• Are zips really uncrackable?

    From Commander Kinsey@21:1/5 to All on Tue Feb 14 15:05:31 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    Trying to get into a password protected zip. Got three instances of a free password cracker (Stella Data Recovery) running for the last handful of hours trying three different methods (they only use 1 core each). Still not got in. I find it hard to
    believe zips are that tightly sealed.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From FromTheRafters@21:1/5 to All on Tue Feb 14 10:36:51 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    Commander Kinsey explained on 2/14/2023 :
    Trying to get into a password protected zip. Got three instances of a free password cracker (Stella Data Recovery) running for the last handful of hours trying three different methods (they only use 1 core each). Still not got in. I find it hard to believe zips are that tightly sealed.

    256 bit encryption is pretty strong.

    What was used to encrypt it?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Commander Kinsey@21:1/5 to FromTheRafters on Tue Feb 14 16:28:48 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On Tue, 14 Feb 2023 15:36:51 -0000, FromTheRafters <FTR@nomail.afraid.org> wrote:

    Commander Kinsey explained on 2/14/2023 :
    Trying to get into a password protected zip. Got three instances of a free >> password cracker (Stella Data Recovery) running for the last handful of hours
    trying three different methods (they only use 1 core each). Still not got >> in. I find it hard to believe zips are that tightly sealed.

    256 bit encryption is pretty strong.

    What was used to encrypt it?

    Is there not a standard for all zips?

    I remember from the 90s when zips were a new thing, it was a laugh they could easily be opened.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Shinji Ikari@21:1/5 to Commander Kinsey on Tue Feb 14 19:45:46 2023
    Hello.

    "Commander Kinsey" <CK1@nospam.com> schrieb

    On Tue, 14 Feb 2023 15:36:51 -0000, FromTheRafters <FTR@nomail.afraid.org> wrote:
    Commander Kinsey explained on 2/14/2023 :
    Trying to get into a password protected zip. Got three instances of a free >>> password cracker (Stella Data Recovery) running for the last handful of hours
    trying three different methods (they only use 1 core each). Still not got >>> in. I find it hard to believe zips are that tightly sealed.
    256 bit encryption is pretty strong.
    What was used to encrypt it?
    Is there not a standard for all zips?

    I don't think so, because zip can be produced by a variety of
    software.

    I remember from the 90s when zips were a new thing, it was a laugh they could easily be opened.

    Well, that ist only 30 years ago, there was a 'tiny' step forward in
    zip files.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Paul@21:1/5 to Commander Kinsey on Tue Feb 14 15:10:11 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On 2/14/2023 10:05 AM, Commander Kinsey wrote:
    Trying to get into a password protected zip.  Got three instances of a free password cracker (Stella Data Recovery) running for the last handful of hours trying three different methods (they only use 1 core each).  Still not got in.  I find it hard to
    believe zips are that tightly sealed.

    Old ZIP, trivially crack-able.
    New ZIP, not so much.

    https://en.wikipedia.org/wiki/ZIP_%28file_format%29#Strong_encryption_controversy

    "WinZip introduced its own AES-256 encryption"

    Not everything with that file extension, is easy pickins.
    You'll need a dictionary attack, and cracking speed will
    depend on whether they decided to use multi-pass or not.

    The last time I experimented with cracking, the software
    said "it will take 13 years" :-) You get the idea. Mind you,
    I was unable to get my video card to work on it, my attempt
    ran CPU-only.

    $ file SketchUp2017.zip <=== made an AES-256 with 7-ZIP zip option, set password to "12345"

    SketchUp2017.zip: Zip archive data, at least v5.1 to extract

    $ file shotwell-master.zip

    shotwell-master.zip: Zip archive data, at least v1.0 to extract

    $ file Sandboxie-5.40.zip

    Sandboxie-5.40.zip: Zip archive data, at least v1.0 to extract

    The non-crypto ones are the "more-compatible" ones that even
    Windows can open for extraction.

    In Windows 11, I used the bash shell to access a modern "file" and /etc/magic. Not that it really did an outstanding job. I would prefer it to name
    the encryption, like zipcrypto if it was trivially crack-able.

    If I use ZipCrypto, it says:

    $ file SketchUp2017.zip <=== made a ZipCrypto with 7-ZIP zip option, set password to "12345"

    SketchUp2017.zip: Zip archive data, at least v2.0 to extract

    Paul

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From FromTheRafters@21:1/5 to Commander Kinsey on Tue Feb 14 15:20:41 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    Commander Kinsey wrote on 2/14/2023 :
    On Tue, 14 Feb 2023 15:36:51 -0000, FromTheRafters <FTR@nomail.afraid.org> wrote:

    Commander Kinsey explained on 2/14/2023 :
    Trying to get into a password protected zip. Got three instances of a
    free
    password cracker (Stella Data Recovery) running for the last handful of
    hours
    trying three different methods (they only use 1 core each). Still not got >>> in. I find it hard to believe zips are that tightly sealed.

    256 bit encryption is pretty strong.

    What was used to encrypt it?

    Is there not a standard for all zips?

    I remember from the 90s when zips were a new thing, it was a laugh they could easily be opened.

    Yes, their password protection was feeble. Now they 'can' encrypt with
    128 or 256 bit encryption algorithms.

    That is a very large 'password space' (keyspace) to slog through doing
    even modified brute force attacks.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Tim Slattery@21:1/5 to Commander Kinsey on Wed Feb 15 11:13:34 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    "Commander Kinsey" <CK1@nospam.com> wrote:

    Trying to get into a password protected zip. Got three instances of a free password cracker (Stella Data Recovery) running for the last handful of hours trying three different methods (they only use 1 core each). Still not got in. I find it hard to
    believe zips are that tightly sealed.

    The ZIP format was created for data compression, not security. Since
    then password protection has been added to it. I guess it would be as
    strong or weak as any other encrypted format.

    --
    Tim Slattery
    tim <at> risingdove <dot> com

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From FromTheRafters@21:1/5 to All on Wed Feb 15 11:35:42 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    Tim Slattery formulated on Wednesday :
    "Commander Kinsey" <CK1@nospam.com> wrote:

    Trying to get into a password protected zip. Got three instances of a free >> password cracker (Stella Data Recovery) running for the last handful of
    hours trying three different methods (they only use 1 core each). Still not >> got in. I find it hard to believe zips are that tightly sealed.

    The ZIP format was created for data compression, not security. Since
    then password protection has been added to it. I guess it would be as
    strong or weak as any other encrypted format.

    From:

    https://pkware.cachefly.net/webdocs/APPNOTE/APPNOTE-6.3.7.TXT

    4.4.3 version needed to extract (2 bytes)

    4.4.3.1 The minimum supported ZIP specification version needed
    to extract the file, mapped as above. This value is based on
    the specific format features a ZIP program MUST support to
    be able to extract the file. If multiple features are
    applied to a file, the minimum version MUST be set to the
    feature having the highest value. New features or feature
    changes affecting the published format specification will be
    implemented using higher version numbers than the last
    published value to avoid conflict.

    4.4.3.2 Current minimum feature versions are as defined below:

    1.0 - Default value
    1.1 - File is a volume label
    2.0 - File is a folder (directory)
    2.0 - File is compressed using Deflate compression
    2.0 - File is encrypted using traditional PKWARE encryption
    2.1 - File is compressed using Deflate64(tm)
    2.5 - File is compressed using PKWARE DCL Implode
    2.7 - File is a patch data set
    4.5 - File uses ZIP64 format extensions
    4.6 - File is compressed using BZIP2 compression*
    5.0 - File is encrypted using DES
    5.0 - File is encrypted using 3DES
    5.0 - File is encrypted using original RC2 encryption
    5.0 - File is encrypted using RC4 encryption
    5.1 - File is encrypted using AES encryption
    5.1 - File is encrypted using corrected RC2 encryption**
    5.2 - File is encrypted using corrected RC2-64 encryption**
    6.1 - File is encrypted using non-OAEP key wrapping***
    6.2 - Central directory encryption
    6.3 - File is compressed using LZMA
    6.3 - File is compressed using PPMd+
    6.3 - File is encrypted using Blowfish
    6.3 - File is encrypted using Twofish

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Paul@21:1/5 to Tim Slattery on Wed Feb 15 12:09:44 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On 2/15/2023 11:13 AM, Tim Slattery wrote:
    "Commander Kinsey" <CK1@nospam.com> wrote:

    Trying to get into a password protected zip. Got three instances of a free password cracker (Stella Data Recovery) running for the last handful of hours trying three different methods (they only use 1 core each). Still not got in. I find it hard to
    believe zips are that tightly sealed.

    The ZIP format was created for data compression, not security. Since
    then password protection has been added to it. I guess it would be as
    strong or weak as any other encrypted format.


    The export laws on crypto, historically had a chilling effect
    on crypto strength. And to some extent, that hasn't changed.
    It's only when it impacts the competitiveness of a country,
    that it stops.

    It used to be "you stop it before it happens" was how
    you handled crypto. Today, it's the usage of rubber hoses
    which is the preferred method (the TrueCrypt mystery,
    and legislative attempts to build backdoors).

    When ZIP was invented, elliptic curve didn't exist. But
    there were still likely to have been methods which signal
    you are using the "tough" version. Using a weak-as-piss
    method ensures your product can be Exported.

    The same kinds of things happened on PDF format.

    And the old protection on ZIP is so weak, if Google wants to,
    they can scan ZIP attachments in GMail with that protection method,
    in "real time". You can't have a much weaker crypto than that.
    It's no barrier at all.

    The newer method on the other hand, is more of an impediment.

    Even the encryption on 7Z has had the odd issue, but these
    implementation details have been corrected.

    Paul

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Mr. Man-wai Chang@21:1/5 to Commander Kinsey on Thu Feb 16 01:19:11 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On 14/2/2023 11:05 pm, Commander Kinsey wrote:
    Trying to get into a password protected zip. Got three instances of a free password cracker (Stella Data Recovery) running for the last handful of hours trying three different methods (they only use 1 core each). Still not got in. I find it hard to
    believe zips are that tightly sealed.


