CN1700180A - Data file restoration and password cracking system - Google Patents

Data file restoration and password cracking system Download PDF

Info

Publication number
CN1700180A
CN1700180A CN 200510025070 CN200510025070A CN1700180A CN 1700180 A CN1700180 A CN 1700180A CN 200510025070 CN200510025070 CN 200510025070 CN 200510025070 A CN200510025070 A CN 200510025070A CN 1700180 A CN1700180 A CN 1700180A
Authority
CN
China
Prior art keywords
file
impaired
submodule
reparation
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200510025070
Other languages
Chinese (zh)
Inventor
李建华
李生红
李翔
祝佳
付二社
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Jiaotong University
Original Assignee
Shanghai Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Jiaotong University filed Critical Shanghai Jiaotong University
Priority to CN 200510025070 priority Critical patent/CN1700180A/en
Publication of CN1700180A publication Critical patent/CN1700180A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention relates to a data file recovery and password decoding system in the field of information technique. It comprises GUI module, active spoil file recovery module and active confidential file decoding module. Active spoil file recovery module does spoil position and spoiling rate identification and recovering to each type spoil active file; confidential file decoding module quickly decodes active confidential file; GUI module receives user's information and chooses the needed module, the order to decode confidential file; active confidential file decoding module decodes the order of confidential file and transforms the result to GUI module.

