Got to k0p on the web, http://iti2.net/k0p/k0p-mini.html. I think I got it
there. I am not sure. If I didn't I wil send it to you
> i know that this has probably been
> talked about hundreds of times but
> could someone lead me to a place
> where i can find out how to get
> into a password protected stuffit
> file.
I only thing that I know , forget about using "remove it" it does'nt
work with any of my encrypted stuffit files.
>i know that this has probably been
>talked about hundreds of times but
>could someone lead me to a place
>where i can find out how to get
>into a password protected stuffit
>file.
try remove passwords. available on a web site called the rock quarry
--
Just my .02
mar...@nai.net
nah, there's a program that'll do all that shit for ya. i think its at the
rock quarry
--
-epidemic
-http://www.tiac.net/users/epidemic
I don't know if that's the same program I have, but on my page there's a
program that removes the passwords for you and has worked well for me in
the past. The URL is below, look in the files area.
--
Phreak in peace d00ds...
juli...@tiac.net (Bungalow Bill)
http://www.tiac.net/users/julianne/
Omega BBS - "We're so rad it hurts. Taste our pain."
In other words there is no way to REMOVE the passwords...
There are ways to OBTAIN the password tho...
For instance if you have MacsBug installrd you can
decompile the code of the .sit file by droping to MacsBug
when the passwd dialogue comes up
then just search the code for ?"cmp.l xx, xx"? or "jmp
<adr>"
I THINK that should work
Also MacNosy should do the trick but no one will send it to
me so i can find out...<CAN WE SAY REQUEST BOYS AND GIRLS>
From this you can find the register that the password is in
when it is compared or you can find the refrence to its
location in the code.
The only problem is if the passwd is encrypted...but you
can probably figure out how that is done by hacking around
with DropStuff(tm)
If anyone wants to help me write a progie or template that
opens up the .sit file and displays the passwd e-mail me.
my adress is on here somewhere.
I am curently playing with Stuffit deluxe Stuffit
Expander and DropStuff to figure out how it puts the
encrypted password together to verify it with the one you
type in
If anyone would like to help me by working on this as well
and giveing me any feedback pleze do one person has already
done so and his offer will be greatly repaid if I can get
this to werk
PS MacNosy would help
CableMite
Well, I'm sure you've seen this, but just in case.... I got this ResEdit
patch for someone recently. Think I got it from Whacked Mac... worked for
him.
--
"Life is an illusion, lunchtime doubly so"
-Ford Prefect, THHGG
> Pfhreakazoid (an49...@anon.penet.fi) wrote:
> : Well, I'm sure you've seen this, but just in case.... I got this ResEdit
> : patch for someone recently. Think I got it from Whacked Mac... worked for
> : him.
>
> Not just to Pfhreakazoid:
> Does this work? Have you gotten it to work? If so, I'd like to know about
> it, because I don't think it does!
>
> Please email me if your experience is otherwise. Thanks,
>
> Dave
No this does not work the MKey resource is the least of your problems when
it comes to stuffit archives the password is used in the encryption of the
archive and resides encrypted itself in bothe the Data and Resource fork
it is possible to becrypt the password and then use it to open the archive
but to impliment this I need a DisAssembler such as MacNosy and noone is
being very generous I mean what the hell $300 for a stupid DisAssembler ha
Im not gonna pay that I would rather write my own
BUT if someone does do me the favor it would be much aprecited and
everyone would hopefully benefit
-------------------------------------------------------------
| ____ This Message from the mind of Cable Mite |
| |||||| e-mail only :Cabl...@aol.com (will change) |
| |||||| |
| |||||| "Being afraid of governments is like being afraid |
|-------- of very big gorillas, especially when they are on|
|/|\__/|\ fire" -Bruce Sterling |
| \__/ |
-------------------------------------------------------------