Solved

lcrypt.dll

Posted on 1997-02-25
4
252 Views
Last Modified: 2013-12-29
Does anyone know where does lcrypt.dll come from ?

We have a copy of lcrypt.dll, but we don't know where does
it come from and if we need a license to distribute the dll.

lcrypt.dll has the same function of unix crypt.
0
Comment
Question by:clintc
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 1

Expert Comment

by:wsmith031597
ID: 1679900
If you could get me a copy of it.  I have software that reads the  internal information about DLLs.  It would take about a minute.

wsmith@cts.com
0
 

Author Comment

by:clintc
ID: 1679901
Thanks for the answer, I'll get a hold  of copies of the source code for
doing 'crypt'.  That was a good idea, I didn't think of extracting info out
of a dll.
0
 

Accepted Solution

by:
johnnyt earned 100 total points
ID: 1679902
Not positive but I bet it is a version of Unix Crypt for Linux.   Linux Crypt.  You running Linux?  Remember any utils on Linux are lookalikes of Unix.
0
 

Expert Comment

by:johnnyt
ID: 1679903
Guess that means my theory was correct.  Great.. glad to be of service.  Unix rocks.. but .. is so so so damn cryptic.  It is history. Bill will use Unix for his restroom.. just like he has done with  OS2...
So Sad.. but true.. Gates is the one Orwell wrote about in 1984!!!

BIG BROTHER IS WATCHING...

See ya.. johnnyt
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article helps those who get the 0xc004d307 error when trying to rearm (reset the license) Office 2013 in a Virtual Desktop Infrastructure (VDI) and/or those trying to prep the master image for Microsoft Key Management (KMS) activation. (i.e.- C…
In this post we will be converting StringData saved within a text file into a hash table. This can be further used in a PowerShell script for replacing settings that are dynamic in nature from environment to environment.
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…

695 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question