1: Q: What is Word Password Geeker?
A: Word Password Geeker is an easy-to-use password recovery tool which can help you recover lost password of Microsoft Word. It can recover word file "Open" Password and remove "Edit" Password.
2. Q: What versions of Word does it support?
A: Word Password Geeker support all versions of Microsoft Word from version 97 to 2010.
3. Q: What is the system Requirements of Word Password Geeker?
A: Support Windows 8/7/Vista/XP/2012/2008/2003/2000(32-bit or 64-bit); 1 GHz processor (2.4 GHz is recommended); 128 MB of RAM (1 GB is recommended); 4 MB of free hard disk space.
4. Q: What is brute-force attack?
A: This Attack will try all possible character combinations.
5. Q: What is brute-force with mask attack?
A: It is useful when you remember a part of password that you can specify the types of character combinations and the length range of the password.
A: It is only available to "Brute-force with Mask Attack" which instructs the program what characters have been used in the password and restrict the search area.
a-z, 0-9,A-Z, -_?!@#$... : Defined by the Predefined Passwords Ranges. If the password contains these, check it.
Custom Character Set : You can define your own Character Set for the Brute-Force Attack. Check "Custom Character Set" and enter the Character with your own.
Prefix : If you remember the beginning of the password characters check it and enter the Character.
Suffix : If you remember the end of the password characters check it and enter the Character.
7. Q: What is "Dictionary Attack"?
A: It is an effective attack for you to recover lost password with a default dictionary in the program. The program will try every password in the dictionary. Besides, you can add your own dictionary to the program for saving the recovery time. The dictionary is just a text file with one word at a line; lines are separated with line breaks.
8. Q: What is "Smart Mutations"?
A: Smart Mutations allows you to try combinations among passwords in the dictionary. If you want more character combinations, check "Smart Mutations" and choose a number for "Mutation Count". For example, if you select the dictionary file contains three words(ab,cd,12), then you choose 2 for "Mutation Count" in order to let the program mutate with these three sets, like ab,cd,12,abab,abcd,ab12,cdab,cdcd,cd12,12ab,12cd,1212 ,etc. Select a number in the "Max Password Length" for the possible maximum length of your password.
9. Q: What is the "Program Priority"?
A:Changing Program Priority allows you to control the allocation of processing resources on your computer. By default, all processes are at normal priority.
Idle priority means that this software will not interrupt other programs, so attacks will not decrease the performance of other running applications.
High priority means that this software will use all available system resources. The performance of other applications will degrade but it will work as fast as possible.
10. Q: What if I stop recovering the password?
A: The program will save the recovery process automatically. And it will run again following last time process even if it suddenly suspended.
11. Q: What's the difference between the trial version and full version?
A: All passwords are recovered, but you can only view 3 or less characters of password.