Do not let spam encryption computer software threaten your information security. The mechanism of Xinmu Magic Folder V2 as well as the operation of cracking the deletion of dotted files (folders) along with other operations Wednesday, August 27, 2008 at 3:15 am
Original reprint please indicate Baidu Laoyan Thank you!
Xinmu Magic Folder V2 is folder encryption application.
Screenshot of this computer software:
download hyperlink:
http://www.skycn.com/soft/32655.html
Why did he get the knife. . . .
Yesterday I saw somebody within the in-depth forum asking for any folder encryption computer software. He also said that it had been used ahead of. . .
I advisable one more software program to him. .
Later, he mentioned that the original application was referred to as Xinmu Magic Folder.
I was curious and got the next one. . . Soon after I encrypted a folder. . . . What I see is the fact that there's a single extra point immediately after this folder. . .
I knew immediately the best way to crack it.
When I do not open the encrypted folder through this computer software. Seeing that you'll find much more files in it, I opened it and it turned out to become a plaintext password. . . .
Through this, I guess about greater than 90% on the supply code of this software. . .
This encryption software might be mentioned to become completely empty without having any algorithm. . . Utilizing such application to encrypt data is just telling other individuals that my significant files are right here.
The author of this software program is also not responsible.
-------------------------------------------------
Let's take a look at the encryption process of this software program.
1. I generate a folder named test around the d drive and his absolute path is d:\test
2. Use this software to encrypt the password as jiami
three. The name of this folder becomes test soon after encryption. There is one more point in the finish
4. In accordance with the basic operation, this folder cannot be opened, copied, deleted and so on. . .
If you want to open this folder, you'll be able to open it by entering the password by way of this software program. . Also can. . . .
usb disk data recovery with all the dos command. . .
-------------------------------------------------- ---------------------------------------
Crack process
Start operating cmd
Navigate towards the upper directory with the folder at the command prompt
For example, the folder is in d:\test.
Can enter
d:
To open and view the contents, you can enter
startd:\test..\
Note that the d:\test..\ of your above command would be the full path. The folder below test in windows is test. The truth is, it truly is test.. Note that the number of points behind and the following \ can not be lost
(
Or enter the complete path directly inside the start off run
d:\test..\
Immediately after this strategy is made use of, this command remains inside the operation. It can be simple to be found that if you wish to resolve it, you'll need to alter the policy group. It can be not suggested.
)
You will find that the original encrypted folder is decrypted. . .
You'll be able to see that there is an extra file within the opened folder named jmmm. jmm This file is recognized by name to decrypt jm. .
Open to find out what's inside. . . .
Saw it. . . . Is my encrypted password. . . . It can be there in plaintext. . . Terrible if you are employed to applying a unified password. . Then I know every little thing about you. . . So absolutely everyone has to have 1 issue and 1 password as I do. Will steer clear of such complications.
Immediately after decryption is full, it is possible to copy what you need to other places
-----------------------------------------
Delete such folder (folder with '.' dot)
Nevertheless in the existing directory at the command prompt (d:\)
rdtest..\/s
Among them, the rd delete command test..\ pay attention to two points and \ don’t lose it. It may be relative path /s with each other using the files and subdirectories in the directory
The program prompts no matter if to confirm the deletion input
y
Just
-------------------------------------------------- -------
Generate such a folder (a folder with '.' dot)
Use the dos command to create such a folder
command
mddove..\
Note that you can find 2 points after dove and do not neglect
================================================== ======================
Some close friends said that files with dots couldn't be deleted. . . . This 1. . Add it.
No matter what technique is used to create files or folders, you could have this code as soon as and for all
dir/x
/x is displayed as a brief name other than the 8dot3 file name
The file name 1.txt. displayed within this state is 1TXT~1
Delete beneath
Delete file command
del file name
If del1TXT~1 can delete 1.txt. file
Delete folder command
rd folder name/s
================================================== ===========================
Look in the programming friends under.
Let's analyze the programming tips of this application
1. Make use of the drag and drop system to acquire the path in the folder to figure out irrespective of whether there is a jmmm.jmm file in the directory that is decrypted and not encrypted
encryption
2. Let the user enter the password twice and compare it correctly. The next step is incorrect and return to re-enter
3. Produce the jmmm.jmm file within the folder and create the password in plain text
three.
usb recovery data with code and add ..\
Decrypt
two. Let the user enter the password and evaluate it together with the jmmm.jmm file within the folder
three. Right after unique prompts to exit the identical, rename the folder with code..\Remove
4. Delete the jmmm.jmm file
As a programmer, do you discover that the logic right here is wrong? . .
There is no judgment as to regardless of whether the file or folder is getting dragged. . . If it is actually a file. . . . .
usb flash drive corrupted file recovery could be troublesome. I did not judge to transform the file into a dotted a single and applied it as a directory. . It is possible to attempt to make use of this encryption software to encrypt a file. . . .
So we add the course of action of judging whether it truly is a file or even a folder. Don’t neglect to exclude the case exactly where the path would be the root directory
The above could be the concept of this application. Buddies can use your familiar software to produce your very own encryption software program. .