DOC

How to Recover Password for PDF

By Tim Cox,2014-02-21 15:54
11 views 0
How to Recover Password for PDF

    How to Recover Password for PDF?

    Have you felt bad that you’ve forgotten the password to your PDF document? If the document is important, you need to access it but you can’t. How frustrating it feels! Then you’ll find that PDF Password Recovery software is something that is vital.

    With Adobe PDF password recovery software you don’t have to worry about this anymore.

    If you are in trouble with the Forgotten Adobe PDF Password, just benefit from the free trial version of PDF Password Recovery 5.0

    PDF Password Recovery is easy to use with the clean design and clear instructions. The Menu

    like all other software is a list of options available to you. For File Name, click "Open"

    immediately after to enter the full path of the PDF document into the program. In the middle is the Attack Types and Settings, three attack types for you to select and the settings to each attack. Log Window is to record for events at a specific time and the Process is a process indicator with

    Current Password and Current Speed showing you the data during the program is processsing

    for the password. Once you get used to the program, it's going to be the ever easiest for you not

    only to manipulate it but to make full use of it to recover the password in the shortest time!

Step1. Import the encrypted PDF file into the program

    Open the program, click "File > Open", or the "Open" tab to import the file into the

    program.

In the "Open" popup, select the file and click "Open".

Step2. Select an attack type

    PDF Password Recovery provides three types of password attacks, which are for

    different uses based on different password situations, such as the password length,

    complexity, etc. Under "Recovery", select an attack type according to your situation. ; Brute-force Attack: The program will try all possible character combinations

    randomly. If you can't remember anything about the password, like its length,

    possible characters it contains, frequently used character set for your password.

    Then use this attack, however, this attack may consume relatively longer time

    than that when using the other two types.

    ; Brute-force with Mask Attack: You can use this attack if you still remember

    part of your password. For example, if you still remember your password is 4

    characters and begins with "z", then you can define the mask as "z???". This

    reduces the work for the program, as it will seek for the last 3 characters of the

    password instead of 4 characters of the whole. To use this attack, a Password

    Mask is must defined.

    ; Dictionary Attack: This attack is highly recommended. If use properly, it is

    the fastest when compared with the above two attacks. This attack is intended

    to seek the possible password based on a dictionary. This dictionary can be the

    integrated one or the one you provide. The integrated dictionary is a text file

    listing common character combinations, such as a, ab, 123, 4, AB, etc. that

    people may frequently use for passwords. You can also create a dictionary by

    listing your character sets that you frequently use to let the program base on

    when seeking passwords. If so, the seeking scope is largely reduced and it is

    bound to save time for the process.

    Under "Recovery", select an attack type that suits you mostly:

    ; "Brute-force Attack (Trying All Possible Combinations)", if with no

    password clue.

    ; Burte-force with Mask Attack (If Some Password Symbols are known), if

    you still remember part of the password.

    ; Dictionary Attack (Recommended), if the password is frequently used or

    you can provide a dictionary file.

Step3. Type of Attack Settings

    1. If Brute-force Attack is selected, settings under "Brute-force" and "Dictionary"

    are grayed. It's no need for you to set. Please refer to "Option settings" below to see

    the detailed information on the settings under "Option".

    2. If Brute-force with Mask Attack is selected, please do the following settings. Under "Brute-force", set the possible length for the password with "Min Length"

    and "Max Length". Define the possible password character settings with "Character

    set":

    ; a-z: refers to the 26 small letters, abcdefghigklmnopqrstuvwxyz. If there is

    small letter in the password, check the box.

    ; 0-9: refers to the ten digits, 0123456789. If there is digit in the password,

    check the box.

    ; A-Z: refers to the 26 letters in upper case,

    ABCDEFGHIGKLMNOPQRSTUVWXYZ. If there is upper letter in the

    password, check the box.

    ; -_!@#$%^&*: refers to special characters. If there is special character in the

    password, check the box.

    ; Custom Character Set: this is to let you enter the symbols that the ranges

    above do not include.

    ; Check the box of "Prefix", if you still remember the first character of the

    password and type it in the box immediately after.

    ; Check the box of "Suffix", if you still remember the last character of the

    password and type it in the box immediately after.

    Please refer to "Option settings" below to see the detailed information on the settings under "Option".

3. If Dictionary Attack is selected, please do the settings below.

    Under "Dictionary":

    ; If you want more character combinations, please check "Smart Mutations".

    Choose a number for "Mutation Count", and select a number in the "Max

    Password Length" for the possible maximum length of your password.

    ; The program provides a default dictionary, which lists common character

    combinations for passwords in line. If want to use the default dictionary, then

    leave it as default. If you want to use your own dictionary, which is closer to

    the possible password, then create a text file, list in line the possible characters

    and character sets that may be included in the password, and then select the

    file as the dictionary for the program with "Select Dictionary File…" Please

    refer to "Option settings" below to see the detailed information on the settings

    under "Option".

Step4. Option settings

    Under "Option", there is Program Priority and General Options:

    Program Priority: Changing Program Priority allows you to control the allocation

    of processing resources on your computer. A multi-tasking operating system such as Windows, allows you to run multiple programs simultaneously, but most computers have only one central processor. This means the OS must divide the total amount of work, and the processor must perform between those programs. While each application has a priority that is automatically determined by the OS, the default allocation of resources among running tasks doesn't always provide maximum system productivity. So you may set the program priority for a preferred system productivity.

    ; Idle: A computer processor is described as idle when it is not being used by

    any program. If you choose Idle here, it means the processor will only

    perform PDF Password Recovery.

    ; High: While the computer processor is performing multiple programs

    simultaneously, if you set the PDF Password Recovery as High, it indicates

    the processor will allocate more processing resources to it. This will definitely

    increase its performance. However, in this case, other programs on the system

    won't receive an appropriate share of processing resource, which may reduce

    their performances.

    General Options:

    ; Auto-save (min): If it is enabled, while the program is processing, it will save

    the project every a period of time. If you set it as 15 minutes, then the program

    will automatically save the process every 15 minutes. Check the box

    "Shutdown the Computer after Cracking Finishes", if you want to close the

    computer after the cracking is finished.

Step5. Start the attack

    Click "Start" to start the attack. This may take several minutes.

    When the attack finishes, a window will pop up to you, telling the opening password in "File Opening Password".

    Copy and paste the password in the box below to open the file. If want to open and edit the file, click "Remove all passwords from the File". Click "OK" to finish the

    job.

    Keyword: PDF password recovery, reset PDF password, forgot password

Report this document

For any questions or suggestions please email
cust-service@docsford.com