Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Encrypted external drive

Posted on 2010-11-15
3
Medium Priority
?
399 Views
Last Modified: 2012-05-10
I have a hard drive that is failing -  It's been encrypted with true crypt (Windows XP).
Upon bootup  I can login (the truecrypt login) then I get BSOD.
What I'd like to do is remove the hard drive and try to get into it through another computer (hook it up through a USD to IDE connector)  -- is it possible to do this with Truecrypt-- (as long as the other drive has Truecrypt installed)?
0
Comment
Question by:hbojorquezgeek
3 Comments
 
LVL 23

Assisted Solution

by:Stelian Stan
Stelian Stan earned 400 total points
ID: 34136756
Do you have the rescue disk created the first time you encrypted the HDD?
If you have the CD you can follow this to decrypt: http://www.maximumpc.com/article/howtos/how_to_encrypt_your_entire_hard_drive_for_free_using_true_crypt?page=0,3

You can attach the HDD to the second computer but you have to open TrueCrypt and mount the encrypted HDD and select System > Permanently Decrypt System Partition/Drive
0
 
LVL 33

Accepted Solution

by:
Dave Howe earned 1600 total points
ID: 34144569
yes, you can. I usually use a usb->sata or usb->ide adaptor rather than mounting the drive internally. You will need to know the passphrase (as the rescue disk won't help there) but I assume you have that.

once you have it mounted, you can either decrypt in place, run windows repair software, or clone the data using software such as ghost (just make sure you set it to continue on error)
0
 

Author Closing Comment

by:hbojorquezgeek
ID: 34145101
Groovy dudes (or dudettes),
The second solution is what I was after (problem is that I will need to get a pata adapter-- crazy tiny freakin' drive ).
0

Featured Post

Keep up with what's happening at Experts Exchange!

Sign up to receive Decoded, a new monthly digest with product updates, feature release info, continuing education opportunities, and more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
The well known Cerber ransomware continues to spread this summer through spear phishing email campaigns targeting enterprises. Learn how it easily bypasses traditional defenses - and what you can do to protect your data.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses
Course of the Month10 days, 19 hours left to enroll

886 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question