I have a number of spreadsheets that I use to store sensitive information. Usernames, passwords, etc. These documents are password protected themselves, but if they're anything like "protected" PDFs, ...
Tool lets investigators harness the power of distributed computing to search for and crack passwords and crypto keys. Passwords are intended to let only authorized users access files and information ...