From: Douglas Sinclair <dsinclai@acs.ucalgary.ca>
To: karn@qualcomm.com (Phil Karn)
Message Hash: 378d843d65198f28e4453b735e722b7a47b7a0c17f013ee11caf639e6266314d
Message ID: <9306240247.AA16249@acs1.acs.ucalgary.ca>
Reply To: <9306240119.AA00555@servo>
UTC Datetime: 1993-06-24 02:49:00 UTC
Raw Date: Wed, 23 Jun 93 19:49:00 PDT
From: Douglas Sinclair <dsinclai@acs.ucalgary.ca>
Date: Wed, 23 Jun 93 19:49:00 PDT
To: karn@qualcomm.com (Phil Karn)
Subject: crypto pklite
In-Reply-To: <9306240119.AA00555@servo>
Message-ID: <9306240247.AA16249@acs1.acs.ucalgary.ca>
MIME-Version: 1.0
Content-Type: text/plain
I have a friend who wrote a gadget called EXELOCK. It will throw
a password stub into the front of an of an EXE file. Now, I'm sure
it doesn't use encryption but just compares the hash of the password to
a stored value. However, I'm sure an IDEA or DES version could be implemented.
As for compression, no need to re-invent the wheel. Simply run pklite
and then run the new EXELOCK on the result.
I'll contact this person and see if I can lay my hands on the source
code for the gadget.
--
PGP 2.2 Key by finger
Return to June 1993
Return to “karn@qualcomm.com (Phil Karn)”