Solved

How to extract password keeper from BES 4.1

Posted on 2010-11-24
2
986 Views
Last Modified: 2012-05-10
Is it possible to extract password keeper content from BES? We're in the middle of changing email and BES servers, one user didn't back up his device properly. I can always reactivate him on the old server, however I was wonder if there is another way I can get to his password keeper. I have all passwords in case they are needed.

Appreciate any suggestions.

0
Comment
Question by:Coffinated
2 Comments
 
LVL 19

Accepted Solution

by:
-jonny- earned 500 total points
ID: 34211620
Unfortunately there isn't as there's no way to enter the device password in order to create the hash of the encryption key used to encrypt the data.
0
 
LVL 5

Author Comment

by:Coffinated
ID: 34214518
-jonny-:

Unfortunately it was impossible, I ended up activating handheld with the old server to get the passwords. It worked well.

Thank you
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Galaxy Note III Updating Apps Without My Permission 5 103
OpenIn and Android 1 57
wondershare 17 61
see android hidden files 10 29
With the proliferation of Android devices on the market today, it was inevitable that malicious types would want to start exploiting the openness of the platform. Luckily however, there are a few options when it comes to mobile security. Starting …
For Sennheiser, comfort, quality and security are high priority areas. This paper addresses the security of Bluetooth technology and the supplementary security that Sennheiser’s Contact Center and Office (CC&O) headsets provide.  
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

778 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question