Using the Extraction Agent in 2026: Compatibility, Signing, Firewall, and Extraction Tips

May 11th, 2026 by Oleg Afonin

Over the years, we have published several articles about the extraction agent. However, the underlying technology changes quickly, and incremental changes often have significant cumulative effects. As a result, many of our older posts are no longer relevant and can be misleading if followed to the letter today. While last year’s recap, Installing and Troubleshooting the Extraction Agent (2025), remains a solid foundation for general setup, it does not account for the most recent hardware and software developments. This article serves as the definitive point of reference, providing an up-to-date recap of everything you need to know about the extraction agent as of May 2026.

Read the rest of this entry »

Adobe PDF security

May 22nd, 2009 by Vladimir Katalov

Wow, Adobe rethinks PDF security. Curious why? Because of vulnerabilities in Abobe Reader (and so zero-day exploits), of course. From the article:

Read the rest of this entry »

Best graphics cards

May 22nd, 2009 by Vladimir Katalov

We wrote about Cost-effective video cards recently, but what about better ones, if the prise does not really matter? Just read Best Of The Best: High-End Graphics Card Roundup at Tom’s Hardware. Large. Expensive. Power-consuming. But really fast — so best choice if you deal with GPU acceleration.

Read the rest of this entry »

Thunder Tables™ Explained

May 21st, 2009 by Andrey Belenko

From time to time we’re receiving questions regarding various technologies used in our products, especially Thunder Tables™ and GPU acceleration. Today I’d like to explain what exactly Thunder Tables™ is (and what it’s not).

Read the rest of this entry »

Frequently Asked Question: Advanced Office Password RECOVERY or Advanced Office Password BREAKER?

May 20th, 2009 by Olga Koksharova

Time is money, difficult to contradict this fact. And another proven fact is that you lose something exactly when something turns out to be absolutely necessary. Once you lost a password to your Word document or presentation that you were going to give in an hour, or Excel report which was supposed to be sent to your manager yesterday… you will count seconds before you get back your files.

Read the rest of this entry »

Too much security won’t spoil the router, will it make it better?

May 18th, 2009 by Olga Koksharova

A number of D-link routers are now equipped with captcha feature. Sounds interesting. 

Read the rest of this entry »

CUDA-enabled applications

May 18th, 2009 by Vladimir Katalov

Tom’s Hardware has tested two mainstream NVIDIA cards (GeForce 9600 GT and GeForce 9800 GTX) on several CUDA-enabled applications. The applications were:

Read the rest of this entry »

Week of Scams

May 15th, 2009 by Katerina Korolkova, Direktur Humas

have a great and secure weekend 🙂  

Read the rest of this entry »

Overclocked AMD/ATI card

May 14th, 2009 by Vladimir Katalov

AMD has hit another megahertz milestone record today. In fact, this is ATI Radeon HD 4890 card, overclocked to 1 GHz at the factory (normally, it runs at 850 MHz); surprisingly, air cooled (I thought that water cooling would be needed).

Read the rest of this entry »