|1||What is ZIP Password Geeker?|
|2||What versions of WinZIP/ZIP does it support?|
|3||What is the system Requirements of ZIP Password Geeker?|
|4||What is brute-force attack?|
|5||What is brute-force with mask attack?|
|6||What’s "Character Set"?|
|7||What is "Dictionary Attack"?|
|8||What is "Smart Mutations"?|
|9||What is the "Program Priority"?|
|10||What if I stop recovering the password?|
|11||What's the difference between the trial version and full version?|
A: ZIP Password Geeker is a powerful password recovery tool which can help you recover lost or forgotten password for ZIP/WinZip/7Zip archives.
A: It supports all versions of ZIP, WinZip, 7Zip archives.
A: Support Windows 8/7/Vista/XP/2012/2008/2003/2000(32-bit or 64-bit); 1 GHz processor (2.4 GHz is recommended); 128 MB of RAM (1 GB is recommended); 4 MB of free hard disk space.
A: This Attack will try all possible character combinations.
A: It is useful when you remember a part of password that you can specify the types of character combinations and the length range of the password.
A: It is only available to "Brute-force with Mask Attack" which instructs the program what characters have been used in the password and restrict the search area.
a-z, 0-9,A-Z, -_?!@#$... : Defined by the Predefined Passwords Ranges. If the password contains these, check it.
Custom Character Set : You can define your own Character Set for the Brute-Force Attack. Check "Custom Character Set" and enter the Character with your own.
Prefix : If you remember the beginning of the password characters check it and enter the Character.
Suffix : If you remember the end of the password characters check it and enter the Character.
A: It is an effective attack for you to recover lost password with a default dictionary in the program. The program will try every password in the dictionary. Besides, you can add your own dictionary to the program for saving the recovery time. The dictionary is just a text file with one word at a line; lines are separated with line breaks.
A: Smart Mutations allows you to try combinations among passwords in the dictionary. If you want more character combinations, check "Smart Mutations" and choose a number for "Mutation Count". For example, if you select the dictionary file contains three words(ab,cd,12), then you choose 2 for "Mutation Count" in order to let the program mutate with these three sets, like ab,cd,12,abab,abcd,ab12,cdab,cdcd,cd12,12ab,12cd,1212 ,etc. Select a number in the "Max Password Length" for the possible maximum length of your password.
A:Changing Program Priority allows you to control the allocation of processing resources on your computer. By default, all processes are at normal priority.
Idle priority means that this software will not interrupt other programs, so attacks will not decrease the performance of other running applications.
High priority means that this software will use all available system resources. The performance of other applications will degrade but it will work as fast as possible.
A: The program will save the recovery process automatically. And it will run again following last time process even if it suddenly suspended.
A: All passwords are recovered, but you can only view 3 or less characters of password.