I
Isaac Hunt
DanS said:I'm not sure if I follow now either. The encryption you speak of is an
intrinsic Windows encryption routine correct ?
The assumption is that the encryption is based on the Windows login. So
if you login using your username/password, your encrypted data is
available to you. If a different user logs in on the same PC with a
different username/password, your encrypted data is NOT available to
them.......is that correct ?
If so, it is then based on the Windows login credentials. The password
reset bootdisk I mentioned is just that.....
1. You boot your PC with this disk, a mini-linux image.
2. It lists all PC username accounts.
3. You choose an account to change the password for, any account, even
the built-in Administrator account, WITHOUT HAVING TO KNOW THE ORIGINAL
PASSWORD!!!!
4. Write changes.
5. Remove the CD, reboot to Windows, logon using the username/new
password.
Is the encryption certificate still valid ? If so, then whomever just did
that routine now has full access to your files.
That is, unless changing your password while in Windows, the 'right' way,
forces Windows to generates a new encryption certificate based on the
username and newly entered password.
No, I use 3rd party encryption software.
Depending on the OS I use either Compusec (which is free in XP & Linux)
http://www.ce-infosys.com/english/downloads/free_compusec/index.html , PGP
WDE www.pgp.com or Bestcrypt FVE www.jetico.com
There are others available but in all the testing I have done, these are the
best IMO.
Safeguard Easy used to be good, but I haven't used it in years.
All of these require authentication before the OS boots so cannot be
bypassed.