Sabtu, 12 Februari 2011

PDF Password

  • Sabtu, 12 Februari 2011
  • Unknown
    • Introduction

    PDF Password Cracker Enterprise edition allows to search for "owner" and "user" passwords with brute-force and dictionary attacks, effectively optimized for speed (however, don’t expect to recover long passwords in a reasonable time with these attacks). In addition, it has Key search attack, which guarantees the decryption (regardless the password length and complexity) of PDF files that use 40-bit encryption (the attack takes about 3-4 days on fast CPU systems).

    The standard security provided by PDF consists of two different methods and two different passwords. Owner Password allows to prevent PDF file from printing, editing (changing), selecting text and graphics (and copying them into the Clipboard), or adding/changing annotations and form fields; User Password locks the file so the password is required to open or view the file. If only owner password is set, decryption is being done instantly; decrypted file can be opened in any PDF viewer (e.g. Adobe Acrobat Reader) without any restrictions, i.e. with edit/copy/print/annotate functions enabled. Alternatively, owner password can be recovered using brute-force or dictionary attacks.

    Additionally, PDF Password Cracker Enterprise supports "key search" attack that allows to decrypt (in a reasonable time) PDF files with 40-bit security regardless the password length, guaranteed.
    • Features

    • Easy to use
    • Drag and drop PDF files
    • Do NOT need Adobe Acrobat software
    • Support Windows 98, ME, NT, 2000, XP, 2003 and Vista Systems
    • Support PDF 1.7 (Acrobat 8.x) files, including 40-bit RC4 decryption, 128-bit RC4 decryption, AES decryption, compressed files and unencrypted metadata
    • Support Adobe Standard 40-bit decryption, Adobe Advanced 128-bit decryption and AES decryption
    • Recovers user password required to open the file
    • Brute-Force, or Dictionary attacks are used to recover the password
    • Additional user dictionaries support, case changes, multiple mistypes and other modifications for each dictionary word
    • Program automatically saves password search state and can resume after a stop or a crash
    • Patterns can be used to minimize search time if any part of the password is known
    • Non-English characters in passwords are supported
    • Remove following options from PDF file: Remove metadata, Remove javascript code, Remove embedded thumbnails, Remove all comments, Remove embedded file, Remove bookmarks, Remove private data, Remove named destination, Remove all form actions, Remove digital signatures, Recompress data streams
    • USE PDF Password Cracker Enterprise software

    Registration Window:
    crackpdf-000
    The demo version of PDF Password Cracker Enterprise is a fully functional product with all features required for testing available. After you are convinced that the program fits your needs, you are strongly encouraged to purchase and register your copy of the software by acquiring a personal unlock key, the demo version is can only decrypt the first half pages of your original PDF file.
    In your evaluate period, you may click “Try” button to try this software.
    Main interface of the software:
    crackpdf-001
    Load: Open PDF file for retrieve password. Decrypt: Decrypt current PDF file. Type of attack: Brute-force: Brute force attack for PDF file. Dictionary: Construct user password from a dictionary file. Key search: Search file key for a 40-bit encryption PDF file, the key length is 40 bits, so the total number of keys is 2^40, or 1,099,511,627,776, the whole recovery process takes about 30 days on PIII-450 computer, and the average is just 15 days. All caps latin (A-Z): ABCDEFGHIJKLMNOPQRSTUVWXYZ All small latin (a-z): abcdefghjiklmnopqrstuvwxyz All digits (0-9): 0123456789 All special symbols (!@...): `~!@#$%^&*()-_=+’|,./<>?;:’"[]{} Space: Space character All printable: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghjiklmnopqrstuvwxyz1234567890 `~!@#$%^&*()-_=+’|,./<>?;:’"[]{} User defined characters: User defined characters for construct passwords Minimal password length: Minimal length for passwords. Maximal password length: Maximal length for passwords. Start from: First password to be tried. End at: Last password to be tried. Dictionary file path: Load a dictionary file for dictionary attack. Try all possible upper/lower case combinations: Construct passwords from dictionary file automatically.
    Remove more security options from PDF:
    crackpdf-002
    Remove metadata Enable this option to strip any XML-based metadata (as opposed to the Summary metadata described in “Metadata”) from the PDF file. Often metadata is inserted for tracking or certification purposes that may no longer be needed in the downsized PDF. An example of such metadata is Adobe XMP. Remove javascript code PDFs may include pieces of the JavaScript programming language in order to enable interactive or intelligent documents and forms. Such elements serve no purpose when printing, and should be removed. These code fragments are also not permitted by international standards such as PDF/X or PDF/A and should be removed there also. Remove embedded thumbnails Since Acrobat 5 and 6, as well as Mac OS X’s Preview application are capable of creating thumbnails on the fly there is no reason to include pre-built thumbnails in the PDF. Enabling this option can therefore save file space without impacting viewers. Remove all comments Remove all comments and annotations from PDF file. Remove embedded file Since a PDF file can be used as a “digital envelope”, it is possible to embed other files directly into a PDF file (much like one might do with a StuffIt or Zip archive). This is quite useful when sending the document to people who can make use of the embedded information, but it certainly wouldn’t serve any purpose when printing a document. Remove bookmarks The hierarchical list of common places to go to in a document is important when viewing the document on screen, but when being printed, such information only serves to waste space and slow down transmission to the RIP and should therefore be removed. Remove private data Many of Adobe’s applications, especially Adobe Photoshop and Adobe Illustrator add application specific information to PDF files. In addition, many third party Acrobat plug-ins can also add private information into PDF files. This information is used by these applications to allow you to fully edit PDF files created by these applications. But once you have completed editing of the document, and certainly before distributing it, it is a good idea to remove such information as it will often reduce the PDF as much as 50 percent. Of course, the PDF file can still be edited with Acrobat and other general PDF editing tools. Remove named destination PDF files can contain a list of named destinations for links, similar to anchors (<a>) in HTML documents. When being printed, such information only serves to waste space and slow down transmission to the RIP and should therefore be removed. Remove all form actions Acrobat Form fields may have commands (called Actions) associated with them that enable Acrobat to initiate functions such as opening other files, submitting or resetting form data, playing movies and more. If you aren’t flattening or removing your form fields, but wish to make your PDF inactive from unexpected behaviors or in preparation for printing, you should enable this checkbox. Remove digital signatures Remove digital signatures from PDF file. Recompress data streams When enabled (the default), PDF Password Cracker Enterprise will recompress the text and line art contained in the PDF document. Often this can lead to 10-15% savings due to more efficient compression methods.
    • How to use the PDF Password Cracker Enterprise product?

