Home > Information > Blog > Search
Search the blog
24.05.2019
Wireless Password Recovery v6.0.1
New GPU engine and automated multi-mode for recovery
15.05.2019
Internet Explorer Password Recovery v5.1
New algorithm of password extraction for Windows 8/10 OSes
15.05.2019
Windows Mail Password Recovery
Support for Windows 10 Mail
07.05.2019
Passcape Win CD Keys v 2.9
Extracting Windows OEM product keys from BIOS

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action

Search categories

Search by date

<< May 2019 >>
MoTuWeThFrSaSu
12345
6789101112
13141516171819
20212223242526
2728293031

Found messages

Windows tick-tock

  While assessing and analyzing new protection methods in various operating systems of the Win ... More >>
Date: 13:11:06 27.09.2012
Categories: Articles
Keywords:  windows, security, dpapi, efs, ntfs, active directiry, bug
 

Brief analysis of Yahoo leaked passwords

In early July 2012, the hacker group D33Ds Company published on its website a text file with email ... More >>
Date: 14:48:02 18.07.2012
Categories: Articles
Keywords:  yahoo, leak, password, crack, break, windows password recovery, popular, password audit
 

GPU FAQ

Q: What are the system requirements to run GPU recovery? ... More >>
Date: 09:54:14 30.05.2012
Categories: Articles
Keywords:  gpu,faq,windows password recovery,passwords,brute,force,cuda,device,video
 

DPAPI Secrets. Security analysis and data recovery in DPAPI (Part 2)

DPAPI Credential History Credential History in DPAPI CREDHIST data structure CREDHIST ... More >>
Date: 16:51:23 12.03.2012
Categories: Articles
Keywords:  dpapi, decrypt, blob, master key, credhist, secret,reset, password
 

DPAPI Secrets. Security analysis and data recovery in DPAPI (Part 1)

Introduction DPAPI architecture and security What is DPAPI What does DPAPI protec ... More >>
Date: 16:43:58 12.03.2012
Categories: Articles
Keywords:  dpapi, decrypt, blob, master key, credhist, secret,reset, password
 

Brief Analysis of RockYou Passwords

In December 2009, the RockYou.com website was attacked by hackers. The attack was successful and r ... More >>
Date: 09:30:10 20.02.2012
Categories: Articles
Keywords:  password,analysis,audit,recovery,statistics
 

Modifying PC BIOS setting to load from a bootable CD/DVD/USB

  General information In order to load from your bootable drive, you may need to adjust your ... More >>
Date: 18:21:59 19.11.2010
Categories: Articles
Keywords:  Modify,bios,load,boot,cd,dvd,usb,disk
 

Windows passwords FAQ

Q: What is password protection? A: ... More >>
 

Outlook Passwords

Use strong passwords that combine upper- and lowercase let ... More >>
 

Recovering lost Internet Explorer passwords: Theory and Practice

  German translation of the article can be found here. You can translate the artic ... More >>
 

Recovering Internet Explorer 7 - 9 passwords

  You can translate the article into your native language in order to get the progra ... More >>
 

Windows Run Commands

Windows has a lot of useful commands accessible from Run menu. To invoke the Run box, click on Start ... More >>
Date: 22:41:37 10.12.2009
Categories: Articles
Keywords:  password, recover, best, software, key, run, windows, user, command, internet, program, mail, microsoft, system, passwört, free, registry, file, disk, problem, security
 

Recovering domain cached passwords

You can translate the article into your native language in order to get the program's registrat ... More >>