Encrypting data drive in Mavericks

In Mountain Lion it was possible to right-click on an external data drive and select an option from the popup menu to encrypt the data drive. (Presuming it is properly formatted at a GUID partition HFS+ drive.)
However the same option is not available in the Finder in Mavericks. It is possible similarly encrypt specifically a Time Machine drive by opening Time Machine preferences and ticking a box to encrypt the Time Machine backup volume but I am asking about encrypting a general purpose data drive which will not be used as a Time Machine backup.
Last time I needed to do this I had to specifically find a Mac still running Mountain Lion to do it. Surely there must be an easy way to still do it in Mavericks.
Thanks for any help.

That option is still there. Perhaps the drive your are trying to encrypt is not a Journaled HFS volume.

Similar Messages

  • I lost all personal data while installing maverick in external drive. How can I recover lost data?

    I lost all personal data while installing maverick in external drive. How can I recover lost data?

    If all your files are missing
    You may have logged in as a different user, such as Guest. Open the Users & Groups pane in System Preferences. Your name should be at the top of the user list, under Current User. See also this support article.   
    If files are missing from one folder
    Change the Finder view mode; for example, from icon view to list view, or vice versa.

  • What's the best way to encrypt my "data" drive?

    Hi all -
    I boot from SSD and have my user's home directory relocated to my 'Data' drive, a 4TB 7.2k drive in slot 2 in my MacPro.
    I want to, and did, leave the SSD unencrypted
    I encrypted the Slot 2 'Data' drive via Finder, right-click 'Encrypt.'
    Then, when I went to log in, my user couldn't, because the 'Data' drive wasn't unlocked yet ... of course.
    I had to log in as Adminstrator & unlock the drive, log out & then log in as my user.
    Is there a better way to do this?
    Thanks.

    Hi all -
    I boot from SSD and have my user's home directory relocated to my 'Data' drive, a 4TB 7.2k drive in slot 2 in my MacPro.
    I want to, and did, leave the SSD unencrypted
    I encrypted the Slot 2 'Data' drive via Finder, right-click 'Encrypt.'
    Then, when I went to log in, my user couldn't, because the 'Data' drive wasn't unlocked yet ... of course.
    I had to log in as Adminstrator & unlock the drive, log out & then log in as my user.
    Is there a better way to do this?
    Thanks.

  • HP Protecttools encrypted hard drive - data recovery

     I have an HP Probook 4530s.  It got dropped and the mother board was damaged.  The computer does not even load the boot screen.  The hard drive is un-damaged.   I would like to recover the data from the hard drive, but the data is encrypted with HP Protecttools Security Encryption.  I found this thread:http://h30434.www3.hp.com/t5/Notebook-Operating-Systems-and-Software/ProtectTools-issue-Decrypting-an-encrypted-ProtectTools-HDD/td-p/3362403 It details how to recover data using Disktech2011, a bootable recovery iso image from CD. I followed the directions, but when I get to the step 6, selecting the recovery key...I get an error.  (I do have the original recovery key that was created when I first set up the encryption).  This is the error that I get:  I believe the problem is that the Disktech software cannot find the USB drive that I have the encrypted drive plugged in to (I have the encrypted hard drive from my damaged laptop plugged into a separate computer via a SATA to USB adapter plug). I googled the error and found this https://kc.mcafee.com/corporate/index?page=content&id=KB79409 It details setting the boot disk , which basically tells the software which drive to look at.  However, this is a McAfee error/solution (because the HP protecttools is a McAfee product).  I cant figure out how to set the boot disk in the HP Disktech2011 software.  Does anyone know how to get the Disktech software to recognize my encrypted drive in the USB? Or any other solutions if I am not doing this correctly??? Please help.  I have videos on there that the wife would kill me if I lost.  Thanks.

    I don't know about this particular product, but I've found that lots of disk utilities don't work well, or even at  all, when the drive is connected through a USB cable.  In some cases, a drive connected via a USB cable, even if you're using a docking port, is considered "external" -- and some utilities simply won't work with external drives. If you're using a desktop, what you will probably have to do is open the case and connect the drive to one of the drive cables in the case -- and then reboot.

  • After the last Yosemite update on my MacBook pro I turned the FileVault on, now my Mac is freezing all the time and encrypting the drive looks like going to last forever and I am unable to use my MacBook pro what must I do???!!!

    after the last Yosemite update on my MacBook pro I turned the FileVault on, now my Mac is freezing all the time and encrypting the drive looks like going to last forever and I am unable to use my MacBook pro what must I do???!!!

    1. This procedure is a diagnostic test. It changes nothing, for better or worse, and therefore will not, in itself, solve the problem. But with the aid of the test results, the solution may take a few minutes, instead of hours or days.
    Don't be put off by the complexity of these instructions. The process is much less complicated than the description. You do harder tasks with the computer all the time.
    2. If you don't already have a current backup, back up all data before doing anything else. The backup is necessary on general principle, not because of anything in the test procedure. Backup is always a must, and when you're having any kind of trouble with the computer, you may be at higher than usual risk of losing data, whether you follow these instructions or not.
    There are ways to back up a computer that isn't fully functional. Ask if you need guidance.
    3. Below are instructions to run a UNIX shell script, a type of program. As I wrote above, it changes nothing. It doesn't send or receive any data on the network. All it does is to generate a human-readable report on the state of the computer. That report goes nowhere unless you choose to share it. If you prefer, you can act on it yourself without disclosing the contents to me or anyone else.
    You should be wondering whether you can believe me, and whether it's safe to run a program at the behest of a stranger. In general, no, it's not safe and I don't encourage it.
    In this case, however, there are a couple of ways for you to decide whether the program is safe without having to trust me. First, you can read it. Unlike an application that you download and click to run, it's transparent, so anyone with the necessary skill can verify what it does.
    You may not be able to understand the script yourself. But variations of the script have been posted on this website thousands of times over a period of years. The site is hosted by Apple, which does not allow it to be used to distribute harmful software. Any one of the millions of registered users could have read the script and raised the alarm if it was harmful. Then I would not be here now and you would not be reading this message.
    Nevertheless, if you can't satisfy yourself that these instructions are safe, don't follow them. Ask for other options.
    4. Here's a summary of what you need to do, if you choose to proceed:
    ☞ Copy a line of text in this window to the Clipboard.
    ☞ Paste into the window of another application.
    ☞ Wait for the test to run. It usually takes a few minutes.
    ☞ Paste the results, which will have been copied automatically, back into a reply on this page.
    The sequence is: copy, paste, wait, paste again. You don't need to copy a second time. Details follow.
    5. You may have started the computer in "safe" mode. Preferably, these steps should be taken in “normal” mode, under the conditions in which the problem is reproduced. If the system is now in safe mode and works well enough in normal mode to run the test, restart as usual. If you can only test in safe mode, do that.
    6. If you have more than one user, and the one affected by the problem is not an administrator, then please run the test twice: once while logged in as the affected user, and once as an administrator. The results may be different. The user that is created automatically on a new computer when you start it for the first time is an administrator. If you can't log in as an administrator, test as the affected user. Most personal Macs have only one user, and in that case this section doesn’t apply. Don't log in as root.
    7. The script is a single long line, all of which must be selected. You can accomplish this easily by triple-clicking anywhere in the line. The whole line will highlight, though you may not see all of it in the browser window, and you can then copy it. If you try to select the line by dragging across the part you can see, you won't get all of it.
    Triple-click anywhere in the line of text below on this page to select it:
    PATH=/usr/bin:/bin:/usr/sbin:/sbin:/usr/libexec;clear;cd;p=(Software Hardware Memory Diagnostics Power FireWire Thunderbolt USB Fonts SerialATA 4 1000 25 5120 KiB/s 1024 85 \\b%% 20480 1 MB/s 25000 ports ' com.clark.\* \*dropbox \*genieo\* \*GoogleDr\* \*k.AutoCAD\* \*k.Maya\* vidinst\* ' DYLD_INSERT_LIBRARIES\ DYLD_LIBRARY_PATH -86 "` route -n get default|awk '/e:/{print $2}' `" 25 N\\/A down up 102400 25600 recvfrom sendto CFBundleIdentifier 25 25 25 1000 MB ' com.adobe.AAM.Updater-1.0 com.adobe.AAM.Updater-1.0 com.adobe.AdobeCreativeCloud com.adobe.CS4ServiceManager com.adobe.CS5ServiceManager com.adobe.fpsaud com.adobe.SwitchBoard com.adobe.SwitchBoard com.apple.aelwriter com.apple.AirPortBaseStationAgent com.apple.FolderActions.enabled com.apple.installer.osmessagetracing com.apple.mrt.uiagent com.apple.ReportCrash.Self com.apple.rpmuxd com.apple.SafariNotificationAgent com.apple.usbmuxd com.citrixonline.GoToMeeting.G2MUpdate com.google.keystone.agent com.google.keystone.daemon com.microsoft.office.licensing.helper com.oracle.java.Helper-Tool com.oracle.java.JavaUpdateHelper com.oracle.java.JavaUpdateHelper org.macosforge.xquartz.privileged_startx org.macosforge.xquartz.startx ' ' 879294308 4071182229 461455494 3627668074 1083382502 1274181950 1855907737 2758863019 1848501757 464843899 3694147963 1233118628 2456546649 2806998573 2778718105 2636415542 842973933 2051385900 3301885676 891055588 998894468 695903914 1443423563 4136085286 523110921 3873345487 ' 51 5120 files );N5=${#p[@]};p[N5]=` networksetup -listnetworkserviceorder|awk ' NR>1 { sub(/^\([0-9]+\) /,"");n=$0;getline;} $NF=="'${p[26]}')" { sub(/.$/,"",$NF);print n;exit;} ' `;f=('\n%s: %s\n' '\n%s\n\n%s\n' '\nRAM details\n%s\n' %s\ %s '%s\n-\t%s\n' );S0() { echo ' { q=$NF+0;$NF="";u=$(NF-1);$(NF-1)="";gsub(/^ +| +$/,"");if(q>='${p[$1]}') printf("%s (UID %s) is using %s '${p[$2]}'",$0,u,q);} ';};s=(' s/[0-9A-Za-z._]+@[0-9A-Za-z.]+\.[0-9A-Za-z]{2,4}/EMAIL/g;/faceb/s/(at\.)[^.]+/\1NAME/g;/\/Shared/!s/(\/Users\/)[^ /]+/\1USER/g;s/[-0-9A-Fa-f]{22,}/UUID/g;' ' s/^ +//;/de: S|[nst]:/p;' ' {sub(/^ +/,"")};/er:/;/y:/&&$2<'${p[10]} ' 1s/://;3,6d;/[my].+:/d;s/^ {4}//;H;${ g;s/\n$//;/s: (E[^m]|[^EO])|x([^08]|02[^F]|8[^0])/p;} ' ' 5h;6{ H;g;/P/!p;} ' ' ($1~/^Cy/&&$3>'${p[11]}')||($1~/^Cond/&&$2!~/^N/) ' ' /:$/{ N;/:.+:/d;s/ *://;b0'$'\n'' };/^ *(V.+ [0N]|Man).+ /{ s/ 0x.... //;s/[()]//g;s/(.+: )(.+)/ (\2)/;H;};$b0'$'\n'' d;:0'$'\n'' x;s/\n\n//;/Apple[ ,]|Genesy|Intel|SMSC/d;s/\n.*//;/\)$/p;' ' s/^.*C/C/;H;${ g;/No th|pms/!p;} ' '/= [^GO]/p' '{$1=""};1' ' /Of/!{ s/^.+is |\.//g;p;} ' ' $0&&!/ / { n++;print;} END { if(n<10) print "com.apple.";} ' ' { sub(/ :/,"");print|"tail -n'${p[12]}'";} ' ' NR==2&&$4<='${p[13]}' { print $4;} ' ' END { $2/=256;if($2>='${p[15]}') print int($2) } ' ' NR!=13{next};{sub(/[+-]$/,"",$NF)};'"`S0 21 22`" 'NR!=2{next}'"`S0 37 17`" ' NR!=5||$8!~/[RW]/{next};{ $(NF-1)=$1;$NF=int($NF/10000000);for(i=1;i<=3;i++){$i="";$(NF-1-i)="";};};'"`S0 19 20`" 's:^:/:p' '/\.kext\/(Contents\/)?Info\.plist$/p' 's/^.{52}(.+) <.+/\1/p' ' /Launch[AD].+\.plist$/ { n++;print;} END { if(n<200) print "/System/";} ' '/\.xpc\/(Contents\/)?Info\.plist$/p' ' NR>1&&!/0x|\.[0-9]+$|com\.apple\.launchctl\.(Aqua|Background|System)$/ { print $3;} ' ' /\.(framew|lproj)|\):/d;/plist:|:.+(Mach|scrip)/s/:[^:]+//p ' '/^root$/p' ' !/\/Contents\/.+\/Contents|Applic|Autom|Frameworks/&&/Lib.+\/Info.plist$/ { n++;print;} END { if(n<1100) print "/System/";} ' '/^\/usr\/lib\/.+dylib$/p' ' /Temp|emac/{next};/(etc|Preferences|Launch[AD].+)\// { sub(".(/private)?","");n++;print;} END { split("'"${p[41]}"'",b);split("'"${p[42]}"'",c);for(i in b) print b[i]".plist\t"c[i];if(n<500) print "Launch";} ' ' /\/(Contents\/.+\/Contents|Frameworks)\/|\.wdgt\/.+\.([bw]|plu)/d;p;' 's/\/(Contents\/)?Info.plist$//;p' ' { gsub("^| |\n","\\|\\|kMDItem'${p[35]}'=");sub("^...."," ") };1 ' p '{print $3"\t"$1}' 's/\'$'\t''.+//p' 's/1/On/p' '/Prox.+: [^0]/p' '$2>'${p[43]}'{$2=$2-1;print}' ' BEGIN { i="'${p[26]}'";M1='${p[16]}';M2='${p[18]}';M3='${p[31]}';M4='${p[32]}';} !/^A/{next};/%/ { getline;if($5<M1) a="user "$2"%, system "$4"%";} /disk0/&&$4>M2 { b=$3" ops/s, "$4" blocks/s";} $2==i { if(c) { d=$3+$4+$5+$6;next;};if($4>M3||$6>M4) c=int($4/1024)" in, "int($6/1024)" out";} END { if(a) print "CPU: "a;if(b) print "I/O: "b;if(c) print "Net: "c" (KiB/s)";if(d) print "Net errors: "d" packets/s";} ' ' /r\[0\] /&&$NF!~/^1(0|72\.(1[6-9]|2[0-9]|3[0-1])|92\.168)\./ { print $NF;exit;} ' ' !/^T/ { printf "(static)";exit;} ' '/apsd|BKAg|OpenD/!s/:.+//p' ' (/k:/&&$3!~/(255\.){3}0/ )||(/v6:/&&$2!~/A/ ) ' ' $1~"lR"&&$2<='${p[25]}';$1~"li"&&$3!~"wpa2";' ' BEGIN { FS=":";p="uniq -c|sed -E '"'s/ +\\([0-9]+\\)\\(.+\\)/\\\2 x\\\1/;s/x1$//'"'";} { n=split($3,a,".");sub(/_2[01].+/,"",$3);print $2" "$3" "a[n]$1|p;b=b$1;} END { close(p);if(b) print("\n\t* Code injection");} ' ' NR!=4{next} {$NF/=10240} '"`S0 27 14`" ' END { if($3~/[0-9]/)print$3;} ' ' BEGIN { L='${p[36]}';} !/^[[:space:]]*(#.*)?$/ { l++;if(l<=L) f=f"\n   "$0;} END { F=FILENAME;if(!F) exit;if(!f) f="\n   [N/A]";"cksum "F|getline C;split(C, A);C="checksum "A[1];"file -b "F|getline T;if(T!~/^(AS.+ (En.+ )?text(, with v.+)?$|(Bo|PO).+ sh.+ text ex|XM)/) F=F" ("T", "C")";else F=F" ("C")";printf("\nContents of %s\n%s\n",F,f);if(l>L) printf("\n   ...and %s more line(s)\n",l-L);} ' ' s/^ ?n...://p;s/^ ?p...:/-'$'\t''/p;' 's/0/Off/p' ' END{print NR} ' ' /id: N|te: Y/{i++} END{print i} ' ' / / { print "'"${p[28]}"'";exit;};1;' '/ en/!s/\.//p' ' NR!=13{next};{sub(/[+-M]$/,"",$NF)};'"`S0 39 40`" ' $10~/\(L/&&$9!~"localhost" { sub(/.+:/,"",$9);print $1": "$9|"sort|uniq";} ' '/^ +r/s/.+"(.+)".+/\1/p' 's/(.+\.wdgt)\/(Contents\/)?Info\.plist$/\1/p' 's/^.+\/(.+)\.wdgt$/\1/p' ' /l: /{ /DVD/d;s/.+: //;b0'$'\n'' };/s: /{ /V/d;s/^ */- /;H;};$b0'$'\n'' d;:0'$'\n'' x;/APPLE [^:]+$/d;p;' ' /^find: /d;p;' "`S0 44 45`" ' BEGIN{FS="= "} /Path/{print $2} ' ' /^ *$/d;s/^ */   /;' ' s/^.+ |\(.+\)$//g;p ' '/\.(appex|pluginkit)\/Contents\/Info\.plist$/p' ' /2/{print "WARN"};/4/{print "CRITICAL"};' ' /EVHF|MACR/d;s/^.+: //p;' );c1=(system_profiler pmset\ -g nvram fdesetup find syslog df vm_stat sar ps crontab iotop top pkgutil 'PlistBuddy 2>&1 -c "Print' whoami cksum kextstat launchctl smcDiagnose sysctl\ -n defaults\ read stat lsbom mdfind ' for i in ${p[24]};do ${c1[18]} ${c2[27]} $i;done;' pluginkit scutil dtrace profiles sed\ -En awk /S*/*/P*/*/*/C*/*/airport networksetup mdutil lsof test osascript\ -e );c2=(com.apple.loginwindow\ LoginHook '" /L*/P*/loginw*' "'tell app \"System Events\" to get properties of login items'|tr , \\\n" 'L*/Ca*/com.ap*.Saf*/E*/* -d 1 -name In*t -exec '"${c1[14]}"' :CFBundleDisplayName" {} \;|sort|uniq' '~ $TMPDIR.. \( -flags +sappnd,schg,uappnd,uchg -o ! -user $UID -o ! -perm -600 \)' '.??* -path .Trash -prune -o -type d -name *.app -print -prune' :${p[35]}\" :Label\" '{/,}L*/{Con,Pref}* -type f ! -size 0 -name *.plist -exec plutil -s {} \;' "-f'%N: %l' Desktop L*/Keyc*" therm sysload boot-args status " -F '\$Time \$(RefProc): \$Message' -k Sender Req 'fsev|kern|launchd' -k RefProc Rne 'Aq|WebK' -k Message Rne 'Goog|ksadm|probe|Roame|SMC:|smcD|sserti|suhel| VALI|ver-r|xpma' -k Message Req 'abn|bad |Beac|caug|corru|dead[^bl]|FAIL|fail|GPU |hfs: Ru|inval|jnl:|last value [1-9]|NVDA\(|pagin|proc: t|Roamed|rror|SL|TCON|Throttli|tim(ed? ?|ing )o|WARN' " '-du -n DEV -n EDEV 1 10' 'acrx -o comm,ruid,%cpu' '-t1 10 1' '-f -pfc /var/db/r*/com.apple.*.{BS,Bas,Es,J,OSXU,Rem,up}*.bom' '{/,}L*/Lo*/Diag* -type f -regex .\*[cght] ! -name .?\* ! -name \*ag \( -exec grep -lq "^Thread c" {} \; -exec printf \* \; -o -true \) -execdir stat -f:%Sc:%N -t%F {} \;|sort -t: -k2 |tail -n'${p[38]} '/S*/*/Ca*/*xpc* >&- ||echo No' '-L /{S*/,}L*/StartupItems -type f -exec file {} +' '-L /S*/L*/{C*/Sec*A,Ex}* {/,}L*/{A*d,Ca*/*/Ex,Co{mpon,reM},Ex,In{p,ter},iTu*/*P,Keyb,Mail/B,Pr*P,Qu*T,Scripti,Sec,Servi,Spo,Widg}* -path \\*s/Resources -prune -o -type f -name Info.plist' '/usr/lib -type f -name *.dylib' `awk "${s[31]}"<<<${p[23]}` "/e*/{auto,{cron,fs}tab,hosts,{[lp],sy}*.conf,mach_i*/*,pam.d/*,ssh{,d}_config,*.local} {,/usr/local}/etc/periodic/*/* /L*/P*{,/*}/com.a*.{Bo,sec*.ap}*t {/S*/,/,}L*/Lau*/*t .launchd.conf" list getenv /Library/Preferences/com.apple.alf\ globalstate --proxy '-n get default' -I --dns -getdnsservers\ "${p[N5]}" -getinfo\ "${p[N5]}" -P -m\ / '' -n1 '-R -l1 -n1 -o prt -stats command,uid,prt' '--regexp --only-files --files com.apple.pkg.*|sort|uniq' -kl -l -s\ / '-R -l1 -n1 -o mem -stats command,uid,mem' '+c0 -i4TCP:0-1023' com.apple.dashboard\ layer-gadgets '-d /L*/Mana*/$USER&&echo On' '-app Safari WebKitDNSPrefetchingEnabled' "+c0 -l|awk '{print(\$1,\$3)}'|sort|uniq -c|sort -n|tail -1|awk '{print(\$2,\$3,\$1)}'" -m 'L*/{Con*/*/Data/L*/,}Pref* -type f -size 0c -name *.plist.???????|wc -l' kern.memorystatus_vm_pressure_level '3>&1 >&- 2>&3' " -F '\$Time \$Message' -k Sender kernel -k Message CSeq 'n Cause: -' " );N1=${#c2[@]};for j in {0..9};do c2[N1+j]=SP${p[j]}DataType;done;N2=${#c2[@]};for j in 0 1;do c2[N2+j]="-n ' syscall::'${p[33+j]}':return { @out[execname,uid]=sum(arg0) } tick-10sec { trunc(@out,1);exit(0);} '";done;l=(Restricted\ files Hidden\ apps 'Elapsed time (s)' POST Battery Safari\ extensions Bad\ plists 'High file counts' User Heat System\ load boot\ args FileVault Diagnostic\ reports Log 'Free space (MiB)' 'Swap (MiB)' Activity 'CPU per process' Login\ hook 'I/O per process' Mach\ ports kexts Daemons Agents XPC\ cache Startup\ items Admin\ access Root\ access Bundles dylibs Apps Font\ issues Inserted\ dylibs Firewall Proxies DNS TCP/IP Wi-Fi Profiles Root\ crontab User\ crontab 'Global login items' 'User login items' Spotlight Memory Listeners Widgets Parental\ Controls Prefetching SATA Descriptors App\ extensions Lockfiles Memory\ pressure SMC Shutdowns );N3=${#l[@]};for i in 0 1 2;do l[N3+i]=${p[5+i]};done;N4=${#l[@]};for j in 0 1;do l[N4+j]="Current ${p[29+j]}stream data";done;A0() { id -G|grep -qw 80;v[1]=$?;((v[1]==0))&&sudo true;v[2]=$?;v[3]=`date +%s`;clear >&-;date '+Start time: %T %D%n';};for i in 0 1;do eval ' A'$((1+i))'() { v=` eval "${c1[$1]} ${c2[$2]}"|'${c1[30+i]}' "${s[$3]}" `;[[ "$v" ]];};A'$((3+i))'() { v=` while read i;do [[ "$i" ]]&&eval "${c1[$1]} ${c2[$2]}" \"$i\"|'${c1[30+i]}' "${s[$3]}";done<<<"${v[$4]}" `;[[ "$v" ]];};A'$((5+i))'() { v=` while read i;do '${c1[30+i]}' "${s[$1]}" "$i";done<<<"${v[$2]}" `;[[ "$v" ]];};A'$((7+i))'() { v=` eval sudo "${c1[$1]} ${c2[$2]}"|'${c1[30+i]}' "${s[$3]}" `;[[ "$v" ]];};';done;A9(){ v=$((`date +%s`-v[3]));};B2(){ v[$1]="$v";};for i in 0 1;do eval ' B'$i'() { v=;((v['$((i+1))']==0))||{ v=No;false;};};B'$((3+i))'() { v[$2]=`'${c1[30+i]}' "${s[$3]}"<<<"${v[$1]}"`;} ';done;B5(){ v[$1]="${v[$1]}"$'\n'"${v[$2]}";};B6() { v=` paste -d: <(printf "${v[$1]}") <(printf "${v[$2]}")|awk -F: ' {printf("'"${f[$3]}"'",$1,$2)} ' `;};B7(){ v=`grep -Fv "${v[$1]}"<<<"$v"`;};C0() { [[ "$v" ]]&&sed -E "$s"<<<"$v";};C1() { [[ "$v" ]]&&printf "${f[$1]}" "${l[$2]}" "$v"|sed -E "$s";};C2() { v=`echo $v`;[[ "$v" != 0 ]]&&C1 0 $1;};C3() { v=`sed -E "${s[63]}"<<<"$v"`&&C1 1 $1;};for i in 1 2 7 8;do for j in 0 2 3;do eval D$i$j'(){ A'$i' $1 $2 $3; C'$j' $4;};';done;done;{ A0;D20 0 $((N1+1)) 2;D10 0 $N1 1;B0;C2 27;B0&&! B1&&C2 28;D12 15 37 25 8;A1 0 $((N1+2)) 3;C0;D13 0 $((N1+3)) 4 