Questions tagged [recovery]

64 questions
3
votes
3 answers

TrueCrypt Data Recovery

I deleted a 2GB directory and sub-directories/data files from a TrueCrypt container mounted as a Drive Letter. The directory and sub-directories/data files was larger than the recycle bin so it was deleted without the recycle bin. The recycle bin…
stever88
  • 31
  • 2
3
votes
1 answer

How can a server recover from its secret key stolen?

Suppose a server use digital signature to prove the files it sends to users. If someone steals the secret key in the server, what should it do?
yoarcher
  • 33
  • 3
3
votes
1 answer

Is there a difference between "Maximum Tolerable Downtime" and "Maximum Allowed Downtime"?

I'm studying for the CCSP exam and one of the BC/DR terms that is referenced in my study material is "Maximum Allowable Downtime". The definition for it is: MAD (Maxium Allowable Downtime) How long it would take for an interruption in service to…
Mike B
  • 3,336
  • 4
  • 29
  • 39
3
votes
3 answers

Password manager and account recovery

I'd like to start using a password manager, but I'm not sure how to handle account recovery. I'm not a criminal or a secret agent, so if I lose my master password (or my second authentication factor, like a Yubikey thumbdrive, or my own thumb), I…
3
votes
1 answer

What is the purpose of having 10 MFA Recovery Codes?

When you enable MFA for many popular services they provide you with 10 recovery codes that will allow you to temporarily disable or update your MFA settings with their service in the event that your device is lost, stolen, or simply stops…
AJB
  • 316
  • 2
  • 12
2
votes
4 answers

Need a word-list generator from a few words and numbers

I have an old rar backup and I am trying to recover the password. I remember the words in the password, but I usually add some numbers and cap some characters (don't know which ones though). I have been trying for days to use a recovery tool to work…
Cory
  • 121
  • 1
  • 1
  • 3
2
votes
1 answer

How to reset a second factor authentication without compromising the authentication process

I am designing a system that uses two-factor authentication. Where the user can only granted access only if the two authentication factors passed the verification. Let us assume that the first factor is simply a password-based authentication and…
Ubaidah
  • 1,054
  • 6
  • 11
2
votes
3 answers

Creating a custom restore disk to prevent data mining?

I work in commercial telecoms and one part of our business is the leasing of computer equipment to call centers. If the customer for whatever reason gives us the equipment back (non-payment, out of business, downsizing) we lease out these same…
Adam
  • 131
  • 3
2
votes
0 answers

Different email address in the email and the cancellation link in "Security alert for your linked Google Account"

In order to be able to help my mother, my gmail is listed as a recovery email for her Google account, mother@gmail.com (not her actual address). Today I received a "Security alert for your linked Google Account" which notified me that someone…
Fato39
  • 121
  • 1
  • 4
2
votes
2 answers

How to securely destroy old cellphone, to avoid personal data recuperation?

While cleaning I've found an old cellphone. This phone does not turn on, and I'm not sure if contains personal data. I would like to throw away this phone, but I'm concerted if this data can be recovered some way. What could be the best way to…
user674887
  • 275
  • 1
  • 2
  • 5
2
votes
1 answer

No password root accounts of an entire laboratory!

2 days ago some of the university staff asked me about 3 computers here. All the computers are using Ubuntu and have the exact same password on the login screen for the superuser. Let's say StackPa$$word is the password. 3 computers refused the…
2
votes
2 answers

Is it possible to browse Windows 7 Previous Versions of an offline hard drive?

Short of buying identical hardware, my sister's computer died and she kept only the hard drive. She moved a file to a USB FD prior to it dying, but she can't find the FD. She knows it was on the desktop. I've used the "Previous Versions" feature on…
user208145
  • 123
  • 3
2
votes
2 answers

Resetting LUKS password from CLI with the recovery key

I have a dd of a computer which has a LUKS-encrypted partition. I do not have the password but I do have a recovery key which would allow me to change the password through a GUI interface when the computer is booted. Unfortunately, I no longer have…
2
votes
1 answer

Lost my PGP private key when hard drive wiped. Possible to recover?

I recently made a big mistake of wiping my C drive that held my pgp key ring. Currently the key ring is the only way I can get access to an account with $300 of bitcoin. I've downloaded some recovery tools and went through the files but to be honest…
Braden Whaley
  • 21
  • 1
  • 3
2
votes
3 answers

Do moved files leave a trace on the drive they created on?

I have created a word document on my computer, or any other file like txt, image, PSD etc. Now, I then take that file and move it to an external device, would that file leave a trace on the computer? Is it recoverable on the computer?
Aasim Azam
  • 125
  • 1
  • 1
  • 6