You are here: hacking technology > encryption decipher > Content
Hot Articles
Recommend Articles
New Articles
The encryption decipher has the good idea
  Add date: 09/02/2008   Publishing date: 09/02/2008   Hits: 148
Total 4 pages, Current page:1, Jump to page:
 

The encryption and the decipher are a permanent hot spot topic, what encryption is safe? How can untie the commonly used password? Whether you already did realize, in you are constantly together every day in the password and the protection, already had too many unsafe factors to puzzle itself? Today, the author will lead everybody to approach to explain together with the world which encrypts, which safe hidden dangers has a look to have to puzzle everybody.

    First, explains has the good idea

    1.BIOS

    BIOS is English " Basic Input Output System " the abbreviation, after translating literally, Chinese name is “the basic input-output system”. Sometimes we for the more comprehensive protective system, frequently the BIOS encryption, this will look like very “the insurance” the way, actually will also have (the BIOS password which the crack this article will discuss to explain only limits table model computer).

    First, we may obtain some universal codes to prepare the future trouble. For instance the Award universal code includes: Wantgirl, Syxz, dirrid, Award, Ebbb, 589589 and so on. The AMI BIOS multi-purpose passwords are AMI, BIOS, PASSWORD, HEWITT RAND. Certainly this is not a good method, because the password which, if we establish has forgotten, also how can remember these complex multi-purpose passwords?

    Also one method, is the Debug order. If the computation function normal guidance (we may with a section of startup disk, only not be able to enter BIOS casually), also said that the machine has established the BIOS revision password. This kind of password establishment is mainly to prevent not to be authorized the user to establish BIOS, but may use under DOS condition Debug to order to eliminate this password manually, the concrete operations are as follows:
 
C:\ >DEBUG 
- 0 70 10 
O 71 01 
Q 

    Or 

C:\ >DEBUG 
- 0 70 2e 
- O 71 00 
O 70 2f 
- O 71 00 
Q 

    After starts the computer, may enter the CMOS revision establishment directly, but no longer inquired the password. 

    2. system password

    Adds a password to the system to be able to guarantee that others have been unable to enter systematically? If you thought like this was completely mistaken. After we choose a model of small tool, less than one minute may explain XP the password.

    First from http://active.zol.com.cn/security/password.rar downloading software, this software must certainly move under DOS, what because needs to eradicate is the system password. Therefore needs to manufacture one beforehand to contain the password.exe document the startup disk, after its homing system moves password.exe. After the movement, chooses the first item to enter from the definition pattern, after 1 carriage return. Then the selective system district, everybody may also according to the capacity determine which is the C plate, after the choice corresponding serial number, carriage return.

 

Other pages: : 1 * 2 * 3 * 4 * Next>>
Prev:Key or symmetrical key encryption technique Next:The PECompact.v1.80.b2 decipher explains in detail

Comment:

Category: Home > encryption decipher