Possible errors caused by manual operations were avoided, work efficiency and the accuracy of test report were improved. The results of application in tobacco smoke analysis laboratory showed that the developed management system could collect test data from smoking machines and gas chromatograph of different types and converge process data on the VFP database platform, and the data processing flow was fully programmed and standardized. By programming data management module, the management and application of test data, process data and product information were carried out. * A reader reported having a problem unzipping the vfpkeygen.zip, so I have reuploaded it.To improve the accuracy and efficiency of data processing in the process of tobacco smoke analysis, a data acquisition and management system was developed based on Visual FoxPro 9.0 database management system, wherein RS232 serial interface communication technology was used to connect PC with a number of smoking machines and perform remote control of and data acquisition from RM200 smoking machines, and Ethernet communication technology was used to remotely access and collect data from RM200A smoking machines and gas chromatograph. Here is the download link and screen shot of what I came up with.ĭownload VFP Key Generator Example – source code included (80 KB approx) And, since the vfpencryption.fll now supports MD5, I thought I would revisit his example and see whether something of this nature could be created for Visual FoxPro using the vfpencryption.fll.
I remembered seeing an example of this a few years back by a developer named Phil Fresle (back then his example was simpler than it is now). What about creating software serial numbers for an application you have developed? While I highly recommend a product like Armadillo when you need top-notch security, a more simplified approach that is still fairly secure can be had using a hashing function such as MD5. While encrypting passwords and sensitve data using the ciphers, or checking passwords and files for authenticity using hash functions are pretty well known examples, there are others. In my last blog entry I mentioned being able to use the vfpencryption.fll in some real world ways. Please refer to the latest documention for the VFP Encryption FLL that can be found at the following link (though this example and is still valid and will work unmodified using the current version of the VFP Encryption FLL): IMPORTANT : The functions within this FLL have changed.