It is utilized to recuperate the loss of data, particularly when you lost your secret word. It is utilized to perform entrance testing to build the security of the PC and organization. It is utilized to test how great security is in your organization.