3;D23 0 $((N1+4)) 5 4;D13 0 $((N1+9)) 59 50;for i in 0 1 2;do D13 0 $((N1+5+i)) 6 $((N3+i));done;D13 1 10 7 9;D13 1 11 8 10;B1&&D73 19 53 67 55;D22 2 12 9 11;D12 3 13 10 12;D23 4 19 44 13;D23 5 54 12 56;D23 5 14 12 14;D22 6 36 13 15;D22 20 52 66 54;D22 7 37 14 16;D23 8 15 38 17;D22 9 16 16 18;B1&&{ D82 35 49 61 51;D82 11 17 17 20;for i in 0 1;do D82 28 $((N2+i)) 45 $((N4+i));done;};D22 12 44 54 45;D22 12 39 15 21;A1 13 40 18;B2 4;B3 4 0 19;A3 14 6 32 0;B4 0 5 11;A1 17 41 20;B7 5;C3 22;B4 4 6 21;A3 14 7 32 6;B4 0 7 11;B3 4 0 22;A3 14 6 32 0;B4 0 8 11;B5 7 8;B1&&{ A8 18 26 23;B7 7;C3 23;};A2 18 26 23;B7 7;C3 24;D13 4 21 24 26;B4 4 12 26;B3 4 13 27;A1 4 22 29;B7 12;B2 14;A4 14 6 52 14;B2 15;B6 14 15 4;B3 0 0 30;C3 29;A1 4 23 27;B7 13;C3 30;B3 4 0 65;A3 14 6 32 0;B4 0 16 11;A1 26 50 64;B7 16;C3 52;D13 24 24 32 31;D13 25 37 32 33;A2 23 18 28;B2 16;A2 16 25 33;B7 16;B3 0 0 34;B2 21;A6 47 21&&C0;B1&&{ D73 21 0 32 19;D73 10 42 32 40;D82 29 35 46 39;};D23 14 1 62 42;D12 34 43 53 44;D12 22 20 32 25;D22 0 $((N1+8)) 51 32;D13 4 8 41 6;D12 21 28 35 34;D13 27 29 36 35;A2 27 32 39&&{ B2 19;A2 33 33 40;B2 20;B6 19 20 3;};C2 36;D23 33 34 42 37;B1&&D83 35 45 55 46;D23 32 31 43 38;D12 36 47 32 48;D13 10 42 32 41;D13 37 2 48 43;D13 4 5 32 1;D13 4 3 60 5;D12 21 48 49 49;B3 4 22 57;A1 21 46 56;B7 22;B3 0 0 58;C3 47;D22 4 4 50 0;D12 4 51 32 53;D23 22 9 37 7;A9;C2 2;} 2>/dev/null|pbcopy;exit 2>&-
    Copy the selected text to the Clipboard by pressing the key combination command-C.
    8. Launch the built-in Terminal application in any of the following ways:
    ☞ Enter the first few letters of its name into a Spotlight search. Select it in the results (it should be at the top.)
    ☞ In the Finder, select Go ▹ Utilities from the menu bar, or press the key combination shift-command-U. The application is in the folder that opens.
    ☞ Open LaunchPad. Click Utilities, then Terminal in the icon grid.
    Click anywhere in the Terminal window and paste by pressing command-V. The text you pasted should vanish immediately. If it doesn't, press the return key.
    9. If you see an error message in the Terminal window such as "Syntax error" or "Event not found," enter
    exec bash
    and press return. Then paste the script again.
    10. If you're logged in as an administrator, you'll be prompted for your login password. Nothing will be displayed when you type it. You will not see the usual dots in place of typed characters. Make sure caps lock is off. Type carefully and then press return. You may get a one-time warning to be careful. If you make three failed attempts to enter the password, the test will run anyway, but it will produce less information. In most cases, the difference is not important. If you don't know the password, or if you prefer not to enter it, press the key combination control-C or just press return  three times at the password prompt. Again, the script will still run.
    If you're not logged in as an administrator, you won't be prompted for a password. The test will still run. It just won't do anything that requires administrator privileges.
    11. The test may take a few minutes to run, depending on how many files you have and the speed of the computer. A computer that's abnormally slow may take longer to run the test. While it's running, there will be nothing in the Terminal window and no indication of progress. Wait for the line
    [Process completed]
    to appear. If you don't see it within half an hour or so, the test probably won't complete in a reasonable time. In that case, close the Terminal window and report what happened. No harm will be done.
    12. When the test is complete, quit Terminal. The results will have been copied to the Clipboard automatically. They are not shown in the Terminal window. Please don't copy anything from there. All you have to do is start a reply to this comment and then paste by pressing command-V again.
    At the top of the results, there will be a line that begins with the words "Start time." If you don't see that, but instead see a mass of gibberish, you didn't wait for the "Process completed" message to appear in the Terminal window. Please wait for it and try again.
    If any private information, such as your name or email address, appears in the results, anonymize it before posting. Usually that won't be necessary.
    13. When you post the results, you might see an error message on the web page: "You have included content in your post that is not permitted," or "You are not authorized to post." That's a bug in the forum software. Please post the test results on Pastebin, then post a link here to the page you created.
    14. This is a public forum, and others may give you advice based on the results of the test. They speak only for themselves, and I don't necessarily agree with them.
    Copyright © 2014 by Linc Davis. As the sole author of this work, I reserve all rights to it except as provided in the Use Agreement for the Apple Support Communities website ("ASC"). Readers of ASC may copy it for their own personal use. Neither the whole nor any part may be redistributed.

