Closed. This question is off-topic. It is not currently accepting answers.
Want to improve this question? Update the question so it's on-topic for Stack Overflow.
Closed 10 years ago.
Improve this question
I'm aware that the default encryption provided by the zip command in Linux isn't considered to be secure, but I'm curious - what algorithm does it use when encrypting with the --encrypt option?
Since the zip command will write out PKZIP files, it would follow they're implementing the specs for that. Apparently the format allows for several distinct ciphers, the one typically considered "insecure" looks like it's homegrown.
See here for a detailed discussion of how to break it, including some insights into the original algorithm: http://math.ucr.edu/~mike/zipattacks.pdf
Traditional encryption is based on a stream cypher by Roger Schaffely.
The exact, symmetric algorithm is illustrated here http://www.academia.edu/348210/PKZIP_Algorithm
Newer versions of the linux zip utility (zip-info) seem to be going to include AES encryption aswell:
http://www.info-zip.org/phpBB3/viewtopic.php?f=4&t=396&p=2453&hilit=aes#p2453
Related
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 2 years ago.
Improve this question
A ransomware encrypted all my files with the extension .nlah
I used Spyhunter 5 to scan my Windows 10 and delete the malwares.
Then I had to look for a way to recover my files with no success. This is the tool: EMSIsoft: ransomware-decryption-tools
I'm a doctor, and I save very important informations about my patients in that computer. So it's vital to recover those files. Can you help me please?
enter image description here
It is almost impossible to decrypt the files without knowing key and encryption mechanism.
Please make sure you have completed removed the ransomeware from your computer to avoid further damage.
If you have backup copy of your files then get it recovered from backup.
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
Closed 5 years ago.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Improve this question
Where do linux systems keep the users encrypted passwords and how can it be decoded? Or maybe there is a workaround for getting the initial user's password? Thanks
the default directory to the file that keeps passwords in Unix systems is
etc/passwds
and in macOS
etc/master.passwds
https://docs.python.org/3/library/crypt.html
you can read about crypt library of python which may help you to decode the Unix password. One of the ways I do it is I generate all possible Strings of a certain length 8, and then compare the hash from that file with the hash of each of these words. I am not sure that it is the optimal way of solving this question but it works.
Take a look here:
Python generate all possible strings of length n
Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 8 years ago.
Improve this question
I am new to Unix and wanted to understand under the hood working of Unix command. My question is whenever we type any command in shell, how are they interpreted at OS level.
Any help will be great. Thanks.
Actually, the interpretation of commands is done by the shell, not the operating system.
As mentioned in a comment, the operating system provides system calls like fork() and execve() that allow the creation and manipulation of processes. There are also calls that control file descriptors so that inputs and output can be arbitrarily mapped. The operating system provides all of this functionality, but it is up to the shell (bash, csh, zsh, etc) to interpret commands and issue the correct system calls.
Closed. This question is off-topic. It is not currently accepting answers.
Want to improve this question? Update the question so it's on-topic for Stack Overflow.
Closed 11 years ago.
Improve this question
I need to know whether the "crypt" Command Unix/Solaris 10 support 128bit encryption/decryption.
A Blog Post shows that crypt on Solaris 10 does not use anything like DES, RSA, AES etc (wich are typically involved when speaking of "128 Bit encryption"). It uses a weak function that can be broken by many tools, one mentioned in that very article. Use the openssl library or tools when you need up-to-date cryptography.
Use the encrypt and decrypt commands which are always installed on Solaris 10. Openssl provides similar functionalities but might be missing from a standard installation.
Closed. This question is off-topic. It is not currently accepting answers.
Want to improve this question? Update the question so it's on-topic for Stack Overflow.
Closed 12 years ago.
Improve this question
Which one is more powerful operating system? And is it possible to convert Microsoft-DOS batch file into Unix Script and vice-versa?
DOS is a 16-bit monouser operating system, without any kind of memory protection. UNIX is a 32/64 bit multiuser operating system, with multiprocess scheduling, userspace/kernel space separation and memory protection.
From just that description, i can say UNIX is a lot more powerful than DOS. But of course depends on your requirements :)
Is it possible to convert a .bat file to a unixshell script, sure, just do it by hand.
It depends how you define power. By most common definitions a multi-user OS (UNIX) is more powerful than a single user one (DOS). However this is not always the case. If your requirements are for a embedded single user system , then one could argue that a single user OS is better.