The actual usage procedure is quite easy and you will have to follow a simple syntax which starts with the executable of, followed by the desired options and then by the password files. Since it doesn't have a GUI of its own, you will have to open a Command window and run it from there to view the parameters which can be used to carry out the process. Runs from a command line interfaceĪ tool that is quite useful for this purpose is John the Ripper, a command-line utility that will also show its worth in case you need to recover a lost passkey. Since there are many programs specially created to break such locks, it's probably a good idea to actually test the strength of a passcode before using it. Creating strong passwords seems like an easy task at first glance, but it may actually take more than one would expect.