Description

Data file is repaired and password cracking system
Technical field
What the present invention relates to is a kind of computer system that is used for areas of information technology, specifically a kind of data file reparation and password cracking system.
Background technology
Along with the develop rapidly of computing machine, the communication technology, information security has become a major issue in current information epoch.At information security field, the information security service is an important service consultation class industry, and the reparation of impaired file is an important content in the information security service field.At this, the file reparation is meant owing to data reason in logic, for operating system visible, and corresponding application can't rationally, correctly be explained, thereby occur such as " file corruption can't be opened " or open the back being situations such as mess code, solve by error correction, the means such as CRC check, the incorrect form of correction that recomputate.Because the user runs into the situation that occurs mess code after some impaired files can not be opened or open through regular meeting, and many times the user is starved of the correct information that obtains in these files, and this just need repair file.With regard to impaired file reparation, though can carry out repaired by hand, as at an impaired file, from its binary data, progressively carry out manual analysis, judgement damaged part and corresponding reparation, but this method need spend a large amount of workloads usually, for this reason, use special impaired file to repair software and repair the important solution instrument that impaired file has become impaired file reparation automatically.Encrypt file cracks an important service that also belongs in the information security service field.In actual environment, application program occurs through regular meeting and at will do not checked for the data file of protecting its particular type a class password code gives encipherment protection to file phenomenon is set.If this class file user do not know or lost the file encryption password, then it is cracked sometimes and be very important.
At the problem that cracks of this class encrypt file, the mode that typically cracks has the Brute Force and the dictionary of Brute Force, band mask to crack three kinds of modes.Brute Force is meant attempts all possible password combination in the scope of appointment, it cracks the general needs cost plenty of time; The Brute Force of band mask is meant and is used in combination known cryptopart and Brute Force password unknown portions under the situation of knowing partial password in advance, it need know partial password in advance, if known to partial password less, also need usually to spend the more time of cracking; Dictionary cracks and is meant and uses the word be stored in the special dictionary file to crack trial, and it is reasonable that it needs the dictionary structure to improve as far as possible, otherwise the possibility that cracks failure is very big.Sometimes, people can use these modes to carry out craft and crack, unless but the cracker knows more relevant information in advance, otherwise will need a large amount of workloads usually.For this reason, under situation with good conditionsi, it also is the important tool that people use that encrypt file cracks automatically.
Find by prior art documents, number of patent application is 03135381.9 and is called " method for recovering computer file ", this technology provides a kind of method for recovering computer file, comprise the scanning deleted file, the file that the needs that scan are recovered, read the internal memory from disk, be kept on the disk again after repairing.It is primarily aimed at the recovery that the file that causes because of reasons such as deletion, viruses is lost, and can not repair because of the reparation after impaired of file content or form.In further retrieval, Shang Weijian reported the sort ofly can not only have decryption but also have the damage repair function to multiple file type.As, WordRecovery only is used to repair OFFICE files such as Word, and Advanced Zip Repairer only is used to repair the ZIP file, and its function is powerful inadequately, and the success ratio that its file is repaired is high not enough.To multiple formatted file have above-mentioned two kinds of functions " soft damage " file repair system, undoubtedly can be for the user provides very big facility, its application prospect is with considerable.
Summary of the invention
The present invention is directed to the deficiencies in the prior art and defective, a kind of data file reparation and password cracking system are provided, make it by having the function of repairing and cracking common WORD, image, compressed file.
The present invention is achieved by the following technical solutions, the present invention includes: GUI module, common impaired file reparation module and common encryption file crack module, the GUI module is the employed graphic user interface of client, can realize that by this interface user and common impaired file are repaired module and the common encryption file cracks the interactive operation of module, and receive the intermediate result and the end product of above-mentioned two modules in the interactive operation process; Common impaired file is repaired module and is made up of two submodules, wherein an impaired file pre-service submodule is responsible for all kinds of impaired common files are carried out impaired location and extent of damage identification, and the impaired file of another piece is repaired submodule and is responsible for impaired file is repaired; Encrypt file cracks module and is responsible for cracking fast the common encryption file.The GUI module at first receives the information that the user sends, on GUI, select the module that to use according to this information, as: repair impaired file and then select common impaired file to repair module, common impaired file is repaired module to impaired file reparation, and the result who obtains will pass to the GUI module; Crack the encrypt file password and then select the common encryption file to crack module, the common encryption file cracks module the encrypt file password is cracked, and the result who obtains will pass to the GUI module.