  • Encrypting Data on part of a file system.

    A few months ago, using hints I found on the internet, I was able to use diskutil command line utililty to create an encrypted partition of the same sort as when turning FileVault on in Security Preferences.  File Vault doe not appear to offer a way to choose some pargt of the disk storage such as an entire drive of a folder on a drive.  I was able to do it and it worked.  When I mount the disk partition to the system (usualy by plugging it in and turning it on), I'm asked for the security pass phrase or key to decrypt it.  Once mounted with the key supplied, I can access it as any other mounted disk with the type of access restrictions that might be present on any disk.Since I want the data to be truly privatem U decline to put the key into the a known place such as the keychain.  I don't want just anyone who has a log on to this iMac to b e able to read this data.  I want them to need to enter a private key to mount the data. 
    My only problem with this is the hoops I needed to go through to do this.  It is complicated and invovlves setting up special partitions for the purpose.
    Searching Finder help for encrypting data it offered a solution for data on a removable drive.  The stepsare very simple and easy to do:
       a) Mount the files to be encrypted if they are not  online.  They also need to be in a folder or even an entire partition.
        b) Open Disk Utility (GUI version)
        c)Choose File > New > Disk Image From Folder (or New-> Disk Image ffrom a Device).
        d) Select the folder or disk you want to encrypt.
        e) A save dialog will pop up.  Select the name of the archive you wish to create and select a location.  I choose a removable disk partition which has enouh space.  Select Compressed if you wish.  Then Select Encryption and choose the key size for encryption from the drop dwon.  When you click Save, Disk Utility begins creating a disk image that is (possibly) compressed and probably encrypted.  Once done, the files in the folder or partiion are hiddent behind the encryption.  To get to them, you much open the DMG file and supply the password to unlock the encryption.  You can save the key in the keychain if you are not worreid about who can get in.  If you wish to restrict access to fewer people, keep the key secret and provide a recovery mechanism that is suitable for you need.
       f)  One the archive is created, the disk partition containing it may b4 mounted on the system (if it is not there already) and by opening the dmg file you will be asked for the key.  The system will validate that the key works and the encryption and comprewssion are working.  The archive will be mounted as a virual disk.  It can be accessed by any useer of that computer unless the file permissions get in the way.  Mounting it only when the computer is being used by authorized people allow you to mount and dismount the archive for use during a limited time.
    I have a couple of questions here.  Is there an easier way to do this?  Is this encryption as strong as that used in FileVault? 

