?
Solved

encrypted csv

Posted on 2012-03-28
2
Medium Priority
?
429 Views
Last Modified: 2012-08-13
I have an encrypted file in csv format..I have no idea what algorithm was used but only that it needs to be decrypted....help....
0
Comment
Question by:shadow2007
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 84

Expert Comment

by:Dave Baldwin
ID: 37778594
You would have to post it for us to help figure out what was done.  There is no generic encryption for CSV.
0
 
LVL 24

Accepted Solution

by:
Eirman earned 2000 total points
ID: 37778679
I presume you have a password !!!

This might help
http://code.google.com/p/hash-identifier/

You might find a clue if you look at the beginning of the file in wordpad

But according to this
http://stackoverflow.com/questions/5163128/i-have-a-encrypted-and-compressed-file-i-need-help-determining-encryption-the-t

Your chances may be zero
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article is written by John Gates, CISSP. Gates, the SNUG President-Elect, currently holds the position of Manager of Information Systems at Lake Park High School in Roselle, Illinois.
Hey fellow admins! This time, I have a little fairy tale for you. As many tales do, it starts boring and then gets pretty gory. I hope you like it. TL;DR: It is about an important security matter, you should read it if you run or administer Windows …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question