    Talk to ChatGPT? :)

    Theoretically, all password prompts can be hacked. Dictionary attack is
    usually the first method to try.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan Browne@21:1/5 to Mr. Man-wai Chang on Fri Feb 17 18:25:40 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On 2023-02-15 12:19, Mr. Man-wai Chang wrote:
    On 14/2/2023 11:05 pm, Commander Kinsey wrote:
    Trying to get into a password protected zip.  Got three instances of a
    free password cracker (Stella Data Recovery) running for the last
    handful of hours trying three different methods (they only use 1 core
    each).  Still not got in.  I find it hard to believe zips are that
    tightly sealed.


    Talk to ChatGPT? :)

    Theoretically, all password prompts can be hacked. Dictionary attack is usually the first method to try.

    </lurk>

    !*yvgWXVyTQnfbUfj7tNstkM-

    Not in the dictionary much.

    Back in the 80s or 90s we needed to unzip a file after an engineer left
    the co.

    Another engineer used a dictionary attack. Got nowhere.
    Then asked "who was the engineer anyway?"
    "Eric"
    He switched to a Hebrew dictionary and the zip file was opened
    quickly... (Hebrew rendered in the English alphabet).

    <lurk>


    --
    “Donald Trump and his allies and supporters are a clear and present
    danger to American democracy.â€
    - J Michael Luttig - 2022-06-16
    - Former US appellate court judge (R) testifying to the January 6
    committee

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Mr. Man-wai Chang@21:1/5 to Mr. Man-wai Chang on Sat Feb 18 21:35:51 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On 18/2/2023 9:35 pm, Mr. Man-wai Chang wrote:

    The other method is of course using the characteristic of ASCII/EBCDIC!
    That is, try "a", "b", "c", ... "aa", "ab", "ac", "ad", .... This
    method will definitely work, but needs time! ;)

    Exactly like hacking a combination lock...

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Mr. Man-wai Chang@21:1/5 to Alan Browne on Sat Feb 18 21:35:15 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On 18/2/2023 7:25 am, Alan Browne wrote:

    Not in the dictionary much.

    Back in the 80s or 90s we needed to unzip a file after an engineer left
    the co.

    Another engineer used a dictionary attack. Got nowhere.
    Then asked "who was the engineer anyway?"
    "Eric"
    He switched to a Hebrew dictionary and the zip file was opened
    quickly... (Hebrew rendered in the English alphabet).

    It's still a dictonary hack, using a human languagte called Hebrew! :)

    The other method is of course using the characteristic of ASCII/EBCDIC!
    That is, try "a", "b", "c", ... "aa", "ab", "ac", "ad", .... This
    method will definitely work, but needs time! ;)

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan Browne@21:1/5 to Mr. Man-wai Chang on Sat Feb 18 12:12:33 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On 2023-02-18 08:35, Mr. Man-wai Chang wrote:
    On 18/2/2023 7:25 am, Alan Browne wrote:

    Not in the dictionary much.

    Back in the 80s or 90s we needed to unzip a file after an engineer left
    the co.

    Another engineer used a dictionary attack.  Got nowhere.
    Then asked "who was the engineer anyway?"
    "Eric"
    He switched to a Hebrew dictionary and the zip file was opened
    quickly... (Hebrew rendered in the English alphabet).

    It's still a dictonary hack, using a human languagte called Hebrew! :)

    The other method is of course using the characteristic of ASCII/EBCDIC!
    That is, try "a", "b", "c", ... "aa", "ab", "ac", "ad", ....  This
    method will definitely work, but needs time! ;)

    That was back then - since then people have learned (I hope) to use real passwords such as the one I put up. Also the encryption level used
    these days is far better than back then.

    --
    “Donald Trump and his allies and supporters are a clear and present
    danger to American democracy.â€
    - J Michael Luttig - 2022-06-16
    - Former US appellate court judge (R) testifying to the January 6
    committee

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From FromTheRafters@21:1/5 to All on Sat Feb 18 12:18:26 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    Mr. Man-wai Chang submitted this idea :
    On 18/2/2023 7:25 am, Alan Browne wrote:

    Not in the dictionary much.

    Back in the 80s or 90s we needed to unzip a file after an engineer left
    the co.

    Another engineer used a dictionary attack. Got nowhere.
    Then asked "who was the engineer anyway?"
    "Eric"
    He switched to a Hebrew dictionary and the zip file was opened
    quickly... (Hebrew rendered in the English alphabet).

    Modified Brute Force attack.

    It's still a dictonary hack, using a human languagte called Hebrew! :)

    Twice Modified Brute Force attack.

    The other method is of course using the characteristic of ASCII/EBCDIC! That is, try "a", "b", "c", ... "aa", "ab", "ac", "ad", .... This method will definitely work, but needs time! ;)

    Brute Force attack.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Mr. Man-wai Chang@21:1/5 to FromTheRafters on Sun Feb 19 13:54:34 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On 19/2/2023 1:18 am, FromTheRafters wrote:

    Modified Brute Force attack.

    Twice Modified Brute Force attack.

    Brute Force attack.


    People might not know the meaning of "brute force". Picking phyical
    locks might be easier to understand. :)

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From FromTheRafters@21:1/5 to All on Sun Feb 19 02:38:58 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    Mr. Man-wai Chang explained on 2/19/2023 :
    On 19/2/2023 1:18 am, FromTheRafters wrote:

    Modified Brute Force attack.

    Twice Modified Brute Force attack.

    Brute Force attack.


    People might not know the meaning of "brute force".

    True, but as you know it just means the whole keyspace is searched and
    on average you check half of them to get a winner.

    Picking phyical locks
    might be easier to understand. :)

    True again, but when you can reduce the keyspace to a smaller set it is
    a 'Modified Brute Force attack' so needing to check only for words
    reduces the effective keyspace and then further restricting to only
    words for a language known to be used by the person doing the
    encryption narrows it even further.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Chris@21:1/5 to Alan Browne on Sun Feb 19 22:56:10 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    Alan Browne <bitbucket@blackhole.com> wrote:
    On 2023-02-18 08:35, Mr. Man-wai Chang wrote:
    On 18/2/2023 7:25 am, Alan Browne wrote:

    Not in the dictionary much.

    Back in the 80s or 90s we needed to unzip a file after an engineer left
    the co.

    Another engineer used a dictionary attack.  Got nowhere.
    Then asked "who was the engineer anyway?"
    "Eric"
    He switched to a Hebrew dictionary and the zip file was opened
    quickly... (Hebrew rendered in the English alphabet).

    It's still a dictonary hack, using a human languagte called Hebrew! :)

    The other method is of course using the characteristic of ASCII/EBCDIC!
    That is, try "a", "b", "c", ... "aa", "ab", "ac", "ad", ....  This
    method will definitely work, but needs time! ;)

    That was back then - since then people have learned (I hope) to use real passwords such as the one I put up.

    Many do and many don't.

    As long as people need to type in passwords they aren't going to use long
    and complicated strings.

    Also the encryption level used
    these days is far better than back then.

    It doesn't matter how good the encryption is if the password is bad.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan Browne@21:1/5 to Chris on Sun Feb 19 18:10:30 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On 2023-02-19 17:56, Chris wrote:
    Alan Browne <bitbucket@blackhole.com> wrote:
    On 2023-02-18 08:35, Mr. Man-wai Chang wrote:
    On 18/2/2023 7:25 am, Alan Browne wrote:

    Not in the dictionary much.

    Back in the 80s or 90s we needed to unzip a file after an engineer left >>>> the co.

    Another engineer used a dictionary attack.  Got nowhere.
    Then asked "who was the engineer anyway?"
    "Eric"
    He switched to a Hebrew dictionary and the zip file was opened
    quickly... (Hebrew rendered in the English alphabet).

    It's still a dictonary hack, using a human languagte called Hebrew! :)

    The other method is of course using the characteristic of ASCII/EBCDIC!
    That is, try "a", "b", "c", ... "aa", "ab", "ac", "ad", ....  This
    method will definitely work, but needs time! ;)

    That was back then - since then people have learned (I hope) to use real
    passwords such as the one I put up.

    Many do and many don't.

    As long as people need to type in passwords they aren't going to use long
    and complicated strings.

    Either use a password manager (as I do) or become clever in the
    composition of the passwords. So earlier I posted a pretty random one appropriate to a password manager.

    Alternately strong passwords that are memorable can look something like:

    merrY$penGuin@2four78

    Also the encryption level used
    these days is far better than back then.

    It doesn't matter how good the encryption is if the password is bad.

    Of course.

    --
    “Donald Trump and his allies and supporters are a clear and present
    danger to American democracy.â€
    - J Michael Luttig - 2022-06-16
    - Former US appellate court judge (R) testifying to the January 6
    committee

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Paul@21:1/5 to Chris on Sun Feb 19 19:00:12 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On 2/19/2023 5:56 PM, Chris wrote:
    Alan Browne <bitbucket@blackhole.com> wrote:
    On 2023-02-18 08:35, Mr. Man-wai Chang wrote:
    On 18/2/2023 7:25 am, Alan Browne wrote:

    Not in the dictionary much.

    Back in the 80s or 90s we needed to unzip a file after an engineer left >>>> the co.

    Another engineer used a dictionary attack.  Got nowhere.
    Then asked "who was the engineer anyway?"
    "Eric"
    He switched to a Hebrew dictionary and the zip file was opened
    quickly... (Hebrew rendered in the English alphabet).

    It's still a dictonary hack, using a human languagte called Hebrew! :)

    The other method is of course using the characteristic of ASCII/EBCDIC!
    That is, try "a", "b", "c", ... "aa", "ab", "ac", "ad", ....  This
    method will definitely work, but needs time! ;)

    That was back then - since then people have learned (I hope) to use real
    passwords such as the one I put up.

    Many do and many don't.

    As long as people need to type in passwords they aren't going to use long
    and complicated strings.

    Also the encryption level used
    these days is far better than back then.

    It doesn't matter how good the encryption is if the password is bad.

    Any Internet-facing passwords here, are long and strong.

    Security inside my LAN is poor. If something gets in here,
    it's total destruction time... If I spent the whole day
    building a fort out of cardboard boxes, there would be nothing
    of value inside the fort (all my waking hours would be spent
    on the fort and nothing else).

    Is my router vulnerable ? Based on industry standards of
    security, the answer to that is... Yes.

