Reset/recover/remove lost or forgotten passwords for Windows, PDF, Office...       
 
Add $12 and get the 21-in-1 Password Recovery Bundle to recover passwords for: Windows, PDF, Word, Excel, Access, PowerPoint, WinRAR/RAR, WinZIP/ZIP...
   Learn More       Buy Now

support@recoverlostpassword.com

Password Recovery Bundle

Windows Password Recovery 6.0

PDF Password Recovery 5.0

Office Password Recovery 5.0

more »»

This is a very good programme. Keep it up.
US Jchebbet
Password Recovery Bundle is easy to install and easier to use. The results are great. I have been using it since two months and did not face any problem so far. I am glad I found it.
Debbie Walsh
General Questions on Trillian Password Recovery 5.0
1. What is Trillian Password Recovery 5.0 and what can it do for me?
2. What Trillian versions does it support?
3. Is it easy to use?
4. Is it fast in password recovering?
5. What OS requirement is it?
6. What is brute-force attack?
7. What is mask? What is brute-force with mask attack?
8. What is dictionary?
9. What is "Smart Mutation"?
10. How to set the "Mutation Count" as I don't even know what's this?
11. Why does the program recommend me to use dictionary attack?
12. I created a dictionary and browsed in the program. Why does the program still use the default dictionary?
13. What is the program priority?
14. What is "Idle"?
15. What is "High"?
16. What if I close the program while the processing is still going on?
17. What's the difference between the demo version and the full version?
18. How to convert the demo version into the full version?
Frequently Asked Questions:

Q: What is RAR Password Recovery 5.0 and what can it do for me?
A: It's a software tool to recover Trillian archive passwords for you to open and extract the files in the archive.

Q: What Trillian versions does it support?
A: It supports all versions of Trillian archives.

Q: Is it easy to use?
A: Yes. Even a new user can fully manipulate in less than a minute.

Q: Is it fast in password recovering?
A: The speed is fast with generally more than 220000 passwords per second.

Q: What OS requirement is it?
A: Pentium II 300 or higher CPU; Windows 2000/NT/XP/2003/Vista; 64MB of RAM.

Q: What is brute-force attack?
A: Brute-force attack can be simply interpreted as to attack the password by testing guesses one by one. Generally speaking, this mode is not as efficient as the other two attacks brute-force with mask attack, and dictionary attack when the password is long and complex.

Q: What is mask? What is brute-force with mask attack?
A: In the field of decryption, mask is a commonly used term refers to the password features you still remember. For example, the possible password length, any digits, letters, special characters like pond, dollar, or asterisk in the password; what is the fist and last characters of the password, etc.

Q: What is dictionary?
A: Dictionary is a text file, which can be simply interpreted as a lib Trillian listing the password elements. The program will just base on this dictionary to detect the password. This dictionary can be the integrated one or the one you provide.

Q: What is "Smart Mutation"?
A: One situation is that you are sure of the characters in the password but do not know for example which letter is capitalized, where is the digit placed, etc. If you want more character combinations, please check "Smart Mutations".

Q: How to set the "Mutation Count" as I don't even know what's this?
>A: Choose a number for "Mutation Count" according to the number of character sets, for example, you are sure of your password is composed with three parts of AB, ab, 123(here AB, ab, 123 is considered as a whole), then you choose 3 for "Mutation Count" in order to let the program mutate with these three sets, like ABab123, ab123AB, 123ABab, etc. Select a number in the "Max Password Length" for the possible maximum length of your password.

Q: Why does the program recommend me to use dictionary attack?
A: Dictionary attack is the most efficient way to recover the password for you. If you can create a dictionary file for the program to base on, then the speed may be even largely accelerated.

Q: I created a dictionary and browsed in the program. Why does the program still use the default dictionary?
A: Empty the default dictionary path will be OK.

Q: What is the program priority?
A: Changing Program Priority allows you to control the allocation of processing resources on your computer. A multi-tasking operating system such as Windows, allows you to run multiple programs simultaneously, but most computers have only one central processor. This means the OS must divide the total amount of work, and the processor must perform between those programs. While each application has a priority that is automatically determined by the OS, the default allocation of resources among running tasks doesn't always provide maximum system productivity. So you may set the program priority for a preferred system productivity.

Q: What is "Idle"?
A: A computer processor is described as Idle when it is not being used by any program. If you choose Idle here, it means the processor will only perform RAR Password Recovery 5.0.

Q: What is "High"?
A: While the computer processor is performing multiple programs simultaneously, if you set RAR Password Recovery 5.0 as High, it indicates the processor will allocate more processing resources to it. This will definitely increase its performance. However, in this case, other programs on the system won't receive an appropriate share of processing resource, which may reduce their performances.

Q: What if I close the program while the processing is still going on?
A: The program will ask you whether to resume the project or not next time you run the program. If you want to resume the project, click "Yes".

Q: What's the difference between the demo version and the full version?
A: Passwords longer than 3 characters can't be recovered.

Q: How to convert the demo version into the full version?

A: Open the demo program, click "Help>Registration" and enter the Serial Number in the box, click "OK".

If you are failed to find the answer you are looking for, please email directly .

 
Privacy  |   Links   |  Site Map   |   News   |   Blog
Copyright @ 2007-2013 SmartKey. All rights Reserved.