November 14th, 2024 by Oleg Afonin
In the latest update of Elcomsoft Distributed Password Recovery (EDPR), we’ve introduced a revamped load-balancing feature. The new feature aims to enhance resource utilization on local workstations across diverse hardware configurations. This update has drastically reduced the time required to break passwords in certain hardware configurations, thanks to a refined load distribution algorithm. In this article, we’ll share some technical details on how load balancing leverages a mix of GPUs and CPU cores.
May 12th, 2009 by Vladimir Katalov
There is a few, so I’ll put ’em all into a single blog post 🙂
May 12th, 2009 by Vladimir Katalov
Highly recommended: Burned, Dropped, Drowned: HDD Recovery In Pictures. I hope that you will not encounter into such situations, though :).
May 12th, 2009 by Vladimir Katalov
Apart from official IT Security events, London ethical hackers like to organize monthly meetings such as DC4420 in clubs, sometimes changing their location. In an informal manner they exchange their experience, represent new ideas and technologies.
May 10th, 2009 by Olga Koksharova
Do you still reuse passwords? The recent study from University of California shows again that such a bad habit continues to exist. The worst thing about reusing passwords is that it doesn’t require being a technically skilled hacker to guess your password for this or that document.
April 30th, 2009 by Vladimir Katalov
Note to PGP legal dept: I’m not going to put the ® sign every time when I mention PGP. I’m just tired; we already did that in our press release and on our web site, and I think it’s enough. No, really? Well, I’ll repeat one more time: all names like PGP are trademarks or registered trademarks of their respective owners in the UK, USA, Russia and probably somewhere else – e.g. in Albania. There are too many countries to mention, sorry :). Why should I care about (R)? Keep reading, and you’ll see the reason.
April 30th, 2009 by Andrey Belenko
There is a lot of speculation about what has happened between Elcomsoft and PGP here on Infosecurity Europe 2009 in London, so I would like to share my own point of view which may or may not coincide with Elcomsoft’s.
April 28th, 2009 by Vladimir Katalov
We never thought that our participation would bring such kind of trouble (or at least a disappointment).
April 28th, 2009 by Katerina Korolkova, Direktur Humas
Last week a colleague of mine, Andrey Belenko, gave a speech at the Troopers conference in Munich. Olga wrote about it in this blog. All the talks at Troopers were awesome. Soon the videos and slide shows will be available for downloading on Troopers website.
April 28th, 2009 by Vladimir Katalov
Considering Intel Core i7? Read Nvidia Says Core i7 Isn’t Worth It and nVidia calls Core i7 a waste of money first. We’d agree that investing into GPU(s) is really a good idea, especially if you need to crack passwords.
April 28th, 2009 by Vladimir Katalov
17" screen, Intel Core 2 Extreme processor (four cores) plus NVIDIA GeForce GTX 260M — an excellent device not only for gaming, but also for wardriving. Get it from Sager, and just add Wireless Security Auditor.