Well....
This is actually somewhat like what the Internet TV Show called Hak5 talked about when they discussed TrueCrypt.
They stated how someone who could access your PC long enough, could take a snapshot of your memory using win32dd or mdd (possibly some others) on a thumb drive, and then use a program called Volatility using a plugin extract the AES key (if using AES), and I can't remember the name but I believe they claim their is an AES key brute-force tool.
NOTE: You need Admin rights to use mdd and win32dd now with 2003 SP1 and above, yet due to how IEEE 1394/Firewire's standard is written, you could eventually get a firewire thumb drive and still do this method because apparently since Firewire does DMA (Direct Memory Access) it gets kernel-level memory, instead of user-level memory, which is what you want (kernel-level).
Also, you could steal Windows's SAM files, which obviously stores passwords.
What's bad about this whole thing is, once you stole a snapshot of the person's RAM, you are free to crack the passwords in the comfort of your own home, basically bypassing any attempt that would be imposed on the target it self against brute-force or even sometimes dictionary attacks.