Home > Access Password Geeker > Access Password Geeker Frequently Asked Questions

Access Password Geeker Frequently Asked Questions:

1What is Access Password Geeker?
2What versions of Access does it support?
3What is the system Requirements of Access Password Geeker?
4What is brute-force attack?
5What is brute-force with mask attack?
6What’s "Character Set"?
7 What is "Smart Mutations"?
8What is the "Program Priority"?
9What if I stop recovering the password?
10What's the difference between the trial version and full version?

 

Frequently Asked Questions (FAQ):

1. Q: What is Access Password Geeker?

A: Access Password Geeker is a password recovery software, which can recover lost password for Microsoft Access.

2. Q: What versions of Access does it support?

A: Access Password Geeker supports all versions of Microsoft Access from version 97 to 2010.

3. Q: System Requirements of Access Password Geeker?

A: Supports Windows 8/7/Vista/XP/2012/2008/2003/2000(32-bit or 64-bit); 1 GHz processor (2.4 GHz is recommended); 128 MB of RAM (1 GB is recommended); 4 MB of free hard disk space.

4. Q: What is brute-force attack?

A: This Attack will try all possible character combinations.

5. Q: What is brute-force with mask attack?

A: It is useful when you remember a part of password that you can specify the types of character combinations and the length range of the password.

6. Q: What’s "Character Set"?

A: It is only available to "Brute-force with Mask Attack" which instructs the program what characters have been used in the password and restrict the search area.
a-z, 0-9,A-Z, -_?!@#$... : Defined by the Predefined Passwords Ranges. If the password contains these, check it.
Custom Character Set : You can define your own Character Set for the Brute-Force Attack. Check "Custom Character Set" and enter the Character with your own.
Prefix : If you remember the beginning of the password characters check it and enter the Character.
Suffix : If you remember the end of the password characters check it and enter the Character.

7. Q: What is "Dictionary Attack"?

A: It is an effective attack for you to recover lost password with a default dictionary in the program. The program will try every password in the dictionary. Besides, you can add your own dictionary to the program for saving the recovery time. The dictionary is just a text file with one word at a line; lines are separated with line breaks.

8. Q: What is "Smart Mutations"?

A: Smart Mutations allows you to try combinations among passwords in the dictionary. If you want more character combinations, check "Smart Mutations" and choose a number for "Mutation Count". For example, if you select the dictionary file contains three words(ab,cd,12), then you choose 2 for "Mutation Count" in order to let the program mutate with these three sets, like ab,cd,12,abab,abcd,ab12,cdab,cdcd,cd12,12ab,12cd,1212 ,etc. Select a number in the "Max Password Length" for the possible maximum length of your password.

9. Q: What is the "Program Priority"?

A: Changing Program Priority allows you to control the allocation of processing resources on your computer. By default, all processes are at normal priority.
Idle priority means that this software will not interrupt other programs, so attacks will not decrease the performance of other running applications.
High priority means that this software will use all available system resources. The performance of other applications will degrade but it will work as fast as possible.

10. Q: What if I stop recovering the password?

A: The program will save the recovery process automatically. And it will run again following last time process even if it suddenly suspended.

11. Q: What's the difference between the trial version and full version?

A: All passwords are recovered, but you can only view 3 or less characters of password.