Analyzing the Windows SRUM Database

August 15th, 2025 by Oleg Afonin

When it comes to Windows forensics, some of the most valuable evidence can be stored deep inside system directories the average user never touches. One such source of evidence is the System Resource Usage Monitor (SRUM) database. Introduced in Windows 8 and still shipping today with the latest Windows 11 updates, SRUM collects detailed historical records about application usage and network activity. This database is a perfect source of data for reconstructing the user’s activities during an investigation. In this article, we’ll review the available types of data and demonstrate a way to access the SRUM database by using a bootable tool.

Read the rest of this entry »

Encryption and decryption from security law perspective (Part II)

July 3rd, 2009 by Olga Koksharova

In my previous post I suggested several variants of computer security translated by different laws. Now I’d like to get to ciphers…again viewed by law.

Read the rest of this entry »

Rumored AMD Phenom II X4 TWKR chips accessible?

July 1st, 2009 by Olga Koksharova

Not long ago I wrote about AMD’s TWKR when the first rumors reached the media. Now we have more news on that. And the sad one is that TWKR still cannot be purchased in retail and most probably won’t be, at least not the ones from the sought-after 100 exemplars that exist today.

Read the rest of this entry »

Password by Toolman

July 1st, 2009 by Olga Koksharova

Do you understand a word? Except for "password"? Translator needed! 🙂

Read the rest of this entry »

Reasonable, appropriate, adequate…security (Part I)

June 30th, 2009 by Olga Koksharova

Most laws define security obligations as reasonable, appropriate, suitable, necessary, adequate etc. without giving more precise directives to follow. Is it good or bad? And what should be known about these standards?

Read the rest of this entry »

Thunder Tables – now registered trademark

June 29th, 2009 by Olga Koksharova

Good news over here! We’ve got a nice and shiny registration certificate from the United States Patent and Trademark Office. Now our Thunder Tables have their (R) sign.

Read the rest of this entry »

Password Recovery Tools Are Legal In Germany

June 24th, 2009 by Katerina Korolkova, Direktur Humas

 When we meet our customers at trade fairs in Germany, we are always asked questions about legality of our tools. The reason for this is that German law on so-called “hacking tools” is very strict. At the same time the wording of the respective paragraphs is unclear and ambiguous.

Read the rest of this entry »

Intel Larrabee, AMD Llano: when?

June 23rd, 2009 by Vladimir Katalov

According to NordicHardware, Sapphire Or Zotac Might Launch Larrabee. No further information on Larrabee yet, though; as we already wrote, the Larrabee lauch date is set to 2010. The only news from Intel so far is about i3, i5, i7 CPU naming system: Lynnfield, Clarksfield, Arrandale, Clarkdale; besides, Intel plans shipments of 32nm ‘Clarkdale’ in Q4.

Read the rest of this entry »

Squeezing your First Amendment rights

June 23rd, 2009 by Olga Koksharova

In the city of Bozeman (the US) it is…pardon, was “acceptable” to require user credentials to your personal mailboxes and other social networking accounts, when applying for a job. What for? For “a thorough background check”. Have a look at their press release:

Read the rest of this entry »

AMD Phenom II 42 TWKR Black Edition is the new black

June 19th, 2009 by Olga Koksharova

The world is waiting for the specifications of currently most powerful processor – AMD Phenom II 42 TWKR Black Edition aka Formula 1. They say it has an unlocked clock multiplier for ease of overclocking, though consumes 200W and thus requires good cooling. One of the pictures on the website of Maingear PC founder and CEO (Wallace Santos) has a not-for-sale-note which caused a gossip that the new processor is not meant for retail, but probably for direct selling from AMD to “extreme enthusiasts”.

Read the rest of this entry »

The U.S. statutes on password related crimes – overview by states

June 18th, 2009 by Olga Koksharova

In this entry I’d like to suggest a kind of a list of various legal decisions on password [ab]use I could find on the web. Your add-ins are welcome, just put in any other acts you know…

Read the rest of this entry »