    No. I don't know why it would not be, except it is easier for a person to leave the disk mounted where anyone can then see it. With FileVault forcing a password on wake from sleep, it will likely be encrypted if anyone found it.
    I'm not sure why you went to the trouble you did before, except the instructions might have been to create an encrypted partition as opposed to creating the disk image. Disk images have been around for at least a decade.
    If you plan on backing up the image with Time Machine, use a sparse bundle disk image as it will write the data to small files, called stripes. Only the stripes that change get backed up instead of the entire image.

  • Bitlocker with PIN and can't encrypt second drive

    I have my OS drive encrypted, and have a boot PIN. All is well. I'm trying to encrypt the data drive in my laptop, and I'm getting a prompt
    "The Group Policy settings for BitLocker startup options are in conflict and cannont be applied". The options are configured as this:
    Configure TPM startup: Allow TPM
    Configure TPM startup PIN: Allow startup PIN with TPM
    Configure TPM startup key: Allow startup key with TPM
    Configure TPM startup key and PIN: Allow startup key and PIN with TPM
    I've tried setting the bottom two to not allow, but that doesn't seem to matter. I've verified that there are no domain GPOs that adjust these settings.
    What am I missing?

    Hi,
    How did you encrypt the data drive? Which settings did you change?
    For the Fixed Data Drives encryption, the group policy located here:
    Computer Configuration\Windows Components\BitLocker Drive Encryption\Fixed Data Drives
    It seems your operating system drive encryption group policy is correctly configured.
    Use the command gpresult /h gpreport.html to export the group policy settings, check if there's any clue.
    And, this is for your reference:
    Best Practice for BitLocker
    Regards,
    Miya 
    TechNet Subscriber Support in forum. If you have any feedback on our support, please contact
    [email protected]
    Miya Yao
    TechNet Community Support

  • Insert an encrypt data in a Table

    Hi all,
    i have encrypted a data with HmacMD5, all its fine. but when i've tried to insert encrypt data in my table, hash code may return symbols like �?��Z��x��. then when i do a select data has been corrupted. how can i encrypted in stardand symbols( like mysql passwords). here is my code:
                KeyGenerator kg = KeyGenerator.getInstance("HmacMD5");
                SecretKey sk = kg.generateKey();
                // Get instance of Mac object implementing HMAC-MD5, and
                // initialize it with the above secret key
                Mac mac = Mac.getInstance("HmacMD5");
                mac.init(sk);
                byte[] result = mac.doFinal(dirMAC.getBytes());
                String macenc=new String(result);
                String x = "jdbc:mysql://localhost/"+
                        "mydatabase?user="+user+"&password="+
                        pass;
                Class.forName("com.mysql.jdbc.Driver").newInstance();
                conn = DriverManager.getConnection(x);
                conn.createStatement().executeUpdate("insert into user " +
                        "(User,Password) values('system','"+myPass+"')");
                java.sql.ResultSet rs=conn.createStatement().executeQuery("select password "+
                         "from " +"user where user ='system' ");
                rs.next();
                if((rs.getString(1).equals(macenc))) {
                    System.out.println(rs.getString(1)+" YES "+macenc);
                } else {
                    System.out.println(rs.getString(1)+" NO "+macenc);
                }Output NO. and sometimes when hash has (') character Query not found.
    thanks.

    Thie is most probably the offending line
    String macenc=new String(result);
    It is never a good idea to try to convert arbitrary bytes into a String using this approach. Not all byte sequences have valid char representation. If you must have a String representation use Base64 or Hex encoding of your Hmac. Google for Jakarta Commons Codec to get a library to assist you with this.

  • Encrypt External Drive with TrueCrypt / PGP Signature

    I want to use TrueCrypt to encrypt an external drive. I understand the new version of FileVault can do this but I prefer not to upgrade to Lion. I'd rather wait till Mountain Lion comes out later this year.
    For those who have used both...Just wondering how TrueCrypt compares to FileVault in regards to encrypting an external drive.
    Also, I am trying to install or execute the PGP Signature to ensure that the TrueCrypt software that I am downloading from the TrueCrypt's Web site is authentic and has not been hacked.
    How do I run or install it? I double-click on the PGP Signature file, a window pops up and says it cannot find an application to open it. I even tried removing the ".sig" from the end of the file name and it say it cannot open the disk image.
    There are instructions on the TrueCrypt web site for Windows users but none for the Mac users that I can see.

    If you want better, more reliable security on a external drive, you should get a self encrypting external drive, these have a hardware based encryption, either a physical key and/or keypad to enter a password and do all the encryption/decryption on the drive itself.
    No need for software means you can take your data to any secure machine and the computer thinks it just another drive. Software can become unrelaible or glitchy, subjected to updates/tampering. Hardwired requires physical possession of the device.
    Also there are smalller portable USB thumb drives like Iron Key that also self-encrypt and have the advantage of being quickly discarded upon a threat.

  • Plausible deniability on an encrypted external drive?

    Hello,
    I would like to use an external drive as a backup to store my personal data. As I don't care about Windows compatibility, LUKS seems good for that.
    But my problem is to encrypt my critical data (like bank details), where a nested hidden volume seems a good option. Arch still has the "good" version of TrueCrypt, but its strange end of life announcement make me wonder if it's still good to use.
    LUKS' author doesn't plan to add this yet, listing a number of reasons but a comment (#18) seems to tell it's feasable.
    So what are my options if I want to do that?
    Thanks.

    In regards to plausible deniability, it's possible to go even further if you're willing to roll up your sleeves...
    You can do something like creating a "normal" partition containing stuff you don't care too much about, partially spanning the disk. Then, in the unallocated space beyond that partition, pick a region of sectors to use as the encrypted volume, and set up a loop device to access them.
    losetup -o [offset in bytes] --sizelimit [size in bytes] /dev/loop0 /dev/sdX
    Then, set up dm-crypt in *plain* mode on that loop device (plain mode means no header, so the encrypted data is theoretically indistinguishable from random garbage):
    cryptsetup --cipher=${chosen_cipher} open --type=plain /dev/loop0 ${some_name}
    which will make the decrypted device show up at /dev/mapper/some_name. This command prompts for a passphrase to be entered. note this command has do be re-done the same each time you need to mount the decrypted storage. You can also use a keyfile, by adding
    --key-file=somefile --key-size=${size_of_key_in_bits}
    to the cryptsetup command before "open". The mapper device can then be closed with
    crypsetup close ${some_name}
    and the raw loop device removed with
    losetup -d /dev/loop0
    If you do it this way, both the opening commands must be done manually when you want to access the encrypted storage. Additionally you'll need to remember the offset and size of the region on the external drive that is your encrypted data. However, if you overwrite the disk with random data before starting, there's no way to tell the encrypted data is there just by looking at the disk - hidden amongst the random data. The idea of the normal partition before it is to act like a decoy, so you could claim the "unallocated" space is just where you want to add a new partition later.

  • Photosmart B8550 driver for Maverick NOT AVAILABLE

    Photosmart B8550 driver for Maverick NOT AVAILABLE.
    The website should say that it has it, or it doesn't!  So ambiguious...
    Call tech support and for a kindly $25 box we'll show a work around.  I interpret that to be obsolesence.  You are up to date or you are not.  The refund of the money is more complicated to monitor than when the softweare patch would be available, at least 5 times more complicated.  Wait for the bank statement to see if ther money was refunded, and than follow up for the refund, come ON!

    Tomesh,
    Problem is not so clear but I can say you can try these things.
    1. Are you trying to do retroactive calculation for particular employee . If yes, then check the driver perk wage type validity period.
    2. If you are using some constant table to calculate Driver's perk value then you must check that contact table and dates mentioned there.