    Part of the security for a home user, is what the ISP
    is doing. For example, I watched one day, as someone within
    myisp.com was scanning my node. Today, the ISP does not allow
    other users to scan internal nodes, so I no longer see
    script kiddies doing stuff like that. However, Google can
    still attempt to scan the node. There is, of course, no
    purposeful webserver running (that I know of). There could
    be localhost:631 within the bash shell, but that's about it.
    Even if IIS on the current OS, actually installed useful
    stuff (it doesn't), I would not be doing that. I have used
    the IIS ftpd setup in the past, but only on an episode basis
    (for a couple hours, and not port-forwarded, then removed).

    Since my WinXP machine died, my imaginary security has
    gone up this much [fingers measure a tiny space about
    the size of a millimeter] :-)

    Paul

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Char Jackson@21:1/5 to Paul on Sun Feb 19 18:43:03 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On Sun, 19 Feb 2023 19:00:12 -0500, Paul <nospam@needed.invalid> wrote:

    Part of the security for a home user, is what the ISP
    is doing. For example, I watched one day, as someone within
    myisp.com was scanning my node. Today, the ISP does not allow
    other users to scan internal nodes, so I no longer see
    script kiddies doing stuff like that. However, Google can
    still attempt to scan the node. There is, of course, no
    purposeful webserver running (that I know of). There could
    be localhost:631 within the bash shell, but that's about it.
    Even if IIS on the current OS, actually installed useful
    stuff (it doesn't), I would not be doing that.

    Well, IIS includes a web server, which I find very useful and
    convenient. Useful for one is apparently not useful for another. In my
    case, it saves me from having to go get a third party web server.

    I have used
    the IIS ftpd setup in the past, but only on an episode basis
    (for a couple hours, and not port-forwarded, then removed).

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Paul@21:1/5 to Char Jackson on Sun Feb 19 20:30:12 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On 2/19/2023 7:43 PM, Char Jackson wrote:


    I have used
    the IIS ftpd setup in the past, but only on an episode basis
    (for a couple hours, and not port-forwarded, then removed).

    When I looked at this previously, I did not like the
    lack of the word "server". When they choose waffle-words
    for stuff, I can't tell if I'm getting a pony, or only the pony-poo.

    [Picture]

    https://i.postimg.cc/MK7Xq1sb/Win11-IIS.gif

    And this uncertainty started, with some HyperV shuck-and-jive.
    You could not tell what you were getting.

    Paul

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Chris@21:1/5 to Alan Browne on Mon Feb 20 07:45:37 2023
    XPost: uk.comp.sys.mac, alt.comp.os.windows-11, alt.computer.workshop

    Alan Browne <bitbucket@blackhole.com> wrote:
    On 2023-02-19 17:56, Chris wrote:
    Alan Browne <bitbucket@blackhole.com> wrote:
    On 2023-02-18 08:35, Mr. Man-wai Chang wrote:
    On 18/2/2023 7:25 am, Alan Browne wrote:

    Not in the dictionary much.

    Back in the 80s or 90s we needed to unzip a file after an engineer left >>>>> the co.

    Another engineer used a dictionary attack.  Got nowhere.
    Then asked "who was the engineer anyway?"
    "Eric"
    He switched to a Hebrew dictionary and the zip file was opened
    quickly... (Hebrew rendered in the English alphabet).

    It's still a dictonary hack, using a human languagte called Hebrew! :) >>>>
    The other method is of course using the characteristic of ASCII/EBCDIC! >>>> That is, try "a", "b", "c", ... "aa", "ab", "ac", "ad", ....  This
    method will definitely work, but needs time! ;)

    That was back then - since then people have learned (I hope) to use real >>> passwords such as the one I put up.

    Many do and many don't.

    As long as people need to type in passwords they aren't going to use long
    and complicated strings.

    Either use a password manager (as I do) or become clever in the
    composition of the passwords.

    I agree and do use s password manager myself. However, having tried to persuade family members to do the same, it's just too much of a faff and
    they stick with their crappy and/or written down passwords.

    With the best will in the world many people will not be using best
    practices.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From mechanic@21:1/5 to Chris on Mon Feb 20 12:08:20 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On Sun, 19 Feb 2023 22:56:10 -0000 (UTC), Chris wrote:

    As long as people need to type in passwords they aren't going to
    use long and complicated strings.

    No excuse!

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From J. J. Lodder@21:1/5 to mechanic on Mon Feb 20 13:33:30 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    mechanic <mechanic@example.net> wrote:

    On Sun, 19 Feb 2023 22:56:10 -0000 (UTC), Chris wrote:

    As long as people need to type in passwords they aren't going to
    use long and complicated strings.

    No excuse!

    And long passwords need not be difficult.
    1RoseByAnyOtherNameWillSmellAsSweet!
    will be just fine,
    (if you are not known for fandom)

    Jan

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Chris@21:1/5 to mechanic on Mon Feb 20 12:42:22 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    mechanic <mechanic@example.net> wrote:
    On Sun, 19 Feb 2023 22:56:10 -0000 (UTC), Chris wrote:

    As long as people need to type in passwords they aren't going to
    use long and complicated strings.

    No excuse!

    At work one time, I set up my password as a 25 character random string via
    my password manager which was great until they decided to sync the network password with the local password on my machine. So when when I needed to
    login after a reboot or screensaver kicks in I had to type it in manually.

    Quickly changed it - via the support desk - to something more type-able!

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Chris@21:1/5 to J. J. Lodder on Mon Feb 20 12:49:03 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    J. J. Lodder <nospam@de-ster.demon.nl> wrote:
    mechanic <mechanic@example.net> wrote:

    On Sun, 19 Feb 2023 22:56:10 -0000 (UTC), Chris wrote:

    As long as people need to type in passwords they aren't going to
    use long and complicated strings.

    No excuse!

    And long passwords need not be difficult. 1RoseByAnyOtherNameWillSmellAsSweet!
    will be just fine,
    (if you are not known for fandom)

    Or correct-horse-battery-staple

    Yet people still think complexity is better than length. Sometimes this is
    true as some places artificially restrict the length of acceptable
    passwords. Some as short as 9-12 characters IME.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan Browne@21:1/5 to J. J. Lodder on Mon Feb 20 10:01:42 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On 2023-02-20 07:33, J. J. Lodder wrote:
    mechanic <mechanic@example.net> wrote:

    On Sun, 19 Feb 2023 22:56:10 -0000 (UTC), Chris wrote:

    As long as people need to type in passwords they aren't going to
    use long and complicated strings.

    No excuse!

    And long passwords need not be difficult. 1RoseByAnyOtherNameWillSmellAsSweet!
    will be just fine,

    Good, but insert a few numbers/spec chars in the middle too ... along
    with a misspelled word and caps in the "wrong" places ... and it will be
    as good as random where a dictionary+brute force attack occurs.

    --
    “Donald Trump and his allies and supporters are a clear and present
    danger to American democracy.â€
    - J Michael Luttig - 2022-06-16
    - Former US appellate court judge (R) testifying to the January 6
    committee

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Mr. Man-wai Chang@21:1/5 to Chris on Mon Feb 20 23:00:46 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On 20/2/2023 8:42 pm, Chris wrote:

    At work one time, I set up my password as a 25 character random string via
    my password manager which was great until they decided to sync the network password with the local password on my machine. So when when I needed to login after a reboot or screensaver kicks in I had to type it in manually.

    You should use your brain to memorize all 25-character random strings. :)

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan Browne@21:1/5 to Chris on Mon Feb 20 09:53:55 2023
    XPost: uk.comp.sys.mac, alt.comp.os.windows-11, alt.computer.workshop

    On 2023-02-20 02:45, Chris wrote:
    Alan Browne <bitbucket@blackhole.com> wrote:
    On 2023-02-19 17:56, Chris wrote:
    Alan Browne <bitbucket@blackhole.com> wrote:
    On 2023-02-18 08:35, Mr. Man-wai Chang wrote:
    On 18/2/2023 7:25 am, Alan Browne wrote:

    Not in the dictionary much.

    Back in the 80s or 90s we needed to unzip a file after an engineer left >>>>>> the co.

    Another engineer used a dictionary attack.  Got nowhere.
    Then asked "who was the engineer anyway?"
    "Eric"
    He switched to a Hebrew dictionary and the zip file was opened
    quickly... (Hebrew rendered in the English alphabet).

    It's still a dictonary hack, using a human languagte called Hebrew! :) >>>>>
    The other method is of course using the characteristic of ASCII/EBCDIC! >>>>> That is, try "a", "b", "c", ... "aa", "ab", "ac", "ad", ....  This
    method will definitely work, but needs time! ;)

    That was back then - since then people have learned (I hope) to use real >>>> passwords such as the one I put up.

    Many do and many don't.

    As long as people need to type in passwords they aren't going to use long >>> and complicated strings.

    Either use a password manager (as I do) or become clever in the
    composition of the passwords.

    I agree and do use s password manager myself. However, having tried to persuade family members to do the same, it's just too much of a faff and
    they stick with their crappy and/or written down passwords.

    With the best will in the world many people will not be using best
    practices.

    Alas, very true. At least my SO has developed the "clever" passwords
    mode. But she does keep them written down in a "safe place".


    --
    “Donald Trump and his allies and supporters are a clear and present
    danger to American democracy.â€
    - J Michael Luttig - 2022-06-16
    - Former US appellate court judge (R) testifying to the January 6
    committee

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From J. J. Lodder@21:1/5 to Alan Browne on Mon Feb 20 21:04:47 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    Alan Browne <bitbucket@blackhole.com> wrote:

    On 2023-02-20 07:33, J. J. Lodder wrote:
    mechanic <mechanic@example.net> wrote:

    On Sun, 19 Feb 2023 22:56:10 -0000 (UTC), Chris wrote:

    As long as people need to type in passwords they aren't going to
    use long and complicated strings.

    No excuse!

    And long passwords need not be difficult. 1RoseByAnyOtherNameWillSmellAsSweet!
    will be just fine,

    Good, but insert a few numbers/spec chars in the middle too ... along
    with a misspelled word and caps in the "wrong" places ... and it will be
    as good as random where a dictionary+brute force attack occurs.

