Linkek a témában:
Document & Zipped File Passwords
Quick and simple way to unlock those Microsoft Word, Zip, or PDF files that you've forgotten the password to. - Version 1.2.0
The HTML Form - Password Input Tag
The type of HTML input tag that we will discuss in this tutorial is the password input tag. The password input tag is very similar to the text input tag that we discussed in the last tutorial. You should read that tutorial before you continue.
How to Bypass BIOS Passwords
BIOS passwords can add an extra layer of security for desktop and laptop computers. They are used to either prevent a user from changing the BIOS settings or to prevent the PC from booting without a password.
Linux/UNIX system password using PHP script
If you just wanted to change your own password or other user passwords use passwd command.
Password Recovery Methods
Sometimes, the password can be recovered instantly. This is only possible if the password protection is very poorly implemented. The example is MS Access. Any password for an MS Access document can be recovered instantly no matter how long it is.
Passwords - securing your online business
As online business owners, our passwords list grows as a great number of the services we access require authentication. We are tempted to use the same password over and over, or to use easy to remember words.... a very unwise practice.
Resetting a forgotten MySQL root password
Resetting the root password of a MySQL database is trivial if you know the current password if you don't it is a little tricker. Thankfully it isn't too difficult to fix, and here we'll show one possible way of doing so.
Setting a BIOS Password
To enter the BIOS setup program, sometimes called CMOS setup:
Turn on or reboot your computer. The screen will display a series of diagnostics and a memory check.
A message like "Hit the <DEL> key to enter the BIOS setup program" will appear.
Cracking Windows passwords with Linux
If you lose a Windows password, or you buy a system that has an OS on it, but you don't know the password, what are you to do? The best thing to do would be to throw in a Linux CD, format the drive, and install the Distro. But, what if you want to boot to the system and see what's on there, and get data off?
Smarter password management
Your dog’s name... your anniversary... your childrens’ initials, birthday, or birth weight... your favorite hobby, or the name of your boat. Which one do you use for your password? Network Administrators and hackers know that most people choose passwords like these to protect anything from logging into web-based bulletin boards to buying things online.