Protected disk image

hi, i created in september a protected diskimage and i forgot the password, can i open it by another way?
excuse my english, i'm french

i know but there should be an underground way, like copy it on a pc or on another computer...
run it with another application..
anybody knows about it?

Similar Messages

  • Trying to create a password protected disk image in 10.8.4

    Trying to create a password protected disk image in 10.8.4. I follow steps in Apple:Support but I get an error saying "Resource busy"?

    Please read this whole message before doing anything.
    This procedure is a diagnostic test. It’s unlikely to solve your problem. Don’t be disappointed when you find that nothing has changed after you complete it.
    The purpose of the test is to determine whether the problem is caused by third-party software that loads automatically at startup or login, by a peripheral device, or by corruption of certain system caches. 
    Disconnect all wired peripherals except those needed for the test, and remove all aftermarket expansion cards. Boot in safe mode and log in to the account with the problem. Note: If FileVault is enabled on some models, or if a firmware password is set, or if the boot volume is a software RAID, you can’t do this. Ask for further instructions.
    Safe mode is much slower to boot and run than normal, and some things won’t work at all, including sound output and  Wi-Fi on certain iMacs. The next normal boot may also be somewhat slow.
    The login screen appears even if you usually log in automatically. You must know your login password in order to log in. If you’ve forgotten the password, you will need to reset it before you begin. Test while in safe mode. Same problem? After testing, reboot as usual (i.e., not in safe mode) and verify that you still have the problem. Post the results of the test.

  • Version doesn't work on external password protected disk image

    Version doesn't work on external password protected disk image.
    Any ideas?

    Hi
    Did you assign the external monitor as a primary display in the graphic properties?
    I think you did it due to the fact that the Toshiba boot display appears on the external monitor.
    But just moment please. The Tecra M7 was delivered with the Win XP Pro tablet edition and not with Vista.
    Did you install it at you own hand?
    I presume everything has worked running Win XP
    Maybe you should try remove the graphic driver from the Vista system and use one from the 3rd site like www.laptopvideo2go.com

  • No password asked for Protected Disk Image...

    I set up a Protected Disk Image using the given instructions yet when I click on it it does not ask for the password I set for it...? I thought it worked by having to ask for the password before it opens...?

    It can be, that the password is saved in the keychain. When it is, it not ask for the password.
    When you create an Protected DiskImage, you can choose if the Password should saved in the Keychain or not.

  • USB Flash Drive (with password protected Disk Image) copies files very slowly. Why?

    I'm backing up some data onto a 32GB flash drive that I've put a password-protected Disk Image onto, and am copying this data into, but it is achingly slow. It's taking hours to copy just 500MB!
    I have another 64MB flash drive that I have set up the same way, but this one copies files very quickly. I can't spot any difference between them in Disk Utility/System profiler.
    For the record, the process I've used for bothe drives is reformatted to Mac OS Extended (Journaled), then created a new Disk Image onto each drive (just a bitsmaller than the maximum size of the drive to enable it to fit) with 128--bit encryption.
    Does anyone have any idea why the 32GB drive would perform any differently? I am using the same USB port on my iMac for each drive, but am getting very different copying speeds. It's driving me nuts! Many thanks.

    The drive seems to be working fine if I copy files onto it outside of the Disk Image file (there's about 200MB of free space left over after I added the DMG). So I can only deduce from that that it is something specifically to do with the DMG itself. Though, as mentioned, I compared the DMG on my (fast) 64GB stick and the DMG on this problematic (slow) 32GB stick in Disk Utility/System Profiler (and I originally set them up in an identical way, as far as I am aware), and they seem to be the same. But one is performing achingly slow. Even dropping a file into the mounted DMG takes a few minutes to even think about it. It's very odd.

  • Cannot open leopard password protected disk image

    i had created a password protected disk image under leopard. Now that i have snow leopard i can't open it anymore with the right password. Since then i know that i have changed the name of the disk image also. does anyone know if either changing the name of the image or upgrading from leopard to snow leopord would explain why i cannot open the image anymore?

    Neither change should matter. I suspect that the password is wrong, maybe missing a cap or lowercase item or a number. Find someone running Leopard, copy it over, and see if it'll open there.

  • How Safe is a Password Protected Disk Image?

