). Derived key can be guessed, when you have the code. Then use the underlying OS features to store the key safely – i.e. CryptProtectData() under Windows, or a Linux keyring. Read the key only when you need it, and then destroy it clearing the memory.

  2. Jan Doggen said

    For the second link, Google+ says: “This post could not be found.
    This URL may be incorrect, the post may have been deleted, or the post may not have been shared with this account “

    • jpluimers said

      Thanks for noticing that. It is exactly why I archive so many links with [WayBack] or [Archive.is] tags: too many links suddenly disappearing.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

 
%d bloggers like this: