?
Solved

how to decrypt a "encrypted.asc" file?

Posted on 2014-07-27
4
Medium Priority
?
967 Views
Last Modified: 2016-07-15
I received an email from someone and the file has been encrypted. The file has been encrypted as "encrypted.asc"
Please help me
0
Comment
Question by:Leeex
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 34

Accepted Solution

by:
Michael-Best earned 2000 total points
ID: 40223157
You will need to contact the person that sent the file in order to recieve the decryption method.
0
 
LVL 34

Expert Comment

by:Michael-Best
ID: 41713020
The person that encrypted the file has the decryption key, so I recommend accept
https:#a40223157 as the correct solution.
0

Featured Post

How Blockchain Is Impacting Every Industry

Blockchain expert Alex Tapscott talks to Acronis VP Frank Jablonski about this revolutionary technology and how it's making inroads into other industries and facets of everyday life.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article, you will read about the trends across the human resources departments for the upcoming year. Some of them include improving employee experience, adopting new technologies, using HR software to its full extent, and integrating artifi…
This tutorial shows how to create a greeting card by combining two image layers and a text layer on a PC using a free image editing app.
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question