PDA

View Full Version : How to Read/Decode encrypted raw TEMS investigation log files



abbasi
2013-07-08, 12:21 AM
Dear All,
I've been wondering if it is possible to read/decode/parse encrypted TEMS investigation (any version) log files programmatically. Idea is to not utilize fmt or other exported text files from TEMS investigation itself but do this as actix does it i.e. importing raw log files and processing those. A bunch of python scripts exist on the internet claiming to achieve the goal however most need access to a host of TEMS application files including temspy indicating that they are using the TEMS parent application in the background or files such as converter.exe to achieve the desired result. Been wondering how actix is doing this.

The snapshot below shows exactly how TEMS log file looks in raw form (i.e. encrypted) hence unreadable.

33060

PETER1234567
2013-07-14, 02:34 AM
Quuestion is out of Mind Pls explain Clearly

scorpion
2013-07-14, 07:10 PM
Only way is to use Actix/Tems tool..there is no otjher tool can read such file...

mp9413
2013-07-16, 12:13 AM
You can do it in TI 10 or TI 11 with Python. However, ASCOM removed the python support in TI12 and later release.

yaltaf1
2013-07-16, 08:31 PM
So i guess there is no other way but purchase TEMS Tech licence from ASCOM just like Actix, NEMO, Infovista or Gladiator did. Or May be there is a way to deal with the encryption they are using.

You can do it in TI 10 or TI 11 with Python. However, ASCOM removed the python support in TI12 and later release.

cappuccino2013
2013-07-20, 12:56 AM
Please give links to download beacause i 'm a newer.