Question about Computers & Internet

1 Answer

Encryption of my scripts

I use a canadian software called ACL to write scripts and want to encrypt them for safety sake in such a manner that they can be used in the encrypted form by my clients.

Posted by on

  • Cass Surek
    Cass Surek May 11, 2010

    Please provide an URL to the manufacturer's website.

×

1 Answer

  • Level 2:

    An expert who has achieved level 2 by getting 100 points

    MVP:

    An expert that gotĀ 5 achievements.

    Novelist:

    An expert who has written 50 answers of more than 400 characters.

    Governor:

    An expert whose answer gotĀ voted for 20 times.

  • Expert
  • 150 Answers

This depends on what you are actually trying to achieve.

1) You may try to search Google and Wikipedia for topics
dealing with "CODE OBFUSCATION"

if your are trying to keep your script algorithms a secret.

2) If you are more interested with making sure that the script
has not been tampered with, you can scan it with a hash/
checksum generator to create a unique signature,
such as CRC or MD5

3) You can also ZIP the file into a password protected archive,
and/or convert the archive into a self-decrypting EXE file.

4) You can split the script into two parts:

The first script accepts a password and decrypts the
second script into an temporary file, runs that file and
then securely deletes the file by over-writing it multiple
times using special bit pattern, or launching BCWipe
to do it.

You obviously got to consider what happens when your
script is interrupted, to make sure no open data residue
is left behind.

5) Finally, the ACL program itself may have some
facility or plug-in to do what you need, contact the
manufacturer's tech support.

Hope this helps

Martin

Posted on Apr 26, 2008

1 Suggested Answer

6ya6ya
  • 2 Answers

SOURCE: I have freestanding Series 8 dishwasher. Lately during the filling cycle water hammer is occurring. How can this be resolved

Hi,
a 6ya expert can help you resolve that issue over the phone in a minute or two.
best thing about this new service is that you are never placed on hold and get to talk to real repairmen in the US.
the service is completely free and covers almost anything you can think of (from cars to computers, handyman, and even drones).
click here to download the app (for users in the US for now) and get all the help you need.
goodluck!

Posted on Jan 02, 2017

Add Your Answer

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

1 Answer

My buffalo hd pntu3 hard disk is encrypted using the default software from drivenavigator , securelock easy manager. how to remove the encryption?


In the software Secure Lock Manager Easy is a tab "Setting the Encryption mode" Pressing "Releasing encryption mode" will remove the encryption. Make a backup of the data before please.

Nov 03, 2013 | Buffalo Technology Buffalo MiniStation...

1 Answer

I want to decrypt encrypted SQL Stored Procedure 2008?


Hi walllerry,
I have read your problem and I go through it by reading some tutorials or searching some best software that quickly solves your problem. At last I found SysTools SQL Decryptor Software and read its features or information. It's really amazing software and it also having the solution for your problem that it decrypt encrypted SQL Stored procedure 2008. I am giving you the link please visit: http://www.systoolsgroup.com/sql-decryptor.html

May 22, 2013 | Computers & Internet

1 Answer

Menc file extension of picture file-cannot download,what software is used to download..unit is ASPEN..thanks


MENC finle stands for Microsoft Windows Mobile encrypted file. This means that the encryption is turned on in your Windows mobile phone all your pics become .menc files when the encryption is on. Turn off he encryption.
To disable encryption
go to Settings ? System or Settings ? Security on the Windows Mobile device and remove check the box that says "Encrypt files placed on storage cards."

Jul 13, 2011 | Computers & Internet

1 Answer

I encrypted some text using a software.the software asked me to enter a key to encrypt the text,finally the encryption was successful.a few days later i lost the copy of software that i used to encrypt the...


all the encryption softwares use different encryption algorithm.i.e. different steps to encode a file.
the other software shows that the file was not encrypted because for this software, you previously encrypted file is an original file and not encrypted file.
to decrypt the file you need that very encryption software that you used earlier.

Mar 28, 2011 | Computers & Internet

1 Answer

I encrypted all my important text using a key through a software.however it's important for me to get back the original text since it contains info which really matters to me.i lost the copy of the...


you cannot use other encryption software to decrypt it as all the encryption softwares use different encryption algorithm.i.e. different steps to encode a file.

to decrypt the file you need that very encryption software that you used earlier.
no other option available.

Mar 23, 2011 | AccessData Password Recovery Tool Kit (ftk...

2 Answers

I have a dell inspiron 1300 laptop with service tag: #CBWBD2J-595B and i need system/bios password for it.Any help is appreciated?


To unlock your laptop using the easiest method available go to: http://dell-inspiron-1300-bios-password.biospwd.com

Dell password authentication system explained :

The BIOS of most modern computers also allow a password to be set for each of the connected hard drives. This password is stored in the service area of the hard disk. Because of this, moving the password protected hard drive to a new computer does not allow access to the hard drive unless the password that was assigned to the hard drive is provided.
The ATA Security Mode Feature Set that is implemented in all modern hard drives actually provides for two passwords, a "Master Password" and a "User Password"
The User Password locks the hard drive and the Master Password is only used to allow an administrator to reset the user password.
The BIOS of many computers will not allow the master password for the hard drive to be changed from the default, so they rarely are. A quick search of Google.com for the specific model of hard drive with the phrase "ATA Master Password" will generally result in multiple web pages that contain the default master password . Hardware tools can recover, reset, or brute-force both the User and Master Passwords.

