Sponsored Content
Full Discussion: Decryption software
Top Forums UNIX for Dummies Questions & Answers Decryption software Post 13768 by Phatress on Wednesday 23rd of January 2002 12:08:20 PM
Old 01-23-2002
Lightbulb Decryption software

whats the most sufficient way to make decryption software? What are the recoomendations for one?
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

File Encryption and Decryption in UNIX.

Hello guys ! I have used "crypt <first> second" command to encrypt "first" to "second" file. i have assign a key for that of course. Now when i try to look content of "seocnd" file through "cat second" command, the file is encrypted and cannot be read which is according to plan. But when... (3 Replies)
Discussion started by: abidmalik
3 Replies

2. UNIX for Advanced & Expert Users

decryption using digital certificate

A client application is encrypting a text using private key and sends through socket. My application(server written in c/c++,unix) receives the chiper-text through socket. I have client's digital certificate. now, how do I decrypt(may be using openssl library) this ciper-text using client's... (1 Reply)
Discussion started by: johnbach
1 Replies

3. Shell Programming and Scripting

Password decryption

Hi, I don't know if I am in a correct category with my question. I want to know what decryption-method is used for this password: (1) The first stadium is (its stored in the settings.xml of my software):... (2 Replies)
Discussion started by: Mogli1977
2 Replies

4. Shell Programming and Scripting

decryption issue!

Hi, Something bizarre is happening while decrypting the files. I had a decrypt script which was working smoothly on uname -a Linux ######### 2.6.9-89.ELsmp #1 SMP Mon Apr 20 10:33:05 EDT 2009 x86_64 x86_64 x86_64 GNU/Linux After the front-end application was moved to uname -a Linux... (2 Replies)
Discussion started by: dips_ag
2 Replies

5. Shell Programming and Scripting

unix Script for decryption

how to decrypt a file using unix Scipts . i am using one code that is working in the manual testing... echo $pass_phrase|gpg --output $filename_DEx --batch --passphrase-fd 0 --decrypt $filename_DEx_enc in the informatica level its not working.. can anybody help me in this? thanks... (1 Reply)
Discussion started by: rajesh_pola
1 Replies

6. Programming

Write own decryption application

Hi , I need some help as I dont know where to start. I need to create a unix decryption application. The information I have been given is this so far: the specification of the encryption process is: NET 2 Cryptography classes. RijndaelManaged encryption algorithm ... (13 Replies)
Discussion started by: caciing_help
13 Replies

7. UNIX for Dummies Questions & Answers

decryption of .cpt file

Hi i have the path for encrytion file in unix and i want to decrypt the .cpt file in unix and change the password how can i do that . (3 Replies)
Discussion started by: lily
3 Replies

8. Shell Programming and Scripting

String encryption and decryption

Hello All, There are so many questions on this and I didn't find any concluded answer. I want to encrypt a string in the script, actually this is a password. I tried using openssl (I am a newbie to openssl), but it is generating a long one which we can't remember. I want to encrypt the... (5 Replies)
Discussion started by: karumudi7
5 Replies

9. HP-UX

Decryption of files on HP-UX servers?

I am pulling a file from sfdc to HP-UX servers. But in HP-UX servers, the file data shows encrypted. Can anyone tell me how to decrypt them? The file data is like- ... (1 Reply)
Discussion started by: saga20
1 Replies
ISAMLOG(1)						      General Commands Manual							ISAMLOG(1)

NAME
isamlog - Write info about whats in a nisam log file. USAGE
isamlog [-?iruvIV] [-c #] [-f #] [-F filepath/] [-o #] [-R file recordpos] [-w write_file] [log-filename [table ...]] SYNOPSIS
isamlog [-?|-I] [-V] [-c] [-f] [-F] [-i] [-o] [-p #] [-r] [-R] [-u] [-v] [-w] DESCRIPTION
isamlog -?|-I info -V version -c do only # commands -f max open files -F file path -i extra info -o offset -p # remove # components from path -r recover -R file recordposition -u update -v verbose -w write file NOTE
If no file name is given isam.log is used One can give a second and a third '-v' for more verbose. Normaly one does a update (-u). If a recover is done all writes and all possibly updates and deletes is done and errors are only counted. If one gives table names as arguments only these tables will be updated SEE ALSO
isamchk (1), isamlog (1), mysqlaccess (1), mysqladmin (1), mysqlbug (1), mysqld (1), mysqldump (1), mysqlshow (1), msql2mysql (1), perror (1), replace (1), safe_mysqld (1), which1 (1), zap (1), AUTHOR
Ver 1.0, distribution 3.23.29a Michael (Monty) Widenius (monty@tcx.se), TCX Datakonsult AB (http://www.tcx.se). This software comes with no warranty. Manual page by L. (Kill-9) Pedersen (kill-9@kill-9.dk), Mercurmedia Data Model Architect / system developer (http://www.mer- curmedia.com) 20 December 2000 ISAMLOG(1)
All times are GMT -4. The time now is 01:25 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy