Home > RAR Password Geeker > RAR Password Geeker Frequently Asked Questions

RAR Password Geeker Frequently Asked Questions:

1What is RAR Password Geeker?
2What versions of RAR does it support?
3What is the system Requirements of RAR Password Geeker?
4What is brute-force attack?
5What is brute-force with mask attack?
6What’s "Character Set"?
7What is "Dictionary Attack"?
8 What is "Smart Mutations"?
9What is the "Program Priority"?
10What if I stop recovering the password?
11What's the difference between the trial version and full version?

 

Frequently Asked Questions (FAQ):

1: Q: What is RAR Password Geeker?

A: RAR Password Geeker is a rar password tool, which can recover lost or forgotten password for RAR archives created by WinRAR, RAR or other archives software.

2. Q: What versions of RAR does it support?

A: RAR Password Geeker support all versions of WinRAR, RAR or other archives software.

3. Q: What is the system Requirements of RAR Password Geeker?

A: Support Windows 8/7/Vista/XP/2012/2008/2003/2000(32-bit or 64-bit); 1 GHz processor (2.4 GHz is recommended); 128 MB of RAM (1 GB is recommended); 4 MB of free hard disk space.

4. Q: What is brute-force attack?

A: This Attack will try all possible character combinations.

5. Q: What is brute-force with mask attack?

A: It is useful when you remember a part of password that you can specify the types of character combinations and the length range of the password.

6. Q: What’s "Character Set"?

A: It is only available to "Brute-force with Mask Attack" which instructs the program what characters have been used in the password and restrict the search area.
a-z, 0-9,A-Z, -_?!@#$... : Defined by the Predefined Passwords Ranges. If the password contains these, check it.
Custom Character Set : You can define your own Character Set for the Brute-Force Attack. Check "Custom Character Set" and enter the Character with your own.
Prefix : If you remember the beginning of the password characters check it and enter the Character.
Suffix : If you remember the end of the password characters check it and enter the Character.

7. Q: What is "Dictionary Attack"?

A: It is an effective attack for you to recover lost password with a default dictionary in the program. The program will try every password in the dictionary. Besides, you can add your own dictionary to the program for saving the recovery time. The dictionary is just a text file with one word at a line; lines are separated with line breaks.

8. Q: What is "Smart Mutations"?

A: Smart Mutations allows you to try combinations among passwords in the dictionary. If you want more character combinations, check "Smart Mutations" and choose a number for "Mutation Count". For example, if you select the dictionary file contains three words(ab,cd,12), then you choose 2 for "Mutation Count" in order to let the program mutate with these three sets, like ab,cd,12,abab,abcd,ab12,cdab,cdcd,cd12,12ab,12cd,1212 ,etc. Select a number in the "Max Password Length" for the possible maximum length of your password.

9. Q: What is the "Program Priority"?

A:Changing Program Priority allows you to control the allocation of processing resources on your computer. By default, all processes are at normal priority.
Idle priority means that this software will not interrupt other programs, so attacks will not decrease the performance of other running applications.
High priority means that this software will use all available system resources. The performance of other applications will degrade but it will work as fast as possible.

10. Q: What if I stop recovering the password?

A: The program will save the recovery process automatically. And it will run again following last time process even if it suddenly suspended.

11. Q: What's the difference between the trial version and full version?

A: All passwords are recovered, but you can only view 3 or less characters of password.