Sponsored Content
Full Discussion: executing encrypted files
Top Forums UNIX for Advanced & Expert Users executing encrypted files Post 16629 by AtleRamsli on Tuesday 5th of March 2002 02:28:58 PM
Old 03-05-2002
There may be. Try the Icon Programming language at www.cs.arizona.edu/icon (Icon is C meets Perl meets ProLog meets Beta).
The reason I think it would work with Icon is that you can modify the way the program is loaded.
With a pure binary this might get rather involved, since the first part of the program would have to consist of a key prompter, a loader and dectrypter, and the application.

It is an interesting project, but you might want to be quit proficient before attempting it.

Also, what do you want to achieve?
For copy protection there already exists loads of libraries ... but for putting something together quickly and running it, I don't know.
For a shell script, you just feed the script to decrypt before executing ...

Atle
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

executing encrypted files

Hi, Is there a way of executing encrypted files? I have encrpyted files using vi and crypt, but when I execute the encrypted file, it takes the contents literally (special characters, junk - encrpyted format). Kind Regards, Kawah (1 Reply)
Discussion started by: Kawah Cheung
1 Replies

2. Programming

Problem executing C files in Linux

Hi there I compiled a simple .c file using the cc command, the file was compiled successfully and executable file (a.out) was generated. But When I executed the a.out file it gave me: bash: a.out: command not found Can anybody tell me what's the problem. Note that I'm using: Red Hat... (3 Replies)
Discussion started by: HAS
3 Replies

3. UNIX for Dummies Questions & Answers

encrypted files

Hi lads me again trying to get a wee bit fancy with my scripting anyway it dosn't seem to want to run (strange as it may seem) I encrypted a file renamed it and wrote another file that unencrypts it (it contains passwords) (and b4 anyone says I am doing this for my own reasons) In a... (3 Replies)
Discussion started by: w33man
3 Replies

4. Shell Programming and Scripting

executing an encrypted script

Can we execute an encrypted shell script . I encrypted a shell scripts with crypt with keys and tried to execute it it gave me segmentation faul?? Can somebody answer this one please?? If we can is there any settings i need to change?? Thanks (2 Replies)
Discussion started by: ajnabi
2 Replies

5. UNIX for Dummies Questions & Answers

How to unzip multiple files (encrypted) in a directory.

Good day all. I want to unzip multiple files in a directory. Suppose there are two files: test.txt.zip and test1.txt.zip Using this command: unzip -o -P test*.zip results in the unzipping of the first file not second. It gives this error: Archive: test.txt.zip caution: filename not... (2 Replies)
Discussion started by: er_ashu
2 Replies

6. UNIX for Dummies Questions & Answers

how to compare 2 encrypted files?

I have 2 files :- 1) f1.txt and f2.txt.Both contain some text as - 2)Now I did : output: I got them to be equal. 3) I encrypted them using gpg and with the SAME paraphrase :- 4)Now I did : #cmp f1.txt.gpg f2.txt.gpg (OR) #diff f1.txt.gpg f2.txt.gpg output: I got them to be... (1 Reply)
Discussion started by: nsharath
1 Replies

7. Shell Programming and Scripting

Delete many files by executing script.

Hi , I am novice in Unix. Kindly , try to resolve my query. I have 3 folders. Inside these folders , I have few files respectively. Now , Instead of deleting each file by visitng the directory. I want to write a script which when executed all files gets deleted with that. For ex:- Dir -... (1 Reply)
Discussion started by: devmns
1 Replies

8. Linux

Secured encrypted files via Linux

I need to encrypt a ".txt" file with password settings and it should decrypt the file automatoically when end user types correct password. Can some one help me on this. Thank you (3 Replies)
Discussion started by: rlmadhav
3 Replies

9. Shell Programming and Scripting

Executing shell script files

Whats the difference between executing a file such as test.sh as: ./test.sh as apposed to sh test.sh i've noticed that a simple while loop will not execute for the 2nd way of doing it, but will for the first. Also what do you guys all recom (6 Replies)
Discussion started by: linuxkid
6 Replies

10. Shell Programming and Scripting

Executing a batch of files within a shell script with option to refire the individual files in batch

Hello everyone. I am new to shell scripting and i am required to create a shell script, the purpose of which i will explain below. I am on a solaris server btw. Before delving into the requirements, i will give youse an overview of what is currently in place and its purpose. ... (2 Replies)
Discussion started by: goddevil
2 Replies
crypt(1)						      General Commands Manual							  crypt(1)

NAME
crypt - encode/decode SYNOPSIS
crypt key < input.File > output.File DESCRIPTION
The command reads from the standard input and writes on the standard output. You must supply a key which selects a particular transforma- tion. If no password is given, demands a key from the terminal and turns off printing while the key is being typed in. The command encrypts and decrypts with the same key. Files encrypted by are compatible with those treated by the ed, ex and vi editors in encryption mode. The security of encrypted files depends on three factors: the fundamental method must be hard to solve, direct search of the key space must be infeasible, and sneak paths by which keys or clear text can become visible must be minimized. The command implements a one-rotor machine designed along the lines of the German Enigma, but with a 256-element rotor. Methods of attack on such machines are known, but not widely; moreover the amount of work required is likely to be large. The transformation of a key into the internal settings of the machine is deliberately designed to be expensive, for example, to take a sub- stantial fraction of a second to compute. However, if keys are restricted to three lowercase letters, then encrypted files can be read by expending only a substantial fraction of five minutes of machine time. Since the key you choose is an argument to the command, it is potentially visible to users executing the command or a derivative. To mini- mize this possibility, destroys any record of the key immediately upon entry. The most vulnerable aspect of is the choice of keys and key security. EXAMPLES
The following examples use KEY as the key to encrypt and decrypt files. The first example encrypts the file naming the resulting encrypted file The second example decrypts the file naming the resulting decrypted file The third example prints the encrypted file in clear text. $ crypt KEY < plain.File > crypt.File $ crypt KEY < crypt.File > decrypt.File $ crypt KEY < crypt.File | pr FILES
for typed key RELATED INFORMATION
ed(1), ex(1), vi(1), crypt(3), makekey(8) delim off crypt(1)
All times are GMT -4. The time now is 12:52 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy