• You can use any third party tool to decrypet encrypted procedure