Solved

Recover XP with GuardianEdge Installed

Posted on 2011-09-28
4
1,851 Views
Last Modified: 2012-06-21
Laptop has Windows XP SP3 Installed, I get the System32\Config Corruption error. The only roadblock i have is Guardian Edge is installed and I am unable to access the XP Recovery Console. Any Ideas?

I have the Guardian Edge Access Utility  but that gets me into the command prompt but unable to repair And upon bootup after inputting the Username and Password  i cannot find a way to boot into the recovery console from the CD.
0
Comment
Question by:kfarhang
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 62

Accepted Solution

by:
☠ MASQ ☠ earned 500 total points
ID: 36720646
You can't run Recovery Console as this involves booting to the XP CD and being able to see an unencrypted HDD partition.  it's a kind of rock and hard place scenario.  With the GE recovery CD .iso you should be able to boot to the unencrypted command prompt and see the NTFS file structure but the files you need to copy for the traditional corrupt config.sys repair will be marked as in use.

You will be able to run simple disk repairs such as CHKDSK though and it's worth doing this.  otherwise you'll need to remove the encryption to be able to boot to RC AND see the drive contents.

Assume from your question you already have the .iso and the EPHD Access tool.
0
 
LVL 4

Expert Comment

by:Klaatu01
ID: 36895520
Encryption really only helps protect the information on the hard drive while you are travelling away from home or office, or when your laptop is vulnerable to theft.  I recommend moving files off of any encrypted volume at the earliest possible opportunity and suggest storing them on an encrypted thumbdrive (or password protected thumbdrive) as the alternative strategy to data safety.

I am mentioning this not only because I worked with GuardianEdge encryption for four years, but also because the idea of being 'data vulnerable' is not obvious to most users.  If you are the type of business person or user with valuable data on a laptop, you may be a target for information criminals --- and they do not necessarily want a copy of your information so much as they want to deprive you of the benefit of having it.  By this I mean an encrypted laptop seems safe, but there are people (perhaps business competitors) who would steal the laptop and just destroy it!  This tactic is done in the hope of depriving you of data which has not been backed up anywhere yet.  Regardless of whether it is contractual information, bids being prepared, sensitive personnel data or other competitive information, if the purpose is to 'set you back' a week's worth of work or cause a deadline to be missed, a missing laptop is a goal achieved in some scenarios.

Finally, if all the important data is safe on external media (or a network share drive) than when issues with the encryption develop the system may be safely 'slicked' and reloaded; to get the asset and the user back to work as soon as possible!  In a time-critical organization the idea of having extra hard drives preloaded and ready to be swapped into the laptops is also a super-strategy to consider.  Yes, extra hard drives sitting on a shelf (or in an I.T. department's fire resistant safe) is an additional expense, but it only takes one incident avoided to recoup the cost in many business scenarios.*

Notes:
The preloaded hard drive ready to deploy scenario ONLY works if the organization has a standard laptop deployed to all travelling users.  The platform of the unit must be identical; users may have differing external USB devices such as wireless network adapters, mice, keyboards, USB thumbdrives, external drives and card readers (more gadgets to keep track of, but still resource-wise).
0
 
LVL 59

Expert Comment

by:LeeTutor
ID: 37052226
This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.
0

Featured Post

SharePoint Admin?

Enable Your Employees To Focus On The Core With Intuitive Onscreen Guidance That is With You At The Moment of Need.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Migration path for Window Virtual PC.... 34 139
EmsisoftAntiMalware is it trusted reliable 4 68
Mutiple Folder view (5 Folder view) 3 82
Outlook search issues 5 55
Encryption for Business Encryption (https://en.wikipedia.org/wiki/Encryption) ensures the safety of our data when sending emails. In most cases, to read an encrypted email you must enter a secret key that will enable you to decrypt the email. T…
No single Antivirus application (despite claims by manufacturers) will catch or protect you from all Virus / Malware or Spyware threats. That doesn't stop you from further protecting yourself however - and this article is to show you how.
The viewer will learn how to successfully create a multiboot device using the SARDU utility on Windows 7. Start the SARDU utility: Change the image directory to wherever you store your ISOs, this will prevent you from having 2 copies of an ISO wit…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question