Home > PDF Password Geeker > PDF Password Geeker Frequently Asked Questions

PDF Password Geeker Frequently Asked Questions:

1 What is PDF Password Geeker?
1 What versions of PDF does it support?
1 What is the system Requirements of PDF Password Geeker?
1 What is brute-force attack?
1 What is brute-force with mask attack?
1 What’s "Character Set"?
1 What is "Dictionary Attack"?
1 What is "Smart Mutations"?
1 What is the "Program Priority"?
1 What if I stop recovering the password?
1 What's the difference between the trial version and full version?

 

Frequently Asked Questions (FAQ):

1: Q: What is PDF Password Geeker?

A: PDF Password Geeker is a powerful password recovery tool to recover User password and remove Owner password for PDF documents.

2. Q: What versions of PDF does it support?

A: PDF Password Geeker support all versions of Adobe Acrobat or other PDF software.

3. Q: What is the system Requirements of PDF Password Geeker?

A: Support Windows 8/7/Vista/XP/2012/2008/2003/2000(32-bit or 64-bit); 1 GHz processor (2.4 GHz is recommended); 128 MB of RAM (1 GB is recommended); 4 MB of free hard disk space.

4. Q: What is brute-force attack?

A: This Attack will try all possible character combinations.

5. Q: What is brute-force with mask attack?

A: It is useful when you remember a part of password that you can specify the types of character combinations and the length range of the password.

6. Q: What’s "Character Set"?

A: It is only available to "Brute-force with Mask Attack" which instructs the program what characters have been used in the password and restrict the search area.
a-z, 0-9,A-Z, -_?!@#$... : Defined by the Predefined Passwords Ranges. If the password contains these, check it.
Custom Character Set : You can define your own Character Set for the Brute-Force Attack. Check "Custom Character Set" and enter the Character with your own.
Prefix : If you remember the beginning of the password characters check it and enter the Character.
Suffix : If you remember the end of the password characters check it and enter the Character.

7. Q: What is "Dictionary Attack"?

A: It is an effective attack for you to recover lost password with a default dictionary in the program. The program will try every password in the dictionary. Besides, you can add your own dictionary to the program for saving the recovery time. The dictionary is just a text file with one word at a line; lines are separated with line breaks.

8. Q: What is "Smart Mutations"?

A: Smart Mutations allows you to try combinations among passwords in the dictionary. If you want more character combinations, check "Smart Mutations" and choose a number for "Mutation Count". For example, if you select the dictionary file contains three words(ab,cd,12), then you choose 2 for "Mutation Count" in order to let the program mutate with these three sets, like ab,cd,12,abab,abcd,ab12,cdab,cdcd,cd12,12ab,12cd,1212 ,etc. Select a number in the "Max Password Length" for the possible maximum length of your password.

9. Q: What is the "Program Priority"?

A:Changing Program Priority allows you to control the allocation of processing resources on your computer. By default, all processes are at normal priority.
Idle priority means that this software will not interrupt other programs, so attacks will not decrease the performance of other running applications.
High priority means that this software will use all available system resources. The performance of other applications will degrade but it will work as fast as possible.

10. Q: What if I stop recovering the password?

A: The program will save the recovery process automatically. And it will run again following last time process even if it suddenly suspended.

11. Q: What's the difference between the trial version and full version?

A: All passwords are recovered, but you can only view 3 or less characters of password.