Solved

Novell iFolder data un-encrypted

Posted on 2007-04-11
5
286 Views
Last Modified: 2013-12-05
I am trying out Novell iFolder 3.0 installed on Linux SUSE server. Is there a way to have the information un-encrypted on the linux server.  I want to be able to browse the data on the server rather than seeing the simas lock in the ifolder/data directory.
0
Comment
Question by:Sebree
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
5 Comments
 
LVL 35

Accepted Solution

by:
ShineOn earned 125 total points
ID: 18890482
No.

That's one of the features of iFolder.  It's secure.

I think, however, if you install the iFolder client on the server, you can use that to access the iFolder info.  I could be wrong, but it's worth exploring.
0
 

Author Comment

by:Sebree
ID: 18890642
I guess my main concern is that I want to see the physical files and folders on the linux server.  I want the clients to have to login remotely to sync. and to see the files via. the web browser.
0
 
LVL 35

Expert Comment

by:ShineOn
ID: 18892730
Based purely on what I've seen with iFolder on NetWare 6.0, all you get to see is folders with numbered folder names and files with numbers for names within those numbered folders...  is that what you want to see?
0
 
LVL 34

Expert Comment

by:PsiCop
ID: 18897619
As ShineOn says, security is a very big part of iFolder. No, you can't rummage around user data files, they are deliberately stored in an encrypted form to prevent casual perusal.
0
 

Author Comment

by:Sebree
ID: 18899368
Thanks for the help, I will install the client and access the files that way.
0

Featured Post

Secure Your WordPress Site: 5 Essential Approaches

WordPress is the web's most popular CMS, but its dominance also makes it a target for attackers. Our eBook will show you how to:

Prevent costly exploits of core and plugin vulnerabilities
Repel automated attacks
Lock down your dashboard, secure your code, and protect your users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The purpose of this article is to show how we can create Linux Mint virtual machine using Oracle Virtual Box. To install Linux Mint we have to download the ISO file from its website i.e. http://www.linuxmint.com. Once you open the link you will see …
The purpose of this article is to demonstrate how we can use conditional statements using Python.
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial
Suggested Courses

626 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question