
×
(1) The book allows the generation of one trillion strong passwords.
(2) The password source code with one million randomly arranged characters was built by replacing one million after comma positions of Pi by 73 characters ( A - Z, a - z, 0 - 9 and 11 special keyboard characters).
(3) For generating the one trillion strong passwords 2 strings of 4 characters are underlined, combined and added by a personal string.
(4) No writing of the password is needed for remembering.
(5) A table allows the administration of 96 password protected accounts.
(6) 2 corners of the book are rounded for avoiding bending the corners.
(7) The book has a narrow spine (12 mm) and can be stored together with the laptop in the laptop bag.
(8) The book has a thread stitching and therefore can be used for a whole business life.
(2) The password source code with one million randomly arranged characters was built by replacing one million after comma positions of Pi by 73 characters ( A - Z, a - z, 0 - 9 and 11 special keyboard characters).
(3) For generating the one trillion strong passwords 2 strings of 4 characters are underlined, combined and added by a personal string.
(4) No writing of the password is needed for remembering.
(5) A table allows the administration of 96 password protected accounts.
(6) 2 corners of the book are rounded for avoiding bending the corners.
(7) The book has a narrow spine (12 mm) and can be stored together with the laptop in the laptop bag.
(8) The book has a thread stitching and therefore can be used for a whole business life.