Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 7 years ago.
Improve this question
I have many FTP site and stored it in Site Manager. when I need to retrieve password to my colleague, I can export it and get back the username and password. but now I found the password is encrypted. Can I get back the plain text password from the exported xml? I am using Filezilla 10.10
<User>abc.com</User>
<Pass encoding="base64">ZW1lcjAyMDI</Pass>
I think this is the tool you are looking for: https://www.base64decode.org/
Just fill in your base64 encoded password and it will decode it for you.
The password seems just to be base64 encoded (not instant readable, but it still is the password).
In older fileZilla versions, the password wasn't even encoded, and the passwords were there in plain text, this is a (small) improvement.
Related
Closed. This question is not about programming or software development. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 4 days ago.
Improve this question
I am doing a CTF and I have found a password (0e460290431228528018551933538861) and I presume that this is a sort of Hmac or hash of the real password. So, in order to find the real password I think to use John The ripper. I have installed it on my windows but I really do not know how to use. For example is this password of a known format ? should I provide the file rockyou.txt ? How should I proceed ?
Thank you very much for your time and your help
Installed Kali linux
Closed. This question is not about programming or software development. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 5 months ago.
Improve this question
Hello Guys so today i wanted to completely secure my vServer with a Private Key, i mostly use Tabby.sh for it cause it's pretty modern and has a bunch of Features so yeah. But now i don't know how i can use my private Key. I inserted it in the Authentication Method and also inserted the Password. I use this Auto Authentication Method:
But now when i connect it Says that i should type in the Passphrase which I am making but then when i click OK that Textbox again pops up and when i click in the terminal that textbox dissapears and it sends this message
And this
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 2 years ago.
Improve this question
As I'm using a windows 7.We are configured public ip to access our apache server. After a Remote desktop connection via Anydesk Ended. All the Files in System are encrypted with .deep extension. Every Folder Contains Text files that has id and mrdeep#protonmail.com and bitcoin donate information and also system already has K7 AntiSecurity(Licensed but about to end).But after affected, K7 automatically vanished. Hence can anyone help me to recover those files and also guide me to escape from such viruses in future..
it looks that this is Scarab ransomware new version. Scarab has decryption tool developed by Dr. Web. You should try that, it may work for this .deep extension or just use anti-malware tools, clean everything. Then maybe Data Recovery Pro will help with data decryption. Keep your anti-virus and anti-malware up-to-date so you can avoid this nasty virus. These most commonly come from infected spam email attachments. so clean that box more often and scan your system more frequently. Good luck!
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 4 years ago.
Improve this question
I've set up a TLS server in Go using a custom generated certificate/key pair. Is there an easy way for me to test that the content of my HTTP requests to this server is indeed encrypted when it gets sent out over the network? For my own sanity I'd like to compare and contrast the content of the packets when I use TLS vs normal HTTP.
You can use a sniffer, here are two: Charles Proxy, it has a 30 day free trial period and is easy to use. Or WireShark, it is free and you will hate using it.
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 8 years ago.
Improve this question
What is the point of allowing ssh-keygen to generate empty passphrase keys when it is not recommended to use such keys for remote login? What situations would such keys be useful for?
The passphrase protects the key in its storage on your local computer.
Even without a passphrase, a key is still better than a password, as it can only be "stolen" if someone has physical access to your computer (or at least some kind of network access to the files on your computer), whereas a password can be brute-forced (or leaked from any number of places in case you re-use passwords).