| Introduction |
| Requirements |
| How to work with the program |
| Passwords and encryption |
| Selecting the options |
| Password-encrypted file |
| Type of attack |
| Brute-force range options |
| Start from password |
| Password mask |
| Password length |
| Dictionary options |
| Known plaintext attack |
| Auto-save |
| Other options |
| Advanced options |
| Save and Read setup |
| Save and Read setup |
| Benchmarks |
| Benchmark |
| Getting the results |
| Recovery process |
| Program status |
| The password is... |
| Known bugs and limitations |
| Known bugs and limitations |
| Tips & tricks |
| Files with different passwords |
| What to start from |
| Dictionary-based attacks |
| Command line |
| Unexpected crash |
| Technical support |
| Contacting us |
| Where to get the latest version |
| License and registration |
| Copyright and license |
| Registration |
| Limitations of unregistered version |
| Acknowledgements |
| Acknowledgements |