Crypto question

  • Thread starter Thread starter John
  • Start date Start date
J

John

I have just scanned with F-secure and in the report I found it hadn't opened
some files with the following name:

Folder: "Crypto"
sub folder "RSA"

Should I delete them or do they serve a purpose.

--
 
From: "John" <[email protected]>

| I have just scanned with F-secure and in the report I found it hadn't opened
| some files with the following name:
|
| Folder: "Crypto"
| sub folder "RSA"
|
| Should I delete them or do they serve a purpose.
|

Without posting the fully qualified path, an answer should NOT be given.

Please... Do not delete yet.
 
David H. Lipman said:
From: "John" <[email protected]>

| I have just scanned with F-secure and in the report I found it hadn't
opened
| some files with the following name:
|
| Folder: "Crypto"
| sub folder "RSA"
|
| Should I delete them or do they serve a purpose.
|

Without posting the fully qualified path, an answer should NOT be given.

Please... Do not delete yet.

Examples:

C:\Documents and Settings\Administrator.JOHN-D7FA0F3DD3\Application
Data\Microsoft
C:\Documents and Settings\All Users\Application Data\Microsoft
C:\Documents and Settings\Pam's Computer\Application Data\Microsoft
 
'David H. Lipman' wrote:
| Without posting the fully qualified path, an answer should NOT be given.
|
| Please... Do not delete yet.
_____

Ever feel like a dentist?
And that even after the reply to your post you will have to keep pulling?

Phil Weldon

| From: "John" <[email protected]>
|
|| I have just scanned with F-secure and in the report I found it hadn't
opened
|| some files with the following name:
||
|| Folder: "Crypto"
|| sub folder "RSA"
||
|| Should I delete them or do they serve a purpose.
||
|
| Without posting the fully qualified path, an answer should NOT be given.
|
| Please... Do not delete yet.
|
| --
| Dave
| http://www.claymania.com/removal-trojan-adware.html
| http://www.ik-cs.com/got-a-virus.htm
|
|
 
From: "Phil Weldon" <[email protected]>


| Ever feel like a dentist?
| And that even after the reply to your post you will have to keep pulling?
|
| Phil Weldon
|

Exactly -- pulling teeth !
Grrrrrr :-(
 
From: "John" <[email protected]>


| Examples:
|
| C:\Documents and Settings\Administrator.JOHN-D7FA0F3DD3\Application
| Data\Microsoft
| C:\Documents and Settings\All Users\Application Data\Microsoft
| C:\Documents and Settings\Pam's Computer\Application Data\Microsoft
|

Please post the FULL path ! That's a partial path.
 
David H. Lipman said:
From: "Phil Weldon" <[email protected]>


| Ever feel like a dentist?
| And that even after the reply to your post you will have to keep
pulling?
|
| Phil Weldon
|

Exactly -- pulling teeth !
Grrrrrr :-(

Will this do the job?

C:\Documents and Settings\John\Application
Data\Microsoft\Crypto\RSA\S-1-5-21-790525478-343818398-839522115-1004
 
Phil Weldon said:
'David H. Lipman' wrote:
| Without posting the fully qualified path, an answer should NOT be given.
|
| Please... Do not delete yet.
_____

Ever feel like a dentist?
And that even after the reply to your post you will have to keep pulling?

Phil Weldon

| From: "John" <[email protected]>
|
|| I have just scanned with F-secure and in the report I found it hadn't
opened
|| some files with the following name:
||
|| Folder: "Crypto"
|| sub folder "RSA"
||
|| Should I delete them or do they serve a purpose.
||
|
| Without posting the fully qualified path, an answer should NOT be given.
|
| Please... Do not delete yet.
|
| --
| Dave
| http://www.claymania.com/removal-trojan-adware.html
| http://www.ik-cs.com/got-a-virus.htm
|
|
I respect your wisdom - can you try to respect the fact that some people may
not fully understand the terminology to the extent that you do. Groups such
as this can be very helpful - but this one seems to be populated by some
quite arrogant people who seem to miss a point when responding to questions
and seek help from knowledgeable people.
 
From: "John" <[email protected]>


| Will this do the job?
|
| C:\Documents and Settings\John\Application
| Data\Microsoft\Crypto\RSA\S-1-5-21-790525478-343818398-839522115-1004
|

That's a fully qualified name and path.
Leave these folders alone.
 