  • FileVault vs TrueCrypt to Encrypting External Drive

    I was wondering how FileVault and TrueCrypt compare in regards to encrypting an external hard drive. Is one more secure than the other?
    TrueCrypt claims there is no "backdoor," I am not sure if the same can be said for FileVault. And I guess there is some kind of key associated with FileVault. Is that a separate file or is it stored in the Keychain?
    Other users have recommend getting a hardware based encryption that is built into some external drives but I don't have the funds to spend on such a purchase.
    Also, I am not ready to upgrade to Lion and perhaps not even Mountain Lion. I am hoping that Mountain Lion will work better with Adobe CS5.5 as compared to Lion.

    @Kaldek,
    Are you related to "Marksman338"?
    heheheh
    Really, though, speaking of "very little fact" I would greately appreciate it if you could cite your sources.  I'm always looking for fresh info, and there is so much out there its hard to read it all.
    So lets work as team.  Please provde some references and a little more detail so I can understand the "best practice" you have developed.
    And, just for the record, since you did make a specific inaccurate statement:
    I said:
    Encryption is for people that are more worried about their data becoming public than they are worried about having the data.
    In the very first post.  Which would cover those (very few) people needing to be concerned about data theft through hardware theft.
    I appologize if that was too sublte for you.  Being lazy, I do try and minimize my verbage.
    Just in case your right please allow me to rephrase:
    If your computer contains or manages sensitive data a person, group, or organisation - other than yourself - could profit from then you should EXIT this forum immediately and hire a Consultant to setup and secure your system.
    If, on the other hand, you are in the 98th percentile of users on this system who only have personal information on their computer.  Cherished memories in digital images while "priceless" to you are of little value to anybody else.  You, please, I beg of you, do not encrypt your drive.
    I had one recently.  Encyrpted drive so the "hackers" can't get in.  Drive died.  They just never "got around" to making a single backup.  Nothing can be recovered!
    It hurts me too.  Please don't do it. If you stil think you "need" encryption please post here so we can talk about it.  Make sure its the right choice, and make sure you have a data recovery plan in place.
    I can't decide if encyrpting USB or other portable media you might "leave in a Taxi" is worth it.  Again, the data's value is low.  Most people discovering it will just erase it so they can enjoy their "new" drive.

  • HT201250 How to encrypt data on time machine?

    I have already backed up my mac using time machine. How do I go back and uncheck the option encrypt data, so I can see the flies on windows computer too?

    Zac. wrote:
    What I have found is that the TM backup database is only accessible to the machine that created it. The individual accounts in the TM backup, assuming you have more than one account backed up, is only accessible to that individual account. While it is not Filevault level security, unless your home folder is filevault protected, you should be okay.
    HTH
    zac
    When I disconnect the external drive with the Time Machine backup from my MacBook and connect it to my iMac at work, I can browse the TM folder and access just about any file for any user account that is backed up. Am I really the only one where the backup is not protected?

  • BitLocker cannot find data drive

    I have successfully used BitLocker encryption for the system C: drive and now try to add BitLocker to the F: data drive however it does not turn up as a selectable choice in Control Panel/BitLocker Drive Encryption or when I right click in the FileExplorer.
    Any ideas?
    I saw two similar cases raised online however neither led to a resolution that I can apply. Running 8.1 and the machine is not on a domain. The data drive is a 3TB WD spindle connected via SATA to the MB. It looks just healthy as a Simple Volume in Disk
    Management. I have about 1TB of data on it. This should just be straight forward and I just cannot figure out why it doesn't turn up...
    Appreciate any pointers!

    Hi,
    According to the following library:
    http://technet.microsoft.com/de-de/library/ee449438(v=ws.10).aspx#BKMK_R2disks
    Please check if your 3TB data drive accomplish the conditions.
    In addition, please also check if Event Viewer if it identify the problem:
    Windows Logs>ApplicationsAndServicesLogs>Microsoft>Windows>Bitlocker
    Roger Lu
    TechNet Community Support

  • BitLocker: Admin Credentials Required to Unlock Fixed Data Drive

    Using Bitlocker, I have successfully encrypted a fixed data drive and set a password for unlocking the drive. However, when I restart the computer and log on with non-adminstrator account, I am not prompted to unlock the drive. If I open Explorer
    or Bitlocker from the control panel and attempt to manually unlock the drive, I'm prompted for the Bitlocker password. After entering the correct password, I'm prompted for adminstrator credentials.
    Why should unlocking a Bitlocker encrypted fixed data drive require administrator credentials? They are not required for operating system drive or removable drives.

    Hi,
    To turn on, turn off, or change configurations of BitLocker on operating system and fixed data drives, membership in the local Administrators group is required.
    Standard users can turn on, turn off, or change configurations of BitLocker on removable data drives.
    For more information, please kindly refer to the following link:
    BitLocker Drive Encryption in Windows 7: Frequently Asked Questions
    Hope it helps.
    Alex Zhao
    Please remember to click “Mark as Answer” on the post that helps you, and to click “Unmark as Answer” if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread.

Maybe you are looking for

  • STO -  ERROR IN ME21N  - sadhu kishore , ayub .

    HI ALL , WHILE trying to transfer stock between  2 plants in different copmany codes , in ME21N  the system is unable to recognise the IMG config , thou all is fine .   can any one pl guide ? pl do guide with reg to  stock between  2 plants in differ

  • Password to install Flash Player?

    I'm signed in to my Adobe account and in the middle of installing an upgrade to Adobe Flashplayer and it is prompting me for a password. Won't accept my Adobe password. What password is it looking for? Apple?

  • Central vendor

    Hi when I am trying to create a vendor centrally i am getting an error ""Communication error with external tax system (vertex_MS0018)"" Any help is appreciated

  • Business Intelligence Suite Enterprise Edition with  Ebs?

    Hi all, how can set Business Intelligence Suite Enterprise Edition working with Ebs with ODBC (Windows platform XP) regards Gordan

  • Photoshop text issue with OSX Mavericks on Macbook Pro

    I have a frustrating problem with Photoshop on my Macbook Pro. I can enter text without any problem, but the minute I try to edit it, resize, change font or colour it totallt dissappears and the layer name revers to 'layer x" (whatever number it is).