|
Introduces seven kind of floppy disk encryption technology tool | Hits:10 |
TruCrypt, PGP, FreeOTFE, BitLocker, DriveCrypt and 7-Zip, these encryption procedure has provided the exceptionally reliable real-time encryption function, may ensure the data security for you, avoids the data missing, stealing as well... | 2008-07-14 |
Teaches you to explain forcefully encrypts the WinRAR document method | Hits:14 |
When a very important RAR document, because forgot when the password is unable the solution compression, you like this have gotten rid of it? Certainly is not, you may use the RAR document which RAR Password Cracker this soft... | 2008-07-12 |
The Oracle cryptographic document uses and maintains the skill | Hits:11 |
The Oracle relational database system has obtained the widespread application by its remarkable performance, but guaranteed that the database security is the data bank administration work important content. This article in summarizes... | 2008-07-12 |
Wondrous use DEBUG eliminates the CMOS password | Hits:17 |
Turns on the engine case, found on motherboard's battery, separated it with motherboard's connection (is takes down battery), this time CMOS will lose the internal storage because of the power failure all information.... | 2008-07-11 |
Teaches you a few words to let OBLOG deliver the user password little darling | Hits:7 |
Along with networking's gradual development, more and more enterprises had their website platform, propagandizes itself outward through this platform, enables the staff to be possible internally the better exchange technical question and... | 2008-07-11 |
Summarizes some encryption algorithm | Hits:16 |
Before having some are, study explains writes the registration machine-hour to write, some are I rewrite certain brothers' code to come, writes more than many does not advise: {======================================================= ... | 2008-07-10 |
Teaches you to use IAT hook to realize the windows universal code back door | Hits:147 |
No matter is first really has, we may realize a such back door. Introduces in the windows debarkation process simply first some processes. the winlogon advancement gains the user name and the password with gina.dll, passes to the lsass... | 2008-07-10 |
And uses to some ASC detail network horse's explaining | Hits:12 |
In the QQ group, some people are hawking the net horse. The net friend spends obtains a sharing to give me, lets me have a look. Therefore had the following this article. 1. net Ma Chutan Opens the net horse in the browser,... | 2008-07-09 |
The specification explains in technical the violence to explain the principle | Hits:9 |
Cannot not say that studies three stages which explains: Primary, the updated program, with tools and so on ultraedit revises the exe document, calls the violence to explain, abbreviation demolition. Intermediate, pursues... | 2008-07-09 |
Orders with Dos to carry on locks the anti-virus formatted hard disk | Hits:10 |
More and more viral procedures carry on to the computer data destruction, some viral more direct formatting hard disk district. Actually, we may use the poor life to make to prevent the viral procedure to hard... | 2008-07-08 |
Orders with Dos to untie the long-distance NT server user password | Hits:9 |
If knew that a NT account household and the password, may use net use \ \ main engine \ ipcContentnbsp; password /user: user With long-distance main engine establishment connection, this is each hacker perhaps the dream becomes perhaps i... | 2008-07-08 |
|