Sponsored Content
Full Discussion: Can't unlock encrypted disk
Top Forums UNIX for Beginners Questions & Answers Can't unlock encrypted disk Post 303043058 by Neo on Friday 17th of January 2020 12:33:10 AM
Old 01-17-2020
Sorry to ask such a basic question, but the first thing that comes to mind is caps lock on your keyboard.

Are you sure (sorry, I guess you are, just asking for completeness) that your cap are not locked on your keyboard Smilie

(happens to me all the time ... )
This User Gave Thanks to Neo For This Post:
 

9 More Discussions You Might Find Interesting

1. Solaris

How to unlock my editor?

When I want to use the editor ,whether vi or textedit,it prompts for entering a key. How can I disable this function?many thanks for offering solutions! (1 Reply)
Discussion started by: smartboy1461
1 Replies

2. Solaris

how to unlock user ID in solaris?

I only able to lock user ID with passwd -l username It seems there is no option for me to unlock ID in solaris? Is there any command as below? passwd -u username Appreciate someome can share with me the way to do it. (1 Reply)
Discussion started by: dwarf007
1 Replies

3. UNIX for Dummies Questions & Answers

Unable to unlock users in Tru64

Hi Friends We have two node trucluster Tru64 4.0F Alpha Servers,In one of Tru64 4.0F Unix Server I am unable to unlock users, when I issue usermod command I will get following error /usr/sbin/usermod -x administrative_lock_applied=0 username account manager has exited unexpectedly - please... (0 Replies)
Discussion started by: madanmb
0 Replies

4. HP-UX

not able to unlock user

Hi, not able to unlock user eventhough executed /usr/lbin/modprpw -k username Thanks in advance (2 Replies)
Discussion started by: bpsunadm
2 Replies

5. AIX

how to unlock a dvd in HMC

When I do HMC upgrade, I download HMC code from IBM web site and burn it to a DVD disk, when I get the first DVD out of HMC's dvd rom and input the second DVD, it shows error: The requested device is already locked by the process: Install Corrective Service. Would you like to try to request a... (2 Replies)
Discussion started by: rainbow_bean
2 Replies

6. Shell Programming and Scripting

perl FileHandle Closure during after unlock

Hi we have one function which is used to append data the file in exclusive lock mode in aperl script. This script is executed by multiple threads at the same time. accessing the same file.this script runs throught the day. sometimes the file2.txt size is getting reduced. for eg from 10 M... (1 Reply)
Discussion started by: Shahul
1 Replies

7. Shell Programming and Scripting

Need help in lock and unlock and after the changes

Requirement:First i need to unlock the directory which i had a script for it.If i select app1 it should unlock the directory and after chnages in the script once need to lock the directory with lock command The below highlighed variables in lock and unlock has to be changed according... (2 Replies)
Discussion started by: bhas85
2 Replies

8. Shell Programming and Scripting

Where are lock and unlock commands?

I'm running cygwin bash on Windows 8.1. I would like to to write a OS neutral bash script that uses the commands like lock, block and unlock. Do I need to write lock, block and unlock myself in C++? I'm hoping someone has already written them. My bash script would look something like this:... (2 Replies)
Discussion started by: siegfried
2 Replies

9. Solaris

Solaris Automatic Account Unlock

Hello, It is to my understanding that when configuring the Solaris operating system to meet compliance standards, you must configure the "LOCK_AFTER_RETRIES" value in the "/etc/security/policy.conf" file to "YES", and then configure the "RETRIES" parameter in the "/etc/default/login" file to the... (4 Replies)
Discussion started by: TrustSovietBear
4 Replies
crypt(1)						      General Commands Manual							  crypt(1)

NAME
crypt - encode and decode files SYNOPSIS
[password] DESCRIPTION
reads from the standard input and writes on the standard output. password is a key that selects a particular transformation. If no pass- word is given, demands a key from the terminal and turns off printing while the key is being typed in. encrypts and decrypts with the same key: The latter command decrypts the file and prints the clear version. Files encrypted by are compatible with those treated by the editor in encryption mode (see ed(1)). Security of encrypted files depends on three factors: the fundamental method must be hard to solve; direct search of the key space must be infeasible; "sneak paths" by which keys or clear text can become visible must be minimized. implements a one-rotor machine designed along the lines of the German Enigma, but with a 256-element rotor. Methods of attack on such machines are widely known; thus provides minimal security. The transformation of a key into the internal settings of the machine is deliberately designed to be expensive; that is, to take a substan- tial fraction of a second to compute. However, if keys are restricted to, for example, three lowercase letters, then encrypted files can be read by expending only a substantial fraction of five minutes of machine time. Since the key is an argument to the command, it is potentially visible to users executing the or a derivative (see ps(1)). The choice of keys and key security are the most vulnerable aspect of EXAMPLES
The following example demonstrates the use of to edit a file that the user wants to keep strictly confidential: ... ... ... Note that the option is the encryption mode of and prompts the user for the same key with which the file was encrypted. WARNINGS
If output is piped to and the encryption key is given on the command line, can leave terminal modes in a strange state (see nroff(1) and stty(1)). If two or more files encrypted with the same key are concatenated and an attempt is made to decrypt the result, only the the first of the original files is decrypted correctly. FILES
for typed key SEE ALSO
ed(1), makekey(1), stty(1). crypt(1)
All times are GMT -4. The time now is 06:26 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy