Announcement

Collapse
No announcement yet.

Windows XP help!!!!!!!!!!!!!!!!!!!

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Windows XP help!!!!!!!!!!!!!!!!!!!

    Okay, I have a very serious problem. Back in march, I went into file properties, then advanced, and encrypted some files. Since, I have reinstalled my OD (same OS, xp, just formatted a drive and did a clean install). now, i cannot open the files. it says access is denied. Is there anything i can do to fix this???

    thanks in advance
    "Mal nommer les choses, c'est accroître le malheur du monde" - Camus (thanks Davout)

    "I thought you must be dead ..." he said simply. "So did I for a while," said Ford, "and then I decided I was a lemon for a couple of weeks. A kept myself amused all that time jumping in and out of a gin and tonic."

  • #2
    If you encripted the file, you probably supplied a password during this process. Without it, you can't access the file.
    If you remembered to write down the password, did you remember to install the encription package?
    The monkeys are listening.

    Comment


    • #3
      Take off your shirt. Take pictures.

      It could help.

      Comment


      • #4
        You're screwed. Windows ties it's encryption keys to your user password, but even if you had that, you still wouldn't have the entire key. What you need is a recovery certificate, and I'm guessing you don't have one.
        "Beauty is not in the face...Beauty is a light in the heart." - Kahlil Gibran
        "The greatest happiness of life is the conviction that we are loved; loved for ourselves, or rather, loved in spite of ourselves" - Victor Hugo
        "It is noble to be good; it is still nobler to teach others to be good -- and less trouble." - Mark Twain

        Comment


        • #5
          What you need is a recovery certificate
          The existence of such a certificate alone renders that whole "encryption" stuff in Windows utterly useless. It's a fake like so many other things.

          Comment


          • #6
            Originally posted by Sir Ralph
            The existence of such a certificate alone renders that whole "encryption" stuff in Windows utterly useless. It's a fake like so many other things.
            Do you understand how key cryptography works?
            "The issue is there are still many people out there that use religion as a crutch for bigotry and hate. Like Ben."
            Ben Kenobi: "That means I'm doing something right. "

            Comment


            • #7
              Originally posted by Asher
              Do you understand how key cryptography works?
              Yes, and I bet better than you.

              The existance of "Master keys" or "Recovery keys" alone represent backdoors to the key encryption and renders them useless.

              Comment


              • #8
                People encrypt their files because it's both important and sensitive, and the existance of a "recovery key" ensures both, provided you keep the recovery key safe (ie, on a floppy/usb drive that you keep with you).

                Nothing's worse than reinstalling the OS and finding out all your sensitive, important information can no longer be accessed, even by you. Hence the (optional) recovery keys.
                "The issue is there are still many people out there that use religion as a crutch for bigotry and hate. Like Ben."
                Ben Kenobi: "That means I'm doing something right. "

                Comment


                • #9
                  so, is it possible to get one of these recovery keys?
                  "Mal nommer les choses, c'est accroître le malheur du monde" - Camus (thanks Davout)

                  "I thought you must be dead ..." he said simply. "So did I for a while," said Ford, "and then I decided I was a lemon for a couple of weeks. A kept myself amused all that time jumping in and out of a gin and tonic."

                  Comment


                  • #10
                    Originally posted by Kaak
                    so, is it possible to get one of these recovery keys?
                    It has to be YOUR recovery key

                    Comment


                    • #11
                      As far as I know, you had to make the key yourself beforehand if you wanted one.
                      "The issue is there are still many people out there that use religion as a crutch for bigotry and hate. Like Ben."
                      Ben Kenobi: "That means I'm doing something right. "

                      Comment


                      • #12
                        Originally posted by Asher
                        People encrypt their files because it's both important and sensitive, and the existance of a "recovery key" ensures both, provided you keep the recovery key safe (ie, on a floppy/usb drive that you keep with you).

                        Nothing's worse than reinstalling the OS and finding out all your sensitive, important information can no longer be accessed, even by you. Hence the (optional) recovery keys.
                        Given the recovery key is your personal property and no one else would be able to generate one, you are right. In this case the word "recovery" is redundant, though, it's just the key you're storing, may be with a bit of "bla bla" around it. With the same key you can decode your encrypted data after you reinstalled the OS. To call it "Recovery certificate" is just misleading and leads to the question, who except me can hold such a certificate for my data.

                        What I'm talking about are backdoors to the encryption system. For instance are there easy methods to make "master keys" in key encryption algorithm, which greatly reduce the width of the used key.

                        An example: For the sake of simplicity, let's assume we encrypt our data with a 6-digit decimal number. That's at least, what the key generator gives us. What we don't know is, that the generator spits out only multiples of, say, 1357. That's not obvious, if you look at the 6 digit key. We think, a brute force attacker has to go through 1,000,000 possibilities for the key, but in fact it are only 1,000,000 / 1,357 = ~737. Compare 1 million and 737, quite a difference, no?

                        The reality is of course not that simple, but there are similar methods to store such "master keys" like the number 1357 in my example at the police, the CIA, NSA, Mossad or whatever, which reduce a keywidth of 128 bit to 40 bit or similar. I think I encrypted it with 128 bit and so it is for everyone except those with the "master key". For them it's only a weak 40 bit encryption. You get the message.

                        As long as an encryption algorithm is not thoroughly described and open in it's algorithmus and software, I would refuse to use it. Answer me a simple question: Are you sure there's no backdoor (as described) in the Windows encryption system?

                        Comment


                        • #13
                          I am also curious as to what cyher protocol is used in Windows XP. It's not one of the public ones, is it?
                          (\__/) 07/07/1937 - Never forget
                          (='.'=) "Claims demand evidence; extraordinary claims demand extraordinary evidence." -- Carl Sagan
                          (")_(") "Starting the fire from within."

                          Comment


                          • #14
                            Originally posted by Sir Ralph
                            Answer me a simple question: Are you sure there's no backdoor (as described) in the Windows encryption system?
                            The only "back door" is the user-generated recovery key.

                            The US government (and 7 other nations, now) have looked at the code extensively to ensure there's no backdoors. The US government even gave Windows 2000, XP Pro, and 2003 higher C2 security classification than Linux in part due to the very-well implemented encrypting file system.

                            The most secure way you could do it, is IBM's Security Subsystem 2.0 like I've got on my new ThinkPad. It's got a TCPA-compliant chip on it, and your keys and encryption is dealt with on its own pool of protected RAM and processor to prevent snooping.
                            "The issue is there are still many people out there that use religion as a crutch for bigotry and hate. Like Ben."
                            Ben Kenobi: "That means I'm doing something right. "

                            Comment


                            • #15
                              wow....then i have lost a lot of very nice naked pictures of my ex
                              "Mal nommer les choses, c'est accroître le malheur du monde" - Camus (thanks Davout)

                              "I thought you must be dead ..." he said simply. "So did I for a while," said Ford, "and then I decided I was a lemon for a couple of weeks. A kept myself amused all that time jumping in and out of a gin and tonic."

                              Comment

                              Working...
                              X