November 27th, 2025 by Oleg Afonin
Eighteen years ago, before “GPU acceleration” and “AI data center” became household terms, a small hi-tech company changed the rules of cryptography. In 2007, we unveiled a radical idea – using the untapped power of graphics processors to recover passwords, which coincided with the release of video cards capable of performing fixed-point calculations. What began as an experiment would soon redefine performance computing across nearly every field.
March 30th, 2009 by Katerina Korolkova, Direktur Humas
lifehacker has started a series of posts on choosing and using secure passwords. Few days ago they published a list of handy tips from their readers on how to create passwords you can rely on. One of the readers admitted that in a company he works for IT administrators require password change every 30 days and
March 26th, 2009 by Olga Koksharova
Have you ever had to say sorry because you’ve sent an e-mail to a wrong person? Isn’t it an embarrassing situation? Hopefully it wasn’t a confidential e-mail otherwise you may get into trouble. After all it’s typical of all of us. You’ve simply made a stupid blunder to enter a wrong address…or to use AutoComplete. Such things may trigger some unpleasant consequences which is actually a minimal harm AutoComplete can incur.
March 19th, 2009 by Katerina Korolkova, Direktur Humas
The German c’t magazine (issue 06/09) has published an article about cracking of NTLM-hashes with graphic cards. In this article pen test experts from SySS GmbH bring up a touchy question of how fast an intruder can break into your system. How long should your Windows logon password be, so that you could keep having your beauty sleep?