Password Recovery | XenArmor https://xenarmor.com Sat, 29 Nov 2025 10:28:32 +0000 en-US hourly 1 https://xenarmor.com/wp-content/uploads/2018/12/favicon.png Password Recovery | XenArmor https://xenarmor.com 32 32 How to Switch from PIN to Password Login on Windows https://xenarmor.com/how-to-switch-from-pin-to-password-login-on-windows/ https://xenarmor.com/how-to-switch-from-pin-to-password-login-on-windows/#respond Sat, 29 Nov 2025 10:28:32 +0000 https://xenarmor.com/?p=26457 By default, Windows 11 is now PIN based login which is good for additional security features. However sometimes for specific use cases (like recovering passwords using All-In-One External Drive Password Pro), you may need to switch to password login mode. This article quickly shows you how to easily switch from PIN to Password mode on Windows 11/10. First, you need to disable the “only allow Windows Hello sign-in for Microsoft accounts” setting, then go to Settings > Accounts > Sign-in options and click the Remove button under PIN. You will need to enter your account password to confirm the removal. If a password is not yet set up, you will need to add one first. Below are detailed steps (here is quick 1 minute video link) Step 1:  Disable Passwordless Sign-in Go to Settings > Accounts > Sign-in options. Scroll down to Additional settings. Turn the toggle for “For improved security, only allow Windows Hello sign-in for Microsoft accounts on this device” to Off. You may need to restart your computer for this change to take effect. Step 2: Remove the PIN Open Settings by pressing Windows + I or searching for it in the Start menu. Click on Accounts in the left-hand menu. Select Sign-in options on the right. Find the PIN option and click the Remove button. If the option is grayed out, ensure you first turned off the passwordless setting in the step 1. You will be prompted to enter your account password to confirm. Click OK or Yes to complete the removal. That’s all, now you can login with your password instead of PIN.

