?
Solved

How can retrieve my sensitive data while protect with portable security base software named Folder Lock Professional (MRT).

Posted on 2010-01-13
2
Medium Priority
?
629 Views
Last Modified: 2013-11-08

Actually I have faced with a serious problem and it is using portable security base software named Folder Lock Professional (MRT).
After I purchased the software and protected all my personal data which was about 20 GB.
Few days later, when I tried to access my data, the software is not accepting my password.
 I have tried my best with every password which I use normally but none of them worked.
 I need my data and I am really in trouble. Since this software has 830KB size which cause to bring slight changes in windows registry strings to hide and unhide the data. I do respect the software privacy and mean time I really need you support since I have protected more than 20 GB of my private data which I cant ignore them.
 
Note: attached is the icon and properties of mentioned  software.


Please kindly advice how can I retrive my data back.


folderlockPro.JPG
0
Comment
Question by:maxi9
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 3

Accepted Solution

by:
nickt25 earned 500 total points
ID: 26305723
take the hard drive  that contain the information out.
and uset is as a  external driver in another computer
download a program called  GET DATA BACK FOR NTFS
SEACH THE DRIVE
and take your information out

i am 200% sure that it will help you .
0
 

Author Closing Comment

by:maxi9
ID: 31676640
thanks for your support and prompt cooperation.
I have installed the software and easily recovered my hidden data back.

your truelly
0

Featured Post

Enroll in August's Course of the Month

August's CompTIA IT Fundamentals course includes 19 hours of basic computer principle modules and prepares you for the certification exam. It's free for Premium Members, Team Accounts, and Qualified Experts!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I wrote an article (http://www.experts-exchange.com/articles/2245/Anti-rootkit-software.html) some time ago with a reference to nLite  (http://www.nliteos.com/)slipstreaming software.  I recently changed that link to point to NTLite (https://www.ntl…
Today, still in the boom of Apple, PC's and products, nearly 50% of the computer users use Windows as graphical operating systems. If you are among those users who love windows, but are grappling to keep the system's hard drive optimized, then you s…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…
Suggested Courses
Course of the Month13 days, 3 hours left to enroll

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question