Home > Information > Blog > Search
Search the blog
21.02.2018
Windows Password Recovery v11.4.1
New mutation rules, some minor changes and bug fixes
16.02.2018
Wirerless Password Recovery v4.2.8
Some minor changes and bug fixes
12.01.2018
Reset Windows Password v8.2
Support for Bitlocker encryption
25.12.2017
Happy holidays!
New Year greetings and holidays discount

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action

Search categories

Search by date

<< February 2018 >>
MoTuWeThFrSaSu
1234
567891011
12131415161718
19202122232425
262728

Found messages

Analyzing rule efficiency in a hybrid dictionary attack

  When it comes to password decryption, a hybrid dictionary attack is a very flexible and in ... More >>
Date: 11:34:10 25.08.2017
Categories: Articles
Keywords:  hybrid, dictionary attack, dictionary, wordlist, rule, mutation, password, word, recover, find, hash
 

Creating unique dictionaries for password recovery

A lot of water has flown under the bridge since the first password recovery tool has appeared, but a ... More >>
Date: 16:15:28 12.12.2013
Categories: Articles
Keywords:  password, recovery, brute, brute-force, dictionary, wordlist, create, tool, program
 

Hacking WPA2 passwords on Apple iOS in just a few seconds

In researching Apple iOS the German security experts Andreas Kurtz, Daniel Metz, and Felix C. Frei ... More >>
Date: 09:33:24 19.06.2013
Categories: Articles
Keywords:  apple ios, wifi, wpa, psk, hack, crack, break, decrypt, mobile, hotspot, gpu, security
 

The Right Reverend James Langstaff is urging Christians to use Bible Quotes as Passwords

English bishop James Langstaff suggests using Bible quotes instead of more conventional, simple pa ... More >>
Date: 12:56:28 09.04.2012
Categories: Articles
Keywords:  bible, strong, password, phrase, recover, program
 

DPAPI Secrets. Security analysis and data recovery in DPAPI (Part 2)

DPAPI Credential History Credential History in DPAPI CREDHIST data structure CREDHIST ... More >>
Date: 16:51:23 12.03.2012
Categories: Articles
Keywords:  dpapi, decrypt, blob, master key, credhist, secret,reset, password
 

Brief Analysis of RockYou Passwords

In December 2009, the RockYou.com website was attacked by hackers. The attack was successful and r ... More >>
Date: 09:30:10 20.02.2012
Categories: Articles
Keywords:  password,analysis,audit,recovery,statistics
 

Windows passwords FAQ

Q: What is password protection? A: ... More >>
 

Recovering lost Internet Explorer passwords: Theory and Practice

  German translation of the article can be found here. You can translate the artic ... More >>
 

Recovering Internet Explorer 7 - 9 passwords

  You can translate the article into your native language in order to get the progra ... More >>
 

General instruction on recovering passwords from hashes

Use this simple instruction for the recovery of any passwords in Passcape Software programs. This in ... More >>
Date: 22:16:06 10.12.2009
Categories: Articles
Keywords:  recover, password, hash, md4, md5, sha, brute, force, dictionary, attack, word, download, program
 

Recovering domain cached passwords

You can translate the article into your native language in order to get the program's registrat ... More >>