Jump to content

Search the Community

Showing results for tags 'bitlocker'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 5 results

  1. Hello experts, I have a Dell Latitude 3490 Laptop. It comes with Windows 10 Pro Pre-installed. Around 3 months before I did a Windows Update after that I have witnessed a "Yellow" "Lock" Icon present in the Drive volumes, I thought the Windows is protecting the drives, but i didn't know that it was "BitLocker Encryption" at that time. Three days before i had given my laptop to the Dell Service center as it couldn't power on. They have replaced the Motherboard. Now Windows is asking for BicLocker Recover Key which i don't have, The Laptop HDD is 1TB with 3 partitions, c = 150GB, d = 390GB, e = 390GB all three are encrypted with BitLocker. Note: I never enabled the BitLocker Encryption by myself so I don't have the password / Recovery Keys. Any help would be appreciated Thanks ppu
  2. Microsoft has announced a range of Secured-core PCs, devices that adopt a number of security technologies to prevent attacks on a firmware level, rather than software-based approaches. The company says that, as software-based protection has been built into operating systems and connected services, vulnerabilities that target the firmware have largely increased in number in recent years - spiking from just 6 in 2016 to over 400 in 2017 - making this a necessary step. Secured-core PCs are built in conjunction with Microsoft partners, both PC and silicon manufacturers, and they "meet a specific set of device requirements that apply the security best practices of isolation and minimal trust to the firmware layer, or the device core, that underpins the Windows operating system". The devices are aimed at organizations that handle highly sensitive information, such as those that offer financial services, government institutions, and so on. These protection features are enabled by a new feature called Dynamic Root of Trust for Measurement (DRTM), which is present in recent hardware from Intel, AMD, and Qualcomm, so you should be able to get that additional layer of protection regardless of your choice of processor. Using this technology, Secured-core PCs use System Guard Secure Launch as a core feature to prevent firmware attacks during the boot process. Other technologies, such as Virtualization-based Security (VBS), Hypervisor-protected Code Integrity (HVCI), and the Trusted Platform Module (TPM) 2.0 help enable additional protection throughout the OS. Secured-core PCs are now available from a variety of hardware manufacturers, and you can find them here. These include the new Surface Pro X for Business, which is the only Qualcomm-based device on the list for now. Source: Microsoft introduces Secured-core PCs with extra protection against firmware attacks (via Neowin)
  3. Windows ships with a full volume encryption tool called BitLocker. The feature used to trust any SSD that claimed to offer its own hardware-based encryption, but that changed in the KB4516071 update to Windows 10 released on September 24, which now assumes that connected SSDs don't actually encrypt anything. "SwiftOnSecurity" called attention to this change on September 26. The pseudonymous Twitter user then reminded everyone of a November 2018 report that revealed security flaws, such as the use of master passwords set by manufacturers, of self-encrypting drives. That meant people who purchased SSDs that were supposed to help keep their data secure might as well have purchased a drive that didn't handle its own encryption instead. Those people were actually worse off than anticipated because Microsoft set up BitLocker to leave these self-encrypting drives to their own devices. This was supposed to help with performance--the drives could use their own hardware to encrypt their contents rather than using the CPU--without compromising the drive's security. Now it seems the company will no longer trust SSD manufacturers to keep their customers safe by themselves. Here's the exact update Microsoft said it made in KB4516071: "Changes the default setting for BitLocker when encrypting a self-encrypting hard drive. Now, the default is to use software encryption for newly encrypted drives. For existing drives, the type of encryption will not change." People can also choose not to have BitLocker encrypt these drives, too, but the default setting assumes they don't want to take SSD manufacturers at their word. We assume many people would prefer that self-encrypting drives would be as secure as they claim to having Microsoft update BitLocker. But at least now they won't be lulled into a false sense of security. If the drives work as advertised, BitLocker can be told to skip them when it's encrypting data. If they don't, however, at least Windows can now provide them a safety net rather than letting them fall because SSD companies messed up. Source
  4. Installing Windows 7 from a backup? You need a BitLocker patch right away Whether you’re installing Win7 from backup on bare metal or on a VM, watch out for a missing patch. On Friday, Microsoft issued a hidden advisory saying you need to run bcdboot.exe and get the SHA-2 patch KB 3133977 – a BitLocker fix – before you do anything else. Getty Images / Microsoft No doubt you recall the warning back in February that Windows 7, Server 2008 and Server 2008 R2 patches starting in July would use the SHA-2 encryption protocol. If you want to install Win7 patches issued after July, you have to get the SHA-2 translator installed. A few days ago, Microsoft tossed a zinger into the FAQs down at the bottom of its SHA-2 post, 2019 SHA-2 Code Signing Support requirement for Windows and WSUS. That post now says that you have to install a seemingly unrelated patch, KB 3133977, entitled, BitLocker can't encrypt drives because of service crashes in svchost.exe process in Windows 7 or Windows Server 2008 R2. That should immediately raise your eyebrows. It’s a BitLocker fix, fer heaven’s sake, and Microsoft now says you better install that fix before you try to run a new instance of Win7 – whether you have BitLocker or not. Specifically, the SHA-2 post was updated on Aug. 16 to say you can run into trouble in any of these scenarios: You’re using setup to perform a clean install of Win7 using an image (perhaps created by DISM) that’s been customized with updates. You’re burning an image of Win7 directly to disk without running setup. You install an image with SHA-2 support, but the system won’t boot, tossing error 0xc0000428, “Windows cannot verify the digital signature for this file. A recent hardware or software change might have installed a file that is signed incorrectly or damaged, or that might be malicious software from an unknown source.” The remedies in each of those situations is a little bit different, but in general it includes installing the BitLocker fix KB 3133977 (even if you’ve hidden it!) and running the bcdboot.exe program to refresh your boot files. This, buried at the bottom of a FAQ in an old KB article. And you thought Win10 users got all the new bizarre bugs. Thx @abbodi86, @PKCano Stay up on the latest -- Win7, too -- on AskWoody.com. Source: Installing Windows 7 from a backup? You need a BitLocker patch right away (Computerworld - Woody Leonhard)
  5. selesn777

    M3 BitLocker Recovery 3.5

    M3 BitLocker Recovery 3.5 M3 Bitlocker Recovery provides safe, fast and total recovery. M3 Bitlocker Recovery, safe and effective Windows data recovery software for Bitlocker encrypted drive, retrieves your lost videos, photos, music, documents, emails, etc. from your PC's hard drive as well as from USB drives, external hard drives, SD card, CF card, memory card and other storage media. Benefits Recover deleted files from Bitlocker encrypted drive.Recover formatted data from Bitlocker encrypted drive.Recover data lost due to the damaged meta data of Bitlocker encrypted drive and Windows decryption failure.Recover data from Bitlocker encrypted drive when you forgot the password.Recover lost data from Bitlocker encrypted drive when the encryption process is accidentally terminated.Recover data from not accessed Bitlocker encrypted drive due to disk I/O error.Recover lost data from Bitlocker encrypted drive when file system is damaged, such as RAW partition, RAW file system.100% safe. This Windows data recovery program works without any damage to your data.Preview before Recovery: Preview Common file formats, including BMP, GIF, PNG, JPEG, JPG, TXT, etc.Easy to Use: Retrieve data within only 3 simple steps and no prior recovery experience required. The friendly Wizard Mode recovery enables beginners to recover lost files by answering only two questions.Homepage: http://www.lost-recover.com/ OS: Windows / XP / Vista / 7 / 8 / Server 2008 / 2012 Language: Eng Medicine: Keygen Size: 3,07 Mb.
×
×
  • Create New...