Solved

How to recover data from an encrypted IBM Thinkpad T61 by TPM?

Posted on 2012-12-20
6
418 Views
Last Modified: 2013-01-11
How to recover data from an encrypted IBM Thinkpad T61 by TPM?

My graphics card has gone out on my laptop and with some other motherboard issues that cannot be repaired.

My data is encrypted by the on-board TPM device on the motherboard.  How can I recover my data from my hard drive?
0
Comment
Question by:cmleavitt
  • 3
  • 2
6 Comments
 
LVL 46

Expert Comment

by:noxcho
ID: 38710961
If the drive cannot be oved to another identical machine for decryption - then forget about the data. That was the idea of this encryption that nobody gets to it if the machine is stolen.
0
 

Author Comment

by:cmleavitt
ID: 38710979
I've installed the hard drive into a T60 model and it is prompting me for the encryption password in which I don't have.
0
 
LVL 46

Expert Comment

by:noxcho
ID: 38711031
Haven't you used thenpassword on old machine? I assume it is hdd password or does it come before Windows loads?
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 

Author Comment

by:cmleavitt
ID: 38711095
Comes on before windows loads
0
 
LVL 46

Accepted Solution

by:
noxcho earned 500 total points
ID: 38711195
http://forums.theregister.co.uk/forum/2/2010/03/01/thinkpad_password_reset_hard_luck/
Look here, there are more links in google which say how to get over it. But they are all on your own risk.
0
 
LVL 53

Expert Comment

by:McKnife
ID: 38713943
Hi.

Please tell us, which encryption software or encr. method utilised the tpm to encrypt.
Did you start it in windows or how did you trigger encryption?
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When the confidentiality and security of your data is a must, trust the highly encrypted cloud fax portfolio used by 12 million businesses worldwide, including nearly half of the Fortune 500.
Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

895 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now