+ Reply to Thread
Page 2 of 2 FirstFirst 12
Results 16 to 23 of 23

Thread: XCode32 (file scrambler)

  1. #16

    Join Date
    22.05.08
    Location
    SB-RepubliC
    P2P Client
    SB Invention !!
    Posts
    2,899
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 sssss2899
    @ anon & Shoulder : you are partially right guys,but I meant also that if its possible to encrypt certain data into different algorithms for several times,which means after the first encrypting cycle ends up,we starts a new cycle to get the first encrypted data more complicated to decrypt,and so on,after each cycle,start a new one so that if we ran the original data into like 10 encryption cycles we got @ the end,very complicated strings of data that would waste lots of time to unlock it
    Reply With QuoteReply With Quote
    Thanks

  2. #17
    Moderator
    shoulder's Avatar
    Join Date
    12.04.08
    Location
    I*** D* M*****
    Posts
    4,827
    Activity Longevity
    3/20 19/20
    Today Posts
    0/5 sssss4827
    Now i got what you mean I think.

    Well, it's hard to say how long it takes also I'm not a cryptographic expert.
    But as far as I know it depends on the kind of security vulnerability.
    For example if it's "full cracked" or if it has just a "weak point".
    To use a "weak point" will take (much) longer, an example for the use of a it is the TimeAttack for the XBox 360.



    ------------------------------>>>>>>>>>> <<<<<<<<<<------------------------------

    Reply With QuoteReply With Quote
    Thanks

  3. #18
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,439
    Activity Longevity
    8/20 19/20
    Today Posts
    1/5 ssss39439
    Quote Originally Posted by Reppy View Post
    after each cycle,start a new one so that if we ran the original data into like 10 encryption cycles we got @ the end,very complicated strings of data that would waste lots of time to unlock it
    Ok, now how much would it take for a legit user to decrypt the data
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

  4. #19

    Join Date
    22.05.08
    Location
    SB-RepubliC
    P2P Client
    SB Invention !!
    Posts
    2,899
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 sssss2899
    I was not talking about normal users guys here,I meant experts for sure since I was discussing general encrypting term !! Anyway,I did not get a clue yet wether it could be done or not
    Reply With QuoteReply With Quote
    Thanks

  5. #20
    miyukk
    truecrypt are way better, you can mount a virtual HDD from a single 256 AES encrypted file
    Last edited by miyukk; 05.08.08 at 16:15.
    Reply With QuoteReply With Quote

  6. #21
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,439
    Activity Longevity
    8/20 19/20
    Today Posts
    1/5 ssss39439
    Of course TC is better But this is for when you need to encrypt a file fast and to keep total lamers away, and does that perfectly.
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

  7. #22
    Retired Seal
    SealLion's Avatar
    Join Date
    03.05.08
    Location
    The Arctic--Believe it!!
    Posts
    2,079
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 sssss2079
    HI: have you guys ever heard of Axcrypt??

    Its also a file encryption proggy. Its not too bad. I use it for keeping encrypted all my password and username stuff for different forums in case I forget what they are.

    One can use a key file to aid in encrypting whatever file you use. KInd of what truecrypt has and does as well for encrypted volumes.
    Reply With QuoteReply With Quote
    Thanks

  8. #23
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,439
    Activity Longevity
    8/20 19/20
    Today Posts
    1/5 ssss39439
    Quote Originally Posted by SealLion View Post
    HI: have you guys ever heard of Axcrypt??

    Its also a file encryption proggy. Its not too bad.
    ...
    One can use a key file to aid in encrypting whatever file you use.
    Sounds very good SL ^^
    Do you want to post it in the software forum?
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

+ Reply to Thread
Page 2 of 2 FirstFirst 12

Tags for this Thread

Posting Permissions

  • You may post new threads
  • You may post replies
  • You may not post attachments
  • You may not edit your posts
  •