Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium


File transfer to Windows 7 from failing hard drive

Posted on 2011-05-13
Medium Priority
Last Modified: 2012-06-27
I had a vista computer with a failing hard drive. I took the hd out and used a different computer to recover data. I can see the data on computer used for recovery, however, when the data is moved to new computer with windows 7 the folder shows it is empty. Properties of the folder shows over 7 gig and when attempting to change permissions on folder it scans all the files in folder but without success.
Question by:HAMMERTIM3
  • 2
  • 2

Expert Comment

ID: 35754486
Are the files/folders hidden? can you go into file and folder options and clikc the radio button for show hidden files?

Author Comment

ID: 35754636
No they are not hidden, however, they do have a read only attribute that I can uncheck. Then when checking properties again the read only is still checked

Accepted Solution

spiderwilk007 earned 2000 total points
ID: 35754695
Is it important to get these recovery files or do you just need to snag the data off the old hard drive? If so I would just go that route. Microsoft could have controls in place with the recovery files so that you don't pirate an operating system from a failed disk.

Author Comment

ID: 35755023
Not sure what the difference was, I used an XP Pro box to copy the data from the old hd without any issues. I have used a win 7 box numerous times to perform the same funcion without any hiccups.
Some security setting in win 7 pulling off data from a vista password protected profile.

Featured Post

Managing Security Policy in a Changing Environment

The enterprise network environment is evolving rapidly as companies extend their physical data centers to embrace cloud computing and software-defined networking. This new reality means that the challenge of managing the security policy is much more dynamic and complex.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It’s a season to be thankful, and we’re thankful for users like you who engage on site, solve technology problems, and network with others in the industry. What tech are we most thankful for? Keep reading.
Your business may be under attack from a silent enemy that is hard to detect. It works stealthily in the shadows to access and exploit your critical business information, sensitive confidential data and intellectual property, for commercial gain. T…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

572 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question