'John' wrote:
| I respect your wisdom - can you try to respect the fact that some people
may
| not fully understand the terminology to the extent that you do. Groups
such
| as this can be very helpful - but this one seems to be populated by some
| quite arrogant people who seem to miss a point when responding to
questions
| and seek help from knowledgeable people.


I have read your post several times. It seems that you are upset, but it is
not clear what you are saying.
At least in this thread, no one has remarked on your failure to know a
definition. Certainly no arrogance has been demonstrated in REPLIES to your
posts in this thread.

Consider this way of looking at your posts: You have a technical problem,
and are self centered enough to expect the details to be as obvious to
others as it is to you. This is a common outlook - if one spends much time
answering questions about computer problems, humor beats pulling hair.

Phil Weldon

|
| | > 'David H. Lipman' wrote:
| > | Without posting the fully qualified path, an answer should NOT be
given.
| > |
| > | Please... Do not delete yet.
| > _____
| >
| > Ever feel like a dentist?
| > And that even after the reply to your post you will have to keep
pulling?
| >
| > Phil Weldon
| >
| > | > | From: "John" <[email protected]>
| > |
| > || I have just scanned with F-secure and in the report I found it hadn't
| > opened
| > || some files with the following name:
| > ||
| > || Folder: "Crypto"
| > || sub folder "RSA"
| > ||
| > || Should I delete them or do they serve a purpose.
| > ||
| > |
| > | Without posting the fully qualified path, an answer should NOT be
given.
| > |
| > | Please... Do not delete yet.
| > |
| > | --
| > | Dave
| > | http://www.claymania.com/removal-trojan-adware.html
| > | http://www.ik-cs.com/got-a-virus.htm
| > |
| > |
| >
| >
| I respect your wisdom - can you try to respect the fact that some people
may
| not fully understand the terminology to the extent that you do. Groups
such
| as this can be very helpful - but this one seems to be populated by some
| quite arrogant people who seem to miss a point when responding to
questions
| and seek help from knowledgeable people.
|
|
 
From: "Phil Weldon" <[email protected]>


|
| I have read your post several times. It seems that you are upset, but it is
| not clear what you are saying.
| At least in this thread, no one has remarked on your failure to know a
| definition. Certainly no arrogance has been demonstrated in REPLIES to your
| posts in this thread.
|
| Consider this way of looking at your posts: You have a technical problem,
| and are self centered enough to expect the details to be as obvious to
| others as it is to you. This is a common outlook - if one spends much time
| answering questions about computer problems, humor beats pulling hair.
|
| Phil Weldon
|

And my hair is dwindling... :-)
 
David H. Lipman said:
From: "Phil Weldon" <[email protected]>


|
| I have read your post several times. It seems that you are upset, but
it is
| not clear what you are saying.
| At least in this thread, no one has remarked on your failure to know a
| definition. Certainly no arrogance has been demonstrated in REPLIES to
your
| posts in this thread.
|
| Consider this way of looking at your posts: You have a technical
problem,
| and are self centered enough to expect the details to be as obvious to
| others as it is to you. This is a common outlook - if one spends much
time
| answering questions about computer problems, humor beats pulling hair.
|
| Phil Weldon
|

And my hair is dwindling... :-)
Many thanks - even to the dentist. I will leave alone.
 
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I have just scanned with F-secure and in the report I found it hadn't opened
some files with the following name:

Folder: "Crypto"
sub folder "RSA"

Should I delete them or do they serve a purpose.

My understanding of the files held in these folders is that they are used
to store keys to unlock encrypted data. Windows provides a common method of
encrypting/decrypting data to any programs, called the Data Protection API.

This makes it easier for a program to protect data as the program writer
doesn't have to create their own encryption code. Windows itself and
Internet Explorer use the Data Protection API to encrypt information such
as a user's Windows password.

As other posters have advised, don't do anything with these other than
include them in your backup.

Rather technical description of Data Protection API:
http://msdn.microsoft.com/library/d...-us/dnsecure/html/windataprotection-dpapi.asp

HTH,

Adam Piggott, Proprietor, Proactive Services (Computing).
http://www.proactiveservices.co.uk/

Please replace dot invalid with dot uk to email me.
Apply personally for PGP public key.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (MingW32)

iD4DBQFFWvdG7uRVdtPsXDkRAhWyAJ9Pkmktu/VU02uywm+1yvyAP/hSEQCYzBa1
rhLA+kNPu6oF+mvwE5ihnw==
=VWtu
-----END PGP SIGNATURE-----
 
Back
Top