This responds to article <eb0aecca.03012...@posting.google.com>,
from "TPH" <roger...@earthlink.net> on 28/1/03 6:55 AM:
> Any suggestions, links, or ideas? I have a word document that I can't
> open because I forgot/lost my password. Any insight is appreciated.
--
All Spam and attachments blocked by Microsoft Entourage for Mac OS X. Please
post replies to the newsgroup to maintain the thread.
John McGhie, Microsoft MVP: Word for Macintosh and Word for Windows
Consultant Technical Writer <jo...@mcghie-information.com.au>
+61 4 1209 1410; Sydney, Australia: GMT + 10 hrs
Of course, if you are entirely comfortable giving your credit-card details
to someone who cracks passwords for a living, you can let them try.
Personally, I would make sure they agree not to charge you unless they
succeed, because none of them ever seem to :-)
Cheers
This responds to article <0b9801c2c732$fab2cfb0$8af82ecf@TK2MSFTNGXA03>,
from "tph" <roger...@earthlink.net> on 28/1/03 5:08 PM:
Consultant Technical Writer <jo...@mcghie-information.com.au>
"John McGhie [MVP]" <jo...@mcghie-information.com.au> wrote in message news:<BA5C9F8F.222A4%jo...@mcghie-information.com.au>...
Cheers
This responds to article <eb0aecca.03012...@posting.google.com>,
from "TPH" <roger...@earthlink.net> on 29/1/03 7:52 AM:
Consultant Technical Writer <jo...@mcghie-information.com.au>
--
---------------------------------------------------------------------------
Phillip M. Jones, CET |MEMBER:VPEA (LIFE) ETA-I, NESDA,ISCET, Sterling
616 Liberty Street |Who's Who. PHONE:276-632-5045, FAX:276-632-0868
Martinsville Va |pjo...@kimbanet.com, ICQ11269732, AIM pjonescet
24112-1809
---------------------------------------------------------------------------
If it's "fixed", don't "break it"!
mailto:pjo...@kimbanet.com
<http://www.kimbanet.com/~pjones/default.htm>
<http://home.kimbanet.com/~pjones/birthday/index.htm>
<http://vpea.exis.net>
In the future. How about writing down your password somewhere. <grin>
--
But in Word 98 and above, that's what they would need :-)
Cheers
This responds to article <3E381A54...@kimbanet.com>, from "Phillip M.
Jones, C.E.T." <pjo...@kimbanet.com> on 29/1/03 10:15 AM:
Dear Thomas,
Thank you for your document recovery request which has been successfully
completed.
The original password for your document could not be recovered, so we
decrypted the file instead (which has removed the password).
We attached the file which has been protected with a new password to keep
your
data confidential. You can open the file with the new
password
and resave with your own password if required.
We securely delete all documents after 7 days to protect your privacy, so
please contact me in the meantime should you have any queries or problems.
Thank you very much for choosing Password-find.com, and we look forward to
working with you again in the future.
Regards,
Graeme Woods
www.password-find.com
"Phillip M. Jones, C.E.T." <pjo...@kimbanet.com> wrote in message news:<3E381A0A...@kimbanet.com>...
That's great, but I'm curious about how they did it. Do you remember if the
original password was a word that might have been in the dictionary? And do
you know how long it was; in other words, any chance it had less than five
letters in it?
--
Beth Rosengard
Mac MVP
Mac Word FAQ: <http://www.mvps.org/word/FAQs/WordMac/index.html>
Entourage Help Page: <http://www.entourage.mvps.org>
On 1/30/03 11:33 AM, in article
eb0aecca.03013...@posting.google.com, "TPH"
> THEY DID IT.
Not sure if this is good new or bad news for the rest of us. :-)
Do you think they were able to do it because you had used a relatively
simple and ineffective password? Or, an old/weaker version of Word?
What does this tell us about Word's security?
If one wanted to encrypt a Word file that couldn't be cracked, is that even
doable on the Mac?
I just wish I had a thought or two that were worth protecting! :-)
Doug
--
Doug Brightwell
Replace NOSPAM with Doug
But I would love to know how they decrypted it: I wonder if they used a
binary editor to cut the top off your file and paste in the top of a file to
which they already know the password?
Check that they didn't lose any data in this operation :-)
But thank you for getting back to me: this is the very first time I have
seen one of these companies actually succeed in getting any text out of the
file. Remind me to tell Microsoft it's time to go up from 40-bit to 512-bit
encryption :-)
Cheers
This responds to article <eb0aecca.03013...@posting.google.com>,
from "TPH" <roger...@earthlink.net> on 30/1/03 11:33 AM:
Word's current password encryption is only 40-bit because that's all the old
export laws would allow to be exported from the USA. People who wanted more
use PGP (Look for it on the internet...) which is free and enables you to go
up to 1,024-bit encryption. PGP was made outside the USA, so the export
laws had no effect. Consequently, the US government relaxed the laws. I
believe Word XP now does 128-bit encryption out of the box, and I understand
that there's a move on to add 512-bit tripple-DES encryption for drug
dealers :-)
You're right, I have no thoughts worth that level of protection.
Cheers
This responds to article <BA5EDF69.1E980%NOS...@NOSPAMbrightwell.com>, from
"Doug" <NOS...@NOSPAMbrightwell.com> on 30/1/03 1:55 PM:
--
Even keychain uses 128 bit.
This responds to article <3E3C262A...@kimbanet.com>, from "Phillip M.
Jones, C.E.T." <pjo...@kimbanet.com> on 1/2/03 11:55 AM: