The new feature allows administrators to easily manage and allocate the available computational resources across jobs. The administrative server enables users to tap into a pool of available resources by requesting a certain number of recovery agents for a given job. The reserved recovery agents will be allocated to that one job, allowing multiple password recovery tasks to run at the same time.
Resource management simplifies the process of distributing and utilizing the available computational resources across multiple password recovery jobs, ultimately leading to improved efficiency and scalability.
GPU acceleration is now supported on the newest generation of NVIDIA boards, the Ada Lovelace-based RTX 40 and RTX 40 Super series graphics cards. Using these boards, experts can achieve unprecedented recovery speeds while enjoying higher efficiency compared to previous-generation NVIDIA graphics cards.
Break complex passwords, recover strong encryption keys and unlock documents in a production environment. Elcomsoft Distributed Password Recovery is a high-end solution for forensic and government agencies, data recovery and password recovery services and corporate users with multiple networked workstations connected over a LAN or the Internet. Featuring unique acceleration technologies and providing linear scalability with no overhead, Elcomsoft Distributed Password Recovery offers the fastest password recovery by a huge margin, and is the most technologically advanced password recovery product currently available.
Elcomsoft Distributed Password Recovery employs a revolutionary, patented technology to accelerate password recovery when a compatible NVIDIA or AMD graphics card is present in addition to the CPU-only mode. Hardware acceleration utilizes GPU cores of NVIDIA GeForce boards, AMD GPUs, as well as GPU cores built into Intel CPUs including Intel HD Graphics, UHD Graphics and Intel Iris.
The acceleration technology offloads parts of computational-heavy processing onto the fast and highly scalable processors featured in the latest graphic accelerators, achieving unprecedented recovery speeds exceeding those available to CPU-only users by significant margin.
ElcomSoft pioneered asynchronous hardware acceleration. Heterogeneous acceleration allows using multiple video cards of different makes and models, effectively utilizing existing hardware and squeezing the last bit of performance out of every supported component.
Multiple Windows, Linux and macOS full-disk encryption tools are supported including TrueCrypt/VeraCrypt, all versions of Microsoft BitLocker, PGP WDE, FileVault2, BestCrypt and LUKS. The tool must be launched with administrative privileges on the live system being analyzed. If an encrypted volume is detected, a further investigation of a live system might be needed to preserve evidence that could be lost if the computer were powered off.
By only transferring the bare minimum of information over the network, Elcomsoft Distributed Password Recovery allows for massively parallel operation, and scales linearly to as many as 10,000 workstations with no scalability overhead.
The use of virtual machines is on the rise, enabling criminals cover their activities under a virtual umbrella. While storing massive amounts of evidence, an encrypted virtual machine can greatly reduce the risks of an accidental leak of incriminating evidence. Elcomsoft Distributed Password Recovery helps investigators gain access to all of that evidence by breaking the original encryption password.
Three of the most popular virtual machines are supported: VMware, Parallels, and VirtualBox. The tool can attack and recover the original VM encryption passwords, helping investigators to gain access stored in encrypted images.
Elcomsoft Distributed Password Recovery utilizes dedicated high-performance cores found in today's video cards such as those manufactured by NVIDIA and AMD to offload parts of computational-intensive calculations onto the highly scalable video cards. Featuring several hundred GPU cores, a single video card can deliver the speed far exceeding the metrics of a high-end CPU. Elcomsoft Distributed Password Recovery uses thoroughly optimized algorithms, reaching recovery rates that are up to 250 times faster compared to CPU-only benchmarks.
Today's PC motherboards support multiple video cards. Thanks to ElcomSoft's proprietary heterogeneous computing, Elcomsoft Distributed Password Recovery supports a mix of up to 32 video cards even if they are of different makes and models, allowing for even faster password recovery applications for a modest increase in hardware costs. The tool allows mixing NVIDIA and AMD boards of different generations in a single PC.
Elcomsoft Distributed Password Recovery is licensed based on the number of instances (agents). We accept all major credit cards, checks, bank transfers and purchase orders. Sales taxes may be added to your order according to your jurisdiction. Credit card orders are processed immediately. Electronic licenses are generally available instantly after the credit card charge is approved. On rare occasions where we must manually verify your order, the license will be available in 48 hours or less.
The resource management capability is a game-changer for busy environments. The feature allows administrators to easily manage and distribute the available computational resources across multiple jobs. The administrative server enables users to tap into a pool of available resources by requesting a certain number of recovery agents for a given password recovery job. The reserved recovery agents will be allocated to that one job, allowing multiple tasks to run separately at the same time.
In essence, resource management simplifies the process of managing and utilizing the available computational resources by several jobs, ultimately leading to improved efficiency and scalability. Here's how it works:
The included Elcomsoft Hash Extractor tool allows extracting encryption metadata from a wide range of file formats. By using encryption metadata to set up attacks, you are automatically excluding the possibility of potentially sensitive information such as raw or encrypted data falling into the wrong hands as none is included in the extracted hash files.
Elcomsoft Hash Extractor enables to set up attacks on a tiny hash file instead of the original, potentially large file or document. Since no raw or encrypted data is included in encryption metadata, the hash files produced with Elcomsoft Hash Extractor offer significantly higher level of privacy, allowing remote and cloud processing without the risk of a content leak.
Elcomsoft Hash Extractor supports all major Microsoft Office, Open Document, Apple iWork, and Adobe Acrobat formats, as well as LastPass and 1Password password managers and LM/NTLM/DCC hashes. The full list of supported formats is available below.
Elcomsoft Distributed Password Recovery supports a variety of applications and file formats, allowing password recovery from Office documents, Adobe PDF files, PGP disks and archives, personal security certificates and exchange keys, MD5 hashes and Oracle passwords, Windows and UNIX login passwords.
Elcomsoft Distributed Password Recovery supports a variety of applications and file formats, allowing password recovery from Office documents, Adobe PDF files, PGP disks and archives, personal security certificates and exchange keys, MD5 hashes and Oracle passwords, Windows and UNIX login passwords and much more.
Uninstallation procedure: in order to uninstall the product, follow the standard procedure via Control Panel - Programs and features or use the corresponding Unistall link from the product's folder in the Windows Start menu.
Stellar Data Recovery Professional is a powerful tool that caters to all your data recovery needs. Whether you've lost data due to accidental deletion, drive formatting without backup, Shift + Delete files, unexpected computer shutdown, or other reasons, this DIY software will help you recover the lost data. You can even restore permanently deleted or hidden files effectively.
You can recover lost and deleted data from "BitLocker" encrypted hard drives, SSD, or external storage media drives. You can also recover data from a BitLocker encrypted disk image file and choose to run a 'Quick' or 'Deep' scan to recover lost data. The user must enter the BitLocker recovery key for data recovery from encrypted drives.
This easy-to-use yet powerful data recovery software allows you to create a bootable recovery drive. You can use this bootable drive to recover data from Windows systems that fail to boot or crash for reasons like BSoD errors, boot sector corruption, hard drive failure, corrupted system files, drive file-system damage, virus infection, and more.
The software supports recovery from severely corrupted or RAW physical or removable storage media drives such as HDDs, SSDs, USB drives, and 4K Drives. It scans through each sector of the drive to locate and restore every bit of data. In addition, the software efficiently scans the RAW or inaccessible external hard drives' partitions or volumes and retrieves data using the file signature.
The software gets back lost or deleted email data files including Microsoft Outlook (PST), Outlook Express (DBX), Exchange Server (EDB), and many other file types. You just need to select 'Emails' under 'Documents, Folders & Emails' in the 'Select What to Recover' screen and scan your hard drive; the software will list all the lost or deleted email files for recovery.
You can see an enhanced view of the files found in the scanning process. The software scans each sector of the storage media drives to find lost or deleted files and neatly categorizes the scanned data in Tree View, File Type, and Deleted List formats for effortless data sorting and verification before saving. In addition, you can preview files to ensure their quality and then recover them.
b1e95dc632