October 17th, 2025 by Elcomsoft R&D
As we outlined in the previous article (Effective Disk Imaging: Ports, Hubs, and Power), it’s better to connect external USB-C devices (such as adapters and especially write-blockers) to a USB-C port that complies with at least the USB 3.2 Gen2 specs (10 Gbit/s). But what if your computer only has USB-A ports, or only a USB-A port is free? Obviously, you’ll need a USB-C to USB-A cable – but you’ll need to choose the right one very carefully, and that’s not the only thing that matters.
April 16th, 2009 by Vladimir Katalov
If you have no idea what E-Discovery is, read Crossing the E-Discovery Border: IT and Legal. But if you do, I’d recommend attending this webinar anyway 🙂
April 16th, 2009 by Vladimir Katalov
No, it’s no a typo :). COFEE means Computer Online Forensic Evidence Extractor, actually. Never heard about it? Then read Microsoft supplies Interpol with DIY forensics tool. Just don’t ask where to get it. We have not seen it either.
April 16th, 2009 by Olga Koksharova
And now…. we have Rainbow Tables for Microsoft Excel docs with 40-bit encryption. So, it became possible to reach near-instant recovery of 97% of spreadsheets created in MS Excel 97-2003. Unfortunately, due to specificity of Excel spreadsheets format it’s unreal to get 100%-recovery, still, you can use brute force to cover the rest 3%.
April 16th, 2009 by Vladimir Katalov
Sad information: Hackers grab more than 285M records in 2008. Just curious, how about Sarbanes-Oxley Act, does it really work? 🙂
April 16th, 2009 by Vladimir Katalov
According to CNET News, Office 14 technical preview will be available in Q3, and release version in the first half of 2010; Office 2010 will come in both 32-bit and 64-bit versions.
April 16th, 2009 by Vladimir Katalov
The only our product that works with ATI cards (right now) is Wireless Security Auditor, but interesting news anyway: ATI Radeon HD 4770 Info Leaked. I’ll second the editor’s opinion that it will make a good competition to NVIDIA’a 9800GT (of course, supported by EWSA, too).
April 16th, 2009 by Olga Koksharova
Nice lyrics stirs up hacker’s morning drowsy feelings 🙂
April 15th, 2009 by Katerina Korolkova, Direktur Humas
Strong passwords are mutated passwords. Everyone who publishes recommendations on creating secure password says that you have to use both upper- and lower-case letters and inject some tricky special characters. Such recommendations may result in p@$$words and pAsswOrds, and p_a_s_s_w_o_r_d_s. The fact is that modern password recovery software uses dictionary attack to get one’s password back. Dictionary attack means searching lists of dictionary words and common phrases that can be found on the Internet or delivered with the software. It is easy to grab that dictionary words and word phrases make bad passwords, but one has to understand that adding special characters to these words and phrases does’t do them any good. Such password can be easily cracked when smart mutations option is on.
April 15th, 2009 by Olga Koksharova
Google made a video tour inside their premises. Looks like an amazing wire-n-hardware gathering:
April 15th, 2009 by Vladimir Katalov
Need more information on passwords in Active Directory environment — password policies, default settings, fine-graining? Then read Windows Passwords: Making them Secure article at WindowsSecurity.com. But we can also recommend using Proactive Password Auditor on a regular basis, to see how secure your passwords really are.