From: REM on

> Frank Hahn <fhahnisfake(a)yahoo.com.invalid> wrote:

>We encrypted approximately 70 laptops a year or so ago. It was spread over
>several months because we tried to work around work schedules, etc.

We have quite a few more. Unfortunately, we discussed this project
last summer and as of a week ago we received a Feb. deadline out of
the blue. No problem really as long as we have room to work on 10-12
at a time. We're doing maintenance while we have them.

>Just remember that if something happens to the operating system and/or hard
>drive, more often than not, you may not be able to get any data from the
>drive. Decrypting the hard drive from the created CD takes a long time.

We have gone to a centralized server based program that everyone uses,
so the loss of data issue isn't nearly as bad. Folks still have tons
of old Office files. I setup a backup batch file to back up data three
times daily in the important buildings. I keep a backup of user data
on each PC that I work on, too. In the end we might lose some data,
but it will be old stuff, as Anasazi is what everyone is entering
their work on now.

>Also, if you are familiar with how to create a Bart PE disk, you can find
>plugins for Truecrypt online. I have used that several times to boot the
>laptops that would not start otherwise, mount the encrypted drive, and then
>get data copied off to a USB drive.

>Good luck.

Thanks Frank. I'll have a look at that plugin.

From: REM on

> Craig <netburgher(a)REMOVEgmail.com> wrote:

>Thanks for posting that, Frank... I hadn't thought about recovery issues.

It's an outstanding program. It forces the user to make a backup boot
CD before it will encrypt the drive, which will decrypt the encrypted
volume. It is setup for multiboot machines as well. Very nice!

That TrueCrypt plugin and the UBCD4Win sound very capable of data
recovery in the worst case scenario.

From: REM on

> VanguardLH <V(a)nguard.LH> wrote:


>If you don't backup, you deem your data as worthless or reproducible. Since
>"medical data" infers a company, the company should be backing up their
>data. Since this also for a company, they should already have in place the
>sysprep or images they use to restore their workstations which take a short
>time to bring the host back to its initial state, and then restore the .tc
>file from backups or use TC to encrypt the partition and then do a restore
>of files from the backups into that partition.

It's a non-profit org dealing with mental health, mental retardation
and substance abuse clients.

We buy PCs where we can get the best price when we need them, so we
have a melting pot of brands and models. I keep sysprepped images for
the models that we have quite a few of, but for the most part a clean
install is how we've handled this issue.

I'm thinking of trying to put together a sysprepped encrypted image,
but the current deadline does not allow me to work on this.

I've had the idea of making an image that will install on all of our
hardware for awhile now after I came across this article:

http://www.macrium.com/blog/2008/07/15/HowToTransferWindowsXPToDifferentHardware.aspx

It seems pretty straightforward.

Has anyone managed a universally acceptable image for a variety of
hardware?



From: Frank Hahn on
REM <REMbranded(a)netscape.com> wrote in
news:he2rl5pa6epsdk536lrb2pimanjcaban6o(a)4ax.com:

>
> I'm thinking of trying to put together a sysprepped encrypted image,
> but the current deadline does not allow me to work on this.
>
I've wondered if this would work or not, especially the Truecrypt Rescue
disk image that Truecrypt generates. If it did, then the same disk should
supposedly wotk on all computers.


> I've had the idea of making an image that will install on all of our
> hardware for awhile now after I came across this article:
>
> http://www.macrium.com/blog/2008/07/15/HowToTransferWindowsXPToDifferen
> tHardware.aspx
>
> It seems pretty straightforward.
>
> Has anyone managed a universally acceptable image for a variety of
> hardware?
>
I've also wanted to try something like that but have also never had the
time to sit down and do it.

Another thing to keep in mind is that the obsolete Truecrypt disk images
need to be dealt with, etc. Make sure they get marked in some manner so you
can destroy old disks, etc. Just as an example, if Windows will not start,
you most likely will need to decrypt the computer which renders the
original Rescue disk obsolete. When you re-encrypt, you'll end up with a
new Rescue disk. Just make sure they don't get mixed up or it won't work.

--
Frank Hahn
From: Samm Luter on
On Sun, 24 Jan 2010 11:03:35 -0800, Craig wrote:

> Thanks for posting that, Frank... I hadn't thought about recovery issues.

little linux kiddies never do