FZC -mb -nz"zipname" -l"passwd_len" -c"charset" [-p"x:y"]

Begins a brute-force attack, trying every possible word of "passwd_len"
length (see below) using the character set defined by "charset".

passwd_len is (a) a password length between 1 and 32.
              (b) a range, eg 6-13.
              (c) a starting length, eg 4+ (same as 4-32).
              (d) a 0 (same as 1-32 and 1+).

charset is    (a) one or more of the following characters: a,A,s,1,!
                  a = lowercase,
                  A = uppercase,
                  s = space,
                  1 = digits (0..9), and
                  ! = symbols (!"#$%&'()*+,-./:;<=>?@[\]^_`{|}~).
              (b) the file name of a custom charset preceded by an "@".
                  Up to 254 chars (min = 2) can be used. eg @mychar.set
                  Char 0x00 can't be used and will be ignored.
              (c) a "#" - it's equal to the 256 possible values for a
                  char except 0x00 and 0x08.

Example: If passwd_len = 0, FZC will try passwd_len = 1 and increment
         it until length 32 is completed, or you suspend the session.

Try to use a small charset.  If you know the password is lower case
only, use the "a" option, not "#".  "#" takes ages, it's only good for
very short passwords (up to length 5).
Example: the table below lists the max time to crack a password of a
given length using different charsets assuming 2 million tries/sec:
  charset chsetlen  len = 4    len = 5      len = 6      len = 7
  1       10        <1 sec     <1 sec       <1 sec       5 secs
  a       26        <1 sec     5.9 secs     2.6 mins     1.1 hours
  !s      33        <1 sec     20 secs      10.8 mins    5.9 hours
  aA      52        4 secs     3.2 mins     2.7 hours    5.9 days
  aA1     62        7 secs     7.6 mins     7.9 hours    20.4 days
  aA1s!   95        41 secs    1.1 hours    4.3 days     1.1 years
  #       254       35 mins    6.1 days     4.3 years    1081 years

While FZC is working in the brute-force mode, you can view the current
try pressing the space bar or suspend the session pressing ESC.
If you press ESC, FZC will create a RESUME.FZC file in the current
directory and quit; to resume from that file, you must execute FZC with
the "-mr" parameter.

The optional -p"x:y" parameter is used to distribute the work if you
have access to several computers, and assumes they are equally
powerful     y  is the total number of computers (2 to 999)
             x  is the actual one (1 to y).

Example: If you have 3 computers you can use their combined power to
         crack a single ZIP, just execute FZC using 1:3, 2:3 and 3:3.
         Each machine will try 1/3 of the passwords of each length.

Examples:  FZC -mb -nztest.zip -l4 -ca1
              will find passwords like "byte", "ko0l" and "4711".
           FZC -mb -nztest.zip -l0 -ca
              will find (given enough years) any lowercase password.
