Соглашение | Публикация статей

Красивые рольшторы - roll-service.by

Protection of information. Passwords At Rar archives
Категория: English version

Very often the storage of valuable information, we resort to various kinds of support programs that specialize in this area. Despite the fact that many of them are very useful, but also have protection against hacking and broad functionality, we rarely use them for two reasons: payment program and its inaccessibility (though recently, in connection with the emergence of free and inexpensive Internet This criterion can be discarded). But why would seek extra problem, because it is easier, faster and more accessible to resort to the services of your faithful comrade, without which, to date, almost no one computer simply can not do.
You certainly have guessed that it was a WinRAR'e. Perhaps now we can move on to the topic of this article.

Password in WinRar can be used to protect content archives created using the program. When using this type of protection, the user identifies himself password encryption algorithm AES-128. Anyone attempting to extract the information content archive, should enter the correct password, code, which was used for encoding. Otherwise, if the user is unable to enter the correct password, content Rar-file will not be recovered.

It is important to remember that in case of loss of the cipher, there is almost no way to retrieve data from the archive. Used method of coding is so strong that even the author utility WinRAR cmozhet not decrypt the file without a password.

There are two ways to password-protect Use of RAR-archives:

1.Ustanovka password by default. The choice of code being implemented to create a file RAR. After you install the password in this way, encoding applies to all files within the archive.

2.Ustanovka password to individual files. Encoding applied directly to the selected files in the archive. And just when you use this method, be possible to set a password for each file separately.

By default passwords encode data stored in individual files. But there is also the option to zashifrovki archive so that the file names and even browse the archive have been hidden from the user, without entering the proper password.

Encoding files using WinRAR - a very effective way to save data in the archives of foreign people and unwanted interventions. But warn, do not lose their passwords, so as to restore them, 99%, you can not.


Статьи по теме:

Data protection. Luxury or means of survival?
IBM sends framework ACTF donated Eclipse
1C Program Office Trade 8
Advantages of Mobile Commerce
Netpromoter: New Opportunities Professional Web statistics
The scheme of the free acceleration of Internet
Microsoft Great Plains to customers in Russia: how to find a consultant and the most frequent questions
Review of Windows Vista
The reverse side of the coin Spyware
Loss of information - whether it can be avoided?
Mikrokontrolleryne System
The Office of visualization
Visual work for the computer and its consequences
Google on the Internet malicious software
Plotters DIRECT IMAGE
Greedy cabinet creators Spyware is testing!
The development control information tools for PADS
Erg-exercises to improve posture
What is the codec and where they can be downloaded
Free Internet Or How to Become a Hacker
All font - Using Type1 I Truetype
Productivity billing system
Repair & servicing Windows registry
Monitoring computer facts
Mobile Commerce, Mobile Commerce System
Learn the truth about your child doing surfing habits
Fraud Cell Phones
Microprocessors used in CompactPCI-systems
Planning in the operating system UNIX
Hackers, as the subjects of computer crime
The processes in the operating system UNIX
Integration modules PADS in the enterprise software environment
Computer data as an object of criminal assault
The situation for the computer
The company Janet Systems Llc Presented Soa-Platform Ijanet Framework Ultra The exhibition «Kitel 2008»
Team-quality design of computer
Split Access database
Proxy Server - This effective way of protecting information as well as a barrier to attack, hackers
Repair permissions for sluggish computer
Geographic Information Systems (GIS) as a means of collecting and analyzing Geodannyh
Editing a sound file
Review of popular programs Backup
Playing audio and video files
VARIETY COMPUTER VIRUSES
Installing Systems Videonablyudeniya In Office
Robot Tartalo knocking at your door
WAYS OF COMPUTER CRIMES
Concentrators Ethernet NetGear
Time to create protection
Areas which use computer systems based on CompactPCI
ISA bus
Protect photos, images and video
Zao «Light Kommunikeyshn» confirm its status «Microsot Gold Certified Partner» In 2008
The world software
Aptitude CompactPCI-products of rapid obsolescence