Solved

Access Old McAfee Encrypted laptop

Posted on 2016-07-18
8
38 Views
Last Modified: 2016-09-21
I have an old laptop that it encrypted with McAfee Encryption
This is my old company laptop
I have forgot the password on bootup
I contacted our IT helpdesk which is based in India
They say this version is no longer supported and they cant help me
is there any way I can access my data from this laptop?
0
Comment
Question by:dougdog
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
  • 2
  • +1
8 Comments
 
LVL 55

Expert Comment

by:McKnife
ID: 41717342
When your supporters cannot supply a key, nor a data backup and you cannot remember, then there is no way, sorry.
0
 
LVL 64

Assisted Solution

by:btan
btan earned 166 total points
ID: 41717349
You can only get back from backup (non encrypted). No recovery password and not supported. No way to restore.
0
 
LVL 62

Expert Comment

by:☠ MASQ ☠
ID: 41717368
That's pretty much the story.  However it does depend on who administers the Safeboot system for your network, just how old the version is and how long it has been physically disconnected from the administrating network.  If it is the guys in India then it sounds like you're out of luck.  Some versions of Safeboot can be upgraded remotely and then you can generate a challenge code if connected to the admin network either wirelessly or via Ethernet.  The Safeboot admin can then create a response code that will allow you to reset the password for that account.  Some versions will cache all the accounts that have successfully logged in other than by you so you may be able to access the data via another user.

Otherwise it's doing just what it's designed to do - prevent you accessing the drive contents unless you have the password.
0
Schedule a Tour of the ATEN booth at InfoComm 2017

Tour the ATEN booth to see the the Latest Addition to the Modular Matrix Switch Series, New 4K HDMI Over IP Extender and more! Enter ATEN's Ultimate Giveaway Sweepstakes for a chance to win one of several great prizes, including an ATEN US7220 2-Port Thunderbolt 2 Sharing Switch!

 

Author Comment

by:dougdog
ID: 41717433
Are there no paid for services that could access this?
0
 
LVL 55

Accepted Solution

by:
McKnife earned 168 total points
ID: 41717462
Those services would need to brute-force-crack their way in. Though possible, it will only be successful in a reasonable time when you used a dictionary word as password. If you haven't, forget it.
0
 
LVL 62

Assisted Solution

by:☠ MASQ ☠
☠ MASQ ☠ earned 166 total points
ID: 41717489
Are there no paid for services that could access this?
No - for the reasons above
Also remember you don't own the data, it's owned by the company.
0
 
LVL 64

Expert Comment

by:btan
ID: 41718016
Services cannot recover encrypted data in the disk though they can repair and do forensic work of the data are in plain.
0

Featured Post

Instantly Create Instructional Tutorials

Contextual Guidance at the moment of need helps your employees adopt to new software or processes instantly. Boost knowledge retention and employee engagement step-by-step with one easy solution.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP,  Windows Server…
The Task Scheduler is a powerful tool that is built into Windows. It allows you to schedule tasks (actions) on a recurring basis, such as hourly, daily, weekly, monthly, at log on, at startup, on idle, etc. This video Micro Tutorial is a brief intro…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question