Solved

Trillian Security

Posted on 2003-11-14
3
706 Views
Last Modified: 2010-04-11
I have been using Trillian rather than AIM for some time now. I have seen the problem coming, and finally it's here. I forgot my password a while back, and until now, it's been no problem. Now, I have the data files, I need a way to extract the AIM password out from them, so I can once again log on AIM. Any help would be great, thank you.
0
Comment
Question by:List244
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 18

Accepted Solution

by:
chicagoan earned 250 total points
ID: 9753107
That's be a crack, and can't be addressed in this forum.

Get your password resent to you by contacting 800-827-6364.
0
 
LVL 8

Author Comment

by:List244
ID: 9760629
I found one, thanks anyway, I'll keep that in mind
for later questions.
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Here's a look at newsworthy articles and community happenings during the last month.
Recovering from what the press called "the largest-ever cyber-attack", IT departments worldwide are discussing ways to defend against this in the future. In this process, many people are looking for immediate actions while, instead, they need to tho…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month8 days, 19 hours left to enroll

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question