File transfer to Windows 7 from failing hard drive

Posted on 2011-05-13
Last Modified: 2012-06-27
I had a vista computer with a failing hard drive. I took the hd out and used a different computer to recover data. I can see the data on computer used for recovery, however, when the data is moved to new computer with windows 7 the folder shows it is empty. Properties of the folder shows over 7 gig and when attempting to change permissions on folder it scans all the files in folder but without success.
Question by:HAMMERTIM3
    LVL 8

    Expert Comment

    Are the files/folders hidden? can you go into file and folder options and clikc the radio button for show hidden files?

    Author Comment

    No they are not hidden, however, they do have a read only attribute that I can uncheck. Then when checking properties again the read only is still checked
    LVL 8

    Accepted Solution

    Is it important to get these recovery files or do you just need to snag the data off the old hard drive? If so I would just go that route. Microsoft could have controls in place with the recovery files so that you don't pirate an operating system from a failed disk.

    Author Comment

    Not sure what the difference was, I used an XP Pro box to copy the data from the old hd without any issues. I have used a win 7 box numerous times to perform the same funcion without any hiccups.
    Some security setting in win 7 pulling off data from a vista password protected profile.

    Featured Post

    Do You Know the 4 Main Threat Actor Types?

    Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

    Join & Write a Comment

    Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
    This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
    Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…
    Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…

    729 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    17 Experts available now in Live!

    Get 1:1 Help Now