<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>guide Archives - Datarecovery.com</title>
	<atom:link href="https://datarecovery.com/tag/guide/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description></description>
	<lastBuildDate>Mon, 18 Sep 2017 21:21:13 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>Cracking Passwords: 11 Password Attack Methods (And How They Work)</title>
		<link>https://datarecovery.com/rd/cracking-passwords-11-password-attack-methods-work/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Mon, 18 Sep 2017 21:20:05 +0000</pubDate>
				<category><![CDATA[Data Recovery Knowledge]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[guide]]></category>
		<category><![CDATA[password]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5430</guid>

					<description><![CDATA[<p>At Datarecovery.com, we frequently recover lost passwords for everything from Word documents and RAR files to encrypted Linux volumes (LUKS encryption) and Bitcoin wallets. Our customers often ask about our methods; do we simply try every possible password, or is...</p>
<p>The post <a href="https://datarecovery.com/rd/cracking-passwords-11-password-attack-methods-work/">Cracking Passwords: 11 Password Attack Methods (And How They Work)</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="aligncenter size-full wp-image-5432" src="https://datarecovery.com/wp-content/uploads/2017/09/word-cloud10.png" alt="Cracking password techniques word cloud" width="761" height="707" srcset="https://datarecovery.com/wp-content/uploads/2017/09/word-cloud10.png 761w, https://datarecovery.com/wp-content/uploads/2017/09/word-cloud10-300x279.png 300w" sizes="(max-width: 761px) 100vw, 761px" /></p>
<p>At Datarecovery.com, we frequently recover lost passwords for everything from Word documents and RAR files to encrypted Linux volumes (LUKS encryption) and Bitcoin wallets. Our customers often ask about our methods; do we simply try every possible password, or is there more to it?</p>
<p>To put it simply: There&#8217;s more to it. Password recovery services require a solid understanding of the various possible password cracking methods used in modern cryptography. Our engineers work with our clients to choose an appropriate methodology, then use dedicated equipment to complete the crack as efficiently as possible.</p>
<p>Some of the common password cracking methods used by software password cracker tools <a href="https://hashcat.net/hashcat/">such as hashcat</a> are listed below. For more information or to discuss password recovery services, call 1-800-237-4200 to speak with a specialist.</p>
<p><strong>Brute-force attack &#8211;</strong> A brute-force attack exhaustively tries every possible combination of letters, numbers, and symbols to crack a password. It&#8217;s the simplest way to crack a password, but also the most ineffective, since it wastes a lot of time making unlikely guesses.</p>
<p>Most types of encryption effectively prevent a brute-force attack by using hashing algorithms to slow down password entry. Longer passwords can also defeat this technique. For example, a brute-force attack might take 5 minutes to crack a 9-character password, but 9 hours for a 10-character password, 14 days for 11 characters, and 3.9 years for 12 characters.</p>
<p>While we have specialized hardware that allows for extremely fast brute-force cracking, this technique is rarely effective.</p>
<p><strong>Dictionary attack </strong>&#8211; The name says it all: A dictionary attack enters every word in a dictionary as a password. This removes some of the randomness of a brute-force attack, reducing the amount of time needed to find the password—provided that the password is in the dictionary, of course.</p>
<p>Note that &#8220;dictionary&#8221; doesn&#8217;t literally refer to a simple English dictionary; the entries in a cryptography dictionary may include common substitutions (for instance, &#8220;4pple&#8221; for &#8220;apple&#8221;) and numeric entries.</p>
<p>A common example is a <em>rainbow-table attack. </em>A rainbow table is essentially a dictionary optimized for common hash values as well as passwords. A rainbow-table attack is, therefore, a dictionary attack, but with a specialized dictionary optimized for the cracking attempt.</p>
<p><strong>Combinator attack </strong>&#8211; This attack appends dictionary entries to other dictionary entries. It&#8217;s effective because users often choose passphrases that combine a few common, easy-to-remember phrases, for instance &#8220;password123.&#8221;</p>
<p>Let&#8217;s say that the dictionary for a combinator attack has the words &#8220;dog&#8221; and &#8220;cat.&#8221; The combinator would try &#8220;dogcat&#8221; and &#8220;catdog&#8221; as possible passwords. A combinator attack can be extraordinarily effective at cracking user-generated passphrases, but it&#8217;s not too effective for cracking machine-created passphrases.</p>
<p><strong>Fingerprint attack </strong>&#8211; This is a fairly new type of attack, and its method is fairly sophisticated. It breaks possible passphrases down into &#8220;fingerprints,&#8221; single- and multi-character combinations that a user might choose. For the word &#8220;dog,&#8221; the technique would create fingerprints including &#8220;d,&#8221; &#8220;o,&#8221; &#8220;g,&#8221; along with &#8220;do,&#8221; and &#8220;og.&#8221;</p>
