PCSTATS Main Page Follow PCSTATS on Facebook PCSTATS RSS Feed PCSTATS Twitter Feed + Motherboards
+ Videocards
+ Memory
+ Beginners Guides
News & Advanced Search  Feedback?
[X]   Directory of
Guides & Reviews

Beginners Guides
Motherboards by Brand
Weekly Newsletter
Archived Newsletters

+70 MORE Beginner GUIDES....
Beginners Guides: Preventing Data Theft from a Stolen Laptop
Beginners Guides: Preventing Data Theft from a Stolen Laptop - PCSTATS
Abstract: And, if that doesn't work, at least you can protect your data better than you did that brand new notebook. Harsh words, but sound advice.
Filed under: Beginners Guides Published:  Author: 
External Mfg. Website: PCSTATS Sep 08 2005   M. Dowler  
Home > Reviews > Beginners Guides > PCSTATS

Creating a Recovery Agent

On the 'file to import' page, click 'browse' then change the 'files of type' dropdown box to .pfx files.

Select the filename you created with the 'cipher /r:' command. Type the password.

Check the 'mark this key as exportable' box.

Click 'next.'

Choose the 'Automatically Select The Certificate Store Based On The Type Of Certificate' option.

Click 'next,' then 'finish.'

Close the certificates console.

Go to 'start\run' and type 'secpol.msc' to open the local security policies.

Navigate to 'Security Settings\Public Key Policies\Encrypting File System,' and
Choose 'Action\Add Data Recovery Agent.' Click 'Next.'

Click 'browse folders.' Open the filename you created earlier with the 'cipher'
command. Click 'next' then 'finish.' The current user is now a data-recovery agent and
can decrypt any EFS encrypted files on the system.

< Previous Page © 2022 PCSTATS.com
Please respect the time and effort that went into creating each PCSTATS Beginners Guide, do not illegally copy. Thank you.
Next Page >


Contents of Article: PCSTATS
 Pg 1.  Beginners Guides: Preventing Data Theft from a Stolen Laptop
 Pg 2.  Biometric security
 Pg 3.  Laptop tracing software
 Pg 4.  Protecting your data in the event of theft
 Pg 5.  Password Tips and Encrypt Vital Data
 Pg 6.  How to encrypt files in Windows XP
 Pg 7.  — Creating a Recovery Agent
 Pg 8.  Exporting a data recovery certificate

Hardware Sections 

PCSTATS Network Features Information About Us Contact
PCSTATS Newsletter
Tech Glossary
Technology WebSite Listings
News Archives
(Review RSS Feed)
Site Map
PCstats Wallpaper
About Us
Privacy Policy
Advertise on PCSTATS

How's Our Driving?
© Copyright 1999-2022 www.pcstats.com All rights reserved. Privacy policy and Terms of Use.