Lastbit Software recovers lost or forgotten or passwords since 1997. Password Recovery Solutions Online since 1997

About Us

Contact us: info@LastBit.com

Our Story: From Personal Challenge to Global Solution

In 1997, our founder Vytas Ramanchauskas faced a problem that would shape the next 28 years of our company's journey. He had forgotten the password to an important Word 97 document. What seemed like a simple issue revealed a significant change in Microsoft's approach to security – Office 97 had introduced robust password protection that rendered all existing recovery tools useless.

This personal frustration led to the creation of Office Password 97, the first professional password recovery software specifically designed for Microsoft's new encryption standards. What began as one developer's solution to his own problem has evolved into a trusted service used by millions worldwide.

Pioneering Password Recovery Since 1997

We were the first to tackle Office 97's revolutionary password protection. While earlier Office versions used trivial protection that could be cracked instantly, Office 97 introduced real cryptographic security. Our breakthrough software established us as pioneers in this emerging field.

The Golden Era: Guaranteed Recovery (1999-2006)

Due to legal restrictions of that era, Office encryption was limited to 40-bit strength. In 1999, we took advantage of this limitation to offer a service that was unparalleled at the time: guaranteed password recovery regardless of password complexity. Given the computing power available at the time, which was insufficient to crack a 40-bit key, we offered a service for the guaranteed recovery of password-protected office documents. We developed our own data center capable of processing up to 100 documents simultaneously. This system required a maximum of 96 hours (4 days) for guaranteed document decryption. We subsequently reduced the time to two days. Through the implementation of innovative table-based transformations, we have refined our service to deliver any password in under one minute. From the outset, we have committed to the principle of Privacy First. Our service did not require access to the content of documents. Instead, our program extracted a few bytes related to password protection, transferred them to the server, and later received the encryption key. It then decrypted the document on the client's computer. This approach ensures that the document's content remains securely on the user's computer. We continue to adhere to this principle in our current operations.

The Modern Challenge: Office 2007 and Beyond

Office 2007 changed everything. Microsoft introduced:

  • New document formats (.docx, .xlsx, .pptx)
  • AES encryption with 128-bit and later 256-bit keys
  • Properly implemented cryptographic algorithms

This transformation made password recovery exponentially more difficult. Today's recovery requires massive computational resources that far exceed what any single computer can provide. Cloud computing is essential but expensive and technically complex.

Our Technology Evolution

Over the years, we've developed and offered various system utilities alongside our password recovery tools. However, in 2025, we made a strategic decision: complete website redesign and laser focus on our core expertise – password recovery service for Microsoft Office.

Privacy: Our Founding Principle

From day one, privacy and confidentiality have been paramount. Our technology ensures:
  • Documents never leave your computer
  • Only a few dozen bytes of encryption metadata are extracted
  • This data relates solely to password structure, never document content
  • Zero knowledge of your actual document contents
This isn't just a feature – it's the foundation of how we built our entire service architecture.

Infrastructure and Investment

We maintain our own specialized hardware infrastructure, allowing us to offer:
  • Computational power exceeding typical recovery services
  • Significantly lower computing costs than traditional cloud services due to our use of specialized equipment
  • Complete control over security and privacy

The computational power we dedicate to each recovery attempt would cost hundreds of dollars if rented from commercial cloud providers. Our investment in specialized equipment and optimization allows us to offer this service at a fraction of that cost.

Cutting-edge Recovery Methods

Raw computing power is only part of the story. The real difference comes from how intelligently that power is used:

  • Enhanced dictionary attack
    We use a custom, extremely large dictionary built from real-world passwords.
    Instead of simply trying each word as-is, we generate and test many realistic variations: combining words with digits, joining several words together, adding characters at the beginning and the end, simulating common typos, deliberate misspellings, and other human-like modifications.

  • Smart Force Attack technology
    In contrast to classic brute force, which blindly tries every possible combination, Smart Force Attack is a guided search that prioritizes the most probable character sequences.
    We analyzed billions of real passwords using AI and built a model that predicts which combinations are statistically most likely, so we can test them first.

  • Brute force — only as a last resort
    Full brute force is extremely expensive for modern MS Office encryption and is used only when smarter methods are no longer effective.

Global Impact

  • 28 years of continuous operation
  • Millions of users worldwide
  • 130+ countries served
  • 65+% success rate for modern encrypted documents
  • First and still best in the industry

Looking Forward

While Office encryption has become incredibly sophisticated, our commitment remains unchanged: providing the most effective, secure, and user-friendly password recovery service possible. We continue investing in new technologies, expanding our computational capabilities, and refining our methods to maintain the highest success rates in the industry. Whether you're a Fortune 500 company or an individual who simply forgot a password, we bring the same dedication, expertise, and computational power to recover your important documents.

Contact Us

Have questions about our service or need assistance? We're here to help. Email: info@LastBit.com