Several encryption software cracking methods

Source: Internet
Author: User

Tell everyone the simplest way to distinguish: Any software that claims to have "lightning encryption", "instant encryption", and "one-second encryption" functions must be pseudo encryption software! What is typical is the high-intensity file encryption master, file encryption super master, etc. Anyone who knows a little bit about computer knowledge knows that even copying files cannot be completed instantly.

There are a lot of pseudo-encryption software, which are common: high-strength file encryption master, Golden Lock file encryption special police, E-drill file encryption master, E-God file encryption, file encryption super master, file lock king, folder protector, folder encryption Supreme, folder diamond lock, Super Rabbit encryption ...... Too many. In addition, these junk "encryption" software are charged, 30 ~ 50, which means money fraud ~.

The following describes the solution:

There are two methods to crack: Use tracing software, and use the doscommand to crack some low-level software,

The simplest way is to use the resource manager to open the computer (which comes with attachments in the Start Menu). You can see many folders similar to 00020c01-0000-0000-c000-0000000000000046, which are called encrypted folders. In addition, there are many auxiliary software, list a few items as needed:

1. directly use WinRAR to browse encrypted folders, so that you can easily see all the contents before encryption.

2. ice blade (IceSword, which can be used to crack folders encrypted by locking the King)

3. total Commander, this software is very cool. It is the terminator of windows resource manager. It can be used to crack E-drill file encryption masters, E-God file encryption, high-strength file encryption masters, and file locking kings, files and folders encrypted by the secret folder of the super agent .)

4. Folder sniffing, which can be detected by almost all pseudo-encryption software ~~

2. Use the CD and dir/a/x commands of the doscommand to see the "encrypted" content of files such as E-drill file encryption masters and high-strength file encryption masters. (Exaggerated? However, most people who are exposed to computers later may not use dos, but it doesn't matter if they can use software to crack it.

Finally, many people think that using such pseudo-software is not dangerous. In fact, there may not be many people who crack it, but the key is that they use some windows skills to achieve "encryption, in your daily use, what other operations have you done? As a result, your "encrypted" file disappears. Isn't it enough to regret it?

If you find that your friends use the software you just mentioned, please kindly advise them, or you can only hear them cry. Currently, PGP and Wolf Dog encryption experts are the real encryption software that uses standard algorithms. The former is powerful but easy to use and the latter is free of charge. You can try it.

  1. Cracking static encryption software
  2. Best way to prevent software cracking through distorted transformation Encryption
  3. Famous hacker cracking Apple's anti-copy encryption software

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.