About Us
Contact us: info@LastBit.com
Our Story: From Personal Challenge to Global Solution
In 1997, our founder Vytas Ramanchauskas faced a problem that would shape the next 28 years of our company's journey. He had forgotten the password to an important Word 97 document. What seemed like a simple issue revealed a significant change in Microsoft's approach to security – Office 97 had introduced robust password protection that rendered all existing recovery tools useless.
This personal frustration led to the creation of Office Password 97, the first professional password recovery software specifically designed for Microsoft's new encryption standards. What began as one developer's solution to his own problem has evolved into a trusted service used by millions worldwide.
Pioneering Password Recovery Since 1997
We were the first to tackle Office 97's revolutionary password protection. While earlier Office versions used trivial protection that could be cracked instantly, Office 97 introduced real cryptographic security. Our breakthrough software established us as pioneers in this emerging field.
The Golden Era: Guaranteed Recovery (1999-2006)
Due to legal restrictions of that era, Office encryption was limited to 40-bit strength. In 1999, we took advantage of this limitation to offer a service that was unparalleled at the time: guaranteed password recovery regardless of password complexity. Given the computing power available at the time, which was insufficient to crack a 40-bit key, we offered a service for the guaranteed recovery of password-protected office documents. We developed our own data center capable of processing up to 100 documents simultaneously. This system required a maximum of 96 hours (4 days) for guaranteed document decryption. We subsequently reduced the time to two days. Through the implementation of innovative table-based transformations, we have refined our service to deliver any password in under one minute. From the outset, we have committed to the principle of Privacy First. Our service did not require access to the content of documents. Instead, our program extracted a few bytes related to password protection, transferred them to the server, and later received the encryption key. It then decrypted the document on the client's computer. This approach ensures that the document's content remains securely on the user's computer. We continue to adhere to this principle in our current operations.
The Modern Challenge: Office 2007 and Beyond
Office 2007 changed everything. Microsoft introduced:
- New document formats (.docx, .xlsx, .pptx)
- AES encryption with 128-bit and later 256-bit keys
- Properly implemented cryptographic algorithms
This transformation made password recovery exponentially more difficult. Today's recovery requires massive computational resources that far exceed what any single computer can provide. Cloud computing is essential but expensive and technically complex.
Our Technology Evolution
Over the years, we've developed and offered various system utilities alongside our password recovery tools. However, in 2025, we made a strategic decision: complete website redesign and laser focus on our core expertise – password recovery service for Microsoft Office.
Privacy: Our Founding Principle
From day one, privacy and confidentiality have been paramount. Our technology ensures:- Documents never leave your computer
- Only a few dozen bytes of encryption metadata are extracted
- This data relates solely to password structure, never document content
- Zero knowledge of your actual document contents
Infrastructure and Investment
We maintain our own specialized hardware infrastructure, allowing us to offer:- Computational power exceeding typical recovery services
- Significantly lower computing costs than traditional cloud services due to our use of specialized equipment
- Complete control over security and privacy
The computational power we dedicate to each recovery attempt would cost hundreds of dollars if rented from commercial cloud providers. Our investment in specialized equipment and optimization allows us to offer this service at a fraction of that cost.
Cutting-edge Recovery Methods
Raw computing power is only part of the story. The real difference comes from how intelligently that power is used:
-
Enhanced dictionary attack
We use a custom, extremely large dictionary built from real-world passwords.
Instead of simply trying each word as-is, we generate and test many realistic variations: combining words with digits, joining several words together, adding characters at the beginning and the end, simulating common typos, deliberate misspellings, and other human-like modifications. -
Smart Force Attack technology
In contrast to classic brute force, which blindly tries every possible combination, Smart Force Attack is a guided search that prioritizes the most probable character sequences.
We analyzed billions of real passwords using AI and built a model that predicts which combinations are statistically most likely, so we can test them first. -
Brute force — only as a last resort
Full brute force is extremely expensive for modern MS Office encryption and is used only when smarter methods are no longer effective.
Global Impact
- 28 years of continuous operation
- Millions of users worldwide
- 130+ countries served
- 65+% success rate for modern encrypted documents
- First and still best in the industry

