Wedid our best to enhance this tool performance as well as the recovery speed with some advanced methods and it found to be the fastest tool for MS Access password recovery. Password recovery speed for very common hardware is available below to back this statement up.
Integrated GPUs
Modern integrated GPUs (like Intel HD and Iris Graphics) can be used for password recovery acceleration. Integrated GPUs are not as powerful as dedicated (discrete) devices and often overlooked but can add up to 30% to CPU performance.
AMD and Nvidia GPUs
Compute units or stream multiprocessors (CU, SM, SMX, SMM) are the main building blocks of GPU calculation power, thus 32xCU GPU card is usually twice as fast as 16xCU GPU card of the same family and architecture running at the same frequency.
The table below shows expected performance per SM / CU for Nvidia and AMD GPUs as well as several actual examples.
Trial version is available to check format and hardware compatibility. It allows you to setup and test run any password search for up to 15 min per run. Recovered passwords are hidden behind the asterisks.
The new feature allows administrators to easily manage and allocate the available computational resources across jobs. The administrative server enables users to tap into a pool of available resources by requesting a certain number of recovery agents for a given job. The reserved recovery agents will be allocated to that one job, allowing multiple password recovery tasks to run at the same time.
Resource management simplifies the process of distributing and utilizing the available computational resources across multiple password recovery jobs, ultimately leading to improved efficiency and scalability.
GPU acceleration is now supported on the newest generation of NVIDIA boards, the Ada Lovelace-based RTX 40 and RTX 40 Super series graphics cards. Using these boards, experts can achieve unprecedented recovery speeds while enjoying higher efficiency compared to previous-generation NVIDIA graphics cards.
Break complex passwords, recover strong encryption keys and unlock documents in a production environment. Elcomsoft Distributed Password Recovery is a high-end solution for forensic and government agencies, data recovery and password recovery services and corporate users with multiple networked workstations connected over a LAN or the Internet. Featuring unique acceleration technologies and providing linear scalability with no overhead, Elcomsoft Distributed Password Recovery offers the fastest password recovery by a huge margin, and is the most technologically advanced password recovery product currently available.
Elcomsoft Distributed Password Recovery employs a revolutionary, patented technology to accelerate password recovery when a compatible NVIDIA or AMD graphics card is present in addition to the CPU-only mode. Hardware acceleration utilizes GPU cores of NVIDIA GeForce boards, AMD GPUs, as well as GPU cores built into Intel CPUs including Intel HD Graphics, UHD Graphics and Intel Iris.
The acceleration technology offloads parts of computational-heavy processing onto the fast and highly scalable processors featured in the latest graphic accelerators, achieving unprecedented recovery speeds exceeding those available to CPU-only users by significant margin.
ElcomSoft pioneered asynchronous hardware acceleration. Heterogeneous acceleration allows using multiple video cards of different makes and models, effectively utilizing existing hardware and squeezing the last bit of performance out of every supported component.
Multiple Windows, Linux and macOS full-disk encryption tools are supported including TrueCrypt/VeraCrypt, all versions of Microsoft BitLocker, PGP WDE, FileVault2, BestCrypt and LUKS. The tool must be launched with administrative privileges on the live system being analyzed. If an encrypted volume is detected, a further investigation of a live system might be needed to preserve evidence that could be lost if the computer were powered off.
By only transferring the bare minimum of information over the network, Elcomsoft Distributed Password Recovery allows for massively parallel operation, and scales linearly to as many as 10,000 workstations with no scalability overhead.
The use of virtual machines is on the rise, enabling criminals cover their activities under a virtual umbrella. While storing massive amounts of evidence, an encrypted virtual machine can greatly reduce the risks of an accidental leak of incriminating evidence. Elcomsoft Distributed Password Recovery helps investigators gain access to all of that evidence by breaking the original encryption password.
Three of the most popular virtual machines are supported: VMware, Parallels, and VirtualBox. The tool can attack and recover the original VM encryption passwords, helping investigators to gain access stored in encrypted images.