    Most sites insist nowadays on at least one digit,
    one capitalised letter, and one special sign.
    My example complies,

    Jan

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From J. J. Lodder@21:1/5 to Mr. Man-wai Chang on Mon Feb 20 21:04:48 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    Mr. Man-wai Chang <toylet.toylet@gmail.com> wrote:

    On 20/2/2023 8:42 pm, Chris wrote:

    At work one time, I set up my password as a 25 character random string via my password manager which was great until they decided to sync the network password with the local password on my machine. So when when I needed to login after a reboot or screensaver kicks in I had to type it in manually.

    You should use your brain to memorize all 25-character random strings. :)

    No problem with that at all, for me.
    The problem is memorising a few particular ones,

    Jan

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From nospam@21:1/5 to Lodder on Mon Feb 20 15:09:28 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    In article <1q6gy5q.1fuccml6gve0bN%nospam@de-ster.demon.nl>, J. J.
    Lodder <nospam@de-ster.demon.nl> wrote:


    Most sites insist nowadays on at least one digit,
    one capitalised letter, and one special sign.
    My example complies,

    that actually makes it *easier* to crack, since all passwords that
    don't meet the artificial requirements can immediately be ruled out,
    thereby reducing the number of possibilities.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From J. J. Lodder@21:1/5 to nospam on Mon Feb 20 21:35:06 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    nospam <nospam@nospam.invalid> wrote:

    In article <1q6gy5q.1fuccml6gve0bN%nospam@de-ster.demon.nl>, J. J.
    Lodder <nospam@de-ster.demon.nl> wrote:


    Most sites insist nowadays on at least one digit,
    one capitalised letter, and one special sign.
    My example complies,

    that actually makes it *easier* to crack, since all passwords that
    don't meet the artificial requirements can immediately be ruled out,
    thereby reducing the number of possibilities.

    Yes, but the character space becomes much greater.
    There really are people who have lower case-only,
    or digits-only passwords.

    Jan

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Chris@21:1/5 to Mr. Man-wai Chang on Mon Feb 20 22:50:33 2023
    XPost: uk.comp.sys.mac, alt.comp.os.windows-11, alt.computer.workshop

    Mr. Man-wai Chang <toylet.toylet@gmail.com> wrote:
    On 20/2/2023 8:42 pm, Chris wrote:

    At work one time, I set up my password as a 25 character random string via >> my password manager which was great until they decided to sync the network >> password with the local password on my machine. So when when I needed to
    login after a reboot or screensaver kicks in I had to type it in manually.

    You should use your brain to memorize all 25-character random strings. :)

    Waste of grey matter. Remembering one or two long, non-random strings is sufficient :)

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Chris@21:1/5 to J. J. Lodder on Mon Feb 20 22:49:28 2023
    XPost: uk.comp.sys.mac, alt.comp.os.windows-11, alt.computer.workshop

    J. J. Lodder <nospam@de-ster.demon.nl> wrote:
    Alan Browne <bitbucket@blackhole.com> wrote:

    On 2023-02-20 07:33, J. J. Lodder wrote:
    mechanic <mechanic@example.net> wrote:

    On Sun, 19 Feb 2023 22:56:10 -0000 (UTC), Chris wrote:

    As long as people need to type in passwords they aren't going to
    use long and complicated strings.

    No excuse!

    And long passwords need not be difficult.
    1RoseByAnyOtherNameWillSmellAsSweet!
    will be just fine,

    Good, but insert a few numbers/spec chars in the middle too ... along
    with a misspelled word and caps in the "wrong" places ... and it will be
    as good as random where a dictionary+brute force attack occurs.

    Most sites insist nowadays on at least one digit,
    one capitalised letter, and one special sign.
    My example complies,

    It may not comply with length restrictions and some sites only allow
    certain special characters.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Commander Kinsey@21:1/5 to Shinji Ikari on Thu Feb 23 04:27:26 2023
    On Tue, 14 Feb 2023 18:45:46 -0000, Shinji Ikari <shinji@gmx.net> wrote:

    Hello.

    "Commander Kinsey" <CK1@nospam.com> schrieb

    On Tue, 14 Feb 2023 15:36:51 -0000, FromTheRafters <FTR@nomail.afraid.org> wrote:
    Commander Kinsey explained on 2/14/2023 :
    Trying to get into a password protected zip. Got three instances of a free
    password cracker (Stella Data Recovery) running for the last handful of hours
    trying three different methods (they only use 1 core each). Still not got >>>> in. I find it hard to believe zips are that tightly sealed.
    256 bit encryption is pretty strong.
    What was used to encrypt it?
    Is there not a standard for all zips?

    I don't think so, because zip can be produced by a variety of
    software.

    But it's all compatible. If you create it with 7zip, I can open int with winzip.

    I remember from the 90s when zips were a new thing, it was a laugh they could easily be opened.

    Well, that ist only 30 years ago, there was a 'tiny' step forward in
    zip files.

    So I couldn't open a modern zip with the 1st version of pkunzip?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Commander Kinsey@21:1/5 to Paul on Thu Feb 23 04:29:30 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On Tue, 14 Feb 2023 20:10:11 -0000, Paul <nospam@needed.invalid> wrote:

    On 2/14/2023 10:05 AM, Commander Kinsey wrote:
    Trying to get into a password protected zip. Got three instances of a free password cracker (Stella Data Recovery) running for the last handful of hours trying three different methods (they only use 1 core each). Still not got in. I find it hard to
    believe zips are that tightly sealed.

    Old ZIP, trivially crack-able.
    New ZIP, not so much.

    https://en.wikipedia.org/wiki/ZIP_%28file_format%29#Strong_encryption_controversy

    "WinZip introduced its own AES-256 encryption"

    Not everything with that file extension, is easy pickins.
    You'll need a dictionary attack, and cracking speed will
    depend on whether they decided to use multi-pass or not.

    The last time I experimented with cracking, the software
    said "it will take 13 years" :-) You get the idea. Mind you,
    I was unable to get my video card to work on it, my attempt
    ran CPU-only.

    $ file SketchUp2017.zip <=== made an AES-256 with 7-ZIP zip option, set password to "12345"

    SketchUp2017.zip: Zip archive data, at least v5.1 to extract

    $ file shotwell-master.zip

    shotwell-master.zip: Zip archive data, at least v1.0 to extract

    $ file Sandboxie-5.40.zip

    Sandboxie-5.40.zip: Zip archive data, at least v1.0 to extract

    The non-crypto ones are the "more-compatible" ones that even
    Windows can open for extraction.

    Yip, Windows is annoying, it opens a zip without me even noticing it's not a folder, since the icons are so similar. Then it gives a stupid error nothing to do with the problem. The problem being I need a password, but it doesn't seem to know that.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Commander Kinsey@21:1/5 to FromTheRafters on Thu Feb 23 04:30:24 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On Tue, 14 Feb 2023 20:20:41 -0000, FromTheRafters <FTR@nomail.afraid.org> wrote:

    Commander Kinsey wrote on 2/14/2023 :
    On Tue, 14 Feb 2023 15:36:51 -0000, FromTheRafters <FTR@nomail.afraid.org> >> wrote:

    Commander Kinsey explained on 2/14/2023 :
    Trying to get into a password protected zip. Got three instances of a >>>> free
    password cracker (Stella Data Recovery) running for the last handful of >>>> hours
    trying three different methods (they only use 1 core each). Still not got >>>> in. I find it hard to believe zips are that tightly sealed.

    256 bit encryption is pretty strong.

    What was used to encrypt it?

    Is there not a standard for all zips?

    I remember from the 90s when zips were a new thing, it was a laugh they could
    easily be opened.

    Yes, their password protection was feeble. Now they 'can' encrypt with
    128 or 256 bit encryption algorithms.

    That is a very large 'password space' (keyspace) to slog through doing
    even modified brute force attacks.

    Yes, the program I tried asked for hints. Like did I use capital letters, numbers, symbols etc. I guess it was designed for people trying to hack into their own zip files....

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Commander Kinsey@21:1/5 to Paul on Thu Feb 23 08:10:03 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On Wed, 15 Feb 2023 17:09:44 -0000, Paul <nospam@needed.invalid> wrote:

    On 2/15/2023 11:13 AM, Tim Slattery wrote:
    "Commander Kinsey" <CK1@nospam.com> wrote:

    Trying to get into a password protected zip. Got three instances of a free password cracker (Stella Data Recovery) running for the last handful of hours trying three different methods (they only use 1 core each). Still not got in. I find it hard
    to believe zips are that tightly sealed.

    The ZIP format was created for data compression, not security. Since
    then password protection has been added to it. I guess it would be as
    strong or weak as any other encrypted format.

    The export laws on crypto, historically had a chilling effect
    on crypto strength.

    No government can stop me encrypting how I wish, then sending it to anyone in any country.

    And to some extent, that hasn't changed.
    It's only when it impacts the competitiveness of a country,
    that it stops.

    It used to be "you stop it before it happens" was how
    you handled crypto. Today, it's the usage of rubber hoses
    which is the preferred method (the TrueCrypt mystery,
    and legislative attempts to build backdoors).

    When ZIP was invented, elliptic curve didn't exist. But
    there were still likely to have been methods which signal
    you are using the "tough" version. Using a weak-as-piss
    method ensures your product can be Exported.

    The same kinds of things happened on PDF format.

    And the old protection on ZIP is so weak, if Google wants to,
    they can scan ZIP attachments in GMail with that protection method,
    in "real time". You can't have a much weaker crypto than that.
    It's no barrier at all.

    The newer method on the other hand, is more of an impediment.

    Even the encryption on 7Z has had the odd issue, but these
    implementation details have been corrected.

    Isn't 7zip just a zip program, using the same standards as any other?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Commander Kinsey@21:1/5 to FromTheRafters on Thu Feb 23 08:08:41 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On Wed, 15 Feb 2023 16:35:42 -0000, FromTheRafters <FTR@nomail.afraid.org> wrote:

    Tim Slattery formulated on Wednesday :
    "Commander Kinsey" <CK1@nospam.com> wrote:

    Trying to get into a password protected zip. Got three instances of a free >>> password cracker (Stella Data Recovery) running for the last handful of
    hours trying three different methods (they only use 1 core each). Still not
    got in. I find it hard to believe zips are that tightly sealed.

    The ZIP format was created for data compression, not security. Since
    then password protection has been added to it. I guess it would be as
    strong or weak as any other encrypted format.

