A. Crack a password or username
B. Find a hidden web page
C. find the key used to encrypt a message
D. All of the above