Solved

.Encrypted Files

Posted on 2006-11-08
3
399 Views
Last Modified: 2010-04-11
Hi guys,

My partners computer recently dies and i have had to recover her data from and external hard drive.

There are several .Encrypted files on her machine (eg file.txt.Encrypted)

I want to know a few things:

Firstly, what programs can you recommed for opening the files (freeware / free programs please)
Secondly, how can i go about retrieving the data from the files if i have had to restore the files to a different computer (my laptop).  I know this may not be the type of question smiled upon in thei forum, but there are some letters and pictures from her now dead grandfather which mean the world to her and i NEED to recover the documents ASAP.

Please help in any way possible
Ben
0
Comment
Question by:NAORC
  • 2
3 Comments
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 500 total points
ID: 17903891
You need to know or findout what they were encrypted with... are the M$ office documents, are they stored in an EFS folder, are they password protected zip files, are they True-Crypt, Steganos, ...(insert hundreds of other encryption sofware here !-)
There really aren't that many free programs, but there are plenty of trial software app's, they have limitations however, as they are only trail app's.
ElComSoft has some of the best software you can buy/try: http://crackpassword.com/

is this a real example? file.txt.Encrypted
passwords.txt.Encrypted ... it actually end's in ".encrypted"?

-rich
0
 
LVL 5

Author Comment

by:NAORC
ID: 17905858
yes, thats an actual example.. they acually ended in that extension.

They are old files and have been transferred across several computers and the cannot remember the original encryption program.
0
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 18002062
Did you find the app that was used?
-rich
0

Featured Post

Back Up Your Microsoft Windows Server®

Back up all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Pop culture is prime bait for hackers seeking to infect user’s computers and mobile devices with malicious malware. Hackers know exactly what the latest trends are online and know how to use them to their advantage.
Knowing where your website is hosted is as important as the features you receive, the monthly fee, and the support you receive. Due diligence should be done when choosing your next hosting provider.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question