Hi,
I've got a text-file with aes-encrypted content generated by a software in use at my place. It contains a database name, an username and the corresponding password. In the software, the user can enter these parameters, establish a connection to the database (Oracle DB) and perform different...