Post by bulamb0d on May 1, 2019 16:53:12 GMT 1
Old source code of my program bulamb0d in GFA basic.... maybe contain bugs...
i just found it in my old files....
copy paste below and save with .g32 extension.
LoadForm frm1 Center
ed1.Text = "ClipperGems19770816"
Local i%
Dim m$(4)
Data ?!?, About, Exit
Data */
i% = -1
Do
i%++
Read m$(i%)
Loop Until m$(i%) = "*/"
m$(i%) = "" /* menu terminatioin
Menu m$() /* activate menu bar
Do
Sleep
Until Me Is Nothing
Sub frm1_MenuEvent(idx%)
If idx% == 2 Then
frm1.Close
ElseIf idx% == 1 Then
About
End If
End Sub
Procedure cmd1_Click
Local cFilename$
FileSelect "c:\*.*", "", cFilename$
If lb1.Find(cFilename$) < 0 And Len(cFilename$) > 0 Then
lb1.AddItem cFilename$
End If
End Procedure
Procedure lb1_DblClick
lb1.RemoveItem lb1.ListIndex
End Procedure
Procedure chk1_Click
If ed1.PassWordChar == "" Then
ed1.PassWordChar = "*"
Else
ed1.PassWordChar = ""
End If
End Procedure
Procedure cmd2_Click
Local nLoop
For nLoop = 0 To lb1.ListCount - 1
DoAction( lb1.List(nLoop), ed1.Text)
Next
Message "", "Finish"
End Procedure
Procedure cmd3_Click
ed1.Text = ""
End Procedure
Procedure cmd4_Click
ak0n
End Procedure
Procedure ak0n
Dim explorer As Object
Set explorer = CreateObject("InternetExplorer.Application")
explorer.Navigate "http://www.ak0n.tk"
explorer.Visible = True
End Procedure
Function bEncrypt( nData As Integer, nPassword As Integer, nBase As Integer)
If nData <> 0 Then
nData = nData + nPassword
If nData > nBase Then
nData = nData - nBase
End If
End If
Return nData
EndFunction
Function bDecrypt(nData As Integer, nPassword As Integer, nBase As Integer)
If nData <> 0 Then
If nData > nPassword Then
nData = nData - nPassword
Else
nData = (nData + nBase) - nPassword
End If
End If
Return nData
EndFunction
Function DoAction(cFile As String, cPassword As String)
Dim Key As String, Buf As String
Open cFile for Input As # 1
Open cFile + "tmp" for Output As # 2
Key = cPassword
While Not EOF(# 1)
Buf = Input?(65536, # 1)
Buf = bCrypt(Buf, Key, opt1.Value)
Print # 2, Buf;
Wend
Close # 1
Close # 2
Kill Yes NoUndo Silent, cFile
Rename cFile + "tmp" As cFile
EndFunction
Function bCrypt( sData As String, sPassword As String, nCryptType As Integer)
Local nPasswordLength As Integer, nDataLength As Integer
Local sNewData As String, nLoop As Integer
Local nSkip As Integer, nData As Integer, nPassword As Integer
nSkip := 1
nPasswordLength := Len(sPassword)
nDataLength := Len(sData)
sNewData := ""
For nLoop = 1 To nDataLength
nData := Asc(sData, nLoop)
nPassword = Asc(sPassword, nSkip)
If nCryptType == 0 Then
sNewData := sNewData + Chr(bEncrypt( nData, nPassword, 255))
Else
'##E#
sNewData := sNewData + Chr(bDecrypt( nData, nPassword, 255))
End If
nSkip := nSkip + 1
If nSkip > nPasswordLength Then
nSkip := 0
End If
Next
Return sNewData
EndFunction
Sub About
Dim sAbout As String
sAbout = "What is Bulambod? " + Chr(13) + Chr(10)
sAbout = sAbout + "It is an algorithm to convert information to unusable format." + Chr(13) + Chr(10) + Chr(13) + Chr(10)
sAbout = sAbout + "Why Bulambod was created?" + Chr(13) + Chr(10)
sAbout = sAbout + "It is an art, my dream to create unbreakable cipher, the missing link to the future." + Chr(13) + Chr(10) + Chr(13) + Chr(10)
sAbout = sAbout + "Is it really unbreakable?" + Chr(13) + Chr(10)
sAbout = sAbout + "Yes, algorithm itself is unbreakable, but this software is not, it depends on your settings." + Chr(13) + Chr(10) + Chr(13) + Chr(10)
sAbout = sAbout + "Is it legal to use it?" + Chr(13) + Chr(10)
sAbout = sAbout + "It depends on law were your current resident is." + Chr(13) + Chr(10) + Chr(13) + Chr(10)
