Tip & How-To about Computers & Internet
Every month (if you're lucky), corporate information technology forces you to change your e-mail, network and other log-in passwords.
On top of that, there are numerous websites and accounts that demand passwords for access. A recent survey by RSA Security, a Bedford, Mass., consulting company that advises businesses on security issues, found that one in five business people are juggling more than 15 passwords.
Managing this "password inflation" leads people to get lazy, using easily guessed words or dates and writing them down where they can easily be found. Two-thirds of the respondents to RSA's study said they knew co-workers who kept their passwords on pieces of paper, and 40 per cent have seen passwords on Post-it notes stuck on workstations. The study also found that at some large companies, as many as half of all requests flowing into IT help desks involved forgotten or compromised passwords.
Passwords people choose are, on average, very weak. People are underestimating the level of ingenuity and determination on the part of hackers.
This is very boring when forgot your password, but don't think it trouble.
Once I met the same problem.
And my friend recommand me to free download a software to recovery password for Windows, Excel, Word, Access, PowerPoint, Outlook, Outlook Express, PDF, RAR/WinRAR, ZIP/WinZIP, MSN, AOL, Google Talk, Paltalk, Trillian, Miranda, Opera, Firefox and IE Browser, etc. Over 21 types of passwords can be Recovered instantly. Until now, these password recovery tools are the fastest on the market, the easiest to use and the least expensive...
Called Password Recovery Bundle
Password Recovery Bundle is a multifunctional tool to recovery many kinds of password.
It provides three password attack modes to enhance its performance to crack the password. They are Brute-force attack, Brute-force with Mask attack, and Dictionary attack.
• Brute-force Attack: It means the program will do a full-scale search and try all possibilities randomly in order to get the guess matched with the password and recover it. However, this mode is not as efficient as the other two attacks when the password is long and complex. As the length of the password increases, so does the number of possible passwords, in this way the program will do a lot more times of guess tests, sometimes a dramatically more times than the other two attacks. Obviously, this method is unlikely to be practical unless the password is relatively small and simple.
• Brute-force with Mask Attack: What's Mask? In the field of decryption, mask is a commonly used term refers to the password features you still remember. For example, the possible password length, any digits, letters, special characters like pond, dollar, or asterisk in the password; what is the fist and last characters of the password, etc. You can use this attack if you still remember part of your password. For example, if you still remember your password is 4 characters and begins with "z", then you can define the mask as "z???". Thus reduces the detecting scale for the program, as it will only seek for the last 3 characters instead of 4 characters of the whole. To use this attack, a password mask must be defined.
• Dictionary Attack: This attack is highly recommended as it offers a smarter access to the password recovery. If use properly, it is the fastest when compared with the above two attacks. This attack is intended to seek the possible password based on a dictionary. Then what's a dictionary? Dictionary is a text file, which can be simply interpreted as a library listing the password elements. The program will just base on this dictionary to detect the password. This dictionary can be the integrated one or the one you provide. The integrated dictionary is a text file listing common character combinations, such as a, ab, 123, 4, AB, etc. that people may frequently use for passwords. You can also create a dictionary by listing your character sets that you frequently use to let the program base on when seeking passwords, such as your name, birthplace, birthday, etc. If so, the seeking scope will be largely reduced and it is bound to save time for the process.
Posted by moriniferl... on
Nov 09, 2015 | Cell Phones
May 27, 2011 | Facebook Social Network
Jul 14, 2010 | Yahoo Mail
Mar 30, 2010 | Computers & Internet
145 people viewed this tip
Usually answered in minutes!