Analyzing the Windows SRUM Database

August 15th, 2025 by Oleg Afonin

When it comes to Windows forensics, some of the most valuable evidence can be stored deep inside system directories the average user never touches. One such source of evidence is the System Resource Usage Monitor (SRUM) database. Introduced in Windows 8 and still shipping today with the latest Windows 11 updates, SRUM collects detailed historical records about application usage and network activity. This database is a perfect source of data for reconstructing the user’s activities during an investigation. In this article, we’ll review the available types of data and demonstrate a way to access the SRUM database by using a bootable tool.

Read the rest of this entry »

CUDA-enabled applications

May 18th, 2009 by Vladimir Katalov

Tom’s Hardware has tested two mainstream NVIDIA cards (GeForce 9600 GT and GeForce 9800 GTX) on several CUDA-enabled applications. The applications were:

Read the rest of this entry »

Week of Scams

May 15th, 2009 by Katerina Korolkova, Direktur Humas

have a great and secure weekend 🙂  

Read the rest of this entry »

Overclocked AMD/ATI card

May 14th, 2009 by Vladimir Katalov

AMD has hit another megahertz milestone record today. In fact, this is ATI Radeon HD 4890 card, overclocked to 1 GHz at the factory (normally, it runs at 850 MHz); surprisingly, air cooled (I thought that water cooling would be needed).

Read the rest of this entry »

Laptop security – myths and mistakes

May 13th, 2009 by Olga Koksharova

Today’s businesses are very mobile. Sometimes you don’t even need to have a conventional office, it becomes virtual, it is always with you in your mobile phones, netbooks and laptops. Such mobile mini-offices stuffed with corporate documents and reports, partners’ data, confidencial correspondence, access passwords are in danger of being stolen, both virtually and physically. You can try to protect your laptop using laptop security cable locks but what if it was stolen? Let all your information go into adversary’s hands? Do you _really_ think that your Windows logon password is an impenetrable barrier for the adversary? Have you heard of Elcomsoft System Recovery? You still think your laptop is secure because you have BIOS password and/or partial drive encryption? Read an article by Kevin Beaver ‘Securing corporate data on your laptops’ , take off rose-colored glasses and revise your laptop security as suggested in Kevin’s step-by-step outline. 

Read the rest of this entry »

More on SLI

May 13th, 2009 by Vladimir Katalov

If you are going to purchase a new computer (or make it yourself), you should definitely think about graphics — for CAD/CAM, gaming, searching for extraterrestrial intelligence at home or password cracking. Of course, thinking of budget, too. I hope you’re already aware of NVIDIA SLI which allows to use multiple video cards, but how a single dual-GPU compares to two single-GPU ones? Read GeForce GTX 295 Vs. GTX 275 SLI: When Two Are Better Than One.

Read the rest of this entry »

Password-related news

May 12th, 2009 by Vladimir Katalov

There is a few, so I’ll put ’em all into a single blog post 🙂

Read the rest of this entry »

Hard disk recovery

May 12th, 2009 by Vladimir Katalov

Highly recommended: Burned, Dropped, Drowned: HDD Recovery In Pictures. I hope that you will not encounter into such situations, though :).

Read the rest of this entry »

DC4420

May 12th, 2009 by Vladimir Katalov

Apart from official IT Security events, London ethical hackers like to organize monthly meetings such as DC4420 in clubs, sometimes changing their location. In an informal manner they exchange their experience, represent new ideas and technologies.

Read the rest of this entry »

Green password policy? No re-use!

May 10th, 2009 by Olga Koksharova

Do you still reuse passwords? The recent study from University of California shows again that such a bad habit continues to exist. The worst thing about reusing passwords is that it doesn’t require being a technically skilled hacker to guess your password for this or that document.  

Read the rest of this entry »