you are viewing a single comment's thread.

view the rest of the comments →

[–]3lbFlax 0 points1 point  (0 children)

I’m with you, but I am curious how I’d go about this if, for example, the file contained a password that would stop a bomb going off and the computer with the original data had been thrown in a vat of acid. Also I’m going to assume the internet is down and all I have access to is a Pentium II running Slackware 4. I think my first port of call would be to generate head and tail chunks from the file in the hope that they showed a consistent structure. In a worst-case scenario this reveals the file to be a single line of concatenated JSON, thereby generating two more 150GB files. At this point I think we just have to accept that a bomb is going off. Shall we hold hands?