sAbout = sAbout + "Why is it FREE?" + Chr(13) + Chr(10)
sAbout = sAbout + "This software is FREE, to promote the algorithm, but this algorithm is not FREE." + Chr(13) + Chr(10) + Chr(13) + Chr(10)
sAbout = sAbout + "Is Bulambod algorithm for sale?" + Chr(13) + Chr(10)
sAbout = sAbout + "NO, but if your interested, you can lease the right to to use this algorithm." + Chr(13) + Chr(10) + Chr(13) + Chr(10)
sAbout = sAbout + "Is it secure than other cipher algorithm?" + Chr(13) + Chr(10)
sAbout = sAbout + "As long the information and password is unknown its imposible to crack or hack." + Chr(13) + Chr(10) + Chr(13) + Chr(10)
sAbout = sAbout + "The Future" + Chr(13) + Chr(10)
sAbout = sAbout + "DNA, Finger Print, Retina, Face recognition, voice is not the future for security its a scam, it well "
sAbout = sAbout + "cause a very insecure system, the most secure type of input device is a usbdrive, imagine you select "
sAbout = sAbout + "any kinds of files for security, one for your front door, one for your vault etc." + Chr(13) + Chr(10) + Chr(13) + Chr(10)
sAbout = sAbout + "Bulambod executable net framework edition - A" + Chr(13) + Chr(10)
sAbout = sAbout + "Bulambod executable net framework edition - B" + Chr(13) + Chr(10)
sAbout = sAbout + "Bulambod executable windows edition" + Chr(13) + Chr(10)
sAbout = sAbout + "Bulambod executable windows mobile edition " + Chr(13) + Chr(13) + Chr(10)
sAbout = sAbout + "Contains bulambod cipher algorithm." + Chr(13) + Chr(10) + Chr(13) + Chr(10)
sAbout = sAbout + "WARNING!" + Chr(13) + Chr(10)
sAbout = sAbout + "This cipher algorithm cannot + Chr(10)be used or embed in any Software or Hardware without approval of the author. "
sAbout = sAbout + "This algorithm is very secured that can produce unbreakable results. It can be design to used "
sAbout = sAbout + "infinite password length. Can use number system known or unknown as base. Can be design to use any "
sAbout = sAbout + "kind of input device for password like laser, voice, DNA ,video, etc." + Chr(13) + Chr(10) + Chr(13) + Chr(10)
sAbout = sAbout + "NOTE" + Chr(13) + Chr(10)
sAbout = sAbout + "This algorithm is not for sale however if you are interested you can contact me for more details. "
sAbout = sAbout + "You can use this executable as FREEWARE for non commercial use only, otherwise you are oblige to "
sAbout = sAbout + "pay $1.00 to my account." + Chr(13) + Chr(10) + Chr(13) + Chr(10)
sAbout = sAbout + "Copyright 1994-2xxx"
rtf1.Text = sAbout
rtf1.Visible = True
End Sub
Sub rtf1_KeyDown(Code&, Shift&)
rtf1.Visible = False
End Sub
$DatFile
$FormVersion = 2
:{frm1 603, 804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:{Icon} 489,1078
QN0axEeA2QA3BwhAGUGIxEZ8CET0hI6PwTwbwfAiP+//YIRERJSEiEVERwSEyISE0WqQbQ4Yfmvq
PD/LVAb/p3PCKAEEhECQQACEQQkAgEACEIAiDkACDhQk/yQo071hwBwKBjhwQtOJZx5QIYJFB3Sw
ZoHCn1j8WNGCVtTLeSiSHh7Q4O3C3TH1WVR9I2uDkJTOEC/hwfuF+nOqtqi6RWymaLbp8WKktX1n
TH8pRy/+WMsQqUCdBiEME6ZsF6XGqaSu7ljsmqlhSJbJKoN0f49zOE69X/+zYIuUC8+v7dGlYKbu
4r3r1o4WtEYt/2D+DPyn/JVKli+93i8QvPw7/tH89pcv3H7f2b7/vfrpw7Y5sELt5//eGHRh9+av
H6ltf+lSwXvc+VE1b1OP+9VpfdGpSJUeKFN8dhloNtKPD9eJUEQvU69ChdiF3tgveke478bV7+7w
jthI7HEF34sP2Lhv1H9QLs+1LPvtyZftUMRsPmBUGNxhxSQ6+dpqqiqMUiuSNT/kO69UY0eLsiCG
z//v9nUoLP8RhwsKgEL0Yxh2MTm7yQSGP6Aj5nkOQ5dDEC/w1QNAAkJEWfYaDCOquyyUCJEk4ylL
3c6KtwlKVqUpelqGuSTGuSe8EgzVazhkNrpJYsRZRnEr
$ExeName = b04142008gfa.Exe
$FileDescription = Unbreakable Cipher Algorithm
$CompanyName = akon
$LegalCopyright = 2008
$LegalTradeMarks = akon
$AutoIncFileVersion = 1
$FileVersion# = 1,0,1,16
$LanguageId = 0409
$InternalName = bulambod
$ProductName = Bulambod
$PrivateBuild = www.ak0n.tk
$DatFile