Encryption
--
Questions
--
Followers
Top Experts
Zero AI Policy
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
Anyway, the 4.83 client should still have an "advanced" button on the GINA. Â Click that, and go to the Windows tab, and select another user or domain or something.
If you have no backdoors into the local environment, as in a user other than Administrator with local Administrators group membership, your user may well have FUBARed the whole mess.
If you boot into safe mode WITHOUT NETWORKING you should not get the Novell client, but still will have to contend with logging into the local machine.
I haven't played with pgpdisk since the 6.x days, and didn't even know they had added boot-time protection to it, but - here is how I would approach the problem.
1) build a WinPE disk suitable for the ox installed on the pc
2) install to said disk a SAM reset/editing tool to recover the local admin password
3) log an install of pgp desktop and note where it places files outside of its own dirs and what registry entries it makes; transfer these to the WinPE cd and burn
4) boot from winpe cd, attempt to mount drive; if that succeeds, run the SAM editing tools against the unlocked drive, then reboot and see if it worked
of course, the mount process assumes you have a copy of the key used to secure the pgpdisk and/or the password for it.






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
Encryption
--
Questions
--
Followers
Top Experts
Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. In an encryption scheme, the intended communication information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.