Elcomsoft Distributed Password Recovery utilizes dedicated high-performance cores found in today's video cards such as those manufactured by NVIDIA and AMD to offload parts of computational-intensive calculations onto the highly scalable video cards. Featuring several hundred GPU cores, a single video card can deliver the speed far exceeding the metrics of a high-end CPU. Elcomsoft Distributed Password Recovery uses thoroughly optimized algorithms, reaching recovery rates that are up to 250 times faster compared to CPU-only benchmarks.
Today's PC motherboards support multiple video cards. Thanks to ElcomSoft's proprietary heterogeneous computing, Elcomsoft Distributed Password Recovery supports a mix of up to 32 video cards even if they are of different makes and models, allowing for even faster password recovery applications for a modest increase in hardware costs. The tool allows mixing NVIDIA and AMD boards of different generations in a single PC.
Elcomsoft Distributed Password Recovery is licensed based on the number of instances (agents). We accept all major credit cards, checks, bank transfers and purchase orders. Sales taxes may be added to your order according to your jurisdiction. Credit card orders are processed immediately. Electronic licenses are generally available instantly after the credit card charge is approved. On rare occasions where we must manually verify your order, the license will be available in 48 hours or less.
The resource management capability is a game-changer for busy environments. The feature allows administrators to easily manage and distribute the available computational resources across multiple jobs. The administrative server enables users to tap into a pool of available resources by requesting a certain number of recovery agents for a given password recovery job. The reserved recovery agents will be allocated to that one job, allowing multiple tasks to run separately at the same time.
In essence, resource management simplifies the process of managing and utilizing the available computational resources by several jobs, ultimately leading to improved efficiency and scalability. Here's how it works:
The included Elcomsoft Hash Extractor tool allows extracting encryption metadata from a wide range of file formats. By using encryption metadata to set up attacks, you are automatically excluding the possibility of potentially sensitive information such as raw or encrypted data falling into the wrong hands as none is included in the extracted hash files.
Elcomsoft Hash Extractor enables to set up attacks on a tiny hash file instead of the original, potentially large file or document. Since no raw or encrypted data is included in encryption metadata, the hash files produced with Elcomsoft Hash Extractor offer significantly higher level of privacy, allowing remote and cloud processing without the risk of a content leak.
Elcomsoft Hash Extractor supports all major Microsoft Office, Open Document, Apple iWork, and Adobe Acrobat formats, as well as LastPass and 1Password password managers and LM/NTLM/DCC hashes. The full list of supported formats is available below.
Elcomsoft Distributed Password Recovery supports a variety of applications and file formats, allowing password recovery from Office documents, Adobe PDF files, PGP disks and archives, personal security certificates and exchange keys, MD5 hashes and Oracle passwords, Windows and UNIX login passwords.
Elcomsoft Distributed Password Recovery supports a variety of applications and file formats, allowing password recovery from Office documents, Adobe PDF files, PGP disks and archives, personal security certificates and exchange keys, MD5 hashes and Oracle passwords, Windows and UNIX login passwords and much more.
Uninstallation procedure: in order to uninstall the product, follow the standard procedure via Control Panel - Programs and features or use the corresponding Unistall link from the product's folder in the Windows Start menu.
SecureRecovery for Access 3.2 offers several powerful new features, including support for Access 2021 and the ability to recover encrypted databases. This software can repair corrupt access database file elements including:
If your Microsoft Access databases experience file corruption, it can make them unusable and impossible to open with native applications. This is generally a result of circumstances like sudden loss of power or power-surges, high use of memo fields, and occasionally, inadequately designed servers.
SecureRecovery for Access is your go-to solution for effectively repairing all versions of these files. Whether you are using Access 97 or Access 2021, our application can restore the file for you. It works with all Access file types such as .mdb, .mde, .mdw, .mda, .accdb, and .accde. Regardless of the reason your file may have been damaged, our powerful recovery tool can help fix the issue. Our utility uses advanced algorithms to analyze the damaged file and then rebuilds elements such as tables, queries, and reports. Next, it pieces the data back together to restore your database back to its original, fully functional state.
3a8082e126