Full Disk Encryption Methods:

There are two major categories of full disk encryption (FDE)-software-based and hardware-based. Software-based encryption modifies the hard drive drivers and uses the CPU to encrypt all data as it is written to the drive and decrypt all data read from the hard drive. Hardware-based full disk encryption is built into the hard drive and is totally transparent to the user and does not impose a performance impact on the computer.
Software-Based Full Disk Encryption
Wikipedia maintains a lengthy list of disk encryption software The two most popular FDE software implementations are TrueCrypt and BitLocker. BitLocker is included as a feature in the Ultimate and Enterprise editions of Microsoft Windows Vista and Windows 7, but has to be enabled and configured to provide protection. TrueCrypt [18] is free open source software that is ideal for individual users, but lacks management features that make it attractive to enterprise-wide deployment.
Deployment of software-based full disk encryption in any organization with more than just a few computers requires careful consideration of how the encryption keys will be managed. Great encryption without proper key management is like locking the doors to your house and leaving the key under your doormat. One study on the usage of encryption states that 54 percent of respondents had experienced either stolen or unaccounted for encryption keys and that 78 percent experienced system downtime due to encryption failures in the past twelve months [20]. Full Disk Encryption solutions that are targeted at the enterprise typically offer integration with Microsoft's Active Directory or other LDAP directories for secure key management.
In 2008, security researchers created shockwaves by publishing a paper called Lest We Remember: Cold Boot Attacks on Encryption Keys [21]. This paper, and the accompanying YouTube video demonstrate how Software-Based FDE can be circumvented by rebooting a computer that has been left in a locked-screen or sleep state. The attack exploits the fact that Dynamic Random Access Memory

Jan 14, 2011 | Dell Inspiron 6400 Notebook

2 Answers

How to perform system software update to renew encryption key on my playststion 3


You may have to renew the AACS encryption key to play content such as movies on commercially available BD video software (BD-ROM). If a message indicating that the encryption key needs to be renewed is displayed, update the system software to the latest version. The encryption key will then be automatically renewed.
AACS (Advanced Access Control System) is a copyright-protection technology that is used on Blu-ray Discs. The copyrighted content is protected by setting an encryption key on both the disc and the device used to play the disc.
An AACS encryption key expires in 12 to 18 months and must be renewed. There may also be other times when the key has to be renewed. in the manual

Jun 14, 2010 | Sony Playstation 3 (PS3) Console

2 Answers

I forgot the password for my motherboard dell inspiron 1100 is there a way to bypass it or crack it


To unlock your laptop using the easiest method available go to: http://dell-inspiron-1100-bios-password.biospwd.com

Dell password authentication system explained :

The BIOS of most modern computers also allow a password to be set for each of the connected hard drives. This password is stored in the service area of the hard disk. Because of this, moving the password protected hard drive to a new computer does not allow access to the hard drive unless the password that was assigned to the hard drive is provided.
The ATA Security Mode Feature Set that is implemented in all modern hard drives actually provides for two passwords, a "Master Password" and a "User Password"
The User Password locks the hard drive and the Master Password is only used to allow an administrator to reset the user password.
The BIOS of many computers will not allow the master password for the hard drive to be changed from the default, so they rarely are. A quick search of Google.com for the specific model of hard drive with the phrase "ATA Master Password" will generally result in multiple web pages that contain the default master password . Hardware tools can recover, reset, or brute-force both the User and Master Passwords.

Full Disk Encryption Methods:

There are two major categories of full disk encryption (FDE)-software-based and hardware-based. Software-based encryption modifies the hard drive drivers and uses the CPU to encrypt all data as it is written to the drive and decrypt all data read from the hard drive. Hardware-based full disk encryption is built into the hard drive and is totally transparent to the user and does not impose a performance impact on the computer.
Software-Based Full Disk Encryption
Wikipedia maintains a lengthy list of disk encryption software The two most popular FDE software implementations are TrueCrypt and BitLocker. BitLocker is included as a feature in the Ultimate and Enterprise editions of Microsoft Windows Vista and Windows 7, but has to be enabled and configured to provide protection. TrueCrypt [18] is free open source software that is ideal for individual users, but lacks management features that make it attractive to enterprise-wide deployment.
Deployment of software-based full disk encryption in any organization with more than just a few computers requires careful consideration of how the encryption keys will be managed. Great encryption without proper key management is like locking the doors to your house and leaving the key under your doormat. One study on the usage of encryption states that 54 percent of respondents had experienced either stolen or unaccounted for encryption keys and that 78 percent experienced system downtime due to encryption failures in the past twelve months [20]. Full Disk Encryption solutions that are targeted at the enterprise typically offer integration with Microsoft's Active Directory or other LDAP directories for secure key management.
In 2008, security researchers created shockwaves by publishing a paper called Lest We Remember: Cold Boot Attacks on Encryption Keys [21]. This paper, and the accompanying YouTube video demonstrate how Software-Based FDE can be circumvented by rebooting a computer that has been left in a locked-screen or sleep state. The attack exploits the fact that Dynamic Random Access Memory

Apr 11, 2009 | Dell Inspiron 1000 Notebook

1 Answer

Garbled transmissions


it's in the software programed in the chip to descramble the signal

Jun 07, 2008 | Radio Shack Pro-96 Scanner

Not finding what you are looking for?
Computers & Internet Logo

Related Topics:

134 people viewed this question

Ask a Question

Usually answered in minutes!

Top Computers & Internet Experts

Les Dickinson
Les Dickinson

Level 3 Expert

18384 Answers

kakima

Level 3 Expert

102366 Answers

David Payne
David Payne

Level 3 Expert

14161 Answers

Are you a Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...