Key features and uniqueness:
The masks of the control panel, you can see a list of variables with the data, as well as not a small list
features for adjusting them.
You create a mask on your discretion, they are the basis and will depend on the effectiveness of established base.
After this use is not a tricky technique using neural networks, what does it mean -
program can educate themselves and to continue offering you the use of the most popular and most commonly used masks which has been set
a particular password.
In short the program is to parse MOORE mails, as well as data found on them, and generates the corresponding passwords are trained masks.
Also there is a utility parsing mails and information about them (date of birth, name and surname), everything is automated as much as possible
from the user is only required to specify the search criteria (age, country, city and gender) unless you need it and upload
several dozen all valid mails mail.ru ideally, but if this problem can be used up to one address, it will affect only
at the time of collecting mail. The more loaded the faster the program will rob the mails.
The proxy software does not actually need it, they can not use, but for the convenience and functionality of a proxy has been added to the panel
with support for all proxy types, auto-update timeout, and avtochekerom grabber here.
Optionally, the user can set which log files will be saved in the project folder, the settings are only 3 types:
mail: Pass login: pass, Email: Pass: Mask.
With regard to the protection program, nothing nebylo sverhestestvennogo invented, but a key part of the software has been fully transferred to the server,
then I think no need to explain the meaning.
The program is actively updated and will be maintained in connection with a special urgency.
Перекладач
Вимкнути миттєвий переклад
5000/5000
Osnovnoy funktsional:
+Parsing pocht i dop. dannykh o nikh.
+Generatsiya intelektual'ny paroley po maskam.
+Menedzher razrabotki i upravleniye maskami.
+Ispol'zuyetsya sovremennaya tekhnologiya neyronnoy seti dlya samoobucheniya programmy i opredeleniya luchshikh masok paroley.
+Gibkiye nastroyki programmy.
+Sokhraneniye rezul'tata v neskol'kikh formatakh.
+Avtomaticheskoye sokhraneniye primenyayemykh nastroyek.
+Mnogopotochnaya i shustraya rabota.
+Rabotayet bez pereboyev i bez ispol'zovaniya proksi.
+Tesnaya rabota s serverom chto garantiruyet zashchishchennost' po(klyuchevoy funktsional vypolnyayetsya serverom pri etom ne ogranichevaya soft v skorosti).
+Podderzhka vsekh vidov proksi(vdrug ponadobyatsya).
+Mozhno sozdat' prakticheski neogranichennoye kol-vo masok, vso zavisit tol'ko ot vas.
Kusochek rezul'tata(maski sozdany na skoruyu ruku za paru minut)
The main features:
+ Post and additional parsing. data on them.
+ Generation of Intelligent passwords by masks.
+ Development Manager and masks control.
+ Use the modern technology of neural networks for self-study program and determine the best password masks.
+ Flexible application settings.
+ Save results in several formats.
+ Automatic saving of applied settings.
+ Multi-threaded and nimble work.
+ Works without interruption and without the use of a proxy.
+ Close work with a server that guarantees protection for (the key server functionality is performed with any requirements for software in speed).
+ Support for all types of proxy (suddenly needed).
+ You can create a virtually unlimited number of masks, everything depends on you.
A piece of the result (a mask designed to whip up a couple of minutes):
I use a mask:
[SPOILER @
ogin @
@
@
@
@
@
ogin @
@
ogin+@dd @
ogin+@mm+@dd @
ogin+@dd+@mm @
ogin+@mm+@dd @
@mm+@dd @
@
@
@
+@dd @
@
@
@
tolower @
) @
tolower @
)+@mmtolower @
)+@ddtolower @
)+@mm+@ddtolower @
@
) @
tolower @
@
)+@ddtolower @
@
)+@mmtoupper @
ogin)toupper @
ogin) @
toupper @
ogin)+@ddtoupper @
ogin)+@mmtoupper @
ogin) @
+@ddtoupper @
ogin) @
+@mmtolower @
ogin)tolower @
ogin)+ddtolower @
ogin) @
@
toupper @
ogin) @
@
toupper @
@
)toupper @
@
) @
toupper @
@
)+@ddtoupper @
@
)+@mmtoupper @
@
)+@dd+@mmtoupper @
@
)+@dd+@mm @
@dd+@mm @

rem_specsymbols(tolower @
))rem_specsymbols(tolower @
))rem_specsymbols(tolower @
)) @
rem_specsymbols(tolower @
))+@mm+@ddrem_specsymbols(tolower @
))+rem_chars @
ogin)[/SPOILER]
The description and the name of the variable (which is a little, but soon will be added at least another half variables
with useful information passes):
[quote @
ogin => Login of email to '@' @
=> Surname @
=> Lastname@mm => Birthday month
@dd => Birthday day @
=> Birthday year[/quote]Functions with which you can create your unique mask (example I mentioned just above):
License price for 1 pc -Quote:
reverse(@variableName) - Reverses the order of characters variable
simbtoupper(0,@variableName) - Convert characters to lowercase and the symbol with the specified index to uppercase
tolower(@variableName) - Convert variable to lowercase
toupper(@variableName) - Convert variable to uppercase
rem_specsymb(@variableName) - Remove special symbols from variable
rem_chars(@variableName) - Remove characters from variable
rem_digits(@variableName) - Remove digits from variable
rem_fromend(1,@variableName) - Remove a specified count of characters with the end of the variable
rem_aftersymb(*,@variableName) - Remove all characters from variable after said symbol
rem_beforesymb(*,@variableName) - Remove all characters from variable before said symbol
rem_afterindex(1,@variableName) - Remove all characters from the variable after said index
rem_beforeindex(1,@variableName) - Remove all characters from the variable before said index
Change pc lic -
Skype: yocki.yocki
Jabber:

Mail:

We are glad to give to check online in advance.






