All USB Cables Are Equal, But Some Are More Equal Than Others

October 17th, 2025 by Elcomsoft R&D

As we outlined in the previous article (Effective Disk Imaging: Ports, Hubs, and Power), it’s better to connect external USB-C devices (such as adapters and especially write-blockers) to a USB-C port that complies with at least the USB 3.2 Gen2 specs (10 Gbit/s). But what if your computer only has USB-A ports, or only a USB-A port is free? Obviously, you’ll need a USB-C to USB-A cable – but you’ll need to choose the right one very carefully, and that’s not the only thing that matters.

Read the rest of this entry »

E-Discovery

April 16th, 2009 by Vladimir Katalov

If you have no idea what E-Discovery is, read Crossing the E-Discovery Border: IT and Legal. But if you do, I’d recommend attending this webinar anyway 🙂

Read the rest of this entry »

Password cracking with Microsoft cofee

April 16th, 2009 by Vladimir Katalov

No, it’s no a typo :). COFEE means Computer Online Forensic Evidence Extractor, actually. Never heard about it? Then read Microsoft supplies Interpol with DIY forensics tool. Just don’t ask where to get it. We have not seen it either.

Read the rest of this entry »

NEW: Rainbow Tables for password-protected Excel spreadsheets

April 16th, 2009 by Olga Koksharova

And now…. we have Rainbow Tables for Microsoft Excel docs with 40-bit encryption. So, it became possible to reach near-instant recovery of 97% of spreadsheets created in MS Excel 97-2003. Unfortunately, due to specificity of Excel spreadsheets format it’s unreal to get 100%-recovery, still, you can use brute force to cover the rest 3%.  

Read the rest of this entry »

Microsoft Office 14

April 16th, 2009 by Vladimir Katalov

According to CNET News, Office 14 technical preview will be available in Q3, and release version in the first half of 2010; Office 2010 will come in both 32-bit and 64-bit versions.

Read the rest of this entry »

New ATI Radeon card

April 16th, 2009 by Vladimir Katalov

The only our product that works with ATI cards (right now) is Wireless Security Auditor, but interesting news anyway: ATI Radeon HD 4770 Info Leaked. I’ll second the editor’s opinion that it will make a good competition to NVIDIA’a 9800GT (of course, supported by EWSA, too).

Read the rest of this entry »

“I bet you want the password, bet you wanna log in?”

April 16th, 2009 by Olga Koksharova

Nice lyrics stirs up hacker’s morning drowsy feelings 🙂
 

Read the rest of this entry »

Smart Password Mutations Explained

April 15th, 2009 by Katerina Korolkova, Direktur Humas

Strong passwords are mutated passwords. Everyone who publishes recommendations on creating secure password says that you have to use both upper- and lower-case letters and inject some tricky special characters. Such recommendations may result in p@$$words and pAsswOrds, and p_a_s_s_w_o_r_d_s. The fact is that modern password recovery software uses dictionary attack to get one’s password back. Dictionary attack means searching lists of dictionary words and common phrases that can be found on the Internet or delivered with the software. It is easy to grab that dictionary words and word phrases make bad passwords, but one has to understand that adding special characters to these words and phrases does’t do them any good. Such password can be easily cracked when smart mutations option is on. 

Read the rest of this entry »

Great hot water supply

April 15th, 2009 by Olga Koksharova

Google made a video tour inside their premises. Looks like an amazing wire-n-hardware gathering:

Read the rest of this entry »

Windows Passwords

April 15th, 2009 by Vladimir Katalov

Need more information on passwords in Active Directory environment — password policies, default settings, fine-graining? Then read Windows Passwords: Making them Secure article at WindowsSecurity.com. But we can also recommend using Proactive Password Auditor on a regular basis, to see how secure your passwords really are.

Read the rest of this entry »