|Plugin Info: 2empowerFM Text Toolkit|
|Platform:||Win + Mac|
|Last Updated:||April 2013|
Text Toolkit lets you test if an email address looks valid, format digits into phone numbers, capitalize sentences, turn HTML into plain text, generate hash strings, and more. Process each line of a FileMaker value list twice as fast as you could with FM’s MiddleValues(), look at each word in a comma separated list, or do just about anything else with text that you might imagine.
Text Toolkit gives you the power of “Regular Expressions” (“RegEx” for short) which are sequences of special codes and “wildcard” characters that match particular patterns of text. Regular Expressions are so useful that you’ll find something like RegEx search and replace in every major word processor and programming language. Many web sites offer libraries of regular expression patterns and expression building tools to make RegEx easier to use.
Text Toolkit integrates a Perl-compatible RegEx engine that’s fast and well tested. Even advanced features like equivalence classes and Perl back-references are supported. Perl-like variables are created for each matched segment of text, and iteration through multiple matches is supported.
Text Toolkit also gives you the power of “Hashing”. A hash is a short sequence of characters that uniquely represents a piece of text. Changing any part of the text will change its hash.
Store the hash of one or more fields to determine when any of them have been altered. This can be used for security or to determine when changed records in two databases need to be synchronized.
When a hash is “strong”, it is impossible to calculate what text created it. Therefore, if you store the strong hash of a password instead of the password itself, it doesn’t matter if the hash is stolen from your database because the hash can’t be used to determine the password that created it. To verify a password, just compare its hash to the hash you stored.
2empowerFM Text Toolkit supports many hash methods: TR1, MD5, SHA1, SHA256, and SHA512 (one of the strongest hashing methods available) and uses well-tested, third-party hashing libraries.