473,831 Members | 2,288 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Recover encrypted files from defunct Windows XP account

8,435 Recognized Expert Expert
Hi all.

Some months back, I had some Windows problems and ended up having to reinstall XP Pro on a new drive. Since then I have recovered most of my old files from the old drive, and deleted lots of stuff off it, including Windows.

However, having decided to format the old drive and use it for backups, I spent some time scouring it for anything I might have missed. I came across a couple of folders which I really don't want to lose, but they're encrypted. I know the user ID I was using when I created them, and given a few tries I expect I can come up with the password I was using at the time.

So, that's where I stand now. I have these old folders of files which were encrypted by a user account which no longer exists, and naturally, being a typical stupid user I never did set up any recovery agent or anything. So I need to find some way to decrypt them, if it's at all possible. I've spent some time searching and reading this morning, but haven't managed to come up with any way to decrypt these files.

I have physical access to the machine, and whatever rights I care to give myself, since it's my home PC. Um... can't remember the Administrator password, though. I might be able to get that from the guy at the computer shop who installed the new drive and put XP on it. And as mentioned, I know the user ID which created the files, and think I can guess the password (if that matters).

Does anyone know any way I can decrypt these old files?
Jul 22 '07 #1
3 3148
bartonc
6,596 Recognized Expert Expert
I don't know c**p about encrypted files, but some interesting point came out of this discussion.
Jul 23 '07 #2
Killer42
8,435 Recognized Expert Expert
I don't know c**p about encrypted files, but some interesting point came out of this discussion.
Thanks, I already followed that link and did some investigation before posting. It was interesting, but didn't seem very useful for my situation. Of course, it's possible I missed something.
Jul 23 '07 #3
wjnielsen
1 New Member
I have the same problem, I think. A directory on my laptop was encrypted via WinXP Pro and consequently backed up as such on an external HDD. When I reloaded WinXP Pro I no longer could open the files. They do not show up in Windows Explorer, but I can see them with Total Commander. These files are quite high priority for me and being quite short sighted I did not have any retrieval disk made. I have logged in using the exact same username and password with no avail and have not had any luck with the above links. If anyone can help direct me so that I might retrieve this data, I would be grateful.
Aug 6 '07 #4

Sign in to post your reply or Sign up for a free account.

Similar topics

4
2699
by: chuy | last post by:
Is there a way to recover a lost password in Mysql 4.1. I have seen many articles and howto's on how to kill the Mysql process and then restart using skip grant tables option. I am not trying to reset the password but rather recover it. Resetting the password to something else would cause a problem some of the underlying programs that rely on MySQL. I don't feel like changing code for every application that is using MySQL in my site. ...
30
2859
by: zn | last post by:
If I place a form for product ordering on my website, what scripting technology or CGIs can I use to encrypt the e-mail sent to my e-mail account with the order information? Thanks.
12
6658
by: Dave Bailey | last post by:
I need to store an encrypted connection string in the web.config file. I have found several examples on the Net but nothing specific as to how to accomplish task. Thanks in advance, Dave
4
1872
by: Alan Samet | last post by:
Is there a way to easily and securely use the Windows Encrypted File System (EFS) with IIS and ASP.NET? Alternatively, I would prefer to find some sort of totally encrypted low-level device driver to lock-down and encrypt a hard drive. I remember back in my high school days experimenting with a low-level driver called KOH.COM that would require a password upon startup to decrypt file system files. It would be wonderful if a similar...
5
6782
by: Michael Sperlle | last post by:
Is it possible? Bestcrypt can supposedly be set up on linux, but it seems to need changes to the kernel before it can be installed, and I have no intention of going through whatever hell that would cause. If I could create a large file that could be encrypted, and maybe add files to it by appending them and putting in some kind of delimiter between files, maybe a homemade version of truecrypt could be constructed. Any idea what it...
10
4466
by: dermot | last post by:
I have wrriten a small windows service application in visual studio ..net 2003 which listens for incoming FTP files. These files would overwrite over time due to duplicate file names. However any time the windows service tries to rename the file (using flFile.move(source,destination)) it gets an error saying access is denied. The files are on the network, so we though the local system account may not have access We tried changing the...
5
3431
by: rogersw8n | last post by:
Some how, some way the account that creates folders under Temporary Internet files has been changed to a domain account for VS 2003 and VS 2005. I recently installed VS 2005. All seemed to be ok afterwards. I did no development for a couple of weeks, came back and I kept receiving Access Denied to Microsoft.Net\Temporary Internet Files\... Access is Denied. ASPNET had full access to that file and all subfolders. The website I am...
1
4369
by: SBM911 | last post by:
I had a recent hard disk crash but before the event had routinely copies my MP3 and Photo files to another external hard drive. Now I’m seeking to use/access my music and photo files from the backup drive (now my primary) but somehow the files became encrypted (I never set encryption in either the original location or here) and they show up as “green” and unreadable. How to I re-access the files? The box to encrypt/non-encrypt in Properties...
1
1753
by: kbrci | last post by:
We used software from a now defunct company for many years and all of our data is stored in an access database. Two years ago our software was updated, but we never burned the new version to disk. The computer has now crashed and data recover is not possible on the drive. We have a backup of the database but only an older version of the program to access it. The older version does not show all of the fields in the newer version. We have found a...
0
9793
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
9642
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
10777
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
10494
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
7748
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
5619
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
5780
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
2
3963
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
3
3076
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.