Solved

GPG command line for decrypting  ZIP files encrypted by PGP

Posted on 2009-04-09
5
889 Views
Last Modified: 2013-12-21
     
Hello,

I am trying to decrypt ZIP Files which have been encrypted using the PGP. I am usign the following command:

"echo" + "passphrase" + "| gpg.exe --passphrase-fd 0 -o \"" +  outputFileNameFullPath + "\" --decrypt \"" + encryptedFile.FullName + "\"";

It works fine for encrypted 'text' o r 'excel' files. But I cannot get it to work for Zip files.

Any help will be greatly appreciated

Thanks


            
      
0
Comment
Question by:Mumbai Indian
  • 2
5 Comments
 
LVL 68

Accepted Solution

by:
woolmilkporc earned 500 total points
ID: 24288008
Hi,

use gpg-zip!

http://www.gnupg.org/documentation/manuals/gnupg/gpg_002dzip.html

-- doesn't work on Windows, thus not included in the Windows version! Which is your platform?

wmp

0
 
LVL 38

Expert Comment

by:younghv
ID: 25333415
gregclough -
This Member has asked two different hacking/cracking questions and then abandoned them.
This should be a 'Delete/No Refund'.
0
 
LVL 68

Expert Comment

by:woolmilkporc
ID: 25333494
younghv,
I can't see any hacking/cracking stuff here.
The question doesn't give any reason to assume that the asker wouldn't have legal access to the appropriate key/passphrase.
gregclough -
I think that my answer # 24288008 is correct as well as conforming to EE rules and should be accepted.
wmp
 
0

Featured Post

The curse of the end user strikes again      

You’ve updated all your end user’s email signatures. Hooray! But guess what? They’re playing around with the HTML, adding stupid taglines and ruining the imagery. Find out how you can save your signatures from end users today.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Backing Up Ipset 9 94
How can I make my laptop run faster? 16 70
Radius Debug Error 16 43
Identify bottom to remote server 2 30
Recently, an awarded photographer, Selina De Maeyer (http://www.selinademaeyer.com/), completed a photo shoot of a beautiful event (http://www.sintjacobantwerpen.be/verslag-en-fotoreportage-van-de-sacramentsprocessie-door-antwerpen#thumbnails) in An…
In this article we have discussed the manual scenarios to recover data from Windows 10 through some backup and recovery tools which are offered by it.
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
A company’s greatest vulnerability is their email. CEO fraud, ransomware and spear phishing attacks are the no1 threat to a company’s security. Cybercrime is responsible for the largest loss of money to companies today with losses projected to r…

939 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

6 Experts available now in Live!

Get 1:1 Help Now