That means something Windows compatible?
Because I would use crypt command, I just tried between a file I generated on HP-UX:
used crypt and scp the file to a solaris 10...
Works fine. but for Windows....
Hi there,
I just want to know if there's anyway to protect any tar file with a password that requierd when somebody want to extract that tar.
thanks in advance
regards,
Abdulkarim (1 Reply)
I have created a PHP page that I use to clean files on my machine. I would like to leave the file there but I want to password protect it so that I am the only one that can run it from the shell. Does anyone know how to do this? Thanks.
-Cam (2 Replies)
Hello All,
i work with backup, The below script runs and tar the user specified dir and put it in a backup machine. can any one help me to modify this in such a was that the tar file generated can be given a users specific password so that it can have high security.
KINDLY LET ME... (2 Replies)
I'm wondering if there is a way to zip a file and password protect it non-interactively.
zip -e will prompt for a password but I don't want a prompt. This needs to be done automatically as part of a shell script.
I'm using the zip command because the will be unzipped by a Windows machine. ... (1 Reply)
I am trying to zip a file with password protection.
I have read all or atleast most of the threads on the website, but couldn't come up with a solution.
I am running ZIP version 2.3 on HP-UX but I dont see the -P (password) option. I read somewhere that free versions of zip don't come with... (5 Replies)
Hi,
I'm working on Solaris 9 and i need to unzip a password protected zip, which i can do using
zip -Ppassword filename
however when i have done what i need to do with the file is to zip the file back up with a password. Zip on my system is version 2.3 and does not support this?
How can... (0 Replies)
Hi Guru,
I have assignment to create script to compress file as .ZIP with password.
I don't know the command line in AIX. It's very new for me.
I'm try to use zip or tar but I don't have any option for encrypt with password.
Please kindly suggest me.
Thank you very much.
Multidev (7 Replies)
Hello,
i have around 20 backup files tar.gz with sensitive data. The sizes of these files are from around 200MB to around 20GB
I want to secure these files so no one can read, use its contents. only me
the method of encrypting, password protecting them should be fast, so for example in... (1 Reply)
Is there a way to have a user be prompted for a password to open a file? I am trying to protect a bash script from being changed. Thank you :). (3 Replies)
Discussion started by: cmccabe
3 Replies
LEARN ABOUT OSF1
crypt
crypt(1) General Commands Manual crypt(1)NAME
crypt - encode/decode
SYNOPSIS
crypt key < input.File > output.File
DESCRIPTION
The command reads from the standard input and writes on the standard output. You must supply a key which selects a particular transforma-
tion. If no password is given, demands a key from the terminal and turns off printing while the key is being typed in. The command
encrypts and decrypts with the same key.
Files encrypted by are compatible with those treated by the ed, ex and vi editors in encryption mode.
The security of encrypted files depends on three factors: the fundamental method must be hard to solve, direct search of the key space must
be infeasible, and sneak paths by which keys or clear text can become visible must be minimized.
The command implements a one-rotor machine designed along the lines of the German Enigma, but with a 256-element rotor. Methods of attack
on such machines are known, but not widely; moreover the amount of work required is likely to be large.
The transformation of a key into the internal settings of the machine is deliberately designed to be expensive, for example, to take a sub-
stantial fraction of a second to compute. However, if keys are restricted to three lowercase letters, then encrypted files can be read by
expending only a substantial fraction of five minutes of machine time.
Since the key you choose is an argument to the command, it is potentially visible to users executing the command or a derivative. To mini-
mize this possibility, destroys any record of the key immediately upon entry. The most vulnerable aspect of is the choice of keys and key
security.
EXAMPLES
The following examples use KEY as the key to encrypt and decrypt files. The first example encrypts the file naming the resulting encrypted
file The second example decrypts the file naming the resulting decrypted file The third example prints the encrypted file in clear text. $
crypt KEY < plain.File > crypt.File $ crypt KEY < crypt.File > decrypt.File $ crypt KEY < crypt.File | pr
FILES
for typed key
RELATED INFORMATION ed(1), ex(1), vi(1), crypt(3), makekey(8) delim off
crypt(1)