Methods for generating passwordsMethods of cgi objectMethods of employee monitoringMethods of eraser wiping dataMethods of hard disk maintenanceMethods of protecting executable fileMethods of syncing gps information with videoMethods to analyze stocksMethods to hide dataMethods to teach the alphabet for recognition