Solved

Decrypting EFS Files on standalone workstation

Posted on 2008-06-22
4
495 Views
Last Modified: 2012-05-05
I have a stand-alone workstation with Windows XP Pro /SP2  installed which has some files and folders encrypted, but the user account has been deleted.  I went through the steps of creating a Data Recovery Agent, but neither it or the Administrator can open these or change the permissions.  

Is there any way to recover these items?
0
Comment
Question by:bobsully53
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 88

Accepted Solution

by:
rindi earned 250 total points
ID: 21841402
There's a 3rd party tools that might help:

http://www.elcomsoft.com/aefsdr.html
0
 
LVL 50

Expert Comment

by:jcimarron
ID: 21841496
bobsully53--Decryption can also be done within Windows, but it is a little complicated and may no longer be possible if the user account that encrypted is gone.
http://support.microsoft.com/kb/308993/
0
 

Author Comment

by:bobsully53
ID: 21842213
In my case using the 3rd party app was more costly, but as I was under a time constraint the best solution.  rindi provide me with an a link to a product that worked 100% as expected.
0
 

Author Closing Comment

by:bobsully53
ID: 31469549
While costly, this was the quickest solution to the issue and that was my requirement.
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
There are many Password Managers (PM) out there to choose from. PM's can help with your password habits and routines, but they should not be a crutch you rely on too heavily. I also have an article for company/enterprise PM's.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question