Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

What to do when accidentally encrypting files?

Posted on 2009-05-04
2
Medium Priority
?
250 Views
Last Modified: 2013-12-04
I accidentally encrypted a folder full of files while messing around with my computer (XP Pro); apparently, a certificaton "key" is needed to access the files  now.  Any easy soltuion other than my files are lost?  For interest, how or where does the key come from?
0
Comment
Question by:martyjon
1 Comment
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 2000 total points
ID: 24428519
The persons account who encrypted initially, or the administrator should be able to decrypt. If your pc is joined to a domain, then the domain administrator account (not just the IT guy, but using the actual domain administrator account) can decrypt the folder, or if your PC is not joined to a domain the local administrator account is the DRA.
http://technet.microsoft.com/en-us/library/bb457020.aspx#EIAA
It is possible that the domain admin setup a dra at the domain level and that account will have to be used if so. You should be able to copy the files to a non-ntfs file system, typically a usb stick is formatted as a fat-32 file system, and if you have proper access to the files that will decrypt them on the fly. If you don't have the proper access you will be denied when you try to copy them.
http://www.experts-exchange.com/articles/Security/Encryption/Microsofts-Encrypted-FileSystem.html
-rich
0

Featured Post

Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
Video by: ITPro.TV
In this episode Don builds upon the troubleshooting techniques by demonstrating how to properly monitor a vSphere deployment to detect problems before they occur. He begins the show using tools found within the vSphere suite as ends the show demonst…
Screencast - Getting to Know the Pipeline

877 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question