Impaired file pre-service submodule comprises three parts: impaired compressed file pre-service submodule, damaged image file pre-service submodule and impaired OFFICE file pre-service submodule.Impaired compressed file pre-service submodule is responsible for the pre-service of ZIP formatted file, comprise: the information such as local file header structure, central directory structure and tail of file structure that extract the ZIP file, each byte that extracts each structure is checked analysis, search the reason of makeing mistakes; Damaged image file pre-service submodule is responsible for the pre-service of BMP, GIF and JPG formatted file, mainly comprises: extract BMP, GIF and JPG file layout information, the file layout information that extracts is checked analysis, search the reason of makeing mistakes; Impaired OFFICE file pre-service submodule is at first checked the page structure of impaired word file, recovers the normal page, the page of mis repair.Impaired compressed file pre-service submodule is received the GUI module will carry out pre-service to the ZIP file that will repair after to the reparation order of ZIP file, the result who obtains will pass to the impaired compressed file reparation submodule that impaired file is repaired submodule, so that further file is repaired; Impaired damaged image file pre-service submodule is received the GUI module will carry out pre-service to BMP, GIF and the JPG formatted file that will repair after to the reparation order of BMP, GIF and JPG formatted file, the result who obtains will pass to the impaired damaged image file reparation submodule that impaired file is repaired submodule, so that further file is repaired; Impaired OFFICE file pre-service submodule is received the GUI module will carry out pre-service to the word file that will repair after to the reparation order of word file, the result who obtains will pass to the impaired OFFICE file reparation submodule that impaired file is repaired submodule, so that further file is repaired;
Impaired file is repaired submodule and comprised three parts: impaired compressed file is repaired submodule, submodule repaired by the damaged image file and impaired OFFICE file is repaired submodule.Impaired compressed file is repaired the reparation that submodule is responsible for impaired ZIP file, at impaired ZIP file, on the basis of the form of analyzing the ZIP compressed file and corresponding compression algorithm, by comprehensive utilization replace original decompress(ion) code, in the self-extracting bag, write some necessary filling informations, adjust data in the archives bag length information, based on CRC analyze carry out the damaged part location and carry out corresponding correction, skip can not decompress(ion) methods such as partial document, realize automatic reparation to this class file; The damaged image file is repaired the reparation that submodule is responsible for the damaged image file, to these files by using head or/and the afterbody format information is replaced and adjust the method for some correlation parameters in the above-mentioned information according to concrete file, reach this or/and the automatic reparation of trailer information.By adopt analyzing and, repairing automatically and show not damaged image content by the concrete composition structure of image file and the method for corresponding compression algorithm; Impaired OFFICE file is repaired the reparation that submodule is responsible for impaired word file, this module is carried out the information reparation successively according to each document flow, wherein the reparation of word flow is by searching and judges that the beginning label of main part literal in the Word document extracts the main body literal, and all the other every reparations also are to be undertaken by parsing and reparation to corresponding data stream similarly.After the document flow reparation, and then the information that will repair is reintegrated the compound document that becomes structured storage.Carry out the content reparation of compound text then.After impaired file was repaired submodule and received the information that impaired file pre-service submodule transmits, the file type of repairing selected suitable file to repair submodule as required.Repair the ZIP file, then repair submodule by impaired compressed file and repair, the net result information that obtains will output to the GUI module; Repair BMP, GIF and JPG formatted file, then repair submodule by the damaged image file and repair, the net result information that obtains will output to the GUI module; Repair the WORD formatted file, then repair submodule by impaired OFFICE file and repair, the net result information that obtains will output to the GUI module.
The common encryption file cracks module and comprises: the ciphered compressed file cracks submodule, encryption OFFICE file cracks submodule and encrypted image file cracks submodule.The ciphered compressed file cracks submodule, encryption OFFICE file cracks submodule and encrypted image file cracks submodule respectively at fast automatic the cracking under ZIP, WORD and the image file password encryption, Brute Force, the dictionary of comprehensive utilization Brute Force, band mask such as crack at technology such as intelligence cracks, and realize this goal by designing respectively at the functional module of above-mentioned Miscellaneous Documents.The ciphered compressed file crack submodule receive the GUI module to the ZIP encrypt file crack order after, will crack file password to be cracked, the net result that cracks will output to the GUI module; Encrypted image file crack submodule receive the GUI module to the image encryption file crack order after, will crack file password to be cracked, the net result that cracks will output to the GUI module; Encrypt OFFICE crack submodule receive the GUI module to the WORD encrypt file crack order after, will crack file password to be cracked, the net result that cracks will output to the GUI module.
The invention has the beneficial effects as follows, can effective for repairing because of the file breakage that reasons such as faulty operation, virus cause, have characteristics such as high-level efficiency and high reliability.Cracking fast of common password encryption file is provided simultaneously.
The present invention is for the characteristics of impaired ZIP file reparation:
1, for the reparation of ZIP file, present modal restorative procedure concentrates on the reparation of file layout, does not but generally relate to for the damage in ZIP file data district.But the damage of the data division of ZIP file but is very common, this software is from ZIP file basic format and compression algorithm analysis, at format error and two aspects of error in data of ZIP file, support the decompress(ion) under ZIP file layout and the equal damage situations of data respectively.
2, propose part at the impaired ZIP file in data field and repair algorithm
3, support ZIP compressed file and ZIP self-extracting
4, support big ZIP file
