People often wonder about the security of their data as to prohibit access to certain documents and confidential information on your computer. And when transmitting data over the Internet.
Many enjoy the various programs for the prohibition of free access to folders or documents on your computer set passwords on documents using Microsoft Word or Microsoft Excel, etc.. Then, hoping for a miracle that the transfer of documents on the Internet, they no intercept or not zalezet in his computer. But in today's world, everything is very insecure. In his experience, I was convinced that breaking passwords, it is a reality and the majority of programs that provide a guarantee for the security of our data, it is a myth.
And of course many experienced hacking mailboxes and steal from it attached documents or files to the letters.
As I have said that most of the programs we have this protection does not. Guest (crack) password from the word and many other programs can share for the second (with some experience). But for himself, I solved the problem of storing sensitive information. With minimum time and effort. Reading questions to the hacker forums and on their experience, it became clear that the surest way to store data and before sending over the Internet, this backup file (program WinRAR)
Even if you stole, any documents (in zaparolennom archive) is not too bad. If you want pomeret of old age, waiting for the results of the lifting of a password, go here EmeraldSoft - hacking and password recovery. But it is virtually impossible. Especially for RAR.
For ZIP archives, there is such a thing as an attack plain-text. That if you have any file from the archive in uncompressed form. For RAR roll is not only the selection.
The maximum length of the password is supported by WinRAR 64simvola.
As a symbol parolnogo use the following characters:
1) Roman alphabet (upper and lower case) 26 characters, ie 26 +26
2) Cyrillic alphabet (upper and lower case), 33 character, that is 33 +33
3) digit total - 10
4) special characters - 32
and one space ...
We have an extreme option, 161, 64 (a number that horrified a "small") is somewhere 1,7252660092325218160770507415081 e +141.
What remains divided on the speed of your selection and passwords to transfer from a second say in the days, while reasonable in years !!!!!
Thus, you fully protect their data provide storage and transfer. Even in the event of theft criminals will not be able to use them!!
Статьи по теме:
Enabling Windows VistaPotential voltage stabilizers for the protection of the personal computer Downloading multiple operating systems1C Program Office Trade 8Crm, softwareClassification of computers Robot Helps Salamandra Razgadyvat Riddles EvolutionThe new search softwareThe attack at Infinity Gb V2 2 LASER (LED) Plotters How to make the right choice? 1C: Enterprise 7.7. or 8.0Concentrators Ethernet NetGearBasics With VirtualdubTYPES LKSRepair & servicing Windows registryHackers can control a PC without the knowledge of their owners Fraud Cell Phones How to choose the CRM: Develop a short-list CRM systemsAll font - Using Type1 I TruetypeMonitoring computer facts What file compression better?What is the standard CompactPCI?Enabling Windows XPTerms of the need for backup devices METHODS OF PROTECTION FROM COMPUTER VIRUSESLocal bus Split Access databaseTechnology Platform 1C: Enterprise 8 - Areas DevelopmentBlack Banner - 25y frame the Internet Checking Software LicensingTheft of computer dataBus EISA Backing up the blog on Blogspot. Blogger Backup utilityThe reverse side of the coin Spyware Electrostatic Plotters Hide your important documents, a computer in secondsPRINCIPLE OF CONSTRUCTION OF COMPUTER NETWORKSComputer data as an object of criminal assaultPen plotters (PP, PEN PLOTTER)Preventive methods that reduce fatigue while working for a computerNew CCTV: Monitor Smartec STM-193 with a diagonal 19 " The truth of the activation of Windows VistaErgonomic organization of the workplaceHackers, as the subjects of computer crimeNetwork More WinRAR 3.70 RU FinalWhat brings Sp1 For Windows Vista?The development control information tools for PADSLIBCOM-2007: new items of high technology from the company «Alee Software»Restoring files myth or reality?Development and dissemination of computer virusesComponents, Modules, mamboty in CMS JoomlaHold printingDevelopment of Software Development ProjectsSpam and how to cope with it