June 2nd, 2025 by Oleg Afonin
If you’re doing forensic work today, odds are you’re imaging SSDs, not just spinning hard drives. And SSDs don’t behave like HDDs – especially when it comes to deleted files. One key reason: the TRIM command. TRIM makes SSDs behave different to magnetic hard drives when it comes to recovering deleted evidence. This article breaks down what TRIM actually does, how SSDs respond, and what forensic experts need to know when handling modern storage.
May 20th, 2009 by Vladimir Katalov
Considering a (new) AMD/ATI or NVIDIA video card for password cracking with Wireless Security Auditor or Distributed Password Recovery (to get the most from GPU acceleration technology — at an affordable price)? Read the Best Graphics Cards For The Money: May ’09 at Tom’s Hardware. I especially like the Graphics Card Hierarchy Chart.
May 18th, 2009 by Olga Koksharova
A number of D-link routers are now equipped with captcha feature. Sounds interesting.
May 18th, 2009 by Vladimir Katalov
Tom’s Hardware has tested two mainstream NVIDIA cards (GeForce 9600 GT and GeForce 9800 GTX) on several CUDA-enabled applications. The applications were:
May 15th, 2009 by Katerina Korolkova, Direktur Humas
have a great and secure weekend 🙂
May 14th, 2009 by Vladimir Katalov
AMD has hit another megahertz milestone record today. In fact, this is ATI Radeon HD 4890 card, overclocked to 1 GHz at the factory (normally, it runs at 850 MHz); surprisingly, air cooled (I thought that water cooling would be needed).
May 13th, 2009 by Olga Koksharova
Today’s businesses are very mobile. Sometimes you don’t even need to have a conventional office, it becomes virtual, it is always with you in your mobile phones, netbooks and laptops. Such mobile mini-offices stuffed with corporate documents and reports, partners’ data, confidencial correspondence, access passwords are in danger of being stolen, both virtually and physically. You can try to protect your laptop using laptop security cable locks but what if it was stolen? Let all your information go into adversary’s hands? Do you _really_ think that your Windows logon password is an impenetrable barrier for the adversary? Have you heard of Elcomsoft System Recovery? You still think your laptop is secure because you have BIOS password and/or partial drive encryption? Read an article by Kevin Beaver ‘Securing corporate data on your laptops’ , take off rose-colored glasses and revise your laptop security as suggested in Kevin’s step-by-step outline.
May 13th, 2009 by Olga Koksharova
Probably you’ve already heard about this vicious circle thousand times:
May 13th, 2009 by Vladimir Katalov
If you are going to purchase a new computer (or make it yourself), you should definitely think about graphics — for CAD/CAM, gaming, searching for extraterrestrial intelligence at home or password cracking. Of course, thinking of budget, too. I hope you’re already aware of NVIDIA SLI which allows to use multiple video cards, but how a single dual-GPU compares to two single-GPU ones? Read GeForce GTX 295 Vs. GTX 275 SLI: When Two Are Better Than One.
May 12th, 2009 by Vladimir Katalov
There is a few, so I’ll put ’em all into a single blog post 🙂
May 12th, 2009 by Vladimir Katalov
Highly recommended: Burned, Dropped, Drowned: HDD Recovery In Pictures. I hope that you will not encounter into such situations, though :).