The present invention can repair multiple damaged image file, as: BMP, GIF and JPG formatted file.And repair the success ratio height.The ratio of successfully repairing for impaired BMP file reaches 95.8%, and repairing successful ratio substantially is 2.8%; The ratio of successfully repairing for impaired gif file reaches 83.6%; The ratio of successfully repairing for impaired JPG file reaches 73.6%, repairs the ratio of successfully repairing substantially and reaches 11.2%.The described basic reparation of presents successfully is meant the picture traverse error that calculates between 1~3 pixel, this error is because ruined pixel amount is bigger, causes sampling calculating insufficient causing.
More than 90%, the reparation success ratio of image in the file and formula is near 98% for total reparation success ratio (can recover all or part of text) of the body text of impaired word file in the present invention, and it is 100% that document generates success ratio.The advantage that impaired WORD repairs is following 3 points:
The support of Chinese character.Can repair Chinese text.
Repairing formula, and support that (JPG, GIF PNG) repair for the picture file of multiple form.
Enough regenerate MS Word file, it is very fast totally to repair speed.
Description of drawings
Fig. 1 " soft damage " file repair system functional block diagram
Embodiment
As shown in Figure 1, native system comprises three big modules: module repaired by GUI module, common file and the common encryption file cracks module.The GUI module is repaired the impaired file pre-service submodule of module with common file respectively, impaired file reparation submodule cracks module with the common encryption file and is connected.The impaired compressed file pre-service submodule of impaired file pre-service submodule, damaged image file pre-service submodule and impaired OFFICE file pre-service submodule are repaired submodule with the impaired compressed file of impaired file reparation submodule respectively, submodule repaired by the damaged image file and impaired OFFICE file reparation submodule is connected.The GUI module receives user's command information, and GUI is dissimilar according to user's information, and this information is passed to different modules, if will carry out the file reparation, then this information is passed to impaired file pre-service submodule; If will carry out the encrypt file password cracking, then this information is passed to the common encryption file and crack module.Impaired file pre-service submodule is passed to different impaired file pre-service submodules to this information and file to be repaired according to the information of the different file types of the reparation of receiving.Impaired compressed file pre-service submodule is handled impaired ZIP file; Damaged image file pre-service submodule is handled impaired BMP, GIF and JPG formatted file; Impaired OFFICE file pre-service submodule is handled impaired word file.After impaired file pre-service submodule carries out pre-service to above-mentioned file type, its result will send to corresponding impaired file and repair submodule.Impaired compressed file is repaired the information that submodule receives impaired compressed file pre-service submodule, and impaired ZIP file is finally repaired; The damaged image file is repaired the information that submodule receives damaged image file pre-service submodule, and impaired BMP, GIF and JPG formatted file are finally repaired; Impaired OFFICE file is repaired the information that submodule receives impaired OFFICE file pre-service submodule, and impaired word file is finally repaired; The reparation result that impaired file is repaired submodule will output to the GUI module.The common encryption file crack module receive GUI crack order after, dissimilar according to file to be cracked send to different encrypt files to file to be cracked and crack submodule.The ciphered compressed file cracks submodule and receives ZIP file to be cracked, and it is carried out password cracking, and its result will output to the GUI module; Encrypted image file cracks submodule and receives image file to be cracked, and it is carried out password cracking, and its result will output to the GUI module; Encrypt the OFFICE file and crack submodule reception word file to be cracked, and it is carried out password cracking, its result will output to the GUI module.
GUI of the present invention is the employed graphic user interface of client, can realize that by this interface user and common impaired file are repaired module and the common encryption file cracks the interactive operation of module, and receive the intermediate result and the end product of above-mentioned two modules in the interactive operation process; When using, at first opens native system GUI, select common file reparation module submodule and common encryption file to crack submodule according to user's needs then, repair then select File reparation module submodule if will carry out file, crack then select File reparation module submodule if will carry out file password.The process that following first present document is repaired, and then the process of present document password cracking.
After file repair procedures selected common file to repair the module submodule, the file type of repairing was selected different reparation submodules as required, then selected compressed file to repair submodule as repairing the ZIP file.Need to select the file of reparation then, afterwards, the file of selecting is carried out impaired compressed file pre-service, whether inspection selected file in listed files is damaged, selecting impaired file to repair submodule at last repairs the file of selecting, the result who repairs can show on GUI whether repair the information that successfully waits as file.The repair process of damaged image file and OFFICE file is identical with the repair process of ZIP file.
File password cracks process select the common encryption file to crack submodule after, the file type that cracks is as required selected different password cracking submodules, then selects the ciphered compressed file to crack submodule as cracking the ZIP file password.Select the encrypt file that need crack then, afterwards, the user cracks relevant information according to the crack method setting that oneself will take, and is as shown in the table:
Crack method The relevant information that needs setting
The method of exhaustion The minimum and maximum length of password, the password character set
The method of exhaustion of band mask The minimum and maximum length of password, password character set, mask character or character string
Dictionary method The password dictionary
After all information setting are appropriate, just password cracking can have been begun.The result who cracks can be presented on the GUI, as obtains the information that password or password do not find.

