This code has been declared by its author to be Public Domain code.
Download source code | Random Password Generator by Arowx | 2010 |
| |
|
Need a random password but just can't think randomly then use the Password Grid Generator TM...
Yep a grid of 10x10 randomly generated character's all you have to do is pick the a row/line or path or any selection and you have a very random password.
Click the left mouse button to randomize the grid... |
'Arowx : Password Generator -
' ascii characters from 33(!) to 126(~) randomly shuffled in a 10x10 grid
Framework brl.max2d
Import brl.random
Import BRL.D3D9Max2D
Const number = 3473992
seed = MilliSecs()*number
SeedRnd(seed)
AppTitle = "Codegrid Generator"
Graphics 230,230
Repeat
Cls
SeedRnd(seed)
For x = 0 To 9
For y = 0 To 9
DrawText Chr(Rand(33,126)), x*20+20, y*20+20
Next
Next
If MouseDown(1)
seed = MilliSecs()*number
EndIf
Flip
Until AppTerminate() |
Comments |
I don't see the point in multiplying millisecs() by a constant number. It's not going to be any more or less random than it already is.
|
|
not sure about this but...
I guess it gives a series of random numbers that are not as easily predicted as using normal rand. Then again, there are trillions of values millisecs() can be at so yeah I dont think it is very crackable for codes anyway lol...
|
|
Nate - I think you'll find it does nothing other than pass a different seed. It is no more or less random than any other seed.
|
|
Nate - I think you'll find it does nothing other than pass a different seed. It is no more or less random than any other seed.
thats what I was thinking... perhaps I was thinking a little too out loud... I said I dont think using seed rnd millisecs would be able to be reverse ingeneered for cracking codes anyway... which effectively means its not any more random than just using rand()
|
Code Archives Forum