![]() ![]() I have also tried to crack the code using Kali Linux and on pages where they tell me that the code has one of 8 or 10 types of encryption with which it has already been verified one by one and none of them allow me to see the information of the folder names. Returns a hash code suitable for use in hashing algorithms and dataĪnd further down I find the author of the code, who claims to be Nicko Cadell and Gert Driesen, but it doesn't help me much, because I can't locate these people or find out how to get through the encrypted or encoded text to plain text. The password and file are not replaceable so need to be kept. But I didn't get much information, since in the LOGS I only find this little code from Log4net “ Decryption requires the private key generated using genkeys() and the password set at the time. So I started to review the program's LOGS files to find information about what type of encryption the text has or what is the encoding method of this. I appreciate the people who can help me on this topic, since it is really quite complicated and extensive to go through hundreds of folders in search of a file and it would be easier if an application is generated that already knows what documents are in which folder with the assigned compressed name. Note: If you copy unencrypted files to a folder with encrypted property, they will be automatically encrypted. the documents, I can see the content inside the folders and I can open it, but the problem is that since there are too many documents, it is not known which is which, making the job longer looking for it folder by folder. Check the 'Encrypt the File Only' box to encrypt the individual file, then click 'OK' to finish. I have a problem and it is that I have a file compressor with which several documents are compressed a day and every day, the fact is that when searching for the documents in the path where they are stored, they find the name " 0C24F3F90367BA81DF0FB7AD6380B560" and so on.
0 Comments
Leave a Reply. |