Passwords that cannot be recovered or reset instantly (for example, file-open passwords for RAR, Zip, MS Office, MS Money, Lotus Notes, etc.) are searched by basic Dictionary, Xieve, Brute-force, and Previous Passwords attacks. It may take from a few minutes up to several days/weeks/months to find a password, depending on the file type, the password length and symbol set and hardware used.
For example, it usually takes 10 hours to check all 8-letter file-open passwords from Word/Excel 2003 on an average Intel Core Duo system processing 1,000,000 passwords per second.
Please note that the password recovery process for many files is time-consuming. We guarantee that Passware Kit supports your file, works with it flawlessly, and provides a certain password recovery speed. In other cases, we will fully refund your order. We do not guarantee that the password will be found at a reasonable time because it depends on the password settings.
You can significantly reduce the time needed to recover a password by using patterns if any part of the password is known. Just enter this part in the Pattern field at Brute-force Attack Settings -> Advanced -> Pattern. Known parts can be separated with '*' or '?'. For example, pattern "*p?e*" will match both "apple" and "pie". You can also specify the known part by joining the Known Password/Part attack with other attacks. For example, if you know your password is a word followed by "1980", use Join Attacks to combine a Dictionary attack and a Known Password/Part attack with the value set to "1980". Read more about the recovery attacks in Passware Kit.
You can always contact Support for assistance with attack settings.
To accelerate the password recovery process, also try changing other settings: range of password length, symbol set, etc.