    From:

    https://pkware.cachefly.net/webdocs/APPNOTE/APPNOTE-6.3.7.TXT

    4.4.3 version needed to extract (2 bytes)

    4.4.3.1 The minimum supported ZIP specification version needed
    to extract the file, mapped as above. This value is based on
    the specific format features a ZIP program MUST support to
    be able to extract the file. If multiple features are
    applied to a file, the minimum version MUST be set to the
    feature having the highest value. New features or feature
    changes affecting the published format specification will be
    implemented using higher version numbers than the last
    published value to avoid conflict.

    4.4.3.2 Current minimum feature versions are as defined below:

    1.0 - Default value
    1.1 - File is a volume label
    2.0 - File is a folder (directory)
    2.0 - File is compressed using Deflate compression
    2.0 - File is encrypted using traditional PKWARE encryption
    2.1 - File is compressed using Deflate64(tm)
    2.5 - File is compressed using PKWARE DCL Implode
    2.7 - File is a patch data set
    4.5 - File uses ZIP64 format extensions
    4.6 - File is compressed using BZIP2 compression*
    5.0 - File is encrypted using DES
    5.0 - File is encrypted using 3DES
    5.0 - File is encrypted using original RC2 encryption
    5.0 - File is encrypted using RC4 encryption
    5.1 - File is encrypted using AES encryption
    5.1 - File is encrypted using corrected RC2 encryption**
    5.2 - File is encrypted using corrected RC2-64 encryption**
    6.1 - File is encrypted using non-OAEP key wrapping***
    6.2 - Central directory encryption
    6.3 - File is compressed using LZMA
    6.3 - File is compressed using PPMd+
    6.3 - File is encrypted using Blowfish
    6.3 - File is encrypted using Twofish

    Could my stockfish decrypt twofish?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Joerg Lorenz@21:1/5 to All on Thu Feb 23 11:15:03 2023
    XPost: alt.comp.os.windows-11, uk.comp.sys.mac

    Am 23.02.23 um 09:10 schrieb Commander Kinsey:
    On Wed, 15 Feb 2023 17:09:44 -0000, Paul <nospam@needed.invalid> wrote:

    On 2/15/2023 11:13 AM, Tim Slattery wrote:
    "Commander Kinsey" <CK1@nospam.com> wrote:

    Trying to get into a password protected zip. Got three instances of a free password cracker (Stella Data Recovery) running for the last handful of hours trying three different methods (they only use 1 core each). Still not got in. I find it hard
    to believe zips are that tightly sealed.

    The ZIP format was created for data compression, not security. Since
    then password protection has been added to it. I guess it would be as
    strong or weak as any other encrypted format.

    The export laws on crypto, historically had a chilling effect
    on crypto strength.

    No government can stop me encrypting how I wish, then sending it to anyone in any country.

    Sure. But you will be blacklisted and not allowed to fly anymore.
    Your next parking ticket is your death sentence ... :-D

    America is as totalitarian as Russia or China.
    But many Americans think they live in a free country.

    *ROTFLSTC*.

    --
    Gutta cavat lapidem (Ovid)

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Paul@21:1/5 to Commander Kinsey on Thu Feb 23 05:18:11 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On 2/23/2023 3:10 AM, Commander Kinsey wrote:
    On Wed, 15 Feb 2023 17:09:44 -0000, Paul <nospam@needed.invalid> wrote:

    On 2/15/2023 11:13 AM, Tim Slattery wrote:
    "Commander Kinsey" <CK1@nospam.com> wrote:

    Trying to get into a password protected zip.  Got three instances of a free password cracker (Stella Data Recovery) running for the last handful of hours trying three different methods (they only use 1 core each).  Still not got in.  I find it hard
    to believe zips are that tightly sealed.

    The ZIP format was created for data compression, not security. Since
    then password protection has been added to it. I guess it would be as
    strong or weak as any other encrypted format.

    The export laws on crypto, historically had a chilling effect
    on crypto strength.

    No government can stop me encrypting how I wish, then sending it to anyone in any country.

    And to some extent, that hasn't changed.
    It's only when it impacts the competitiveness of a country,
    that it stops.

    It used to be "you stop it before it happens" was how
    you handled crypto. Today, it's the usage of rubber hoses
    which is the preferred method (the TrueCrypt mystery,
    and legislative attempts to build backdoors).

    When ZIP was invented, elliptic curve didn't exist. But
    there were still likely to have been methods which signal
    you are using the "tough" version. Using a weak-as-piss
    method ensures your product can be Exported.

    The same kinds of things happened on PDF format.

    And the old protection on ZIP is so weak, if Google wants to,
    they can scan ZIP attachments in GMail with that protection method,
    in "real time". You can't have a much weaker crypto than that.
    It's no barrier at all.

    The newer method on the other hand, is more of an impediment.

    Even the encryption on 7Z has had the odd issue, but these
    implementation details have been corrected.

    Isn't 7zip just a zip program, using the same standards as any other?

    Just as RAR has a custom compressor (and charges money for it),
    7ZIP has a custom compressor (7z) and it is free.

    I think these are arithmetic compressors, similar to LZMA, but
    you'll probably find a wikipedia entry with the details.

    The other thing it has, is a pre-processor. There is a method
    for re-encoding EXE files, and if 7Z senses EXE files, it passes
    the data through the pre-processor, before the main 7Z compression
    step runs.

    7ZIP has multithreaded compression and multithreaded decompression.
    By using all the cores, the slow LZMA-like method is delivered at
    moderate speed.

    To compress a hard drive full of data with 7Z, costs about $1 worth
    of electricity. Just to give some idea, that certain computing things
    do cost real money. A machine can grind for most of the day,
    compressing a disk drive.

    Some of the other compressors built into 7Z, are not multicore.
    The winZIP compressor is probably not running on multiple cores.

    PIGZ is a parallel version of GZIP. It uses multiple cores during
    compression, but only one core during decompression. And the
    multiple cores, may have a limit. Whereas 7ZIP can use all your
    cores for .7z .

    On Win10 or Win11, you set the thread count to 2x as many as
    the CPU. A CPU with 6C 12T, you set the thread count to 24,
    so that the 12 virtual cores are well-loaded. This helps keep
    the CPU usage bar at 100%. If you set the thread count to 12
    (one per virtual core), it only runs at about 80% or so.
    Since the dictionary size for Ultra mode is 600MB per thread,
    24*600 = close to 16GB of RAM. So if you want to make your
    CPU as hot as possible, you need sufficient RAM for all the
    threads of execution to use.

    And then, when 7ZIP is finished all that mumbo-jumbp, it
    can do a pass of AES256 and encrypt the output blocks.
    Encryption is done after compression, because encrypted
    data does not compress. That's how you can tell the
    quality of encryption, if it does not compress and
    the file becomes smaller.

    Paul

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Shinji Ikari@21:1/5 to Commander Kinsey on Thu Feb 23 13:45:18 2023
    Hello.

    "Commander Kinsey" <CK1@nospam.com> schrieb

    On Tue, 14 Feb 2023 18:45:46 -0000, Shinji Ikari <shinji@gmx.net> wrote:
    "Commander Kinsey" <CK1@nospam.com> schrieb
    On Tue, 14 Feb 2023 15:36:51 -0000, FromTheRafters <FTR@nomail.afraid.org> wrote:
    Commander Kinsey explained on 2/14/2023 :
    Trying to get into a password protected zip. Got three instances of a free
    password cracker (Stella Data Recovery) running for the last handful of hours
    trying three different methods (they only use 1 core each). Still not got
    in. I find it hard to believe zips are that tightly sealed.
    256 bit encryption is pretty strong.
    What was used to encrypt it?
    Is there not a standard for all zips?
    I don't think so, because zip can be produced by a variety of
    software.
    But it's all compatible. If you create it with 7zip, I can open int with winzip.

    Yes, but only, if the unpacking ZIP compatible programm can use the
    same en-/decryption used while packing it.

    I remember from the 90s when zips were a new thing, it was a laugh they could easily be opened.
    Well, that ist only 30 years ago, there was a 'tiny' step forward in
    zip files.
    So I couldn't open a modern zip with the 1st version of pkunzip?

    if it is encrypted with an never encrytion method, that pkunzip does
    not know of: yes, then you can not get the data inside of the ZIP file
    with a to old pkunzip versoion.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Commander Kinsey@21:1/5 to Mr. Man-wai Chang on Wed Mar 1 20:33:41 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On Sat, 18 Feb 2023 13:35:51 -0000, Mr. Man-wai Chang <toylet.toylet@gmail.com> wrote:

    On 18/2/2023 9:35 pm, Mr. Man-wai Chang wrote:

    The other method is of course using the characteristic of ASCII/EBCDIC!
    That is, try "a", "b", "c", ... "aa", "ab", "ac", "ad", .... This
    method will definitely work, but needs time! ;)

    Exactly like hacking a combination lock...

    No, you listen with a stethoscope to see if you get a number right. Or if the lock is shit, you can pull it slightly further apart when one number is correct.

    Mind you, a combination lock doesn't encrypt the contents, so you can just use bolt cutters.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Commander Kinsey@21:1/5 to Mr. Man-wai Chang on Wed Mar 1 20:32:38 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On Sat, 18 Feb 2023 13:35:15 -0000, Mr. Man-wai Chang <toylet.toylet@gmail.com> wrote:

    On 18/2/2023 7:25 am, Alan Browne wrote:

    Not in the dictionary much.

    Back in the 80s or 90s we needed to unzip a file after an engineer left
    the co.

    Another engineer used a dictionary attack. Got nowhere.
    Then asked "who was the engineer anyway?"
    "Eric"
    He switched to a Hebrew dictionary and the zip file was opened
    quickly... (Hebrew rendered in the English alphabet).

    It's still a dictonary hack, using a human languagte called Hebrew! :)

    They're not human.

    The other method is of course using the characteristic of ASCII/EBCDIC!
    That is, try "a", "b", "c", ... "aa", "ab", "ac", "ad", .... This
    method will definitely work, but needs time! ;)

    Especially if it's a password like I use. Press the shift slowly on and off, while mashing the other hand on the letters and numbers. So you get capitals, lower case, symbols, and numbers.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Commander Kinsey@21:1/5 to Mr. Man-wai Chang on Wed Mar 1 20:34:23 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On Sun, 19 Feb 2023 05:54:34 -0000, Mr. Man-wai Chang <toylet.toylet@gmail.com> wrote:

    On 19/2/2023 1:18 am, FromTheRafters wrote:

    Modified Brute Force attack.

