Home > Information > Blog > Search
Search the blog
27.11.2017
Cyber Monday Deals
20% off for all
03.11.2017
Reset Windows Password v8.1
Support for Windows 10 Fall Creators Update
02.11.2017
Windows Password Recovery v 11.3
Support for new GPUs, Windows 10 FCU
19.10.2017
New blog post
Farewell to Syskey!

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action

Search categories

Search by date

<< December 2017 >>
MoTuWeThFrSaSu
123
45678910
11121314151617
18192021222324
25262728293031

Found messages

Analyzing rule efficiency in a hybrid dictionary attack

  When it comes to password decryption, a hybrid dictionary attack is a very flexible and in ... More >>
Date: 11:34:10 25.08.2017
Categories: Articles
Keywords:  hybrid, dictionary attack, dictionary, wordlist, rule, mutation, password, word, recover, find, hash
 

Creating unique dictionaries for password recovery

A lot of water has flown under the bridge since the first password recovery tool has appeared, but a ... More >>
Date: 16:15:28 12.12.2013
Categories: Articles
Keywords:  password, recovery, brute, brute-force, dictionary, wordlist, create, tool, program
 

Hacking WPA2 passwords on Apple iOS in just a few seconds

In researching Apple iOS the German security experts Andreas Kurtz, Daniel Metz, and Felix C. Frei ... More >>
Date: 09:33:24 19.06.2013
Categories: Articles
Keywords:  apple ios, wifi, wpa, psk, hack, crack, break, decrypt, mobile, hotspot, gpu, security
 

The Right Reverend James Langstaff is urging Christians to use Bible Quotes as Passwords

English bishop James Langstaff suggests using Bible quotes instead of more conventional, simple pa ... More >>
Date: 12:56:28 09.04.2012
Categories: Articles
Keywords:  bible, strong, password, phrase, recover, program
 

DPAPI Secrets. Security analysis and data recovery in DPAPI (Part 2)

DPAPI Credential History Credential History in DPAPI CREDHIST data structure CREDHIST ... More >>
Date: 16:51:23 12.03.2012
Categories: Articles
Keywords:  dpapi, decrypt, blob, master key, credhist, secret,reset, password
 

Brief Analysis of RockYou Passwords

In December 2009, the RockYou.com website was attacked by hackers. The attack was successful and r ... More >>
Date: 09:30:10 20.02.2012
Categories: Articles
Keywords:  password,analysis,audit,recovery,statistics
 

Windows passwords FAQ

Q: What is password protection? A: ... More >>
 

Recovering lost Internet Explorer passwords: Theory and Practice

  German translation of the article can be found here. You can translate the artic ... More >>
 

Recovering Internet Explorer 7 - 9 passwords

  You can translate the article into your native language in order to get the progra ... More >>
 

General instruction on recovering passwords from hashes

Use this simple instruction for the recovery of any passwords in Passcape Software programs. This in ... More >>
Date: 22:16:06 10.12.2009
Categories: Articles
Keywords:  recover, password, hash, md4, md5, sha, brute, force, dictionary, attack, word, download, program
 

Recovering domain cached passwords

You can translate the article into your native language in order to get the program's registrat ... More >>