Claims (9)

1, a kind of data file reparation and password cracking system, it is characterized in that, comprise: GUI module, common impaired file reparation module and common encryption file crack module, the GUI module is the employed graphic user interface of client, can realize that by this interface user and common impaired file are repaired module and the common encryption file cracks the interactive operation of module, and receive the intermediate result and the end product of above-mentioned two modules in the interactive operation process; All kinds of impaired common files are carried out impaired location to common impaired file reparation module and the extent of damage is discerned and impaired file is repaired; Encrypt file cracks module and cracks the common encryption file fast, the GUI module at first receives the information that the user sends, on GUI, select the module that to use according to this information, cracking the encrypt file password then selects the common encryption file to crack module, the common encryption file cracks module the encrypt file password is cracked, and the result who obtains will pass to the GUI module.
2, data file reparation according to claim 1 and password cracking system, it is characterized in that, described common impaired file is repaired module and is made up of two submodules, wherein an impaired file pre-service submodule is responsible for all kinds of impaired common files are carried out impaired location and extent of damage identification, and the impaired file of another piece is repaired submodule and is responsible for impaired file is repaired.
3, data file reparation according to claim 2 and password cracking system, it is characterized in that, described impaired file pre-service submodule comprises three parts: impaired compressed file pre-service submodule, damaged image file pre-service submodule and impaired OFFICE file pre-service submodule, described impaired compressed file pre-service submodule, it receives the GUI module will carry out pre-service to the ZIP file that will repair after to the reparation order of ZIP file, the result who obtains will pass to the impaired compressed file reparation submodule that impaired file is repaired submodule, so that further file is repaired; Described impaired damaged image file pre-service submodule is received the GUI module will carry out pre-service to BMP, GIF and the JPG formatted file that will repair after to the reparation order of BMP, GIF and JPG formatted file, the result who obtains will pass to the impaired damaged image file reparation submodule that impaired file is repaired submodule, so that further file is repaired; Described impaired OFFICE file pre-service submodule is received the GUI module will carry out pre-service to the word file that will repair after to the reparation order of word file, the result who obtains will pass to the impaired OFFICE file reparation submodule that impaired file is repaired submodule, so that further file is repaired.
4, data file reparation according to claim 3 and password cracking system, it is characterized in that, described impaired compressed file pre-service submodule is responsible for the pre-service of ZIP formatted file, comprise: the information such as local file header structure, central directory structure and tail of file structure that extract the ZIP file, each byte that extracts each structure is checked analysis, search the reason of makeing mistakes; Described damaged image file pre-service submodule is responsible for the pre-service of BMP, GIF and JPG formatted file, comprising: extract BMP, GIF and JPG file layout information, the file layout information that extracts is checked analysis, search the reason of makeing mistakes; Described impaired OFFICE file pre-service submodule is at first checked the page structure of impaired word file, recovers the normal page, the page of mis repair.
5, data file reparation according to claim 2 and password cracking system, it is characterized in that, described impaired file is repaired submodule and comprised three parts: impaired compressed file is repaired submodule, submodule repaired by the damaged image file and impaired OFFICE file is repaired submodule, after described impaired file is repaired submodule and is received the information that impaired file pre-service submodule transmits, the file type select File of repairing is repaired submodule as required, repair the ZIP file, then repairing submodule by impaired compressed file repairs, the net result information that obtains will output to the GUI module, repair BMP, GIF and JPG formatted file, then repair submodule by the damaged image file and repair, the net result information that obtains will output to the GUI module; Repair the WORD formatted file, then repair submodule by impaired OFFICE file and repair, the net result information that obtains will output to the GUI module.
6, data file reparation according to claim 5 and password cracking system, it is characterized in that, described impaired compressed file is repaired the reparation that submodule is responsible for impaired ZIP file, at impaired ZIP file, on the basis of the form of analyzing the ZIP compressed file and corresponding compression algorithm, replace original decompress(ion) code by comprehensive utilization, in the self-extracting bag, write some necessary filling informations, adjust the length information of data in the archives bag, analyze based on CRC and to carry out the damaged part location and to carry out corresponding correction, skip can not decompress(ion) methods such as partial document, realize automatic reparation to this class file; Described damaged image file is repaired the reparation that submodule is responsible for the damaged image file, to these files by using head or/and the afterbody format information is replaced and adjust the method for some correlation parameters in the above-mentioned information according to concrete file, reach this or/and the automatic reparation of trailer information.By adopt analyzing and, repairing automatically and show not damaged image content by the concrete composition structure of image file and the method for corresponding compression algorithm; Described impaired OFFICE file is repaired the reparation that submodule is responsible for impaired word file, this module is carried out the information reparation successively according to each document flow, wherein the reparation of word flow is by searching and judges that the beginning label of main part literal in the Word document extracts the main body literal, and all the other every reparations also are to be undertaken by parsing and reparation to corresponding data stream similarly.
7, data file reparation according to claim 6 and password cracking system, it is characterized in that described document flow is after its reparation, and then the information that will repair is reintegrated the compound document that becomes structured storage, carries out the content reparation of compound text then.
8, data file reparation according to claim 1 and password cracking system, it is characterized in that described common encryption file cracks module and comprises: the ciphered compressed file cracks submodule, encryption OFFICE file cracks submodule and encrypted image file cracks submodule.The ciphered compressed file cracks submodule, encryption OFFICE file cracks submodule and encrypted image file cracks submodule respectively at fast automatic the cracking under ZIP, WORD and the image file password encryption, Brute Force, the dictionary of comprehensive utilization Brute Force, band mask such as crack at technology such as intelligence cracks, and realize this goal by designing respectively at the functional module of above-mentioned Miscellaneous Documents.
9, data file reparation according to claim 1 and password cracking system, it is characterized in that, described ciphered compressed file crack submodule receive the GUI module to the ZIP encrypt file crack order after, will crack file password to be cracked, the net result that cracks will output to the GUI module; Encrypted image file crack submodule receive the GUI module to the image encryption file crack order after, will crack file password to be cracked, the net result that cracks will output to the GUI module; Encrypt OFFICE crack submodule receive the GUI module to the WORD encrypt file crack order after, will crack file password to be cracked, the net result that cracks will output to the GUI module.
CN 200510025070 2005-04-14 2005-04-14 Data file restoration and password cracking system Pending CN1700180A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200510025070 CN1700180A (en) 2005-04-14 2005-04-14 Data file restoration and password cracking system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200510025070 CN1700180A (en) 2005-04-14 2005-04-14 Data file restoration and password cracking system

