From: REM on 25 Jan 2010 07:05 > Frank Hahn <fhahnisfake(a)yahoo.com.invalid> wrote: >We encrypted approximately 70 laptops a year or so ago. It was spread over >several months because we tried to work around work schedules, etc. We have quite a few more. Unfortunately, we discussed this project last summer and as of a week ago we received a Feb. deadline out of the blue. No problem really as long as we have room to work on 10-12 at a time. We're doing maintenance while we have them. >Just remember that if something happens to the operating system and/or hard >drive, more often than not, you may not be able to get any data from the >drive. Decrypting the hard drive from the created CD takes a long time. We have gone to a centralized server based program that everyone uses, so the loss of data issue isn't nearly as bad. Folks still have tons of old Office files. I setup a backup batch file to back up data three times daily in the important buildings. I keep a backup of user data on each PC that I work on, too. In the end we might lose some data, but it will be old stuff, as Anasazi is what everyone is entering their work on now. >Also, if you are familiar with how to create a Bart PE disk, you can find >plugins for Truecrypt online. I have used that several times to boot the >laptops that would not start otherwise, mount the encrypted drive, and then >get data copied off to a USB drive. >Good luck. Thanks Frank. I'll have a look at that plugin.
From: REM on 25 Jan 2010 07:08 > Craig <netburgher(a)REMOVEgmail.com> wrote: >Thanks for posting that, Frank... I hadn't thought about recovery issues. It's an outstanding program. It forces the user to make a backup boot CD before it will encrypt the drive, which will decrypt the encrypted volume. It is setup for multiboot machines as well. Very nice! That TrueCrypt plugin and the UBCD4Win sound very capable of data recovery in the worst case scenario.
From: REM on 25 Jan 2010 07:15 > VanguardLH <V(a)nguard.LH> wrote: >If you don't backup, you deem your data as worthless or reproducible. Since >"medical data" infers a company, the company should be backing up their >data. Since this also for a company, they should already have in place the >sysprep or images they use to restore their workstations which take a short >time to bring the host back to its initial state, and then restore the .tc >file from backups or use TC to encrypt the partition and then do a restore >of files from the backups into that partition. It's a non-profit org dealing with mental health, mental retardation and substance abuse clients. We buy PCs where we can get the best price when we need them, so we have a melting pot of brands and models. I keep sysprepped images for the models that we have quite a few of, but for the most part a clean install is how we've handled this issue. I'm thinking of trying to put together a sysprepped encrypted image, but the current deadline does not allow me to work on this. I've had the idea of making an image that will install on all of our hardware for awhile now after I came across this article: http://www.macrium.com/blog/2008/07/15/HowToTransferWindowsXPToDifferentHardware.aspx It seems pretty straightforward. Has anyone managed a universally acceptable image for a variety of hardware?
From: Frank Hahn on 25 Jan 2010 08:20 REM <REMbranded(a)netscape.com> wrote in news:he2rl5pa6epsdk536lrb2pimanjcaban6o(a)4ax.com: > > I'm thinking of trying to put together a sysprepped encrypted image, > but the current deadline does not allow me to work on this. > I've wondered if this would work or not, especially the Truecrypt Rescue disk image that Truecrypt generates. If it did, then the same disk should supposedly wotk on all computers. > I've had the idea of making an image that will install on all of our > hardware for awhile now after I came across this article: > > http://www.macrium.com/blog/2008/07/15/HowToTransferWindowsXPToDifferen > tHardware.aspx > > It seems pretty straightforward. > > Has anyone managed a universally acceptable image for a variety of > hardware? > I've also wanted to try something like that but have also never had the time to sit down and do it. Another thing to keep in mind is that the obsolete Truecrypt disk images need to be dealt with, etc. Make sure they get marked in some manner so you can destroy old disks, etc. Just as an example, if Windows will not start, you most likely will need to decrypt the computer which renders the original Rescue disk obsolete. When you re-encrypt, you'll end up with a new Rescue disk. Just make sure they don't get mixed up or it won't work. -- Frank Hahn
From: Samm Luter on 25 Jan 2010 10:07 On Sun, 24 Jan 2010 11:03:35 -0800, Craig wrote: > Thanks for posting that, Frank... I hadn't thought about recovery issues. little linux kiddies never do
First
|
Prev
|
Next
|
Last
Pages: 1 2 3 4 Prev: what's the difference between these 2 programs? Next: Mouse Speed Switcher |