Solved

How to get into Files encrypted by Acer eData security management where password has been lost

Posted on 2011-02-14
3
3,477 Views
Last Modified: 2012-05-11
Hi
I have beren brought in a USB memory stick by a customer, which has some files stored on it that have been encrypted using Acer eData security management, unfortunately the password has been lost to the mists of time, he now needs to get at a file on this stick.  Is there anyway I can do this.  The files on the memory stick have an extension of .egisenc which I think are emails, and
.docxENX which I think may be word docs.

Any help would be greatly appreciated.

jag
0
Comment
Question by:140160
3 Comments
 
LVL 20

Assisted Solution

by:edster9999
edster9999 earned 250 total points
ID: 34886795
As far as I remember the acer system is secure enough.
Once you forget the password the data is gone.
0
 
LVL 35

Accepted Solution

by:
torimar earned 250 total points
ID: 34886857
The only method I know of is to connect the USB stick to the machine that it was encrypted on and use the eData Supervisor password which will also decrypt files to which the individual file encryption key has been lost.

There is no other known way, at least none that could be used by us mere mortals without asking for help by  Chloe O'Brian from CTU.

This really makes me wonder: if your client thought that to break the encryption on his files all he needs to do is take them to the computer guy round the corner, why did he even bother to encrypt them in the first place? Shouldn't he have to expect that whoever steals data from him would know a "computer guy" as well?
An encryption that can be broken by known tools or methods is no encryption, just like "1234567" is no password.
0
 

Expert Comment

by:RogerIT
ID: 35294361
is there is a way to solve my problem if i encrypt my file and i'm now using a vaio laptop and i don't remember any of my old password?
problem 1 : password lost
problem 2 : i'm working on other computer (not acer) and acer security management works only on acer pc
problem 3: all my old data were lost now
1

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now