    Twice Modified Brute Force attack.

    Brute Force attack.


    People might not know the meaning of "brute force". Picking phyical
    locks might be easier to understand. :)

    Everybody knows what brute force is.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Commander Kinsey@21:1/5 to FromTheRafters on Wed Mar 1 20:36:06 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On Sun, 19 Feb 2023 07:38:58 -0000, FromTheRafters <FTR@nomail.afraid.org> wrote:

    Mr. Man-wai Chang explained on 2/19/2023 :
    On 19/2/2023 1:18 am, FromTheRafters wrote:

    Modified Brute Force attack.

    Twice Modified Brute Force attack.

    Brute Force attack.

    People might not know the meaning of "brute force".

    True, but as you know it just means the whole keyspace is searched and
    on average you check half of them to get a winner.

    Does that mean we should always have passwords full of Zs? Would ZZZZZZZZZZZZZZZZZZZZ be the slowest password to hack?
    Picking phyical locks might be easier to understand. :)

    If it's a key lock, you don't randomly poke at it.

    True again, but when you can reduce the keyspace to a smaller set it is
    a 'Modified Brute Force attack' so needing to check only for words
    reduces the effective keyspace and then further restricting to only
    words for a language known to be used by the person doing the
    encryption narrows it even further.

    Nobody uses words, it's always something like GiraFfE-36£!

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Commander Kinsey@21:1/5 to Alan Browne on Wed Mar 1 21:04:03 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On Sat, 18 Feb 2023 17:12:33 -0000, Alan Browne <bitbucket@blackhole.com> wrote:

    On 2023-02-18 08:35, Mr. Man-wai Chang wrote:
    On 18/2/2023 7:25 am, Alan Browne wrote:

    Not in the dictionary much.

    Back in the 80s or 90s we needed to unzip a file after an engineer left
    the co.

    Another engineer used a dictionary attack. Got nowhere.
    Then asked "who was the engineer anyway?"
    "Eric"
    He switched to a Hebrew dictionary and the zip file was opened
    quickly... (Hebrew rendered in the English alphabet).

    It's still a dictonary hack, using a human languagte called Hebrew! :)

    The other method is of course using the characteristic of ASCII/EBCDIC!
    That is, try "a", "b", "c", ... "aa", "ab", "ac", "ad", .... This
    method will definitely work, but needs time! ;)

    That was back then - since then people have learned (I hope) to use real passwords such as the one I put up. Also the encryption level used
    these days is far better than back then.

    Encryption level is irrelevant if you're trying passwords.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Commander Kinsey@21:1/5 to Paul on Wed Mar 1 21:05:55 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On Mon, 20 Feb 2023 00:00:12 -0000, Paul <nospam@needed.invalid> wrote:

    On 2/19/2023 5:56 PM, Chris wrote:
    Alan Browne <bitbucket@blackhole.com> wrote:
    On 2023-02-18 08:35, Mr. Man-wai Chang wrote:
    On 18/2/2023 7:25 am, Alan Browne wrote:

    Not in the dictionary much.

    Back in the 80s or 90s we needed to unzip a file after an engineer left >>>>> the co.

    Another engineer used a dictionary attack. Got nowhere.
    Then asked "who was the engineer anyway?"
    "Eric"
    He switched to a Hebrew dictionary and the zip file was opened
    quickly... (Hebrew rendered in the English alphabet).

    It's still a dictonary hack, using a human languagte called Hebrew! :) >>>>
    The other method is of course using the characteristic of ASCII/EBCDIC! >>>> That is, try "a", "b", "c", ... "aa", "ab", "ac", "ad", .... This
    method will definitely work, but needs time! ;)

    That was back then - since then people have learned (I hope) to use real >>> passwords such as the one I put up.

    Many do and many don't.

    As long as people need to type in passwords they aren't going to use long
    and complicated strings.

    Also the encryption level used
    these days is far better than back then.

    It doesn't matter how good the encryption is if the password is bad.

    Any Internet-facing passwords here, are long and strong.

    Security inside my LAN is poor. If something gets in here,
    it's total destruction time... If I spent the whole day
    building a fort out of cardboard boxes, there would be nothing
    of value inside the fort (all my waking hours would be spent
    on the fort and nothing else).

    Is my router vulnerable ? Based on industry standards of
    security, the answer to that is... Yes.

    Part of the security for a home user, is what the ISP
    is doing. For example, I watched one day, as someone within
    myisp.com was scanning my node. Today, the ISP does not allow
    other users to scan internal nodes, so I no longer see
    script kiddies doing stuff like that. However, Google can
    still attempt to scan the node. There is, of course, no
    purposeful webserver running (that I know of). There could
    be localhost:631 within the bash shell, but that's about it.
    Even if IIS on the current OS, actually installed useful
    stuff (it doesn't), I would not be doing that. I have used
    the IIS ftpd setup in the past, but only on an episode basis
    (for a couple hours, and not port-forwarded, then removed).

    Since my WinXP machine died, my imaginary security has
    gone up this much [fingers measure a tiny space about
    the size of a millimeter] :-)

    I once ran a security check on my computer, which scanned from an outside website, and apparently it wa 100% tightly shielded and even broke a load of RFCs by not responding.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Commander Kinsey@21:1/5 to Alan Browne on Wed Mar 1 21:24:33 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On Sun, 19 Feb 2023 23:10:30 -0000, Alan Browne <bitbucket@blackhole.com> wrote:

    On 2023-02-19 17:56, Chris wrote:
    Alan Browne <bitbucket@blackhole.com> wrote:
    On 2023-02-18 08:35, Mr. Man-wai Chang wrote:
    On 18/2/2023 7:25 am, Alan Browne wrote:

    Not in the dictionary much.

    Back in the 80s or 90s we needed to unzip a file after an engineer left >>>>> the co.

    Another engineer used a dictionary attack. Got nowhere.
    Then asked "who was the engineer anyway?"
    "Eric"
    He switched to a Hebrew dictionary and the zip file was opened
    quickly... (Hebrew rendered in the English alphabet).

    It's still a dictonary hack, using a human languagte called Hebrew! :) >>>>
    The other method is of course using the characteristic of ASCII/EBCDIC! >>>> That is, try "a", "b", "c", ... "aa", "ab", "ac", "ad", .... This
    method will definitely work, but needs time! ;)

    That was back then - since then people have learned (I hope) to use real >>> passwords such as the one I put up.

    Many do and many don't.

    As long as people need to type in passwords they aren't going to use long
    and complicated strings.

    Either use a password manager (as I do) or become clever in the
    composition of the passwords. So earlier I posted a pretty random one appropriate to a password manager.

    Alternately strong passwords that are memorable can look something like:

    merrY$penGuin@2four78

    Why make it memorable? (Not that I'd ever remember what you just chose) I just save them all in a text file, and also let the browser remember them. If someone breaks into my house the last thing I'd care about is getting into some online accounts.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From FromTheRafters@21:1/5 to All on Wed Mar 1 16:49:12 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    It happens that Commander Kinsey formulated :
    On Sun, 19 Feb 2023 05:54:34 -0000, Mr. Man-wai Chang <toylet.toylet@gmail.com> wrote:

    On 19/2/2023 1:18 am, FromTheRafters wrote:

    Modified Brute Force attack.

    Twice Modified Brute Force attack.

    Brute Force attack.


    People might not know the meaning of "brute force". Picking phyical
    locks might be easier to understand. :)

    Everybody knows what brute force is.

    A cryptography 'jargon' term for an exhaustive key search.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Zaidy036@21:1/5 to Commander Kinsey on Wed Mar 1 17:31:12 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On 3/1/2023 3:32 PM, Commander Kinsey wrote:
    On Sat, 18 Feb 2023 13:35:15 -0000, Mr. Man-wai Chang <toylet.toylet@gmail.com> wrote:


    It's still a dictonary hack, using a human languagte called Hebrew! :)

    They're not human.


    Really? If you think that then nobody is and since a lot of the computer hardware and code was developed by them you should not be using any of it.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Commander Kinsey@21:1/5 to J. J. Lodder on Sat Mar 4 01:26:28 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On Mon, 20 Feb 2023 20:04:47 -0000, J. J. Lodder <nospam@de-ster.demon.nl> wrote:

    Alan Browne <bitbucket@blackhole.com> wrote:

    On 2023-02-20 07:33, J. J. Lodder wrote:
    mechanic <mechanic@example.net> wrote:

    On Sun, 19 Feb 2023 22:56:10 -0000 (UTC), Chris wrote:

    As long as people need to type in passwords they aren't going to
    use long and complicated strings.

    No excuse!

    And long passwords need not be difficult.
    1RoseByAnyOtherNameWillSmellAsSweet!
    will be just fine,

    Good, but insert a few numbers/spec chars in the middle too ... along
    with a misspelled word and caps in the "wrong" places ... and it will be
    as good as random where a dictionary+brute force attack occurs.

    Most sites insist nowadays on at least one digit,
    one capitalised letter, and one special sign.
    My example complies,

    The insistance is irritating. I make a nice easy to remember password to use everywhere, then along comes a place with yet one more requirement. If you have a different password for every single thing, people have to write them down, and there goes
    security. Mine are all in an unencrypted text file. I've seen them on postit notes on the side of people's monitors.

    Eye scanning is maybe better, then again I recently watched a TV program where they unlocked a phone using face recognition by aiming it at the sleeping person's face.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Commander Kinsey@21:1/5 to Mr. Man-wai Chang on Sat Mar 4 01:27:39 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On Mon, 20 Feb 2023 15:00:46 -0000, Mr. Man-wai Chang <toylet.toylet@gmail.com> wrote:

    On 20/2/2023 8:42 pm, Chris wrote:

    At work one time, I set up my password as a 25 character random string via >> my password manager which was great until they decided to sync the network >> password with the local password on my machine. So when when I needed to
    login after a reboot or screensaver kicks in I had to type it in manually.

    You should use your brain to memorize all 25-character random strings. :)

    Our brains are pretty shit really.

    I can still remember the 16 digit debit card number from one I had in 1994. But I can't remember any after that. And I could never remember the 3 digit security code!

