quote:
Originally posted by Patchou
Note: for those who wonder, I did accept this thread because I have to reason no hide the way the file is internally structured. And for those of you less "geeky", let me make something very clear: eve with this information, you cannot decrypt a log without the proper password.
Though, with this information, it is dead easy now to make brute-force attackers/decrypters.