Using the Extraction Agent in 2026: Compatibility, Signing, Firewall, and Extraction Tips

May 11th, 2026 by Oleg Afonin

Over the years, we have published several articles about the extraction agent. However, the underlying technology changes quickly, and incremental changes often have significant cumulative effects. As a result, many of our older posts are no longer relevant and can be misleading if followed to the letter today. While last year’s recap, Installing and Troubleshooting the Extraction Agent (2025), remains a solid foundation for general setup, it does not account for the most recent hardware and software developments. This article serves as the definitive point of reference, providing an up-to-date recap of everything you need to know about the extraction agent as of May 2026.

Read the rest of this entry »

EFS-Encrypted Data Recovery

March 31st, 2009 by Katerina Korolkova, Direktur Humas

The Encrypting File System (EFS) was first introduced in Windows 2000 and, as Microsoft claims, is an excellent encryption system with no back door.

Read the rest of this entry »

Teach Yourself Secure Passwords

March 30th, 2009 by Katerina Korolkova, Direktur Humas

lifehacker has started a series of posts on choosing and using secure passwords. Few days ago they published a list of handy tips from their readers on how to create passwords you can rely on. One of the readers admitted that in a company he works for IT administrators require password change every 30 days and

Read the rest of this entry »

AutoINcomplete

March 26th, 2009 by Olga Koksharova

Have you ever had to say sorry because you’ve sent an e-mail to a wrong person? Isn’t it an embarrassing situation? Hopefully it wasn’t a confidential e-mail otherwise you may get into trouble. After all it’s typical of all of us. You’ve simply made a stupid blunder to enter a wrong address…or to use AutoComplete. Such things may trigger some unpleasant consequences which is actually a minimal harm AutoComplete can incur.

Read the rest of this entry »

Pen Testing with Distributed Password Recovery and GPUs

March 19th, 2009 by Katerina Korolkova, Direktur Humas

The German c’t magazine (issue 06/09) has published an article about cracking of NTLM-hashes with graphic cards. In this article pen test experts from SySS GmbH bring up a touchy question of how fast an intruder can break into your system. How long should your Windows logon password be, so that you could keep having your beauty sleep?

Read the rest of this entry »