I'm having one doubt about the VIM ENCRYPTION key. I having a text file, I encrypted that file using
[OR]
Now, where the encrypted key is stored (path). Whether it stored in a separate file or the text file itself. If I open a the file it asked Encryption key. How it compare my key with the original key?
My dilemma,
I need to send, deemed confidential, information via e-mail (SMTP). This information is sitting as a file on AIX. Typically I can send this data as a e-mail attachment via what we term a "mail filter" using telnet. I now would like to somehow encrypt the data and send it to a e-mail... (1 Reply)
hi,
i am facing a problem that (i think) many people had before.
under linux i use vim and therefor i am used to be able to use the cursor, delete and backspace keys in edit mode.
that's not the case in the classic vi, e.g. under solaris. when hitting these keys, uninteded char sequences are... (1 Reply)
Hi There,
I have set encryption key to my file using :X command.
Now that I no more need encryption key to the file, I just want to delete/remove the encryption key. I have gone through many source but in vain. None of the source provided me with the solution that I am looking for.
I... (2 Replies)
I downloaded vim.7.2 and compiled the vim source .
Added the vim binary path to PATH (Because iam not the root of the box)
when i load the file using vim it throws me an error
Error detected while processing /home2/e3003091/.vimrc:
line 2:
E185: Cannot find color scheme darkblue
line... (0 Replies)
Hi, I've used the following way to set ssh public key authentication and it is working fine on Solaris 10, RedHat Linux and SuSE Linux servers without any problem. But I got error 'Server refused our key' on Solaris 8 system. Solaris 8 uses SSH2 too. Why? Please help. Thanks.
... (1 Reply)
Hi All,
In linux server some encryption keys were imported using gpg command.
I want to know when those keys was imported.
Is there any way to get when the encryption keys were imported?
Thanks in advance..
:rolleyes: (1 Reply)
Hi all,
I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS.
For example: when A wants to send file to B
A will encrypt the file with B's computer MAC/IP address as an encryption key
This file can only be decrypted... (2 Replies)
Hi,
we have private and public key, encrypt file using public and want to decrypt using private key. can you please advise below commands are correct or other remedy if unix have?
encrypt -a arcfour -k publickey.asc -i TESTFILE.csv -o TESTFILE00.csv
decrypt -a arcfour -k privatekey.asc... (2 Replies)
Discussion started by: rizwan.shaukat
2 Replies
LEARN ABOUT PLAN9
crypt
crypt(1)crypt(1)NAME
crypt - encode or decode a file
SYNOPSIS
crypt [password]
The crypt utility encrypts and decrypts the contents of a file. crypt reads from the standard input and writes on the standard output. The
password is a key that selects a particular transformation. If no password is given, crypt demands a key from the terminal and turns off
printing while the key is being typed in. crypt encrypts and decrypts with the same key:
example% crypt key < clear.file > encrypted.file
example% crypt key < encrypted.file | pr
prints the contents of clear.file.
Files encrypted by crypt are compatible with those treated by the editors ed(1), ex(1), and vi(1) in encryption mode.
The security of encrypted files depends on three factors: the fundamental method must be hard to solve; direct search of the key space
must be infeasible; "sneak paths" by which keys or cleartext can become visible must be minimized.
crypt implements a one-rotor machine designed along the lines of the German Enigma, but with a 256-element rotor. Methods of attack on
such machines are widely known, thus crypt provides minimal security.
The transformation of a key into the internal settings of the machine is deliberately designed to be expensive, that is, to take a substan-
tial fraction of a second to compute. However, if keys are restricted to (say) three lower-case letters, then encrypted files can be read
by expending only a substantial fraction of five minutes of machine time.
Since the key is an argument to the crypt command, it is potentially visible to users executing ps(1) or a derivative command. To minimize
this possibility, crypt takes care to destroy any record of the key immediately upon entry. No doubt the choice of keys and key security
are the most vulnerable aspect of crypt.
/dev/tty for typed key
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Availability |SUNWcsu |
+-----------------------------+-----------------------------+
des(1), ed(1), ex(1), ps(1), vi(1), attributes (5)
8 Mar 2005 crypt(1)