08-10-2011
The uuencode command just takes binary and encodes it in visible ascii characters 6 bits per character. I do not see any password or encrypt. Try zip with the encode option. Your mail will be shorter, too, and the encryption more effective on the more random zip bytes. Or, pipe it through crypt or the like:
Man Page for crypt (All Section 0) - The UNIX and Linux Forums
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
How to set password in zip files under unix?
There are password protection available in various os.
Does unix has password protection for zip files?
Is zip and gzip command has it? (6 Replies)
Discussion started by: p_prathaban
6 Replies
2. AIX
Can it be done? Ive read in a few places that the crypt program no longer exists on AIX...if its do-able please tell me how. (2 Replies)
Discussion started by: rdudejr
2 Replies
3. UNIX for Dummies Questions & Answers
Hi Experts,
I am an SAP ABAP developer and compleatly stranger to unix and I need a help to extend a small peice of code.
Our requirement is to zip a file with password protection in a specified directory. Following is the code I am using to zip a file ZZZZ.TXT.
Here YYYY = is the path... (3 Replies)
Discussion started by: veeru4all
3 Replies
4. UNIX for Dummies Questions & Answers
I am trying to zip a file with password protection.
I have read all or atleast most of the threads on the website, but couldn't come up with a solution.
I am running ZIP version 2.3 on HP-UX but I dont see the -P (password) option. I read somewhere that free versions of zip don't come with... (5 Replies)
Discussion started by: pintu
5 Replies
5. UNIX for Advanced & Expert Users
I need to convert a password protected excel file which will be in UNIX server to a comma separated file. For this I need to open the excel file in UNIX box but the UNIX box doesn't prompt for password instead it is opened in an encrypted manner.
I could manually ftp the excel file to local... (2 Replies)
Discussion started by: Devivish
2 Replies
6. Shell Programming and Scripting
Since I'm just new in unix, can I ask the experts on how I can develop or enhance a unix utility in protecting or securing a file using scripts.
Im thinking chmod, is it enought? or are there other utilities in unix?
My algorithm is like there will be a menu that shows a list of types of... (2 Replies)
Discussion started by: imjustjong
2 Replies
7. Linux
Hi All
I am working on a site to help newbie to learn linux for free.
demo.freelinuxconsole.info
there is only one file index.php its been able to rename or deleted.
Kindly let me know what permissions should i give to secure this file from editing or deleting by others. (8 Replies)
Discussion started by: smithjack
8 Replies
8. Shell Programming and Scripting
Hi Friends,
I execute a perl script with password as input but i wish not to print the password when i give the input. Instead when i provide the password it could be shown as "****" instead of original password. I know we can use Term::ReadKey or IO::Prompt for this, but just wanted to know if... (0 Replies)
Discussion started by: nmattam
0 Replies
9. Shell Programming and Scripting
How to create a file in UNIX which is password protected ?
Thanks and Regards,
Neeraj (5 Replies)
Discussion started by: neeraj617
5 Replies
10. UNIX for Dummies Questions & Answers
Hi
We send *.csv with sensitive data to our customers. Our customers open those files with Excel.
A new requirement is that we password protect those CSV files.
I thought to pack them with ZIP and assign a password to the archive.
But Solaris 10 can't encrypt ZIP files.
$ zip -P... (12 Replies)
Discussion started by: slashdotweenie
12 Replies
crypt(3C) crypt(3C)
NAME
crypt - generate hashing encryption
SYNOPSIS
Obsolescent Interfaces
DESCRIPTION
crypt():
is the password encryption function. It is based on a one way hashing encryption algorithm with variations intended (among other things)
to frustrate use of hardware implementations of a key search.
key is a user's typed password. salt is a two-character string chosen from the set this string is used to perturb the hashing algorithm in
one of 4096 different ways, after which the password is used as the key to encrypt repeatedly a constant string. The returned value points
to the encrypted password. The first two characters are the salt itself.
Obsolescent Interfaces
generate hashing encryption.
WARNINGS
The return value for points to data whose content is overwritten by each call.
and are obsolescent interfaces supported only for compatibility with existing DCE applications. New multithreaded applications should use
SEE ALSO
crypt(1), login(1), passwd(1), getpass(3C), passwd(4), thread_safety(5).
STANDARDS CONFORMANCE
crypt(3C)