Introduction |
Requirements |
How to work with the program |
Passwords and encryption |
Selecting the options |
Password-encrypted file |
Type of attack |
Brute-force range options |
Start from password |
Password mask |
Password length |
Dictionary options |
Known plaintext attack |
Auto-save |
Other options |
Advanced options |
Save and Read setup |
Save and Read setup |
Benchmarks |
Benchmark |
Getting the results |
Recovery process |
Program status |
The password is... |
Known bugs and limitations |
Known bugs and limitations |
Tips & tricks |
Files with different passwords |
What to start from |
Dictionary-based attacks |
Command line |
Unexpected crash |
Technical support |
Contacting us |
Where to get the latest version |
License and registration |
Copyright and license |
Registration |
Limitations of unregistered version |
Acknowledgements |
Acknowledgements |