Program Type: Shareware
Release date: 2015-04-20
All-in-one analysis, unprotection and data recovery for MS Access 2000-2016 (.mdb, .mdw, .mde, .mda, .accdb, .accde, .accda). Open protected database -> analyse database content and structure -> recover deleted tables, records (rows) and columns.
Recover / Remove Database Protection -> Analyse Content and Structure -> Recover deleted Tables, Records and Columns... I. Open Protected Database: Instantly recover MS Access 2000-2003 passwords and user-level security records. Including User Names and IDs necessary to recreate lost .mdw file. Recover User Names, Passwords, IDs and Group Names, IDs from workgroup databases (.mdw). Configure and queue number of attacks for MS Access 2007-2016(TP) password recovery: Dictionary (with keyboard layouts-aware recovery), Brute-force and Mixed attacks. Virtually endless number of combinations for mixed attacks. Highly optimized code (SSE, AVX) guarantees maximum performance. Supports up to 64 simultaneous processing threads (multi-CPU, multi-GPU). Utilizes NVIDIA, AMD and Intel Graphics processing units with a high-performance methods. Edit DB Properties: AllowBypassKey, StartUpShowDBWindow, CustomRibbonID, MDE flag, etc. Edit User-level access rights. Assign dbSecFullAccess to any object. Clear VBA Project protection. II. View Database Content: All Objects (tables, queries, ...) Ownership and Properties. Tables and Columns details. VBA modules and classes list and highlighted source code. Access Permissions. Name Maps. III. Scan and Recover Deleted Data: Deleted Tables. Deleted Records (Rows). Deleted Columns (this is unique feature) Hex View or Export attached files, OLE objects, images, etc. Export Tables data as XML with XSD Schema to import into any database, use in Excel, etc. Windows XP - Windows 10.
Keywords: access forensics, access database, database forensics, database recovery, table recovery, columns recovery, password recovery, database analysis, user-level security, vba source code
More on Access Forensics
This is the primary download URL given by the publisher of Access Forensics
1 Cool File periodically updates the software information and pricing of Access Forensics from the publisher thus some information might not be up-of-date. You should confirm all information before relying on it. Software piracy is theft, Using Access Forensics password, crack, registration codes, serial numbers, key generators is illegal and will prevent future development of Access Forensics.