Contents
Introduction
Requirements
How to work with the program
About Windows passwords
How the program works
Obtaining password hashes
Credentials
Password cracking
Password cracking methods
Dictionary attack
Brute-force attack
Rainbow attack
Recovery process and results
Reports
Program options
Technical support
Contacting us
Where to get the latest version
License and registration
Copyright and license
Registration
Limitations of unregistered version