Well Hello Rodney!

“Well Hello Rodney!”, was my nana’s favorite greeting. Every time I called or visited; I was greeted with the familiar “Well Hello Rodney!”. I am sitting here reflecting on these words and feeling a bit glum as I will never hear these words again. Thursday night I received word that my nana had passed from…

D&D: Role of the Cleric

One question that always seems to pop up when you are beginning a new campaign is: “Who’s gonna play the cleric?”. This job generally goes to the newcomer or the last to arrive. The cleric, as a “role-playable” character has been grossly neglected. Throughout my years as a role-player and dungeonmaster, many people who play…

Simple Cryptography With C#

One of the applications I’m working on has the need to store Privately Identifiable Information (PII) in it’s databases. We have chosen to store this information using the RSA Public Key Cryptography provider included in the .NET Core base libraries. We all use Public Key Cryptography (PKC) every day. If you are reading this you…

Console Apps in Python and C# (.Net Core) Part 3

In my last post, I showed you how to add named parameters to a Python script. These parameters –extension and –directory gave us the ability to run our programs with different extensions and located in different directories. This article will add the same functionality to the C# version of this program. Where Python has an…

Building a Simple C# Hashing Utility

One of the most interesting aspects of Cryptography is the ability to generate unique hash values from strings or files. Wikipedia Defines Cryptographic as follows: A cryptographic hash function is a hash function that is suitable for use in cryptography. It is a mathematical algorithm that maps data of arbitrary size to a bit string…