All USB Cables Are Equal, But Some Are More Equal Than Others

October 17th, 2025 by Elcomsoft R&D

As we outlined in the previous article (Effective Disk Imaging: Ports, Hubs, and Power), it’s better to connect external USB-C devices (such as adapters and especially write-blockers) to a USB-C port that complies with at least the USB 3.2 Gen2 specs (10 Gbit/s). But what if your computer only has USB-A ports, or only a USB-A port is free? Obviously, you’ll need a USB-C to USB-A cable – but you’ll need to choose the right one very carefully, and that’s not the only thing that matters.

Read the rest of this entry »

Hard news from COMPUTEX 2009

June 3rd, 2009 by Olga Koksharova

It looks like AMD has outrun NVIDIA today. Its World’s First Microsoft DirectX® 11 Graphics Processor, presented a few hours ago in Taipei, is currently the best hardware for Windows 7. Catch up, NVIDIA! However not many details of it suggested. At least enjoy the graphics:  

Read the rest of this entry »

Password Usage Behavior Survey Announced

June 3rd, 2009 by Olga Koksharova

ElcomSoft is launching a survey intended to collect more information on how people handle their passwords, which remain a major way for user authentication. Whether you are ElcomSoft customer or haven’t seriously thought about password security, we hope you will answer our questions.

Read the rest of this entry »

Nvidia Unveils 1U Server With 2 Tesla GPUs On Board

June 3rd, 2009 by Katerina Korolkova, Direktur Humas

The summer has begun, and as usual at this time of the year big companies present the results of hard work to the public. With Microsoft’s Bing and Google Wave flooding the news, you might have overlooked the joint release of NVIDIA and Supermicro. At Computex 2009 in Taipei, Taiwan, Nvidia and Supermicro announced

Read the rest of this entry »

More reasons to hack your PC

June 2nd, 2009 by Olga Koksharova

Want to get an overall picture of all potential threats to your unprotected pc and how it can be used when hacked? Have a look at the vivid graph drafted by Brian Krebs. It’s not only credit cards and passwords… Hey, Brian says this monstrous list not complete, I wonder if you have something to add? 

Read the rest of this entry »

Eurocrypt 2009 Highlights

June 2nd, 2009 by Andrey Belenko

About a month ago annual Eurocrypt conference took place in Cologne, Germany. This is rather academic event (as most if not all events held by IACR) so it is not always easy to read its proceedings filled with formulas and theorems. Nonetheless there are usually couple of very interesting works presented at each such event. Let me tell you a little bit about this year’s highlights.

Read the rest of this entry »

Using Passwords Online

June 1st, 2009 by Olga Koksharova

 Today’s technologies allow staying online practically 24 hrs a day, periodically falling into a sleeping mode. The Internet became easily accessible and numerous devices can connect us to the web from everywhere, and every time when we surf the web we are being registered, at least via IP address of our devices. 

Read the rest of this entry »

Getting hot? Cooling news have come

May 29th, 2009 by Olga Koksharova

First, Gigabyte suggests GV-N275UD-896H GeForce GTX 275 with special cooling system added. And second news – Thermaltake Technology threw a stylish Massive23 laptop cooler. +25C in Moscow makes us think of a better cooling here as well 🙂

Read the rest of this entry »

When CPU is not enough

May 28th, 2009 by Andrey Belenko

Hardware acceleration of password recovery has been a hot topic for quite some time already. We were the first to adopt widely available graphic cards for this purpose and we’re proud of this. Today I’d like to share some thoughts on hardware acceleration for password recovery, its past, present, and future. I will also cover the most frequently asked questions regarding GPUs.

Read the rest of this entry »

The era of cyber tsars

May 27th, 2009 by Olga Koksharova

It seems like monarchy is to reign in the cyber world. During the last weeks mass media heavily speak about the need of finding a proper authority who will be responsible for electronic information security issues: Obama seeks one for the White House, whereas EU commissioner for information society and media (Viviane Reding) announces that "Europe needs a ‘Mister Cyber Security’ as we have a ‘Mister Foreign Affairs’, a security tsar with authority to act immediately if a cyber attack is underway.

Read the rest of this entry »