Current Page: Home > Support > Pakeysoft PowerPoint Password Recovery FAQ

Pakeysoft PowerPoint Password Recovery FAQ

General questions:

  • Q1: What are system requirements for running this powerpoint password recovery?

    A: If you want to run this powerpoint password recovery on your PC, here are the minimum requirements:
    • Microsoft® Windows 8/7/Vista/XP/2008(R2)/2003(R2)/2000 OS
    • 1GHz Intel/AMD processor or above
    • 256MB or above RAM
    • 15MB available disk space for installation
  • Q2: Where do I download this powerpoint password recovery?

    A: Please download this powerpoint password recovery from our website at www.password-recovery-tool.net/downloads.html.
  • Q3: I have gotten my license code and how to register?

    A: First please run the program and click 'Help >Register' option to open 'Registration' window. Then copy and paste your license code in corresponding text boxes to register.
  • Q4: What versions of PowerPoint does it support?

    A: It support all versions of Microsoft PowerPoint from 97 to 2010.
  • Q5: How to get started with this powerpoint password recovery?

    A: You just need to click 'Open' button to load the lost password file and select an attack type, then click 'Start' button to start your password recovering.
  • Q6: What are the differences between Brute-force Attack, Mask Attack, Dictionary Attack and Smart Attack?

    A: There are four attack types in this PowerPoint Password Recovery Tool for you to recover your password. They are Brute-force Attack, Mask Attack, Dictionary Attack and Smart Attack.
    Brute-force Attack: This Attack will try all possible characters combinations in the specified Range. The Range is defined by "Range" and "Length" Options. Instructs the program what characters have been used in the password. You can choose from all capital letters, all small letters, all digits, all special symbols and the space, or all printable (includes all of the above).
    Mask Attack: This Attack is useful when you remeber a part of Password. For example if you remember that length of your password was 5 characters and password begins from "A", you can define the mask "A????" and save the time by trying 4 symbols instead of 5. A Password Mask must be defined to use this Attack.
    Dictionary Attack: This Attack verifies the words stored in the specified Dictionary File. The dictionary is just a text file with one word at a line; lines are separated with line breaks. You can set additional Dictionary Options for this Attack. This attack is highly recommended as it offers a smarter access to the password recovery. We has supplied with one small Dictionary File containing English words. You can also create a dictionary by listing your character sets that you frequently use to let the program base on when seeking passwords, such as your name, birthplace, birthday, etc. If so, the seeking scope will be largely reduced and it is bound to save time for the process.
    Smart Attack: This Attack is the automatic attack. It will try all possible characters combinations include all priteable characters.
  • Q7: What’s 'Range Set'?

    A: It is only available to Brute-force Attack and Mask Attack; which instructs the program what characters have been used in the password and restrict the search area.
    All caps latin(A-Z), All small latin(a-z), All digits(0-9): Defined by the Predefined Passwords Ranges. If the password contains these, check it.
    User-define: You can define your own Character Set for the 'Brute-Force' or 'Mask' Attack. Check 'User-define' and enter the Character with your own.
    Prefix: If you remember the beginning of the password characters check it and enter the Character.
    Suffix: If you remember the end of the password characters check it and enter the Character.
  • Q8: What’s 'Password Mask'?

    A: If you already know some characters in the password, you can specify the mask to decrease the total number of passwords to be verified. At the moment, you can set the mask only for fixed-length passwords, but doing this can still help.
    For example, you know that the password contains 8 characters, starts with 'x', and ends with '99'; the other symbols are small or capital letters. So, the mask to be set is "x?????99", and the charset has to be set to All caps and All small. With such options, the total number of the passwords that PowerPoint Password Recovery will try will be the same as if you're working with 5-character passwords which don't contain digits; it is much less than if the length were set to 8 and the All Printable option were selected. In the above example, the '?' chars indicate the unknown symbols.
    If you know that the password contains an occurrence of the mask character '?', you can choose a different mask character to avoid having one character, '?', represent both an unknown pattern position and a known character. In this case, you could change the mask symbol from '?' to, for example, '*', and use a mask pattern of "x******?" (for mask symbol '*').
  • Q9: What is 'Smart Mutations'?

    A: Smart Mutations allows you to try combinations among passwords in the dictionary. If you want more character combinations, check "Smart Mutations". For example, if you select the dictionary file contains three words(ab,cd,12), then the program will just try all possible combinations, like: ab,cd,12,abab,abcd,ab12,cdab,cdcd,cd12,12ab,12cd,1212 ,etc.
  • Q10: What is the 'Program Priority'?

    A: Changing Program Priority allows you to control the allocation of processing resources on your computer. By default, all processes are at normal priority.
    Background priority means that PowerPoint Password Recovery will not interrupt other programs, so attacks will not decrease the performance of other running applications.
    High priority means that PowerPoint Password Recovery will use all available system resources. The performance of other applications will degrade but PowerPoint Password Recovery will work as fast as possible.
  • Q11: What if I stop recovering the password?

    A: The program will save the recovery process automatically. And it will run again following last time process even if it suddenly suspended.
  • Q12: What's the difference between the trial version and full version?

    A: More than three characters of the password cannot be recovered in the trial version.
  •  

 

password recovery bundle

Package Deals