vfdecrypt(1) General Commands Manual vfdecrypt(1)NAME
vfdecrypt - decrypt encrypted filevault disk images
SYNOPSIS
vfdecrypt -i in-file -p password -o out-file
DESCRIPTION
vile fault decrypts encrypted Mac OS X disk image files. It supports both version 1 and 2 of the non-documented proprietary format.
OPTIONS -i Path to the input file. Usually an encrypted disk image. It's also kosher to redirect from STDIN.
-e Try to extract key from input file.
-k The alphanumeric key you wish to use to decrypt the disk file.
-p The password you wish to use to decrypt the disk file.
-o The output file. It's also kosher to redirect to STDOUT.
SEE ALSO vfcrack(1)BUGS
Feel free to report them or to submit patches.
AUTHORS
Ralf-Philipp Weinmann <ralf@coderpunks.org>
David Hulton <dhulton@openciphers.org>
Jacob Appelbaum <jacob@appelbaum.net>
vfdecrypt(1)
Check Out this Related Man Page
crypt(1) General Commands Manual crypt(1)NAME
crypt - encode/decode
SYNOPSIS
crypt key < input.File > output.File
DESCRIPTION
The command reads from the standard input and writes on the standard output. You must supply a key which selects a particular transforma-
tion. If no password is given, demands a key from the terminal and turns off printing while the key is being typed in. The command
encrypts and decrypts with the same key.
Files encrypted by are compatible with those treated by the ed, ex and vi editors in encryption mode.
The security of encrypted files depends on three factors: the fundamental method must be hard to solve, direct search of the key space must
be infeasible, and sneak paths by which keys or clear text can become visible must be minimized.
The command implements a one-rotor machine designed along the lines of the German Enigma, but with a 256-element rotor. Methods of attack
on such machines are known, but not widely; moreover the amount of work required is likely to be large.
The transformation of a key into the internal settings of the machine is deliberately designed to be expensive, for example, to take a sub-
stantial fraction of a second to compute. However, if keys are restricted to three lowercase letters, then encrypted files can be read by
expending only a substantial fraction of five minutes of machine time.
Since the key you choose is an argument to the command, it is potentially visible to users executing the command or a derivative. To mini-
mize this possibility, destroys any record of the key immediately upon entry. The most vulnerable aspect of is the choice of keys and key
security.
EXAMPLES
The following examples use KEY as the key to encrypt and decrypt files. The first example encrypts the file naming the resulting encrypted
file The second example decrypts the file naming the resulting decrypted file The third example prints the encrypted file in clear text. $
crypt KEY < plain.File > crypt.File $ crypt KEY < crypt.File > decrypt.File $ crypt KEY < crypt.File | pr
FILES
for typed key
RELATED INFORMATION ed(1), ex(1), vi(1), crypt(3), makekey(8) delim off
crypt(1)
I have a huge matrix file containing some 1.5 million rows and 6000 columns. The matrix looks something like this:
1 2 3
4 5 6
7 8 9
3 4 5
I want to add all the numbers in the columns of this matrix and display the result to my stdout. This means that the numbers in the first column are:
... (2 Replies)
Hi,
Just trying to get to grips with sed and awk for some reporting for work and I need some assistance:
I have a file that lists policy names on the first line and then on the second line whether the policy is active or not.
Policy Name: Policy1
Active: yes
Policy... (8 Replies)
version info :
vi availabe with RHEL 5.4
I have a text file with 10,000 lines. I want to copy lines from 5000th line to 7000th and redirect to a file. Any idea how I can do this?
Note:
The above scenario is just an example. In my actual requirement, the file has 14 million lines and I want... (9 Replies)
Hi everyone,
I know the following questions are noobish questions but I am asking them because I am confused about the basics of history behind UNIX and LINUX.
Ok onto business, my questions are-:
Was/Is UNIX ever an open source operating system ?
If UNIX was... (21 Replies)
Hello,
I couldn't find an actual introduction thread, so I decided to just put this here.
I go by d0wngrade online. I have been programming in multiple languages for about 15+ years. I started with standard web design languages like HTML and CSS, but I then advanced from design to development... (2 Replies)
Hi guys...
The first active code line in AudioScope.sh is set -u .
This causes a complete exit if a variable is used/found but has not been allocated at the start of the program.
However, apart from writing code to do the task, is there a switch to to check which variables have been... (17 Replies)
Hi.
In thread https://www.unix.com/shell-programming-and-scripting/267833-grouping-counting.html rovf and I had a mini-discussion on grep and awk.
Here is a demo script that compares the awk and grep approaches for this single problem:
#!/usr/bin/env bash
# @(#) s2 Demonstrate group... (1 Reply)
Hello,
I have to fish out some specific columns from a file based on the header value. I have the list of columns I need in a different file. I thought I could read in the list of headers I need,
# file with header names of required columns in required order
headers_file=$2
# read contents... (11 Replies)
For those interested in installing dash shell on OSX Lion to help test POSIX compliancy of shell scripts, it is quite easy. I did it like this:
If you don't have gcc on your system:
0. Download and install the Command Line Tools for Xcode package from Sign In - Apple *
1. Download the dash... (2 Replies)
Hello and thanks in advance for any help anyone can offer me
I'm trying to learn the find command and thought I was understanding it... Apparently I was wrong. I was doing compound searches and I started getting weird results with the -size test. I was trying to do a search on a 1G file owned by... (14 Replies)
I have data of an excel files as given below,
file1
org1_1 1 1 2.5 100
org1_2 1 2 5.5 98
org1_3 1 3 7.2 88
file2
org2_1 1 1 2.5 100
org2_2 1 2 5.5 56
org2_3 1 3 7.2 70
I have multiple excel files as above shown.
I have to copy column 1, column 4 and paste into a new excel file as... (26 Replies)
Dear All,
Taking a break from Vue.js coding for the site, SEO and YT videos; and hopefully addressing some well deserved criticism from some here that I have been too focused on the visual aspects of the forums versus the substance and the community....
While the "current generation... (9 Replies)
Hi all...
Well guys and gals, I jumped in at the deep end and found things that PERL cannot do by default.
Many tricky terminal escape codes are not catered for so I had to create workarounds.
One thing I searched for was this:
Passing perl variable to shell command
AND, @Neo this was... (15 Replies)