Newsgroups: comp.sys.ibm.pc
Path: utzoo!utgpu!news-server.csri.toronto.edu!rpi!zaphod.mps.ohio-state.edu!wuarchive!uunet!odi!ed
From: ed@odi.com (Ed Schwalenberg)
Subject: Re: Any way to recover encrypted .zip?
In-Reply-To: barnett@rex.cs.tulane.edu's message of 5 Jun 91 00:33:28 GMT
Message-ID: <1991Jun5.145446.4414@odi.com>
Organization: Object Design, Inc.
References: <44102@netnews.upenn.edu> <7765@rex.cs.tulane.edu>
Distribution: usa
Date: Wed, 5 Jun 91 14:54:46 GMT

In article <7765@rex.cs.tulane.edu> barnett@rex.cs.tulane.edu (Karey Barnett) writes:
      Assuming only lower-cased letters in the password, then there
      are 26 to exponent of 10 possible passwords...

Great.  That's only 141167095653376 passwords.  Testing one every millisecond
will only take 4,473 years.

      Thus, you have my suggestion, which as I said before, is intense.

Very.