The post How to Switch from PIN to Password Login on Windows first appeared on XenArmor.]]>
https://xenarmor.com/how-to-switch-from-pin-to-password-login-on-windows/feed/ 0
Password Secrets, Location & Recovery from Popular Android Apps https://xenarmor.com/password-location-secrets-recovery-of-popular-android-apps/ https://xenarmor.com/password-location-secrets-recovery-of-popular-android-apps/#respond Thu, 13 Mar 2025 20:23:13 +0000 https://xenarmor.com/?p=24849 In today’s digital world, passwords protect our personal data, and Android apps store them in different ways. Knowing where they are helps keep your information safe. In this research article, we explore where popular Android apps store your passwords and how you can recover them easily. Password Locations of Popular Android Apps Here is the list of popular Android apps and the password storage location Android App Password File Location 1DM: Browser & Video Download /data/data/idm.internet.download.manager/databases/download.db Amaze File Manager /data/data/com.amaze.filemanager/shared_prefs/com.amaze.filemanager_preferences.xml /data/data/com.amaze.filemanager/databases/utilities.db AndFTP /data/data/lysesoft.andftp/shared_prefs/AndFTP.xml AVG Secure Browser /data/data/com.avg.android.secure.browser/app_xwalkcore/DefaultProfile/Login Data Adblock Browser /data/data/org.adblockplus.browser/app_chrome/Default/Login Data Aloha Browser /data/data/com.aloha.browser/databases/Aloha.db Avast Secure Browser /data/data/com.avast.android.secure.browser/app_xwalkcore/DefaultProfile/Login Data Aqua Mail /data/data/org.kman.AquaMail/shared_prefs/MailAccounts.xml Banana Browser /data/data/org.triple.banana/app_chrome/Default/Login Data BlueMail /data/data/me.bluemail.mail/databases/preferences_storage BlueMail Lite /data/data/me.bluemail.lite/databases/preferences_storage Brave Browser /data/data/com.brave.browser/app_chrome/Default/Login Data Brave Beta Browser /data/data/com.brave.browser_beta/app_chrome/Default/Login Data Brave Nightly Browser /data/data/com.brave.browser_nightly/app_chrome/Default/Login Data Bromite Browser /data/data/org.bromite.bromite/app_chrome/Default/Login Data CX File Explorer /data/data/com.cxinventor.file.explorer/shared_prefs/FTPPrefs.xml, ServerPrefs.xml Carbon Browser /data/data/com.browser.tssomas/app_chrome/Default/Login Data Chrome Browser /data/data/com.android.chrome/app_chrome/Default/Login Data Chrome Beta Browser /data/data/com.chrome.beta/app_chrome/Default/Login Data Chrome Canary Browser /data/data/com.chrome.canary/app_chrome/Default/Login Data Chrome Dev Browser /data/data/com.chrome.dev/app_chrome/Default/Login Data Chromium Browser /data/data/org.bromite.chromium/app_chrome/Default/Login Data CryptoTab Browser /data/data/max.cryptotab.android/app_chrome/Default/Login Data Ecosia Browser /data/data/com.ecosia.android/app_chrome/Default/Login Data eM Client /sdcard/android/data/com.emclient.mailclient/files/accounts.dat eM Client /sdcard/android/data/com.emclient.mailclient/files/accounts.dat Edison Mail /data/data/com.easilydo.mail/shared_prefs/EmailPref.xml, EdoKeyInfo.xml Edge Beta Browser /data/data/com.microsoft.emmx.beta/app_chrome/Default/Login Data Edge Canary Browser /data/data/com.microsoft.emmx.canary/app_chrome/Default/Login Data Edge Dev Browser /data/data/com.microsoft.emmx.dev/app_chrome/Default//Login Data Email – Fast and Smart Mail /data/data/com.fastsigninemail.securemail.bestemail/databases/email.db Email for All Mail Accounts /data/data/com.diavostar.email/databases/email.db EX File Manager /data/data/com.ace.ex.file.manager/shared_prefs/shared_prefs/ prefs_server_list_ftp***.xml File Manager /data/data/com.alphainventor.filemanager/shared_prefs/FTPPrefs.xml File Commander Manager /data/data/com.mobisystems.fileman/databases/servers.db FTP Manager /data/data/com.ftp_manager/files/App.db FTP Cafe /data/data/com.ftpcafe/shared_prefs/com.ftpcafe.preferences.xml FTP Client /data/data/com.litesapp.ftpclient/databases/ftpclient FTP Client/Server /data/data/com.apk_devops_ftp_client/databases/DBName FTP Drive Pro /data/data/com.ftpdrivepro2.technik/files/database.db FTP Rush /data/data/com.wftpserver.ftprush/files/.config/.isolated-storage/PropertyStore.forms FTP Server /data/data/net.xnano.android.ftpserver/databases/ftpusers.db FTP TOOL /data/data/com.litesapp.ftp/databases/FTPClient Firefox Browser /data/data/org.mozilla.firefox/databases/logins2.sqlite FairEmail /data/data/eu.faircode.email/databases/fairemail File Manager by Lufick /data/data/com.cvinfo.filemanager/databases/FILE_MANAGER Herond Browser /data/data/com.herond.android.browser/app_chrome/Default/Login Data Huawei Browser /data/data/com.huawei.browser/app_hw_webview/Default/Login Data Internet Browser /data/data/com.heytap.browser/app_webview_tbl/Default/Login Data JioSphere Browser /data/data/com.jio.web/app_chrome/Default/Login Data K-9 Mail /data/data/com.fsck.k9/databases/preferences_storage Kiwi Browser /data/data/com.kiwibrowser.browser/app_chrome/Default/Login Data Lemur Browser /data/data/com.lemurbrowser.exts/app_chrome/Default/Login Data MI Browser /data/data/com.mi.globalbrowser/app_miui_webview/Default/Login Data Mail – All Email Accounts /data/data/com.quickemail.quicklogin.emailonline/databases/email.db Mises Browser /data/data/site.mises.browser/app_chrome/Default/Login Data Nine Mail /data/data/com.ninefolders.hd3/databases/EmailProvider.db Outlook...

Continue Reading

The post Password Secrets, Location & Recovery from Popular Android Apps first appeared on XenArmor.]]>
https://xenarmor.com/password-location-secrets-recovery-of-popular-android-apps/feed/ 0
Rise of Covid-19 Malwares: How to Protect Your Passwords from being Stolen https://xenarmor.com/rise-of-covid-19-malwares-how-to-protect-your-passwords/ https://xenarmor.com/rise-of-covid-19-malwares-how-to-protect-your-passwords/#comments Wed, 25 Mar 2020 20:45:38 +0000 https://xenarmor.com/?p=16949 Current panic times over global Covid-19 crisis has laid out perfect ground for cyber criminals to launch their malicious attacks with high success rate. Now a days, every one is in panic mode constantly looking for latest updates on Corona virus. Also more people are sitting idle at home browsing internet clicking on every messages, emails they are getting. This situation has lead to rise of 1000’s of Covid-19 malwares exploiting innocent users by stealing their passwords, bank accounts, bitcoins and more. As per Kaspersky Labs over 2600 Covid-19 related malwares have been released since January 2020. How Covid-19 Malwares are Distributed in Wild? Here are some of the latest examples used by cyber criminals to lure innocent victims to steal their passwords and money. As per cyber security company Check Point software, attackers are sending emails in the name of government or health organisation. These emails luring users to visit malicious page or download malware attachments In Japan, malicious emails sent in the name of Japanese disability welfare service. These email contains attachment hiding the notorious Emotet malware. In Indonesia, malware named LokiBot was sent through phishing emails on Covid-19. This malware is used to steal email credentials as well as steal passwords of crypto coin wallets & FTP servers. In Italy, cyber security firm Sophos found emails with Word documents on how to avoid Covid-19 infection. On opening this Word document, VBA script will be executed silently to install TrickBot malware on victim’s computer. In one of the latest scheme, live Corona virus infections map produced by Johns Hopkins University is being used in malicious Web sites (and possibly spam emails) to spread malware as mentioned here. In USA, emails sent using malicious domains like cdc-gov.org (original domain is cdc.gov) representing “Centers for Disease Control and Prevention (CDC)”,...

