Solved

What to do when accidentally encrypting files?

Posted on 2009-05-04
2
241 Views
Last Modified: 2013-12-04
I accidentally encrypted a folder full of files while messing around with my computer (XP Pro); apparently, a certificaton "key" is needed to access the files  now.  Any easy soltuion other than my files are lost?  For interest, how or where does the key come from?
0
Comment
Question by:martyjon
2 Comments
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 500 total points
ID: 24428519
The persons account who encrypted initially, or the administrator should be able to decrypt. If your pc is joined to a domain, then the domain administrator account (not just the IT guy, but using the actual domain administrator account) can decrypt the folder, or if your PC is not joined to a domain the local administrator account is the DRA.
http://technet.microsoft.com/en-us/library/bb457020.aspx#EIAA
It is possible that the domain admin setup a dra at the domain level and that account will have to be used if so. You should be able to copy the files to a non-ntfs file system, typically a usb stick is formatted as a fat-32 file system, and if you have proper access to the files that will decrypt them on the fly. If you don't have the proper access you will be denied when you try to copy them.
http://www.experts-exchange.com/articles/Security/Encryption/Microsofts-Encrypted-FileSystem.html
-rich
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
PGP whole disk encrypted Laptops 5 66
Updating clients Trend Micro (OfficeScan) Console 5 90
deny local logon 12 92
Using icacls to block access to mstsc, cmd & PowerShell 4 141
SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Recently, I read that Microsoft has analysed statistics for their security intelligence report. It revealed: still, the clear majority of windows users do their daily work as administrator. An administrative account is a burden, security-wise. My ar…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

778 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question