home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!ukma!memstvx1!ujacampbe
- From: ujacampbe@memstvx1.memst.edu (James Campbell)
- Newsgroups: comp.compression
- Subject: Re: ARJ password cracker.
- Message-ID: <1992Nov16.141357.4098@memstvx1.memst.edu>
- Date: 16 Nov 92 14:13:57 -0600
- References: <92318.184327MEB117@psuvm.psu.edu> <1992Nov14.065336.17744@nwnexus.WA.COM> <3327@accucx.cc.ruu.nl>
- Followup-To: comp.compression
- Organization: Memphis State University
- Lines: 19
-
- In article <3327@accucx.cc.ruu.nl>,
- nevries@accucx.cc.ruu.nl (Nico E de Vries) writes:
-
- > ...Unfortunately most common ones are crackable (WP, PKZIP, ARJ).
- > I know of WP and PKZIP crack programs but unfortunately not of ARJ crack
- > programs. ARJ encryption is very weak but nooane seems to have made a tool
- > for it.
-
- Why is ARJ's encryption "weak?" Also, where did you see a crack program for
- PKZIP? All I've seen has been a couple of brute-force pass phrase checkers.
-
-
- ========================================================================;-)
- James Campbell, Math Sciences Department, MSU; ujacampbe@memstvx1.memst.edu
- ---------------------------------------------------------------------------
- The above text has not been reviewed by DIRNSA, and should not be construed
- as an official release of the National Security Agency or any of its member
- organizations. No non-public information shall be included in this message.
- ===========================================================================
-