Intelligent Load Balancing: Optimizing Password Recovery Across Heterogeneous Units

November 14th, 2024 by Oleg Afonin

In the latest update of Elcomsoft Distributed Password Recovery (EDPR), we’ve introduced a revamped load-balancing feature. The new feature aims to enhance resource utilization on local workstations across diverse hardware configurations. This update has drastically reduced the time required to break passwords in certain hardware configurations, thanks to a refined load distribution algorithm. In this article, we’ll share some technical details on how load balancing leverages a mix of GPUs and CPU cores.

Read the rest of this entry »

Eurocrypt 2009 Highlights

June 2nd, 2009 by Andrey Belenko

About a month ago annual Eurocrypt conference took place in Cologne, Germany. This is rather academic event (as most if not all events held by IACR) so it is not always easy to read its proceedings filled with formulas and theorems. Nonetheless there are usually couple of very interesting works presented at each such event. Let me tell you a little bit about this year’s highlights.

Read the rest of this entry »

Using Passwords Online

June 1st, 2009 by Olga Koksharova

 Today’s technologies allow staying online practically 24 hrs a day, periodically falling into a sleeping mode. The Internet became easily accessible and numerous devices can connect us to the web from everywhere, and every time when we surf the web we are being registered, at least via IP address of our devices. 

Read the rest of this entry »

Getting hot? Cooling news have come

May 29th, 2009 by Olga Koksharova

First, Gigabyte suggests GV-N275UD-896H GeForce GTX 275 with special cooling system added. And second news – Thermaltake Technology threw a stylish Massive23 laptop cooler. +25C in Moscow makes us think of a better cooling here as well 🙂

Read the rest of this entry »

When CPU is not enough

May 28th, 2009 by Andrey Belenko

Hardware acceleration of password recovery has been a hot topic for quite some time already. We were the first to adopt widely available graphic cards for this purpose and we’re proud of this. Today I’d like to share some thoughts on hardware acceleration for password recovery, its past, present, and future. I will also cover the most frequently asked questions regarding GPUs.

Read the rest of this entry »

The era of cyber tsars

May 27th, 2009 by Olga Koksharova

It seems like monarchy is to reign in the cyber world. During the last weeks mass media heavily speak about the need of finding a proper authority who will be responsible for electronic information security issues: Obama seeks one for the White House, whereas EU commissioner for information society and media (Viviane Reding) announces that "Europe needs a ‘Mister Cyber Security’ as we have a ‘Mister Foreign Affairs’, a security tsar with authority to act immediately if a cyber attack is underway.

Read the rest of this entry »

Intel news: Larrabee delayed, Nehalem-EX Xeon previewed

May 27th, 2009 by Vladimir Katalov

First of all, sad news: Intel Larrabee is delayed till 2010 (we were expecting it in Q4’2009), according to the reports. With 32 cores onboard (though this number is not confirmed yet), it looks like a very good system for password cracking. Some Larrabee development tools and resources are already available, and of course, we’re porting our code to this platform, and will share the results with you as soon as we’ll be able to (we’re under the NDA with Intel; as well as with Nvidia and AMD :)).

Read the rest of this entry »

Living to the 64-bit rhythms

May 26th, 2009 by Olga Koksharova

All modern AMD and Intel processors are 64-bit and corresponding Windows versions are also on the market. It is highly recommended to use 64-bit systems (though 32-bit systems perfectly work on 64-bit processors) because in this case more than 3 Gb RAM can be employed, and today we have lots and lots of 64-bit systems, so it’s getting more and more critical.

Read the rest of this entry »

Adobe PDF security

May 22nd, 2009 by Vladimir Katalov

Wow, Adobe rethinks PDF security. Curious why? Because of vulnerabilities in Abobe Reader (and so zero-day exploits), of course. From the article:

Read the rest of this entry »

Best graphics cards

May 22nd, 2009 by Vladimir Katalov

We wrote about Cost-effective video cards recently, but what about better ones, if the prise does not really matter? Just read Best Of The Best: High-End Graphics Card Roundup at Tom’s Hardware. Large. Expensive. Power-consuming. But really fast — so best choice if you deal with GPU acceleration.

Read the rest of this entry »

Thunder Tables™ Explained

May 21st, 2009 by Andrey Belenko

From time to time we’re receiving questions regarding various technologies used in our products, especially Thunder Tables™ and GPU acceleration. Today I’d like to explain what exactly Thunder Tables™ is (and what it’s not).

Read the rest of this entry »