.dbf file is pwd protected, how to crack?

Posted on 2003-03-09
Medium Priority
Last Modified: 2012-05-04
We have a dbf file a disgruntled employee pwd protected before being fired.
We need to find some kind of shareware app that lets us see the pwd and or edit/remove it.
Any thoughts?

Question by:fr0ntl1n3
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
LVL 33

Expert Comment

ID: 8100570
Typically, a dbf can't be password-protected.  The dbf structure is very wide open and there is no built-in mechanism to password protect it.  There are ways to encrypt outside of the dbf that require a third party app and there are ways to change the header of the dbf just enough where the file can't be read until that byte is changed to one that the program opening up a .dbf will recognize.

Do you get an error message trying to open it?
If so, what is the message?

If it's not an error message, what are the symptoms you see that lead you to your conclusion?

Author Comment

ID: 8104039

Author Comment

ID: 8104047
We are prompted for a password when we try to import into access2000.

we do not know what app created the dbf file.

any help is greatly appreciated
Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

LVL 33

Expert Comment

ID: 8104179
If you haven't already, just assume there is no password and try that.  However, I'm surprised then if it's not asking you for a Login name along with that password.  What good is a password without a login?

If you're starting with Access, you most probably are depending on an ODBC connectivity driver that is loaded on that PC as the method for importing the data.  I really want to say that your ODBC is not setup correctly to import that xBase .dbf file.  (But, I can't see your PC from here. ; )

In Control Panel, check your ODBC setup for .dbf files.  Start with a Visual FoxPro ODBC driver and check its setup.  You might want to create a new setup just for this task that identifies the free table (not a database) folder that tells the driver connection name where to look.

Author Comment

ID: 8104250
Just tried to open in access, asks for a password, I entered nothing and clicked on "enter"
Response was an alert msg (yellow ! in triangle)
that says "could not decrypt file" with an OK and HELP button.

trying the odbc change now, will advise
LVL 33

Expert Comment

ID: 8104301
I was looking for a link to a simple look at how to set that up so I wouldn't re-invent the wheel.  The following one is close, but I believe you're wanting to open a free table and not a .dbc/database file here as this article in generally trying to change you to.

ACC2002: Selecting Visual FoxPro Database in Configure Connection Dialog Box Defaults to Free Table Directory

A .dbf table in native form does not require a login or password.  In fact, that has been one of the many requests in the xBase world to add more security.  There have been various methods of getting security that have all been external to the .dbf itself.

I too am willing to try that file here, if you don't have any real qualms about me looking at it. mailto:Carl@VFUG.Org
LVL 33

Expert Comment

ID: 8104314
Just another possible useful reference:

ACC2002: No Option to Import, Link, or Export to the FoxPro File Type

LVL 17

Expert Comment

ID: 10337090
No comment has been added lately, so it's time to clean up this TA.
I will leave the following recommendation for this question in the Cleanup topic area:

PAQ - no points refunded

Please leave any comments here within the next four days.

EE Cleanup Volunteer

Accepted Solution

PashaMod earned 0 total points
ID: 10364738
PAQed - no points refunded (of 75)

Community Support Moderator

Featured Post

[Webinar] Lessons on Recovering from Petya

Skyport is working hard to help customers recover from recent attacks, like the Petya worm. This work has brought to light some important lessons. New malware attacks like this can take down your entire environment. Learn from others mistakes on how to prevent Petya like worms.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to protecting Oracle Database servers and systems, there are a ton of myths out there. Here are the most common.
Lotus Notes has been used since a very long time as an e-mail client and is very popular because of it's unmatched security. In this article we are going to learn about  RRV Bucket corruption and understand various methods to Fix "RRV Bucket Corrupt…
Video by: Steve
Using examples as well as descriptions, step through each of the common simple join types, explaining differences in syntax, differences in expected outputs and showing how the queries run along with the actual outputs based upon a simple set of dem…
In this video, Percona Solution Engineer Rick Golba discuss how (and why) you implement high availability in a database environment. To discuss how Percona Consulting can help with your design and architecture needs for your database and infrastr…
Suggested Courses

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question