Home > Information > Blog > Search
Search the blog
27.12.2016
Happy New Year!
New Year greetings and holidays discount
27.12.2016
Windows Password Recovery v11.1
Some minor improvements, changes in DPAPI engine
06.12.2016
New blog post
Hash encryption in Windows 10 Anniversary Update
30.11.2016
WPA password recovery benchmarks
New devices

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action

Search categories

Search by date

<< January 2017 >>
MoTuWeThFrSaSu
1
2345678
9101112131415
16171819202122
23242526272829
3031

Found messages

Hash Encryption in Windows 10 Anniversary Update

Microsoft recently introduced a large anniversary update for Windows 10, one of its most popular o ... More >>
Date: 11:59:40 06.12.2016
Categories: Articles
Keywords:  windows 10, Anniversary Update, hash, sam, encryption, rc4, aes, security, ntlm, lm, decrypt
 

Brief analysis of Yahoo leaked passwords

In early July 2012, the hacker group D33Ds Company published on its website a text file with email ... More >>
Date: 14:48:02 18.07.2012
Categories: Articles
Keywords:  yahoo, leak, password, crack, break, windows password recovery, popular, password audit
 

Security audit: user plaintext passwords in OS Windows

Is your Windows logon password 30 characters long? Sorry to break it to you, but it's useless. Any ... More >>
Date: 10:50:39 30.05.2012
Categories: Articles
Keywords:  windows, user, logon, plaintext password, password, windows, hash, secret, registry, windows password recovery
 

DPAPI Secrets. Security analysis and data recovery in DPAPI (Part 2)

DPAPI Credential History Credential History in DPAPI CREDHIST data structure CR ... More >>
Date: 16:51:23 12.03.2012
Categories: Articles
Keywords:  dpapi, decrypt, blob, master key, credhist, secret,reset, password
 

DPAPI Secrets. Security analysis and data recovery in DPAPI (Part 1)

Introduction DPAPI architecture and security What is DPAPI What does DPAPI protec ... More >>
Date: 16:43:58 12.03.2012
Categories: Articles
Keywords:  dpapi, decrypt, blob, master key, credhist, secret,reset, password
 

Brief Analysis of RockYou Passwords

In December 2009, the RockYou.com website was attacked by hackers. The attack was successful and r ... More >>
Date: 09:30:10 20.02.2012
Categories: Articles
Keywords:  password,analysis,audit,recovery,statistics
 

LSA Secrets in Windows

  What are LSA secrets? What is stored in LSA secrets? Where are LSA secrets stored? LSA Se ... More >>
Date: 09:28:32 04.05.2011
Categories: Articles
Keywords:  lsa, secret, windows, viewer, read, decrypt, reader, extract, download
 

Windows passwords FAQ

Q: What is password protection? A: ... More >>
 

Outlook Passwords

Use strong passwords that combine upper- and lowercase let ... More >>
 

Recovering lost Internet Explorer passwords: Theory and Practice

  German translation of the article can be found here. You can translate the article ... More >>
 

Windows Run Commands

Windows has a lot of useful commands accessible from Run menu. To invoke the Run box, click on Start ... More >>
Date: 22:41:37 10.12.2009
Categories: Articles
Keywords:  password, recover, best, software, key, run, windows, user, command, internet, program, mail, microsoft, system, passwört, free, registry, file, disk, problem, security