Intelligent Load Balancing: Optimizing Password Recovery Across Heterogeneous Units

November 14th, 2024 by Oleg Afonin

In the latest update of Elcomsoft Distributed Password Recovery (EDPR), we’ve introduced a revamped load-balancing feature. The new feature aims to enhance resource utilization on local workstations across diverse hardware configurations. This update has drastically reduced the time required to break passwords in certain hardware configurations, thanks to a refined load distribution algorithm. In this article, we’ll share some technical details on how load balancing leverages a mix of GPUs and CPU cores.

Read the rest of this entry »

Home and Corporate Wireless Security

June 8th, 2009 by Olga Koksharova

Securing home Wi-Fi remains uncertain when it comes to law. Some urge users are not liable when they use default security settings and it is manufacturer who is guilty when/if wireless network was ‘successfully’ abused. Others put whole responsibility on users. This is practically a question to law and usually its resolution depends on lawyers’ skills to gather and manipulate the details. Your security encompasses not only security against the law when you happen to fall a victim to an intruder, but also protection against that very intruder. In the long run, it’s up to you whether to endeavor to prove your innocence or take measures to build a reliable fence.

Read the rest of this entry »

New iPhone

June 6th, 2009 by Vladimir Katalov

Latest rumors about iPhone: probably, it will have 3D Graphics Chip in it, according to Fudzilla article. Let’s hope that it will be CUDA-enabled, so we can make GPU-accelerated password cracker for it 😉

Read the rest of this entry »

From COMPUTEX TAIPEI

June 6th, 2009 by Vladimir Katalov

Sorry I did not write blog for some time… Just returned from one-week vacation at Rhodos (Greece).

Read the rest of this entry »

Microsoft UK NTO turns from praxis to theory

June 5th, 2009 by Olga Koksharova

 Jerry Fishenden, Microsoft National Technology Officer in the UK leaves his post to work on his own. He intends to elaborate “a guidebook for politicians and policymakers about what does and doesn’t work in terms of delivering an effective technology policy”

Read the rest of this entry »

Preliminary Larrabee perfomance revealed

June 5th, 2009 by Andrey Belenko

When it comes to Larrabee one of most intriguing things is its performance. Official information provided by Intel was not enough to get good estimation. In my previous post I’ve estimated it as "roughly equivalent to GTX 295". Well, it seems I was too optimistic. Latest rumors are that current Larrabee samples deliver same performance as GTX 285.

Read the rest of this entry »

Hard news from COMPUTEX 2009

June 3rd, 2009 by Olga Koksharova

It looks like AMD has outrun NVIDIA today. Its World’s First Microsoft DirectX® 11 Graphics Processor, presented a few hours ago in Taipei, is currently the best hardware for Windows 7. Catch up, NVIDIA! However not many details of it suggested. At least enjoy the graphics:  

Read the rest of this entry »

Password Usage Behavior Survey Announced

June 3rd, 2009 by Olga Koksharova

ElcomSoft is launching a survey intended to collect more information on how people handle their passwords, which remain a major way for user authentication. Whether you are ElcomSoft customer or haven’t seriously thought about password security, we hope you will answer our questions.

Read the rest of this entry »

Nvidia Unveils 1U Server With 2 Tesla GPUs On Board

June 3rd, 2009 by Katerina Korolkova, Direktur Humas

The summer has begun, and as usual at this time of the year big companies present the results of hard work to the public. With Microsoft’s Bing and Google Wave flooding the news, you might have overlooked the joint release of NVIDIA and Supermicro. At Computex 2009 in Taipei, Taiwan, Nvidia and Supermicro announced

Read the rest of this entry »

More reasons to hack your PC

June 2nd, 2009 by Olga Koksharova

Want to get an overall picture of all potential threats to your unprotected pc and how it can be used when hacked? Have a look at the vivid graph drafted by Brian Krebs. It’s not only credit cards and passwords… Hey, Brian says this monstrous list not complete, I wonder if you have something to add? 

Read the rest of this entry »