Solved

Excel Password

Posted on 2011-09-15
7
309 Views
Last Modified: 2012-05-12
An employee that is no longer here has password protected an Excel 2010 spreadsheet.  What is the best way to get this file open?
0
Comment
Question by:ACA_Infrastructure
  • 4
  • 3
7 Comments
 
LVL 81

Expert Comment

by:zorvek (Kevin Jones)
ID: 36545235
What kind of protection? Workbook? Worksheet? VBA?

Kevin
0
 

Author Comment

by:ACA_Infrastructure
ID: 36545247
I believe it to be just a worksheet
0
 
LVL 81

Accepted Solution

by:
zorvek (Kevin Jones) earned 500 total points
ID: 36545262
Experts Exchange prefers that we do not post methods for unlocking worksheets and workbooks without the password, but, in the case of Excel, posting a link to another site that publicly displays the technique is acceptable. You will find complete instructions for unlocking a workbook or a worksheet without the password at http://www.zorvek.com/excel/unlocking-workbooks-and-sheets.htm.

Kevin
0
What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

 

Assisted Solution

by:ACA_Infrastructure
ACA_Infrastructure earned 0 total points
ID: 36545543
We were able to get find the password!  Now can we set the spreedsheet to never be protected again or does that have to be done by GPO?
0
 
LVL 81

Assisted Solution

by:zorvek (Kevin Jones)
zorvek (Kevin Jones) earned 500 total points
ID: 36545744
You can't prevent someone from protecting a worksheet unless you lock the workbook structure.

Kevin
0
 
LVL 81

Expert Comment

by:zorvek (Kevin Jones)
ID: 36545771
Actually, the user can still protect the worksheet if the workbook structure is protected.

So, it looks like you will have to resort to other means outside of the available Excel options.

Kevin
0
 

Author Closing Comment

by:ACA_Infrastructure
ID: 36565513
This issue is resolved.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Dealing with unintended Excel Active-X resizing quirks (VBA code simulates "self correction") David Miller (dlmille) Intro Not everyone is a fan of Active-X controls in spreadsheets (as opposed to the UserForm approach, the older Form controls …
This article descibes how to create a connection between Excel and SAP and how to move data from Excel to SAP or the other way around.
Viewers will learn the basics of slicers and timelines for both PivotTables and standard Excel tables in Excel 2013.
The viewer will learn how to create two correlated normally distributed random variables in Excel, use a normal distribution to simulate the return on different levels of investment in each of the two funds over a period of ten years, and, create a …

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now