Member Avatar

Hi guys.. Give me Apowersoft screen recorder pro crack pls

Member Avatar
+0 forum 2
Member Avatar

**Hi all fort i would leave a little keygen/passphase maker for anyone that wants one ** Also would like feed back on it maybe someone could help inprove or some ideas to improve plus to get this to work you have to make a file called Data make shore caps D. in the Data file is where the keys generated will go so here it is: #!/usr/bin/python import string import random data = open(r'Data') lines = data.readlines() data.close() data = open(r'Data', 'w') print "Generating random keys from uppercase" print "and lowercase with numbers..." print "Please close terminal with the x …

Member Avatar
+0 forum 5
Member Avatar

I'm trying to find a solution to protect all the software developed in the company I work in. Till now we've been working with hardlocks, but we are trying to cut on expences and wanting to develop our own software protection system. I know that there some free tools, like for instance activelock, but we aren't interested in using third party tools either, since these tools are frequently open to attacks and we might have migration problems in the future. I've been googling and I can't find any good techniques for developing this type of solution. We've seen some ideas …

Member Avatar
+0 forum 1
Member Avatar

An investigation by UKFast has revealed that it is possible to build a super-cracker computer for around the same price as your average low-spec budget desktop PC. Yet unlike your average budget PC, it is claimed that this cybercrime dream machine is capable of processing billions of password combinations per second. Investigators from UKFast built this low budget but high powered password cracker using two readily available graphics cards to provide the firepower necessary to drive the processing of password combos at such an alarmingly fast rate. ![dweb-cracker](/attachments/small/0/dweb-cracker.jpg "align-right") Costing less than £400 ($620) this particular machine was built by …

Member Avatar
+0 forum 9
Member Avatar

Helo every one please tell me anybody where is the save a rar zip file password we download a rar file and it is a password protect we use many softwares but we cannot find his password i think if we use a rar or zip file password then we cannot recover his password another system beacause his setting in another system or save backup in real computer

Member Avatar
+0 forum 10
Member Avatar

The Apple iWork office productivity suite for the Mac has been around for ages, and was recently joined by an iOS version. iWork documents have, up until now, been seen as being pretty safe courtesy of the particular implementation of the 128-bit AES encryption Apple used to secure them. I say up until now as it appears that iWork passwords have been pretty comprehensively broken thanks to the latest in a long line of 'password recovery' applications from Russian outfit Elcomsoft. Of course, truth be told, it has been possible to brute force these iWork document passwords before now but …

Member Avatar
+1 forum 2
Member Avatar

Hello software developers :) I've decided to try and "crack" a (very simple) program I've written myself, just for the sake of it. Here's the code: [CODE] #include <stdio.h> const int serialCode = 255; int guess; int main() { printf("Please enter your serial code: "); scanf("%d", &guess); if(guess == serialCode) { printf("Thank you for CRACKING this software!\n"); return 0; } printf("YOU FAILED!\n"); return 0; } [/CODE] I would like it to be so that once you've submitted your guess, it'll skip the validation and just tell you that you've got it right, right away. This is the disassembly generated by …

Member Avatar
-1 forum 5
Member Avatar

Hi So story goes, Ive recently started hashing user passwords to protect access, but have come to a bit of a problem in that if a user forgets their password, Im unable to retrieve it for them, because all I have is the salted-md5 hash? How has everyone else overcome this problem? lowrks

Member Avatar
+0 forum 4
Member Avatar

According to Russian forensic security experts and 'password recovery' specialists ElcomSoft, the days of protecting documents and files with 40-bit encryption are now officially over. It has now released a product which uses Thunder Tables technology to unlock password-protected documents that have been created using Microsoft Word. In fact, it guarantees that it can provide "near-instant recovery" of any such documents protected with 40-bit encryption. That compares with the days it would have taken using a straightforward brute-force approach. Apparently the secret is the Thunder Tables technology, something that ElcomSoft claims is a result of "scientific research in cryptography" which …

+0 forum 0
Member Avatar

Nick Breese is a researcher with New Zealand based security outfit [URL="http://security-assessment.com/"]Security-Assessment.com[/URL] and found himself giving a presentation at the Kiwicon hacker conference in Wellington earlier this week. His presentation looked at the use of the PlayStation 3 games console to crack passwords, and Breese concluded that when compared to the current best speeds of Intel for the same purpose, the PS3 performed an incredible 100 times faster. According to Breese, eight character strong passwords can be brute force broken in just a couple of days by making the most of the Cell processor in the PS3 whereas before it …

Member Avatar
+0 forum 1
Member Avatar

Everyone was excited about the launch of a new range of iPods, everyone apart from Linux users of course. In its wisdom, [URL="http://www.apple.com"]Apple[/URL] decided to prevent media players other than iTunes from syncing with the MP3 devices, and in so doing locked out Linux users for whom there is no compatible iTunes version. In fairness, Windows users were also screwed over because they had the choice of management application removed entirely. Of course, you would expect the iTunesDB file to change with every iPod release, adding support for video and podcasts and album artwork etc. You wouldn't expect the basic …

Member Avatar
+0 forum 3
Member Avatar

Well, what a weekend that has been. Ever since the reports started emerging online of a brute force attack on the Vista activation code using a modified version of the original software license manager script file I have been, shall we say, dubious as to the authenticity of the claim. Not least because amongst all my contacts in the security research business, on both sides of the industry fence, I failed to find a single one who could verify the crack through their own personal experience. Oh, there have been plenty of reports online of people finding legitimate code keys …

Member Avatar
+0 forum 3

The End.