| Introduction | 
| Requirements | 
| How to work with the program | 
| Passwords and encryption | 
| Selecting the options | 
| Password-encrypted file | 
| Type of attack | 
| Brute-force range options | 
| Start from password | 
| Password mask | 
| Password length | 
| Dictionary options | 
| Known plaintext attack | 
| Auto-save | 
| Other options | 
| Advanced options | 
| Save and Read setup | 
| Save and Read setup | 
| Benchmarks | 
| Benchmark | 
| Getting the results | 
| Recovery process | 
| Program status | 
| The password is... | 
| Known bugs and limitations | 
| Known bugs and limitations | 
| Tips & tricks | 
| Files with different passwords | 
| What to start from | 
| Dictionary-based attacks | 
| Command line | 
| Unexpected crash | 
| Technical support | 
| Contacting us | 
| Where to get the latest version | 
| License and registration | 
| Copyright and license | 
| Registration | 
| Limitations of unregistered version | 
| Acknowledgements | 
| Acknowledgements |