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Commander Kinsey@21:1/5 to J. J. Lodder on Sat Mar 4 01:28:04 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On Mon, 20 Feb 2023 20:04:48 -0000, J. J. Lodder <nospam@de-ster.demon.nl> wrote:

    Mr. Man-wai Chang <toylet.toylet@gmail.com> wrote:

    On 20/2/2023 8:42 pm, Chris wrote:

    At work one time, I set up my password as a 25 character random string via >> > my password manager which was great until they decided to sync the network >> > password with the local password on my machine. So when when I needed to >> > login after a reboot or screensaver kicks in I had to type it in manually. >>
    You should use your brain to memorize all 25-character random strings. :)

    No problem with that at all, for me.
    The problem is memorising a few particular ones,

    Are you telling me you can remember something like £Q%HarbE^7jaerH$j4w6j?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Commander Kinsey@21:1/5 to Paul on Sat Mar 4 03:00:25 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On Thu, 23 Feb 2023 10:18:11 -0000, Paul <nospam@needed.invalid> wrote:

    On 2/23/2023 3:10 AM, Commander Kinsey wrote:
    On Wed, 15 Feb 2023 17:09:44 -0000, Paul <nospam@needed.invalid> wrote:

    On 2/15/2023 11:13 AM, Tim Slattery wrote:
    "Commander Kinsey" <CK1@nospam.com> wrote:

    Trying to get into a password protected zip. Got three instances of a free password cracker (Stella Data Recovery) running for the last handful of hours trying three different methods (they only use 1 core each). Still not got in. I find it hard
    to believe zips are that tightly sealed.

    The ZIP format was created for data compression, not security. Since
    then password protection has been added to it. I guess it would be as
    strong or weak as any other encrypted format.

    The export laws on crypto, historically had a chilling effect
    on crypto strength.

    No government can stop me encrypting how I wish, then sending it to anyone in any country.

    And to some extent, that hasn't changed.
    It's only when it impacts the competitiveness of a country,
    that it stops.

    It used to be "you stop it before it happens" was how
    you handled crypto. Today, it's the usage of rubber hoses
    which is the preferred method (the TrueCrypt mystery,
    and legislative attempts to build backdoors).

    When ZIP was invented, elliptic curve didn't exist. But
    there were still likely to have been methods which signal
    you are using the "tough" version. Using a weak-as-piss
    method ensures your product can be Exported.

    The same kinds of things happened on PDF format.

    And the old protection on ZIP is so weak, if Google wants to,
    they can scan ZIP attachments in GMail with that protection method,
    in "real time". You can't have a much weaker crypto than that.
    It's no barrier at all.

    The newer method on the other hand, is more of an impediment.

    Even the encryption on 7Z has had the odd issue, but these
    implementation details have been corrected.

    Isn't 7zip just a zip program, using the same standards as any other?

    Just as RAR has a custom compressor (and charges money for it),
    7ZIP has a custom compressor (7z) and it is free.

    I think these are arithmetic compressors, similar to LZMA, but
    you'll probably find a wikipedia entry with the details.

    The other thing it has, is a pre-processor. There is a method
    for re-encoding EXE files, and if 7Z senses EXE files, it passes
    the data through the pre-processor, before the main 7Z compression
    step runs.

    7ZIP has multithreaded compression and multithreaded decompression.
    By using all the cores, the slow LZMA-like method is delivered at
    moderate speed.

    Everything should be multithreaded, we've had multicore CPUs for donkey's years.

    To compress a hard drive full of data with 7Z, costs about $1 worth
    of electricity. Just to give some idea, that certain computing things
    do cost real money. A machine can grind for most of the day,
    compressing a disk drive.

    Does it cost much to have a drive compressed by Windows? Every time you read and write you're using the processor. But less of the drive motor and the wear on it.

    Some of the other compressors built into 7Z, are not multicore.
    The winZIP compressor is probably not running on multiple cores.

    PIGZ is a parallel version of GZIP. It uses multiple cores during compression, but only one core during decompression. And the
    multiple cores, may have a limit. Whereas 7ZIP can use all your
    cores for .7z .

    On Win10 or Win11, you set the thread count to 2x as many as
    the CPU. A CPU with 6C 12T, you set the thread count to 24,
    so that the 12 virtual cores are well-loaded. This helps keep
    the CPU usage bar at 100%. If you set the thread count to 12
    (one per virtual core), it only runs at about 80% or so.
    Since the dictionary size for Ultra mode is 600MB per thread,
    24*600 = close to 16GB of RAM. So if you want to make your
    CPU as hot as possible, you need sufficient RAM for all the
    threads of execution to use.

    Doing that might overload the caches and slow it down.

    And then, when 7ZIP is finished all that mumbo-jumbp, it
    can do a pass of AES256 and encrypt the output blocks.
    Encryption is done after compression, because encrypted
    data does not compress. That's how you can tell the
    quality of encryption, if it does not compress and
    the file becomes smaller.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Commander Kinsey@21:1/5 to Joerg Lorenz on Sat Mar 4 02:56:55 2023
    XPost: alt.comp.os.windows-11, uk.comp.sys.mac

    On Thu, 23 Feb 2023 10:15:03 -0000, Joerg Lorenz <hugybear@gmx.ch> wrote:

    Am 23.02.23 um 09:10 schrieb Commander Kinsey:
    On Wed, 15 Feb 2023 17:09:44 -0000, Paul <nospam@needed.invalid> wrote:

    On 2/15/2023 11:13 AM, Tim Slattery wrote:
    "Commander Kinsey" <CK1@nospam.com> wrote:

    Trying to get into a password protected zip. Got three instances of a free password cracker (Stella Data Recovery) running for the last handful of hours trying three different methods (they only use 1 core each). Still not got in. I find it hard
    to believe zips are that tightly sealed.

    The ZIP format was created for data compression, not security. Since
    then password protection has been added to it. I guess it would be as
    strong or weak as any other encrypted format.

    The export laws on crypto, historically had a chilling effect
    on crypto strength.

    No government can stop me encrypting how I wish, then sending it to anyone in any country.

    Sure. But you will be blacklisted and not allowed to fly anymore.
    Your next parking ticket is your death sentence ... :-D

    America is as totalitarian as Russia or China.
    But many Americans think they live in a free country.

    *ROTFLSTC*.

    Then you disguise who you are when you send it.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Commander Kinsey@21:1/5 to Shinji Ikari on Sat Mar 4 03:01:20 2023
    On Thu, 23 Feb 2023 12:45:18 -0000, Shinji Ikari <shinji@gmx.net> wrote:

    Hello.

    "Commander Kinsey" <CK1@nospam.com> schrieb

    On Tue, 14 Feb 2023 18:45:46 -0000, Shinji Ikari <shinji@gmx.net> wrote:
    "Commander Kinsey" <CK1@nospam.com> schrieb
    On Tue, 14 Feb 2023 15:36:51 -0000, FromTheRafters <FTR@nomail.afraid.org> wrote:
    Commander Kinsey explained on 2/14/2023 :
    Trying to get into a password protected zip. Got three instances of a free
    password cracker (Stella Data Recovery) running for the last handful of hours
    trying three different methods (they only use 1 core each). Still not got
    in. I find it hard to believe zips are that tightly sealed.
    256 bit encryption is pretty strong.
    What was used to encrypt it?
    Is there not a standard for all zips?
    I don't think so, because zip can be produced by a variety of
    software.
    But it's all compatible. If you create it with 7zip, I can open int with winzip.

    Yes, but only, if the unpacking ZIP compatible programm can use the
    same en-/decryption used while packing it.

    I remember from the 90s when zips were a new thing, it was a laugh they could easily be opened.
    Well, that ist only 30 years ago, there was a 'tiny' step forward in
    zip files.
    So I couldn't open a modern zip with the 1st version of pkunzip?

    if it is encrypted with an never encrytion method, that pkunzip does
    not know of: yes, then you can not get the data inside of the ZIP file
    with a to old pkunzip versoion.

    I do remember them adding extra methods even back in the DOS versions. There was exploding and imploding.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Commander Kinsey@21:1/5 to Zaidy036@air.isp.spam on Mon Mar 13 00:30:02 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On Wed, 01 Mar 2023 22:31:12 -0000, Zaidy036 <Zaidy036@air.isp.spam> wrote:

    On 3/1/2023 3:32 PM, Commander Kinsey wrote:
    On Sat, 18 Feb 2023 13:35:15 -0000, Mr. Man-wai Chang
    <toylet.toylet@gmail.com> wrote:


    It's still a dictonary hack, using a human languagte called Hebrew! :)

    They're not human.


    Really? If you think that then nobody is

    They're a different species (biological fact).

    and since a lot of the computer
    hardware and code was developed by them you should not be using any of it.

    The hacker code perhaps.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Commander Kinsey@21:1/5 to FromTheRafters on Mon Mar 13 00:29:25 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On Wed, 01 Mar 2023 21:49:12 -0000, FromTheRafters <FTR@nomail.afraid.org> wrote:

    It happens that Commander Kinsey formulated :
    On Sun, 19 Feb 2023 05:54:34 -0000, Mr. Man-wai Chang
    <toylet.toylet@gmail.com> wrote:

    On 19/2/2023 1:18 am, FromTheRafters wrote:

    Modified Brute Force attack.

    Twice Modified Brute Force attack.

    Brute Force attack.


    People might not know the meaning of "brute force". Picking phyical
    locks might be easier to understand. :)

    Everybody knows what brute force is.

    A cryptography 'jargon' term for an exhaustive key search.

    I thought Mr. Man-wai Chang meant people might not know the everyday phrase.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From FromTheRafters@21:1/5 to All on Mon Mar 13 07:25:49 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    on 3/12/2023, Commander Kinsey supposed :
    On Wed, 01 Mar 2023 21:49:12 -0000, FromTheRafters <FTR@nomail.afraid.org> wrote:

    It happens that Commander Kinsey formulated :
    On Sun, 19 Feb 2023 05:54:34 -0000, Mr. Man-wai Chang
    <toylet.toylet@gmail.com> wrote:

    On 19/2/2023 1:18 am, FromTheRafters wrote:

    Modified Brute Force attack.

    Twice Modified Brute Force attack.

    Brute Force attack.


