Encrypted external drive

Posted on 2010-11-15
Last Modified: 2012-05-10
I have a hard drive that is failing -  It's been encrypted with true crypt (Windows XP).
Upon bootup  I can login (the truecrypt login) then I get BSOD.
What I'd like to do is remove the hard drive and try to get into it through another computer (hook it up through a USD to IDE connector)  -- is it possible to do this with Truecrypt-- (as long as the other drive has Truecrypt installed)?
Question by:hbojorquezgeek
LVL 23

Assisted Solution

by:Stelian Stan
Stelian Stan earned 100 total points
Comment Utility
Do you have the rescue disk created the first time you encrypted the HDD?
If you have the CD you can follow this to decrypt:,3

You can attach the HDD to the second computer but you have to open TrueCrypt and mount the encrypted HDD and select System > Permanently Decrypt System Partition/Drive
LVL 33

Accepted Solution

Dave Howe earned 400 total points
Comment Utility
yes, you can. I usually use a usb->sata or usb->ide adaptor rather than mounting the drive internally. You will need to know the passphrase (as the rescue disk won't help there) but I assume you have that.

once you have it mounted, you can either decrypt in place, run windows repair software, or clone the data using software such as ghost (just make sure you set it to continue on error)

Author Closing Comment

Comment Utility
Groovy dudes (or dudettes),
The second solution is what I was after (problem is that I will need to get a pata adapter-- crazy tiny freakin' drive ).

Featured Post

Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

Join & Write a Comment

When the confidentiality and security of your data is a must, trust the highly encrypted cloud fax portfolio used by 12 million businesses worldwide, including nearly half of the Fortune 500.
Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now