?
Solved

Access Old McAfee Encrypted laptop

Posted on 2016-07-18
8
Medium Priority
?
44 Views
Last Modified: 2016-09-21
I have an old laptop that it encrypted with McAfee Encryption
This is my old company laptop
I have forgot the password on bootup
I contacted our IT helpdesk which is based in India
They say this version is no longer supported and they cant help me
is there any way I can access my data from this laptop?
0
Comment
Question by:dougdog
  • 2
  • 2
  • 2
  • +1
7 Comments
 
LVL 57

Expert Comment

by:McKnife
ID: 41717342
When your supporters cannot supply a key, nor a data backup and you cannot remember, then there is no way, sorry.
0
 
LVL 65

Assisted Solution

by:btan
btan earned 664 total points
ID: 41717349
You can only get back from backup (non encrypted). No recovery password and not supported. No way to restore.
0
 
LVL 63

Expert Comment

by:☠ MASQ ☠
ID: 41717368
That's pretty much the story.  However it does depend on who administers the Safeboot system for your network, just how old the version is and how long it has been physically disconnected from the administrating network.  If it is the guys in India then it sounds like you're out of luck.  Some versions of Safeboot can be upgraded remotely and then you can generate a challenge code if connected to the admin network either wirelessly or via Ethernet.  The Safeboot admin can then create a response code that will allow you to reset the password for that account.  Some versions will cache all the accounts that have successfully logged in other than by you so you may be able to access the data via another user.

Otherwise it's doing just what it's designed to do - prevent you accessing the drive contents unless you have the password.
0
 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

 

Author Comment

by:dougdog
ID: 41717433
Are there no paid for services that could access this?
0
 
LVL 57

Accepted Solution

by:
McKnife earned 672 total points
ID: 41717462
Those services would need to brute-force-crack their way in. Though possible, it will only be successful in a reasonable time when you used a dictionary word as password. If you haven't, forget it.
0
 
LVL 63

Assisted Solution

by:☠ MASQ ☠
☠ MASQ ☠ earned 664 total points
ID: 41717489
Are there no paid for services that could access this?
No - for the reasons above
Also remember you don't own the data, it's owned by the company.
0
 
LVL 65

Expert Comment

by:btan
ID: 41718016
Services cannot recover encrypted data in the disk though they can repair and do forensic work of the data are in plain.
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The Internet has made sending and receiving information online a breeze. But there is also the threat of unauthorized viewing, data tampering, and phoney messages. Surprisingly, a lot of business owners do not fully understand how to use security t…
It’s a season to be thankful, and we’re thankful for users like you who engage on site, solve technology problems, and network with others in the industry. What tech are we most thankful for? Keep reading.
In this video, viewers are given an introduction to using the Windows 10 Snipping Tool, how to quickly locate it when it's needed and also how make it always available with a single click of a mouse button, by pinning it to the Desktop Task Bar. Int…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…
Suggested Courses

862 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question