    1. Open the PDF Password Cracker Enterprise program by either going to Programs, select PDF Password Cracker Enterprise v3.1 and click PDF Password Cracker Enterprise v3.0. The interface below will display.
    2. Click the "Load" button to locate the file which you would like to remove the passwords, then click the "Open" button.
    3. Click the "Decrypt" button or "Start" button, then PDF Password Cracker Enterprise will test the passwords for your PDF file automatically,
    4. Once PDF Password Cracker Enterprise retrieved the user password, it will popup a Save As dialog, you may save to a normal PDF file directly, all restrictions will be removed from this decrypted PDF file.
    Read more...

    Rabu, 09 Februari 2011

    Diskless Boot Windows

  • Rabu, 09 Februari 2011
  • Unknown
  • CCBoot allows a diskless boot of either Windows XP, Windows 2003, Windows Vista, Windows 7, or Windows 2008 from an iSCSI target machine remotely located over a standard IP network. Diskless boot makes it possible for computers to be operated without a local disk. The diskless computer is connected to a hard drive over a network and boots up an operating system from a remotely located machine. CCBoot is the convergence of the rapidly emerging iSCSI protocol with gPXE diskless boot technology.
    ccboot-show
    CCBoot offers a seamless diskless boot. Eliminating the need for a local hard drive opens a wide range of possibilities for network management. Using this configuration, the disks for many network computers can be centrally managed, thereby facilitating backup, redundancy, and dynamic allocation of valuable storage resources while at the same time reducing cost to the enterprise.
    Booting from iSCSI makes system administration considerably easier. Freeing a server of its boot volume allows administrators to manage investments in their iSCSI SANs, attaining improved data security, integrity and recovery, higher availability, quicker server deployment
    & repurposing, and more efficient utilization of storage resources.

    Benefits

  • Significantly reduce initial capital and implementation costs.


  • Reduce power and cooling requirements.


  • Accelerate deployments, upgrades, and server repurposing.


  • Reduce complexity and risk.


  • Improve critical system availability.


  • Implement enhanced Disaster Recovery solutions.


  • Read more...

    Selasa, 01 Februari 2011

    VMWare ThinApp Enterprise v4.6.0

  • Selasa, 01 Februari 2011
  • Unknown

  • Image

    Run any version of virtually any application on a single operating system without conflicts. You can even run multiple versions of the same application. Plug VMware ThinApp, formerly known as Thinstall, into your existing management infrastructure and accelerate your software development and desktop deployment. Deliver and deploy applications more efficiently, more securely, and more cost-effectively with agentless application virtualization.

    * Package each application with its own DLL file and registry changes to eliminate installation conflicts
    * Execute applications on locked-down PCs in 100% user mode
    * Run applications from any media without needing admin privileges

    Eliminate Installation Conflicts with Application Virtualization

    Application virtualization encapsulates the applications from the OS and each other; eliminating costly regression testing and conflicts from badly behaving applications. Just plug in an .MSI or .EXE file to deploy a virtual system environment, including registry keys, DLLs, third-party libraries, and frameworks without requiring any installation of agents or applications on the underlying operating system.

    Package Once, Deploy Everywhere (Network, USB, Physical or Virtual Desktops)

    Deploy virtualized applications in user mode, without administrative rights. No device drivers are installed and no registry changes are made because the entire application and its virtual OS are delivered as a single EXE file. Transparently stream large applications from a shared network drive with no server or client software to install. Upgrade or roll-back applications while they’re running. The new version will execute the next time the user starts the application.

    Cater to Your Mobile Workforce

    Let your users run applications on virtually any computer they have access to, including kiosk and hotel PCs. They won’t need to install software or device drivers and won’t need admin rights. Applications run directly from portable storage devices, including Flash drives.

    Improve Your Software Distribution Process

    Deliver software that protects the local OS from modifications that might cause instability or breach security using your existing configuration management tools. Even restricted user accounts can safely run virtualized applications without requiring a local installation, making it much more appetizing for IT staff concerned about security.

    Ease OS and Application Migrations

    ThinApp agentless application virtualization eases OS migrations by enabling applications to run side by side on the same operating system. Users can continue with business as usual without disruption from problematic applications. Furthermore, if an application needs to be removed from the endpoint—it is a simple file-remove with no mess left to clean up in the system registry.

    Size: 35.6 MB
    Compress: Rar / Not Crypted
    MD5: ED9D83A39E10C9E9B7B0BBBB2AAD2849
    Scanned: KIS 2011 / Status;Free
    Platform: Windows Xp / Vista / 7
    Read more...