Solved

Safend XP/Vista compatibility

Posted on 2009-05-04
4
890 Views
Last Modified: 2012-05-06
I've got safend protector installed on an XP and a Vista machine.

I am able to encrypt and copy data on a USB via each OS, but when I try to read data off a USB Key encrypted via the Vista machine on the XP machine I run into a brick wall (and vice versa)

Has anyone had or found a solution to the issue of cross compatibility between USB keys encrypted on xp and vista?
0
Comment
Question by:rbnzuser
  • 2
4 Comments
 
LVL 2

Expert Comment

by:stany0
ID: 24302999
Use http://www.truecrypt.org/downloads
For this program doesn`t matter which type is the host OS.

read the FAQ
"Create a TrueCrypt file container on the USB flash drive (for information on how to do so, see the chapter Beginner's Tutorial, in the TrueCrypt User Guide). If you leave enough space on the USB flash drive (choose an appropriate size for the TrueCrypt container), you will also be able to store TrueCrypt on the USB flash drive (along with the container  not in the container) and you will be able to run TrueCrypt from the USB flash drive (see also the chapter Traveler Mode in the TrueCrypt User Guide). "

good luck
0
 

Author Comment

by:rbnzuser
ID: 24310120
Truecrypt sounds great, but I'm bound to Safend so really needed a solution or direction to go with on that:)
0
 
LVL 13

Accepted Solution

by:
usachrisk1983 earned 500 total points
ID: 24310136
Are you sure it's an OS issue?  Does the USB key work on other Windows XP systems?  I ask because the disk encryption solution we've been using encrypts the external media with the same key that's used to encrypt the hard disk, which makes it unusable on any other system.
0
 

Author Comment

by:rbnzuser
ID: 24310884
The USB key is accessible on company and private workstations running XP (provided the password is given) without a problem.

A Vista workstation will even prompt for the password, accept it, but then refuse you access.  Instead requesting you format the key.  And this is while running as Administrator.

The issue seems so close being a non event, but is literallyfalling at the final hurdle.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

It is only natural that we all want our PCs to be in good working order, improved system performance, so that is exactly how programs are advertised to entice. They say things like:            •      PC crashes? Get registry cleaner to repair it!    …
When you start your Windows 10 PC and got an "Operating system not found" error or just saw  "Auto repair for startup". After a while, you have entered a loop for Auto repair which does not fix anything and you will be in a  panic as all your work w…
The Task Scheduler is a powerful tool that is built into Windows. It allows you to schedule tasks (actions) on a recurring basis, such as hourly, daily, weekly, monthly, at log on, at startup, on idle, etc. This video Micro Tutorial is a brief intro…
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now