<p>This can be an especially effective attack when a user remembers part of a password. However, due to its sophistication, it requires extraordinary computing power.</p>
<p><strong>Hybrid attack &#8211; </strong>This is a blend of a dictionary and a brute-force attack. It makes a dictionary attack stronger by placing a string of brute-force characters to the beginning or end of the dictionary entries.</p>
<p>For instance, &#8220;software&#8221; might be appended with &#8220;software001,&#8221; &#8220;software002,&#8221; &#8220;001software&#8221; and so on.</p>
<p><strong>Mask attack &#8211;</strong> Similar to a brute-force attack, but with rules to reduce the number of errant entries. It&#8217;s extremely useful if some of the characters are known, or if character types are known. For instance, if a user knows that his password has a capital letter at the beginning and three numbers at the end, the mask attack would be far more effective than a simple brute-force attack. The masks are often generated by the password cracker.</p>
<p><strong>Permutation attack &#8211;</strong> A permutation attack uses a dictionary, but each entry in the dictionary also generates permutations of itself. For the word &#8220;dog,&#8221; a permutation attack would create the candidates &#8220;god,&#8221; &#8220;ogd,&#8221; &#8220;odg,&#8221; &#8220;gdo,&#8221; and &#8220;dgo.&#8221;</p>
<p><strong>PRINCE attack &#8211; </strong>Stands for &#8220;PRobability INfinite Chained Elements.&#8221; The PRINCE attack uses an algorithm to try the most likely password candidates with a refined combinator attack. It creates chains of combined words by using a single dictionary.</p>
<p><strong>Rule-based attack &#8211;</strong> As the name implies, a rule-based attack uses rules to eliminate possibilities. It&#8217;s one of the more complex types of attacks, but the possibilities are effectively endless. A password recovery engineer could create any criteria necessary to weed out unlike or impossible guesses.</p>
<p><strong>Table-Lookup attack &#8211;</strong> Each word in a dictionary generates masks for a mask attack while creating new words by consulting a table. Simply put, it&#8217;s effective for guessing passwords when the user replaced one or more characters with numbers or symbols (for instance, &#8220;m$ney&#8221; instead of &#8220;money&#8221;).</p>
<p><strong>Toggle-Case attack &#8211; </strong>This attack creates every possible case combination for each word in a dictionary. The password candidate &#8220;do&#8221; would also generate &#8220;Do&#8221; and &#8220;dO.&#8221;</p>
<p>If you&#8217;ve lost your password or if you need access to an encrypted file that you legally own, Datarecovery.com can help. Call us at 1-800-237-4200 to get started.</p>
<p>The post <a href="https://datarecovery.com/rd/cracking-passwords-11-password-attack-methods-work/">Cracking Passwords: 11 Password Attack Methods (And How They Work)</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Perform a Clean Install of Windows 10</title>
		<link>https://datarecovery.com/rd/perform-a-clean-install-of-windows-10/</link>
		
		<dc:creator><![CDATA[Ben Carmitchel]]></dc:creator>
		<pubDate>Tue, 11 Aug 2015 19:55:09 +0000</pubDate>
				<category><![CDATA[guide]]></category>
		<category><![CDATA[how to]]></category>
		<category><![CDATA[operating system]]></category>
		<category><![CDATA[windows 10]]></category>
		<category><![CDATA[windows 10 guide]]></category>
		<guid isPermaLink="false">http://datarecovery.com/?post_type=rd&#038;p=4240</guid>

					<description><![CDATA[<p>Microsoft recently offered free upgrades to Windows 10 to users of Windows 7, Windows 8 and Windows 8.1. The upgrade processes pretty easily, but it only upgrades — it doesn’t offer a choice for a clean install. A “clean install”...</p>
<p>The post <a href="https://datarecovery.com/rd/perform-a-clean-install-of-windows-10/">Perform a Clean Install of Windows 10</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;"><img loading="lazy" decoding="async" class="alignright size-full wp-image-4246" src="http://datarecovery.com/wp-content/uploads/2015/08/Windows-10-clean-install02b.png" alt="Downloading Windows 10 install screen" width="308" height="150" srcset="https://datarecovery.com/wp-content/uploads/2015/08/Windows-10-clean-install02b.png 308w, https://datarecovery.com/wp-content/uploads/2015/08/Windows-10-clean-install02b-300x146.png 300w" sizes="auto, (max-width: 308px) 100vw, 308px" /></span><span style="font-weight: 400;">Microsoft recently offered free upgrades to Windows 10 to users of Windows 7, Windows 8 and Windows 8.1. The upgrade processes pretty easily, but it only upgrades — it doesn’t offer a choice for a clean install. A “clean install” doesn’t keep any files or settings, and it’s often an excellent option if you’re looking to start fresh. </span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;">We should preface this article by noting that there are some risks associated with performing a clean install of Windows 10. This might be why Microsoft didn’t offer the option along with the upgrade — we doubt that Microsoft wanted their customer service lines flooding with callers who accidentally performed clean installations (deleting essential files in the process).</span></p>