Publications (1)

Publication Number Publication Date
CN1700180A true CN1700180A (en) 2005-11-23

Family

ID=35476254

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200510025070 Pending CN1700180A (en) 2005-04-14 2005-04-14 Data file restoration and password cracking system

Country Status (1)

Country Link
CN (1) CN1700180A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102750495A (en) * 2012-06-07 2012-10-24 北京锐安科技有限公司 System for cracking and restoring iPhone encrypted backup files
CN111353183A (en) * 2020-02-27 2020-06-30 广东安创信息科技开发有限公司 Decryption method of encryption equipment
CN112487147A (en) * 2020-12-02 2021-03-12 中国电子科技集团公司第三十研究所 Automatic matching method, system, computer program and storage medium for password cracking algorithm
CN112580037A (en) * 2019-09-30 2021-03-30 奇安信安全技术(珠海)有限公司 Method, device and equipment for repairing virus file data
CN116881035A (en) * 2023-07-20 2023-10-13 上海弘连网络科技有限公司 File repair method, storage medium and electronic device

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102750495A (en) * 2012-06-07 2012-10-24 北京锐安科技有限公司 System for cracking and restoring iPhone encrypted backup files
CN112580037A (en) * 2019-09-30 2021-03-30 奇安信安全技术(珠海)有限公司 Method, device and equipment for repairing virus file data
CN112580037B (en) * 2019-09-30 2023-12-12 奇安信安全技术(珠海)有限公司 Method, device and equipment for repairing virus file data
CN111353183A (en) * 2020-02-27 2020-06-30 广东安创信息科技开发有限公司 Decryption method of encryption equipment
CN112487147A (en) * 2020-12-02 2021-03-12 中国电子科技集团公司第三十研究所 Automatic matching method, system, computer program and storage medium for password cracking algorithm
CN112487147B (en) * 2020-12-02 2023-05-23 中国电子科技集团公司第三十研究所 Automatic matching method, system, computer program and storage medium for password cracking algorithm
CN116881035A (en) * 2023-07-20 2023-10-13 上海弘连网络科技有限公司 File repair method, storage medium and electronic device

Similar Documents

Publication Publication Date Title
CN1700180A (en) Data file restoration and password cracking system
CN106936441B (en) Data compression method and device
CN102937926B (en) Method and device for recovering deleted sqlite files on mobile terminal
CN110460571A (en) Operation system loophole processing method, device, computer equipment and storage medium
Xiang et al. A novel linguistic steganography based on synonym run-length encoding
CN101453478A (en) Integrity checking method in document transmission
CN102045268B (en) A kind of e-mail data restoration methods and device
US9348832B2 (en) Method and device for reassembling a data file
US20180067978A1 (en) Log management method, log management device, and recording medium
CN105677509A (en) Method and apparatus for recovering data in database
CN106851410B (en) Set top box fault repairing method and system
CN102012896A (en) Method and device for realizing bulk editing of file contents
CN106407038A (en) Fragmented file data recovery method
CN105045676A (en) Device and method for recovering lost data based on SQLite database
US8341538B1 (en) Systems and methods for reducing redundancies in quality-assurance reviews of graphical user interfaces
CN111277651B (en) Remote bidding method and system
CN104699823A (en) Method for restoring short messages deleted in cellphone
CN105022677B (en) A kind of USB device usage record restores inspection method
Ravi et al. A method for carving fragmented document and image files
CN103399804A (en) Method and system for repairing remote package files
CN112925676A (en) Method for realizing recovery of distributed database cluster at any time point based on WAL
CN109086202B (en) FPGA/IP core code rule checking method based on association rule
Hilgert et al. Syntactical carving of PNGs and automated generation of reproducible datasets
CN113507625B (en) Self-adaptive video restoration method
CN107392060A (en) A kind of hard disk, duplicator safety detection method, system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication