LastBit Software Software

SHA-1 Password is a pa...

SHA-1 Password

SHA-1 Password is a password recovery tool for security professionals, which can be used to recover a password if its SHA-1 hash is known. SHA-1 is an industry standard hash algorithm that is used in many applications to store passwords. SHA-1 Password features fast, highly optimized recovery engine that can recover multiple hashes at once: up to 32,000 hashes in the Pro version. The number of hashes being recovered simultaneously does not have significant performance impact. The recovery engine is fully configurable, so you can adjust the recovery options as needed. Since there is no known way to reverse the SHA-1 algorithm, SHA-1 Password provides a number of tools to recover the password: Brute Force Attack, Dictionary Attack, Hybrid Dictionary Attack, Smart Force Attack. SHA-1 Password supports the distributed recovery technology, which allows you to utilize the power of several computers when performing the recovery process, drastically reducing the recovery time. SHA-1 Password has a feature-rich user interface that allows you to utilize its functionality with maximum efficiency. The export and import feature can be used to export and import hashes to or from text files and the Report feature is used to generate text reports after the recovery process is completed. SHA-1 Password comes in two versions: Standard and Pro. The Standard version can process up to 10 hashes simultaneously and the Pro version has a technical limit of 32,000. There is also a free Demo version that can recover only short passwords (up to 3 characters). security, privacy other demo listed in security, privacy other section.

Keywords: hash sha-1 sha security password recovery recover password sha-1 algorithm secure hash algorithm distributed recovery lost password forgotten password crack break hack password crack password add graphics

Find Password Protecte...

Find Password Protected Documents

Find Password Protected Documents searches for password protected files on your computer. Current version analyzes Word, Excel documents (password to open), Access databases (share level passwords), Outlook PST, OneNote, PowerPoint, MS Money files and Zip archives. Find Password Protected Documents generates HTML and XML reports. If you have our password recovery software installed in your system, you can lunch appropriate password recovery module to recover found documents. The program offers IT professionals the ability to control if password protection is used properly in their company. Find Password Protected Documents could be used for forensic computer examination. Find Password Protected Documents license is shareware and it is listed in security, privacy other software.

Keywords: find password protected password protection encrypted documents harmony assistant

ZipPassword is able to...

ZipPassword

ZipPassword is able to recover lost or forgotten password to pkzip/WinZip archives. Brute-force attack, "smart-force attack" and dictionary search are used to find out the password. ZipPassword features unprecedented search speed: up to 1,000,000,000 that is, up to one billion passwords per minute. As of now, it's the world fastest password recovery program, up to 3 times faster than the best competitors software. security tools password recovery,utilities password recovery,utilities security, encryption,utilities system utilities shareware listed in security tools password recovery,utilities password recovery,utilities security, encryption,utilities system utilities section.

Keywords: zip pkzip winzip password crack cracker message bodies

MD5 Password is a pass...

MD5 Password

MD5 Password is a password recovery tool for security professionals, which can be used to recover a password if its MD5 hash is known. MD5 is an industry standard hash algorithm that is used in many applications to store passwords. MD5 Password features fast, highly optimized recovery engine that can recover multiple hashes at once: up to 32,000 hashes in the Pro version. The number of hashes being recovered simultaneously does not have significant performance impact. The recovery engine is fully configurable, so you can adjust the recovery options as needed.Since there is no known way to reverse the MD5 algorithm, MD5 Password provides a number of tools to recover the password:Brute Force Attack, Dictionary Attack, Hybrid Dictionary Attack, Smart Force Attack. MD5 Password supports the distributed recovery technology, which allows you to utilize the power of several computers when performing the recovery process, drastically reducing the recovery time. MD5 Password has a feature-rich user interface that allows you to utilize its functionality with maximum efficiency. The export and import feature can be used to export and import hashes to or from text files and the Report feature is used to generate text reports after the recovery process is completed. MD5 Password comes in two versions: Standard and Pro. The Standard version can process up to 10 hashes simultaneously and the Pro version has a technical limit of 32,000. There is also a free Demo version that can recover only short passwords (up to 3 characters). This is a demo listed under security, privacy other category.

Keywords: hash md5 security password recovery recover password md5 algorithm distributed recovery lost password forgotten password crack break hack password crack password double speed

RegSnap is a tool that...

RegSnap

RegSnap is a tool that can help you analyze changes made to the Windows Registry. With it, you can compare saved snapshots and learn which keys were modified, deleted, or added. You can also analyze other sensitive system parts, such as a list of files in Windows and Windows System directories, win.ini and system.ini files, and autoexec.bat and config.sys files. RegSnap generates HTML based reports and undo/redo .reg files. utilities shareware listed in utilities section.

Keywords: registry change detector track tracking analyzer system registry takes snapshot system help find analyze changes 3a

Absolute Key Logger is...

Absolute Key Logger

Absolute Key Logger is a small program that records all keystrokes into a log file, so that you can use this data later. You can use Absolute Key Logger to: - restore lost typed text. Computers can suddenly crash, freeze or get accidentally reloaded. Or you can lose your text data while filling out web forms (this happens quite frequently due to sever misconfiguration or bad connection). In any of these or similar cases, you can access log file to restore text data you just typed. Absolute Key Logger employs unique algorithms that prevents losing text data even when unexpected critical system shutdowns happen. - find forgotten passwords and logins (just look through the log file to find what you need) - have full control of your computer. This is a perfect tool to make sure that your kids don't access inappropriate websites or don't chat with strangers. You can also use Absolute Key Logger to make sure that nobody uses your computer in your absence or to see whether your employees are using computers for tasks unrelated to work. Since this software records every single keystroke, there is no way to cheat it. This is a shareware listed under security,system category.

Keywords: key logger keystroke recorder key spy record keystrokes log data later powerpoint project

TrafMeter is a Windows...

TrafMeter

TrafMeter is a Windows-based tool providing realtime traffic accounting and monitoring. You can use it to count useful traffic of your computer (it's free!) or use to build the traffic accounting system for all PCs in your office LAN. It makes easy to count custom IP packets and troubleshooting problems saving your efforts as a network administrator. In TrafMeter, you can set unlimited number of filters for captured traffic, defining network packets which are used for tracking/reporting. It supports a creation of rulesets for various monitoring purposes. The rulesets can be used for single hosts, subnets, as well as specific groups of hosts - i.e. all hosts in/not in your LAN, specific IP protocols (ICMP,TCP,UDP,OSPF,etc). In addition, TrafMeter allows TCP/UDP port filtering. It includes real-time presentation of traffic activity via graphical charts. Each filter is represented by a unique color, which allows the webmaster and/or administrator to easily 'see' the Internet connection usage of individual users. TrafMeter supports a tracking of network packets for the different filters, letting you analyze and comment on the monitored traffic (which may include MAC addresses from Ethernet headers and the ToS field from IP headers). Report generation via XML, or to the more common database (Microsoft SQL Server, Oracle, MySQL) is present as well. This internet software is listed under utilities.

Keywords: ip traffic trafic count counter accounting network monitoring realtime monitor xml reports hue saturation

 

Page 4 out of 6    1 2 3 4 5 6

  Software Search:      

Copyright © 2003-2012 FilesLand.com