you can do it using brute force programs, create a fake login page, use a keylogger, use netbus to remotely install a keylogger, bind an image with a remote keylogger trojan, or sit there guessing all night long. its not as easy as most ppl say it is but it can be done. i used keyloggers on many ppls computers thats the easiest way to do it. Only thing is if u use binders or even some keylogger their most likely infected and you have to destroy the file.