![]() If this were really important to you, you can create an EC2 spot instance running a Tesla CUDA card, then execute a CUDA-based brute force program on the server. ![]() ![]() your computer could literally be sitting there until the heat death of the universe. If you don't have a CUDA GPU, then up that estimate to a matter of days. If its an easy to guess, dictionary-based password, and you have a CUDA-capable Nvidia GPU, then a brute force could take a matter of hours. In essence, tell your computer to try every possible password that it could be really really fast. The only way to get the password would be to brute force it. This is for your own safety: If it were recoverable, then what's the point of the password in the first place? Doing such would be tantamount to breaking the AES encryption protocol, which is currently impossible. You cannot "recover" the password to an encrypted RAR file.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |