Saturday, November 2, 2013

im looking for related literature and studies for my thesis about winzip password recovery?

video editing software jar
 on Stitches and Seams: Ren Faire Costume - Is That a Codpiece on Your ...
video editing software jar image



myles





Answer
WinZip is a file archiver and compressor for Microsoft Windows, developed by WinZip Computing (formerly Nico Mak Computing). It natively uses the PKZIP format but also has various levels of support for other archive formats.
WinZip was created in the early 1990s as a shareware GUI front-end for PKZIP. Sometime around 1996 the creators of WinZip incorporated compression code from the Info-ZIP project, thus eliminating the need for the PKZIP executable to be present.
From version 6.0 until version 9.0, registered users could download the newest versions of the software, enter their original registration information, and thereby obtain a free upgrade. As of version 10.0 this upgrade scheme was discontinued.[1] WinZip is available in standard and professional versions.
In May 2006, Corel Corporation, known for its WordPerfect and CorelDRAW product lines, announced that it had completed acquisition of WinZip Computing.[2]
WinZip has a 45-day free evaluation period. However, in some versions it continues to work even after this period of time.
WinZip is a compression program for Microsoft Windows. You use it for .zip files, or to make them.
Creation, addition, extraction from ZIP archives.
Configurable Microsoft Windows Shell integration.
128- and 256-bit key AES encryption.[3] This has replaced the less secure PKZIP 2.0 encryption method used in earlier versions. The implementation, using Brian Gladman's code, was FIPS-197 certified, on March 27, 2003.[4]
Version 9 also implemented a 64-bit version of the PKZIP file format, eliminating both the maximum limit of 65,535 members for single archive and the 4-gibibyte size limit on either the archive and each member file.
Support of the bzip2 and the PPMd compression algorithms, allowing smaller archives at the cost of a potential increase in compression and extraction times (especially when using PPMd).
Decompression of .bz2 and .rar files, and special algorithm for audio files (based on WavPack).
Support for ARC, ARJ, LHA archives if suitable external programs are installed.
Direct write of ZIP archives to CD/DVD
Automation of backup jobs
Integrated FTP upload
Email ZIP archives
WinZip does not support Unicode characters in filenames.[5] [6] Attempting to add these files to an archive results in the error message "Warning: Could not open for reading: ..."

[edit] History
The ZIP file archive format (PKZIP) was originally invented for MS-DOS in 1989 by Phil Katz and his company PKWare[7].
Because PKWare did not protect the name by trademark and algorithm of the process by patent, and was slow to realize that the Windows operating systems would eventually dominate the OS market, WinZip Computing Inc. eventually seized the opportunity and released the WinZip application for Microsoft Windows.
http://www.winzip.com/xregno.htm




(Comparison)
Codecs implementations
MPEG-4 ASP
Video codecs
3ivx · DivX · FFmpeg MPEG-4 · HDX4 · XvidH.264/MPEG-4 AVC

CoreAVC · QuickTime H.264 · x264Lossless

CorePNG · FFV1 · Huffyuv · Lagarith · MSU LosslessOthers

Cinepak · Dirac · Indeo · VP3 · VP7 · Pixlet · Snow · Tarkin · Theora · WMV

Audio codecs
(Comparison)
General

ADPCM · ATRAC · Dolby Digital · Musepack · TwinVQ · Vorbis · WMASpeech/Voice

iLBC · IMBE · iSAC · QCELP · Speex · TruespeechLossless

Apple Lossless · Dolby TrueHD · FLAC · Monkey's Audio · TTA · WavPack · WMA Lossless

Archivers
(Comparison)
Open Source

7-Zip · Ark · File Roller · KGB Archiver · PeaZip · The UnarchiverFreeware

DGCA · FilZip · GCA · IZArc · StuffIt Expander · TUGZip · Zipeg · ZipGenius · WinUHAProprietary

ALZip · BOMArchiveHelper · MacBinary · PowerArchiver · Squeez · StuffIt · WinAce · WinRAR · WinRK · WinZipCommand line

ARC · ARJ · JAR · bzip2 · compress · gzip · Info-ZIP · LHA · lzop · NABOB · PAQ · PKZIP · RAR · SBC · UPX



A password is a form of secret authentication data that is used to control access to a resource. The password is kept secret from those not allowed access, and those wishing to gain access are tested on whether or not they know the password and are granted or denied access accordingly.

The use of passwords goes back to ancient times. Sentries guarding a location would challenge for a password. They would only allow a person in if they knew the password. In modern times, passwords are used to control access to protected computer operating systems, mobile phones, cable TV decoders, automated teller machines (ATMs), etc. A typical computer user may require passwords for many purposes: logging in to computer accounts, retrieving email from servers, accessing files, databases, networks, web sites, and even reading the morning newspaper online.

Despite the name, there is no need for passwords to be actual words; indeed passwords which are not actual words are harder to guess (a desirable property), but are generally harder for users to remember (an undesirable property). Note that password is often used to describe what would be more accurately called a passphrase. Passcode is sometimes taken to imply that the information used is purely numeric, such as the personal identification number (PIN) commonly used for ATM access. Passwords are generally short enough to be memorized.
The rate at which an attacker can submit guessed passwords to the system is a key factor in determining system security. Some systems impose a long time out (several seconds) after a small number (e.g., a maximum of three) of failed password entry attempts. Absent other vulnerabilities, such systems can be secure with relatively simple passwords, if they are not easily guessed. Examples of passwords that are easily guessed include the name of a relative or pet, an automobile license plate number, and such default passwords as admin, 123456, or letmein. [1]

Other systems store or transmit a cryptographic hash of the password in a manner that makes the hash value accessible to an attacker. When this is done, and it is very common (to most observers' surprise or despair), an attacker can work off-line, rapidly testing candidate passwords against the true password's hash value.

Lists of common passwords are widely available and can further speed the process. (See Password cracking.) A sufficiently complex password used in a system with a good hash algorithm can defeat such attacks as the work factor imposed on such an attacker can be made impossible in practice. Passwords that are used to generate cryptographic keys, e.g. for disk encryption or Wi-Fi security, are also subject to high rate guessing. Stronger passwords are needed in such systems
Common techniques used to improve the security of software systems protected by a password include:

not echoing the password on the display screen as it is being entered or obscuring it as it is typed by using asterisks or circular blobs
allowing passwords of adequate length (some Unix systems limited passwords to 8 characters).
requiring users to re-enter their password after a period of inactivity
enforcing a password policy to ensure strong passwords
requiring periodic password changes
assigning passwords at random
providing an alternative to keyboard entry
using encrypted tunnels or password-authenticated key agreement to prevent network attacks on transmitted passwords
Some of the more stringent policy enforcement measures can pose a risk of alienating users, possibly decreasing security.

http://www.wired.com/politics/security/commentary/securitymatters/2006/12/72300
^ http://ancienthistory.about.com/library/bl/bl_text_polybius6.htm
then ry these words in google:
Free online password tools (generation, keeping, testing, archives)
Pronounceable password generator
Password manager written in Java
Password generator, password meter and hasher
Random secure password generator with automatic mnemonic generation
Pick a Safe Password
Password myths and tips
Large collection of statistics about passwords
List of default passwords listed by vendor
Wordlists and articles about Password Security
Security policies can weaken passwords
Password management concerns with internet browsers
More Secure Mnemonic-Passwords: User-Friendly Passwords for Real Humans by Stephan Vladimir Bugaj
The Memorability and Security of Passwords â Some Empirical Results (PDF)
Graphical Passwords: A Survey
Encrypting Passwords with Hashing
Attacking Monoalphabetic Ciphers
The Graphical Passwords Project
PassClicks
PassImages
Links for password-based cryptography
Retrieved from "http://en.wikipedia.org/wiki/Password"
And YA I know I'm long winded.

iTunes video ( i have it in MP4 but wont show up)?




Deniz Hurl


OK i bought the Transformers DVD yesterday thinking that i could watch it on the plane (iPod Touch) i have tommorow i converted it into MP4 but when i add it nothing happens... the add file screen just turns off and im back to square one


Answer
Tagged error, ipod, itunes, mp4, quicktime, vista
iTunes seems to be having a problem with adding new mp4 videos to libary. The problem seems to be with computers running vista generally.

You add the file and nothing happens or shows up after that. When you play the video using Quicktime it shows the âError - 2002: a bad public movie atom was found in the movieâ. The video play perfectly on any other media player with the right codecs.

The problems happens as a collabration of Quicktime, iTunes and Vista (also XP in some cases), how the three of them deal with the ID3 tags in the mp4 file.

So hereâs a workaround that seems to be working for me. If youâre having this same problem and this works for you, please leave a comment so Iâll know that Iâve really solved the generic problem and not just some strange situation on my computer.



Step 1: Grab the Tagger software (main site) (and make sure you have a current JRE installed)

Step 2: After unzipping/untarring the software, double-click on the executable JAR file âtagger.jarâ

Step 3: Use the âFile | Openâ menu option to open the MP4 you are having trouble importing into iTunes.

Step 4: Edit one or more of the tags using the Tagger software and click SAVE. (keep tags short)

Step 5: After Tagger finishes writing the new file with the new tags, add the file to iTunes like you normally would.

tagger alternate links:
FTP2SHARE (5 links)
http://rapidshare.com/files/65793867/TaggerJava6.rar.html
http://depositfiles.com/files/2188522
http://www.megaupload.com/?d=ZM540NAZ
http://www.filefactory.com/file/17faeb/




Powered by Yahoo! Answers

Title Post: im looking for related literature and studies for my thesis about winzip password recovery?
Rating: 97% based on 975 ratings. 4,7 user reviews.
Author: Unknown

Thanks For Coming To My Blog

No comments:

Post a Comment