Continue Reading

The post Rise of Covid-19 Malwares: How to Protect Your Passwords from being Stolen first appeared on XenArmor.]]>
https://xenarmor.com/rise-of-covid-19-malwares-how-to-protect-your-passwords/feed/ 3
How to Recover Remote Desktop Password from UltraVNC https://xenarmor.com/how-to-recover-remote-desktop-password-from-ultravnc/ https://xenarmor.com/how-to-recover-remote-desktop-password-from-ultravnc/#comments Sat, 16 Nov 2019 14:07:37 +0000 https://xenarmor.com/?p=15789 This research article exposes all the password secrets of UltraVNC including where your remote desktop passwords are stored, how it is stored and how to recover it automatically. UltraVNC Password Secrets UltraVNC saves your remote desktop password in a file called “ultravnc.ini” at following location, [Latest Version] C:\Program Files\Uvnc Bvba\UltraVNC\ultravnc.ini [Older Version] C:\Program Files\UltraVNC\ultravnc.ini This “ultravnc.ini” file contains password in encrypted format as shown below, [ultravnc] passwd=9D6EE7BBCB6C60CA0E passwd2=9D6EE7BBCB6C60CA0E UltraVNC encrypts the above remote desktop password using DES algorithm with 8 byte magic key. How to Recover UltraVNC Passwords Automatically Here is simple way to recover UltraVNC remote desktop passwords without worrying about where it is stored and how to decrypt it. You can use our All-in-one Password Recovery Pro to instantly & easily recover all your saved remote desktop  passwords from UltraVNC as shown in video below, Here are the simple steps to recover all your saved passwords, Step 1: Download & Install All-in-one Password Recovery Pro from here Step 2: Next launch the software on your computer Step 3: It will automatically discover, decrypt and display all the passwords from UltraVNC & other apps as shown below Not only remote desktop passwords, this software can also recover website, email, messenger, social network, FTP login passwords from 90+ top Windows apps For more details, please refer to Online User Guide Hope this article has helped you to understand the password secrets of UltraVNC. Let us know what do you think. Please comment below if you have any queries or suggestions.    

The post How to Recover Remote Desktop Password from UltraVNC first appeared on XenArmor.]]>
https://xenarmor.com/how-to-recover-remote-desktop-password-from-ultravnc/feed/ 1
How to Recover Remote Desktop Password from RealVNC https://xenarmor.com/how-to-recover-remote-desktop-password-from-realvnc/ https://xenarmor.com/how-to-recover-remote-desktop-password-from-realvnc/#respond Sat, 16 Nov 2019 14:01:27 +0000 https://xenarmor.com/?p=15781 This research article exposes all the password secrets of RealVNC including where your remote desktop passwords are stored, how it is stored and how to recover it automatically. RealVNC Password Secrets RealVNC saves your remote desktop login password at following Registry location RealVNC Latest Version ------------------------ HKEY_LOCAL_MACHINE\SOFTWARE\RealVNC\vncserver\ RealVNC Older Versions ------------------------ HKEY_LOCAL_MACHINE\SOFTWARE\RealVNC\WinVNC4\ HKEY_CURRENT_USER\SOFTWARE\RealVNC\WinVNC4\ HKEY_LOCAL_MACHINE\SOFTWARE\RealVNC\Default\ HKEY_CURRENT_USER\SOFTWARE\RealVNC\Default\ Depending on the version of RealVNC, the above registry location may vary. However password is always stored in registry value named “Password” RealVNC encrypts the above remote desktop password using DES algorithm with 8 byte magic key. How to Recover RealVNC Passwords Automatically Here is simple way to recover RealVNC remote desktop passwords without worrying about where it is stored and how to decrypt it. You can use our All-in-one Password Recovery Pro to instantly & easily recover all your saved remote desktop  passwords from RealVNC as shown in video below, Here are the simple steps to recover all your saved passwords, Step 1: Download & Install All-in-one Password Recovery Pro from here Step 2: Next launch the software on your computer Step 3: It will automatically discover, decrypt and display all the passwords from RealVNC & other apps as shown below Not only remote desktop passwords, this software can also recover website, email, messenger, social network, FTP login passwords from 90+ top Windows apps For more details, please refer to Online User Guide Hope this article has helped you to understand the password secrets of RealVNC. Let us know what do you think. Please comment below if you have any queries or suggestions.  

The post How to Recover Remote Desktop Password from RealVNC first appeared on XenArmor.]]>
https://xenarmor.com/how-to-recover-remote-desktop-password-from-realvnc/feed/ 0