473,411 Members | 2,164 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,411 software developers and data experts.

Borland application password recovery.

I have an application called "abulafia.exe" with a dll abu.dll. This
program was created in 1991 by Andrew Bulhak with Bitwise
Technology.

I have a file that has been password protected, and I'd like to open
this file, but without the password, it's near impossible for me. I
was hoping somebody could look at this application and see if there's
a way to brute force your way into a password protected file.

Many thanks,

--JP

(ps: anybody interested I can include a link to the d/l of this
application and .dll)

Aug 29 '07 #1
3 1685
te********@gmail.com wrote:
[..]
I have a file that has been password protected, and I'd like to open
this file, but without the password, it's near impossible for me. I
was hoping somebody could look at this application and see if there's
a way to brute force your way into a password protected file.
[..]
I believe you've confused this newsgroup with one with 'hacker' in its
name. Please find the appropriate newsgroups when posting, that's one
of the basic principles of Usenet. Thanks and good luck!

V
--
Please remove capital 'A's when replying by e-mail
I do not respond to top-posted replies, please don't ask
Aug 29 '07 #2
On Aug 29, 10:04 am, "Victor Bazarov" <v.Abaza...@comAcast.netwrote:
techjoh...@gmail.com wrote:
[..]
I have a file that has been password protected, and I'd like to open
this file, but without the password, it's near impossible for me. I
was hoping somebody could look at this application and see if there's
a way to brute force your way into a password protected file.
[..]

I believe you've confused this newsgroup with one with 'hacker' in its
name. Please find the appropriate newsgroups when posting, that's one
of the basic principles of Usenet. Thanks and good luck!

V
--
Please remove capital 'A's when replying by e-mail
I do not respond to top-posted replies, please don't ask
OK. I understand. Although, I realize most good "hackers" are
programmers. I will look at my other options, thanks.
Aug 29 '07 #3

te********@gmail.com <te********@gmail.comwrote in
<11**********************@l22g2000prc.googlegroups .com>:
I have an application called "abulafia.exe" with a dll
abu.dll. This program was created in 1991 by Andrew
Bulhak with Bitwise Technology.
No way! It was written by Jacopo Belbo while working at
Garamond Publishing. But nice try anyway.
I have a file that has been password protected, and I'd
like to open
this file, but without the password, it's near impossible
for me. I was hoping somebody could look at this
application and see if there's a way to brute force your
way into a password protected file.
The password is 'no', of course.

--
This chickenus crossed the roadus while yodelingus.
Aug 30 '07 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

0
by: com | last post by:
MS Access 2000 Password Recoverer 4.2 Screenshot - Soft30.com MS Access 2000 Password Recoverer will display the password to a MS Access database (*.mdb). This program works for MS Access files...
4
by: Ray | last post by:
Does anyone out there have experience with using Db2 8.2 with a program called MISys (also known as ACCPAC). I am having some problems with the application running exteremly slow on workstations...
4
by: clintonG | last post by:
When the password is hashed and most secure this control mails a new password to anybody that provides an authenticated user name. The previous password can no longer be used to login. The newly...
1
by: jobs | last post by:
I'm using asp.net Membership security. Using the Password recovery control, users can reset/recover their passwords. Great. I've grid with all the users. I'd like to add a button so the admin of...
1
by: Me LK | last post by:
Unfortunately I am working on a site that started awhile ago in 1.1 and is just now being finished. This means I don't have all the features of 2.0 like the password controls. I am looking for some...
2
by: whitey | last post by:
Hi All, The following script works when username(or email) and password are in 1 table. what i need to know is how to adjust the code to reflect that the email will be held in tbl_email and the...
1
by: =?Utf-8?B?SHVzYW0=?= | last post by:
Hi : I have the following code that I used it in password recovery: Dim mail As New MailMessage() mail.From = New MailAddress("husam_108@yahoo.com") mail.To.Add("husamalahmadi@hotmail.com")...
1
by: gopi2ks | last post by:
Dear All I am using password recovery control,In this its automatically sending password to mail after configuring smtp,Now I need to restrict the password sending to email and i need to send...
5
by: Jeff | last post by:
hi asp.net 2.0 #1 How do I in the OnSendingMail method get the user email address so I knows where to send the email? #2 What is the code I need to use in the bodyfile for specifying...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.