Home > Information > Blog > Search
Search the blog
11.06.2024
OneNote password recovery v3.4
Support for Microsoft Office 365
17.04.2024
Reset Windows Password v14.2
Telegram data recovery, Photo Database and Media Player investigation tools, and some more
12.04.2024
Office password recovery tools
Resetting VBA passwords
01.03.2024
New blog post
Dumping the history of users' IP addresses in Windows

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action

Search categories

Search by date

<< June 2024 >>
MoTuWeThFrSaSu
12
3456789
10111213141516
17181920212223
24252627282930

Found messages

The History of Users' IP Addresses in Windows OS

Brief overview Understanding External IP Addresses     What is an external I ... More >>
Date: 11:15:49 01.03.2024
Categories: Articles
Keywords:  history, ip, address, user, windows, external, forensic, network, administrator, decrypt, time, online, security, system
 

Total recall: optimizing recovery process for Windows PINs based on dates

PIN stands for Personal Identification Number. But it is not just a number. It was first introduce ... More >>
Date: 09:59:47 03.04.2020
Categories: Articles
Keywords:  windows, pin, code, recover, restore, optimize, decrypt, guess, mask, hash
 

Farewell to Syskey!

Download the article as a PDF file, Hindi version, or Russian version Fare thee well, and ... More >>
Date: 15:11:44 19.10.2017
Categories: Articles
Keywords:  syskey, encryption, md5, rc4, aes, decrypt, registry, microsoft, key, sam, windows, fall creators update
 

Security audit: user plaintext passwords in OS Windows

Is your Windows logon password 30 characters long? Sorry to break it to you, but it's useless. Any ... More >>
Date: 10:50:39 30.05.2012
Categories: Articles
Keywords:  windows, user, logon, plaintext password, password, windows, hash, secret, registry, windows password recovery
 

DPAPI Secrets. Security analysis and data recovery in DPAPI (Part 2)

DPAPI Credential History Credential History in DPAPI CREDHIST data structure CREDHIST ... More >>
Date: 16:51:23 12.03.2012
Categories: Articles
Keywords:  dpapi, decrypt, blob, master key, credhist, secret,reset, password
 

DPAPI Secrets. Security analysis and data recovery in DPAPI (Part 1)

Introduction DPAPI architecture and security What is DPAPI What does DPAPI protec ... More >>
Date: 16:43:58 12.03.2012
Categories: Articles
Keywords:  dpapi, decrypt, blob, master key, credhist, secret,reset, password
 

Modifying PC BIOS setting to load from a bootable CD/DVD/USB

  General information In order to load from your bootable drive, you may need to adjust your ... More >>
Date: 18:21:59 19.11.2010
Categories: Articles
Keywords:  Modify,bios,load,boot,cd,dvd,usb,disk
 

Windows passwords FAQ

Q: What is password protection? A: ... More >>
 

Outlook Passwords

Use strong passwords that combine upper- and lowercase let ... More >>
 

Recovering lost Internet Explorer passwords: Theory and Practice

  German translation of the article can be found here. You can translate the artic ... More >>
 

Recovering Internet Explorer 7 - 9 passwords

  You can translate the article into your native language in order to get the progra ... More >>