<p><span style="font-weight: 400;">With that being said, you might want a clean version of the operating system if your hard drive is already overloaded with old software or if you’re replacing a hard drive. If you want to perform a clean install, the process is pretty easy. Read below to get started.</span></p>
<ul>
<li style="font-weight: 400;"><b>Back up all of your data. </b><span style="font-weight: 400;">A simple but essential step — make sure to back up everything that you need, since a clean install could overwrite files. Double-check your backups before continuing. In fact, we’d recommend making a few backups of especially important files.</span></li>
</ul>
<ul>
<li style="font-weight: 400;"><b>Upgrade to Windows 10.</b><span style="font-weight: 400;"> The clean install option isn’t available until you upgrade. Microsoft rolls out updates in waves, so if you reserved the upgrade, your computer should tell you when it’s ready to install, but you can always click here to </span><a href="https://www.microsoft.com/en-us/software-download/windows10"><span style="font-weight: 400;">download the Windows 10 media creation tool.</span></a><span style="font-weight: 400;"> This allows you to upgrade regardless of whether or not Microsoft has called your number yet.</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;">The upgrade is pretty quick and painless. Your computer will restart a few times during the process.</span></li>
</ul>
<ul>
<li style="font-weight: 400;"><b>Connect to the Internet and let Windows 10 activate itself.</b><span style="font-weight: 400;"> This occurs automatically the first time you start your Windows 10 computer. You can check your activation in your settings under “activation,” and you should see the message “Windows is activated.” Since the clean install requires the activation, we strongly recommend double-checking your activation status before proceeding.</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;"><br />
</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;"><strong>Use the Windows 10 media creation tool to create bootable media.</strong> You can create a DVD or use a USB flash drive; the media creation tool will guide you through the process.</span></li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-4243 size-full" title="Windows 10 clean install 06" src="http://datarecovery.com/wp-content/uploads/2015/08/Windows-10-clean-install06.png" alt="Windows 10 clean install screen, create installation media" width="561" height="407" srcset="https://datarecovery.com/wp-content/uploads/2015/08/Windows-10-clean-install06.png 561w, https://datarecovery.com/wp-content/uploads/2015/08/Windows-10-clean-install06-300x218.png 300w" sizes="auto, (max-width: 561px) 100vw, 561px" /></p>
<ul>
<li style="font-weight: 400;"><b>Restart and boot from the new Windows 10 media. </b><span style="font-weight: 400;">You might need to change BIOS settings in order to boot from the new media.</span></li>
</ul>
<ul>
<li style="font-weight: 400;"><b>Install Windows 10.</b><span style="font-weight: 400;"> Select the clean install. When the Windows 10 installation asks you to enter a product key, press “Skip.” You’ve already associated your computer with the new operating system, so you won’t have any issues — provided that you upgraded before you started the clean installation.</span></li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-4245 size-full" title="Windows 10 clean install screen 05" src="http://datarecovery.com/wp-content/uploads/2015/08/Windows-10-clean-install05.png" alt="Windows 10 clean install screen - install now" width="466" height="342" srcset="https://datarecovery.com/wp-content/uploads/2015/08/Windows-10-clean-install05.png 466w, https://datarecovery.com/wp-content/uploads/2015/08/Windows-10-clean-install05-300x220.png 300w" sizes="auto, (max-width: 466px) 100vw, 466px" /></p>
<p><span style="font-weight: 400;">If you have any issues activating Windows 10, be patient. Your computer might take a while to reach Microsoft’s activation servers. This process will work for any computer with a valid Windows 10 upgrade, but because the free upgrade period is expired, you won’t be able to follow the steps listed above if you haven’t already reserved your free copy of Windows 10.</span></p>
<p><span style="font-weight: 400;">Finally, remember to protect your data before upgrading to Windows 10 or performing a clean install. If you run into issues that threaten your data, you can call our data recovery specialists at 1-800-237-4200.</span></p>
<p>&nbsp;</p>
<p>The post <a href="https://datarecovery.com/rd/perform-a-clean-install-of-windows-10/">Perform a Clean Install of Windows 10</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 46/145 objects using Memcached
Page Caching using Disk: Enhanced 
Minified using Disk

Served from: datarecovery.com @ 2026-04-15 12:40:04 by W3 Total Cache
-->