    People might not know the meaning of "brute force". Picking phyical
    locks might be easier to understand. :)

    Everybody knows what brute force is.

    A cryptography 'jargon' term for an exhaustive key search.

    I thought Mr. Man-wai Chang meant people might not know the everyday phrase.

    That very well may be. I put it back in context.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From David Brooks@21:1/5 to FromTheRafters on Mon Mar 13 11:54:56 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On 13/03/2023 11:25, FromTheRafters wrote:
    on 3/12/2023, Commander Kinsey supposed :
    On Wed, 01 Mar 2023 21:49:12 -0000, FromTheRafters
    <FTR@nomail.afraid.org> wrote:

    It happens that Commander Kinsey formulated :
    On Sun, 19 Feb 2023 05:54:34 -0000, Mr. Man-wai Chang
    <toylet.toylet@gmail.com> wrote:

    On 19/2/2023 1:18 am, FromTheRafters wrote:

    Modified Brute Force attack.

    Twice Modified Brute Force attack.

    Brute Force attack.


    People might not know the meaning of "brute force". Picking phyical
    locks might be easier to understand. :)

    Everybody knows what brute force is.

    A cryptography 'jargon' term for an exhaustive key search.

    I thought Mr. Man-wai Chang meant people might not know the everyday
    phrase.

    That very well may be. I put it back in context.

    Did you tech THIS fellow?

    https://youtu.be/EpBWFF8i_gc

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From David Brooks@21:1/5 to All on Mon Mar 13 15:22:22 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    Oops!

    Did you teach THIS fellow?

    https://youtu.be/EpBWFF8i_gc

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Commander Kinsey@21:1/5 to David Brooks on Sun Mar 19 21:19:57 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On Mon, 13 Mar 2023 11:54:56 -0000, David Brooks <DavidB@nomail.afraid.org> wrote:

    On 13/03/2023 11:25, FromTheRafters wrote:
    on 3/12/2023, Commander Kinsey supposed :
    On Wed, 01 Mar 2023 21:49:12 -0000, FromTheRafters
    <FTR@nomail.afraid.org> wrote:

    It happens that Commander Kinsey formulated :
    On Sun, 19 Feb 2023 05:54:34 -0000, Mr. Man-wai Chang
    <toylet.toylet@gmail.com> wrote:

    On 19/2/2023 1:18 am, FromTheRafters wrote:

    Modified Brute Force attack.

    Twice Modified Brute Force attack.

    Brute Force attack.


    People might not know the meaning of "brute force". Picking phyical >>>>>> locks might be easier to understand. :)

    Everybody knows what brute force is.

    A cryptography 'jargon' term for an exhaustive key search.

    I thought Mr. Man-wai Chang meant people might not know the everyday
    phrase.

    That very well may be. I put it back in context.

    Did you tech THIS fellow?

    https://youtu.be/EpBWFF8i_gc

    Fucking hell, that beats any other one I've seen.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From David Brooks@21:1/5 to Commander Kinsey on Sun Mar 19 22:22:25 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On 19/03/2023 21:19, Commander Kinsey wrote:
    On Mon, 13 Mar 2023 11:54:56 -0000, David Brooks
    <DavidB@nomail.afraid.org> wrote:

    On 13/03/2023 11:25, FromTheRafters wrote:
    on 3/12/2023, Commander Kinsey supposed :
    On Wed, 01 Mar 2023 21:49:12 -0000, FromTheRafters
    <FTR@nomail.afraid.org> wrote:

    It happens that Commander Kinsey formulated :
    On Sun, 19 Feb 2023 05:54:34 -0000, Mr. Man-wai Chang
    <toylet.toylet@gmail.com> wrote:

    On 19/2/2023 1:18 am, FromTheRafters wrote:

    Modified Brute Force attack.

    Twice Modified Brute Force attack.

    Brute Force attack.


    People might not know the meaning of "brute force". Picking phyical >>>>>>> locks might be easier to understand. :)

    Everybody knows what brute force is.

    A cryptography 'jargon' term for an exhaustive key search.

    I thought Mr. Man-wai Chang meant people might not know the everyday
    phrase.

    That very well may be. I put it back in context.

    Did you teach THIS fellow?

    https://youtu.be/EpBWFF8i_gc

    Fucking hell, that beats any other one I've seen.

    Pure fun! 😃

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Brian Gregory@21:1/5 to J. J. Lodder on Mon Mar 20 02:08:45 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On 20/02/2023 20:04, J. J. Lodder wrote:
    Alan Browne <bitbucket@blackhole.com> wrote:

    On 2023-02-20 07:33, J. J. Lodder wrote:
    mechanic <mechanic@example.net> wrote:

    On Sun, 19 Feb 2023 22:56:10 -0000 (UTC), Chris wrote:

    As long as people need to type in passwords they aren't going to
    use long and complicated strings.

    No excuse!

    And long passwords need not be difficult.
    1RoseByAnyOtherNameWillSmellAsSweet!
    will be just fine,

    Good, but insert a few numbers/spec chars in the middle too ... along
    with a misspelled word and caps in the "wrong" places ... and it will be
    as good as random where a dictionary+brute force attack occurs.

    Most sites insist nowadays on at least one digit,
    one capitalised letter, and one special sign.
    My example complies,


    I often seem to manage to pick the one special character that isn't
    allowed! Then the website doesn't tell me what's wrong, it just repeats
    what it already told me, something like "your password must include at
    least 8 characters including one lowercase letter, one uppercase letter,
    one digit, and one special character or punctuation symbol".

    --
    Brian Gregory (in England).

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Chris@21:1/5 to J. J. Lodder on Mon Mar 20 08:34:42 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    J. J. Lodder <nospam@de-ster.demon.nl> wrote:
    Alan Browne <bitbucket@blackhole.com> wrote:

    On 2023-02-20 07:33, J. J. Lodder wrote:
    mechanic <mechanic@example.net> wrote:

    On Sun, 19 Feb 2023 22:56:10 -0000 (UTC), Chris wrote:

    As long as people need to type in passwords they aren't going to
    use long and complicated strings.

    No excuse!

    And long passwords need not be difficult.
    1RoseByAnyOtherNameWillSmellAsSweet!
    will be just fine,

    Good, but insert a few numbers/spec chars in the middle too ... along
    with a misspelled word and caps in the "wrong" places ... and it will be
    as good as random where a dictionary+brute force attack occurs.

    Most sites insist nowadays on at least one digit,
    one capitalised letter, and one special sign.
    My example complies,

    Many (increasingly?) sites have ridiculously low length limits as well. A recent one was 8 characters, but often it's around 20. Your example
    wouldn't work there.

    That's why I gave up on an "internal algorithm" as I had to either have
    several or make it as weak as the worst site.

    Now I use a password manager.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From J. J. Lodder@21:1/5 to Brian Gregory on Mon Mar 20 14:51:31 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    Brian Gregory <void-invalid-dead-dontuse@email.invalid> wrote:

    On 20/02/2023 20:04, J. J. Lodder wrote:
    Alan Browne <bitbucket@blackhole.com> wrote:

    On 2023-02-20 07:33, J. J. Lodder wrote:
    mechanic <mechanic@example.net> wrote:

    On Sun, 19 Feb 2023 22:56:10 -0000 (UTC), Chris wrote:

    As long as people need to type in passwords they aren't going to
    use long and complicated strings.

    No excuse!

    And long passwords need not be difficult.
    1RoseByAnyOtherNameWillSmellAsSweet!
    will be just fine,

    Good, but insert a few numbers/spec chars in the middle too ... along
    with a misspelled word and caps in the "wrong" places ... and it will be >> as good as random where a dictionary+brute force attack occurs.

    Most sites insist nowadays on at least one digit,
    one capitalised letter, and one special sign.
    My example complies,


    I often seem to manage to pick the one special character that isn't
    allowed! Then the website doesn't tell me what's wrong, it just repeats
    what it already told me, something like "your password must include at
    least 8 characters including one lowercase letter, one uppercase letter,
    one digit, and one special character or punctuation symbol".

    I've found some sites don't accept the question mark,

    Jan

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Commander Kinsey@21:1/5 to J. J. Lodder on Thu Mar 30 13:47:53 2023
    XPost: alt.comp.os.windows-11, alt.computer.workshop, uk.comp.sys.mac

    On Mon, 20 Mar 2023 13:51:31 -0000, J. J. Lodder <nospam@de-ster.demon.nl> wrote:

    Brian Gregory <void-invalid-dead-dontuse@email.invalid> wrote:

    On 20/02/2023 20:04, J. J. Lodder wrote:
    Alan Browne <bitbucket@blackhole.com> wrote:

    On 2023-02-20 07:33, J. J. Lodder wrote:
    mechanic <mechanic@example.net> wrote:

    On Sun, 19 Feb 2023 22:56:10 -0000 (UTC), Chris wrote:

    As long as people need to type in passwords they aren't going to
    use long and complicated strings.

    No excuse!

    And long passwords need not be difficult.
    1RoseByAnyOtherNameWillSmellAsSweet!
    will be just fine,

    Good, but insert a few numbers/spec chars in the middle too ... along
    with a misspelled word and caps in the "wrong" places ... and it will be >> >> as good as random where a dictionary+brute force attack occurs.

    Most sites insist nowadays on at least one digit,
    one capitalised letter, and one special sign.
    My example complies,


    I often seem to manage to pick the one special character that isn't
    allowed! Then the website doesn't tell me what's wrong, it just repeats
    what it already told me, something like "your password must include at
    least 8 characters including one lowercase letter, one uppercase letter,
    one digit, and one special character or punctuation symbol".

    I've found some sites don't accept the question mark,

    I've never had symbols denied. I have had a space in my username denied though.

    To pick a password, I tap the shift key with one hand, while mashing the letters and numbers with the other, so I get something like E^J*4^JHd6u.

    Then when I go to copy and paste it from my text file of passwords, I come back to the website and find a red marker saying I'm an idiot for not entering the password. Either that or I fill in the form in the order I think of things, and it gets very
    upset saying I forgot the other thing, just because I dared to enter my name first. Or I fill everything in, press ok, then it complains the captcha which hadn't loaded yet hadn't been filled in, then it removes the password I entered, so when I fill in
    the captcha, it's still annoyed. Web designers are morons.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)