Solved

What to do when accidentally encrypting files?

Posted on 2009-05-04
2
242 Views
Last Modified: 2013-12-04
I accidentally encrypted a folder full of files while messing around with my computer (XP Pro); apparently, a certificaton "key" is needed to access the files  now.  Any easy soltuion other than my files are lost?  For interest, how or where does the key come from?
0
Comment
Question by:martyjon
2 Comments
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 500 total points
ID: 24428519
The persons account who encrypted initially, or the administrator should be able to decrypt. If your pc is joined to a domain, then the domain administrator account (not just the IT guy, but using the actual domain administrator account) can decrypt the folder, or if your PC is not joined to a domain the local administrator account is the DRA.
http://technet.microsoft.com/en-us/library/bb457020.aspx#EIAA
It is possible that the domain admin setup a dra at the domain level and that account will have to be used if so. You should be able to copy the files to a non-ntfs file system, typically a usb stick is formatted as a fat-32 file system, and if you have proper access to the files that will decrypt them on the fly. If you don't have the proper access you will be denied when you try to copy them.
http://www.experts-exchange.com/articles/Security/Encryption/Microsofts-Encrypted-FileSystem.html
-rich
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question