Hi there,
I just want to know if there's anyway to protect any tar file with a password that requierd when somebody want to extract that tar.
thanks in advance
regards,
Abdulkarim (1 Reply)
I have created a PHP page that I use to clean files on my machine. I would like to leave the file there but I want to password protect it so that I am the only one that can run it from the shell. Does anyone know how to do this? Thanks.
-Cam (2 Replies)
Ok here at work I have been charged with finding a way to create a password protect .tar files from the command line. Now i have yet to actully sit down and learn UNIX yet, but that is one of my next todo's. Anyway my questions is I have been surfing in search of a solution and the closest answer... (5 Replies)
Is there a way to password protect a printer that is on a LAN network? Our security officer said our UNIX printers need to be password protected. Is this possible? I am running Solaris 7 and 8...
Thanks in advanced for any suggestions. (4 Replies)
I'm wondering if there is a way to zip a file and password protect it non-interactively.
zip -e will prompt for a password but I don't want a prompt. This needs to be done automatically as part of a shell script.
I'm using the zip command because the will be unzipped by a Windows machine. ... (1 Reply)
Hi,
Is it possible to make sure/test that all uploaded files to my FTP will be of .RAR format (that's easy) but also password protected?
Thanks (0 Replies)
Hi,
I'm working on Solaris 9 and i need to unzip a password protected zip, which i can do using
zip -Ppassword filename
however when i have done what i need to do with the file is to zip the file back up with a password. Zip on my system is version 2.3 and does not support this?
How can... (0 Replies)
Hi,
I am using Red Hat OS 5.0, is there any way that i can password protect directories. I know i can change permission so that no other user can access the content, but sometimes in my office environment i need to share vnc terminal with other people from my login itself. So i want that if user... (1 Reply)
Hi
We send *.csv with sensitive data to our customers. Our customers open those files with Excel.
A new requirement is that we password protect those CSV files.
I thought to pack them with ZIP and assign a password to the archive.
But Solaris 10 can't encrypt ZIP files.
$ zip -P... (12 Replies)
Is there a way to have a user be prompted for a password to open a file? I am trying to protect a bash script from being changed. Thank you :). (3 Replies)
Discussion started by: cmccabe
3 Replies
LEARN ABOUT OPENSOLARIS
crypt
crypt(1) User Commands crypt(1)NAME
crypt - encode or decode a file
SYNOPSIS
crypt [password]
DESCRIPTION
The crypt utility encrypts and decrypts the contents of a file. crypt reads from the standard input and writes on the standard output. The
password is a key that selects a particular transformation. If no password is given, crypt demands a key from the terminal and turns off
printing while the key is being typed in. crypt encrypts and decrypts with the same key:
example% crypt key < clear.file > encrypted.file
example% crypt key < encrypted.file | pr
prints the contents of clear.file.
Files encrypted by crypt are compatible with those treated by the editors ed(1), ex(1), and vi(1) in encryption mode.
The security of encrypted files depends on three factors: the fundamental method must be hard to solve; direct search of the key space
must be infeasible; "sneak paths" by which keys or cleartext can become visible must be minimized.
crypt implements a one-rotor machine designed along the lines of the German Enigma, but with a 256-element rotor. Methods of attack on
such machines are widely known, thus crypt provides minimal security.
The transformation of a key into the internal settings of the machine is deliberately designed to be expensive, that is, to take a substan-
tial fraction of a second to compute. However, if keys are restricted to (say) three lower-case letters, then encrypted files can be read
by expending only a substantial fraction of five minutes of machine time.
Since the key is an argument to the crypt command, it is potentially visible to users executing ps(1) or a derivative command. To minimize
this possibility, crypt takes care to destroy any record of the key immediately upon entry. No doubt the choice of keys and key security
are the most vulnerable aspect of crypt.
FILES
/dev/tty for typed key
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Availability |SUNWcsu |
+-----------------------------+-----------------------------+
SEE ALSO des(1), ed(1), ex(1), ps(1), vi(1), attributes(5)SunOS 5.11 8 Mar 2005 crypt(1)