Solved

How to recover data from an encrypted IBM Thinkpad T61 by TPM?

Posted on 2012-12-20
6
417 Views
Last Modified: 2013-01-11
How to recover data from an encrypted IBM Thinkpad T61 by TPM?

My graphics card has gone out on my laptop and with some other motherboard issues that cannot be repaired.

My data is encrypted by the on-board TPM device on the motherboard.  How can I recover my data from my hard drive?
0
Comment
Question by:cmleavitt
  • 3
  • 2
6 Comments
 
LVL 46

Expert Comment

by:noxcho
ID: 38710961
If the drive cannot be oved to another identical machine for decryption - then forget about the data. That was the idea of this encryption that nobody gets to it if the machine is stolen.
0
 

Author Comment

by:cmleavitt
ID: 38710979
I've installed the hard drive into a T60 model and it is prompting me for the encryption password in which I don't have.
0
 
LVL 46

Expert Comment

by:noxcho
ID: 38711031
Haven't you used thenpassword on old machine? I assume it is hdd password or does it come before Windows loads?
0
IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 

Author Comment

by:cmleavitt
ID: 38711095
Comes on before windows loads
0
 
LVL 46

Accepted Solution

by:
noxcho earned 500 total points
ID: 38711195
http://forums.theregister.co.uk/forum/2/2010/03/01/thinkpad_password_reset_hard_luck/
Look here, there are more links in google which say how to get over it. But they are all on your own risk.
0
 
LVL 53

Expert Comment

by:McKnife
ID: 38713943
Hi.

Please tell us, which encryption software or encr. method utilised the tpm to encrypt.
Did you start it in windows or how did you trigger encryption?
0

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

As a financial services provider, your business is impacted by two of the strictest federal regulations on record: the Sarbanes-Oxley Act and the Gramm-Leach-Bliley Act. Correctly implementing faxing into your organization to provide secure, real-ti…
Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now