BackupExec Lost Media Password

Hi,

I'm trying to catalog a tape on Backup Exec 9.0 so that I can proceed to restore some data off of the tape. The media was orginally protected by a password, unfortunately this password has been lost. Does anyone know of a third party software tool which can be used to recover the password or alternatively recover the the data on the tape? I have used a tool called Recover my Backup developed by Get Data, unfortunately this cannot be used to access a tape drive. I have searched hi and low but havent had any luck. Any input on this would be appreciated.

Thanks
LVL 1
HeadmastersAsked:
Who is Participating?

[Webinar] Streamline your web hosting managementRegister Today

x
 
David_FongConnect With a Mentor Commented:
I think you'll have to send it to a data recovery company. The data isn't encrypted, just the on-tape catalog is protected.
0
 
HeadmastersAuthor Commented:
Thanks David,

I have managed to access bkf files on a NAS box which are protected by the same password. I did this using a software program which I purchased on the Net. This worked great and I could recover the data from within the bkf's unfortunately I couldn't use the program to access the tapes. In the log file on the program I can see it displays the password but it displays in asterik's (*****) so unfortunately i cannot use it to input into Veritas. I still need to use Veritas as some of the backed up files are split across multiple bkf's and unfortunately the recovery software I am using does not support recovery across multiple bkf's.

Anyway, to cut a long story short I have contacted the developers of this particular program to see if they could write a piece of code to crack the password on the bkf files, seeming as though their existing piece of software does this I cant see it being to much trouble. Possibly someone on this forum already knows a good password cracker which will recover a password from a .BKF file. If so please let me know.

0
All Courses

From novice to tech pro — start learning today.