Software Lab (CONSTRUCTION IN PROGRESS)

This page is my software lab. It is culminated over many years of trial and experimentation and a very steep learning curve. This is very much difficult for me as I am an accountant by profession. Over the course of my various clientele experience, I have had to utilize technology and software to accomplish efficiency and effectiveness of my work for them. It has being a humbling experience and although my lab may be considered amateur by programmers out there, I don’t think that is the point. This page documents my experience and my journey.

Below are some of my experiments which I will try to add on whenever I can with my very busy schedule.

MICROSOFT EXCEL

This is a post on how the icons would work and its impact on the website.

MICROSOFT EXCEL

This is a post on how the icons would work and its impact on the website.

CLOUD SOFTWARES

This is a post on how the icons would work and its impact on the website.


Software Lab Generating Algorithms
Description:
This set of VBA codes can be used to generate encryption for your data in Excel. The key will be required to encrypt and decrypt the data.
Code:
Option Explicit 
Function XorC(ByVal sData As String, ByVal sKey As String) As String 
    Dim l As Long, i As Long, byIn() As Byte, byOut() As Byte, byKey() As Byte 
    Dim bEncOrDec As Boolean 
     'confirm valid string and key input:
    If Len(sData) = 0 Or Len(sKey) = 0 Then XorC = "Invalid argument(s) used": Exit Function 
     'check whether running encryption or decryption (flagged by presence of "xxx" at start of sData):
    If Left$(sData, 3) = "xxx" Then 
        bEncOrDec = False 'decryption
        sData = Mid$(sData, 4) 
    Else 
        bEncOrDec = True 'encryption
    End If 
     'assign strings to byte arrays (unicode)
    byIn = sData 
    byOut = sData 
    byKey = sKey 
    l = LBound(byKey) 
    For i = LBound(byIn) To UBound(byIn) - 1 Step 2 
        byOut(i) = ((byIn(i) + Not bEncOrDec) Xor byKey(l)) - bEncOrDec 'avoid Chr$(0) by using bEncOrDec flag
        l = l + 2 
        If l > UBound(byKey) Then l = LBound(byKey) 'ensure stay within bounds of Key
    Next i 
    XorC = byOut 
    If bEncOrDec Then XorC = "xxx" & XorC 'add "xxx" onto encrypted text
End Function 

Procedures:
  1. This is step 1.
  2. This is step 2.
  3. This is step 3.

Leave a Reply

Your email address will not be published. Required fields are marked *