    I've created a Disk Image Volume with a password on my hard drive and have placed sensitive files into it as an alternative to using File Vault. Does anyone know if there is a way that these files be accessed without the password?
    Thanks,
    Joe

    If you created the Disk Image Volume with a Password then it cannot be acsessd without said password.
    It is the same with Filevault.. You cannot make changes without a Password.....Don

  • Password Protect folders (non sparse disk image)

    So there are a collection of files I have protected on my computer using the disk utility method that everyone asking this question uses. I am curious to know if there is any other way of doing it. I want to password protect a folder within this protected disk image just becuase i feel like being extra sneaky and careful at the moment. I mean I could just use another sparse disk image inside the original and use two different passwords but I'm trying to be creative and that could get confusing. Does anyone know of a way to password protect a folder or file without using the disk utility method in Lion? Even if it requires third party stuff

    nails:
    From your earlier posts I gather that you would like to have a high level of security for your data. If an encrypted folder does not do the job for you, you may want to consider FileVault. However, if you use FileVault there are to very important measures you must take: 1) You must remember your password. If you lose or forget your password you will lose aceess to your data permanently. There is no way around it. 2) You must leave adequate space to be able to disable FileVault, should you every need to do so. The encrypted sparseimage requires almost double the size of the image to be able to be expanded.
    Here are a few articles that might be of interest to you:
    A Word about FileVault
    About Encrypted Disk Images
    How to create a password-protected (encrypted) disk image
    Please do post back with further questions or comments.
    Happy Holidays.
    cornelius

  • Password protect a file beyond disk image?

    Hi,
    I've made a password protected disk image file, but once it's opened the file can be opened without a password every time.
    Is there a way to password-protect a file, so that every time you try to open it, it requires a password? (like the way you can encrypt a PDF...)
    Thanks!

    nails:
    From your earlier posts I gather that you would like to have a high level of security for your data. If an encrypted folder does not do the job for you, you may want to consider FileVault. However, if you use FileVault there are to very important measures you must take: 1) You must remember your password. If you lose or forget your password you will lose aceess to your data permanently. There is no way around it. 2) You must leave adequate space to be able to disable FileVault, should you every need to do so. The encrypted sparseimage requires almost double the size of the image to be able to be expanded.
    Here are a few articles that might be of interest to you:
    A Word about FileVault
    About Encrypted Disk Images
    How to create a password-protected (encrypted) disk image
    Please do post back with further questions or comments.
    Happy Holidays.
    cornelius

  • Disk image can mount from local terminal with "open" command but not via ssh

    I have a disk image "backup_image.sparsebundle". If I go to the terminal on my machine and type "open backup_image.sparsebundle" the disk image mounts as expected. No problems. If I secure shell (ssh) log in from a remote Mac and execute the same "open backup_image.sparsebundle" a warning dialog pops up and states that "The following disk images couldn't be opened" followed by my disk name. This is incredibly odd because it used to work just fine. I didn't think there were any ACL differences between a local terminal shell and remote ssh. I mean a shell is a shell right? Or, it used to be and now it isn't? I'm not doing anything obviously incorrect (to me); I'm the same user locally and remotely, same path to disk image. This used to work fine before Mountain Lion.
    Background: All of this started because I wrote a script that would ssh in to a remote machine, open the disk image on that remote machine, mount it across the network over afp and rsync. If I leave the disk image mounted on the remote machine, the script runs fine but if the image is close and I try to remotely open the image as I always did, it fails. The only thing that has changed in the system is, now, both machines are running Mountain Lion. Odd.
    Suggestions?

    Storing the password for the remote disk image in the local keychain of the computer running the script (in to a variable), then passing it accross to the remote machine worked. I'm not sure why all of this changed moving from Lion to Mountain Lion but I suppose it is slightly more secure.
    To programatically mount and sync a remote encrypted disk:
    #!/bin/bash
    if [ -n "`mount | grep ~/sync`" ]; then
      echo "Already mounted"
    else
      pw=$(security -v find-generic-password -w -D "application password")
      ssh -o ConnectTimeout=1 [email protected] "echo $pw | hdiutil attach /Users/user/backup_image.sparsebundle"
      mkdir ~/sync
      mount_afp -s "afp://matdup01:[email protected]/Disk Image" ~/sync
    fi
    if [ $? -eq 0 ]; then
      echo "Mount succeeded!"
    else
      echo "Mount Failed"
      exit 0
    fi
    rsync -vrxtu --delete-before --exclude _* "/Volumes/Media/new Media/" ~/sync/new\ media/
    umount ~/sync
    rmdir ~/sync
    exit

  • Disk Image- "resource temporarily unavailable"

    I created a password protected Disk Image yesterday and it was working fine. Today, whenever I try to mount the disk image, instead of prompting me for the password, the window says "resource temporarily unavailable"
    What can I do to regain access to the disk image and/or retrieve my files?

    I did try that, but it still says the same thing.
    I've never seen this happen before...

  • Password fails in encrypted disk image

    I created a 300 mb encrypted disk image using 10.4.x, about 9 months ago, now I am running 10.5.2 and everytime I try to open the image and type in the password (the correct password I have been using for years) iI get an authentification error. I know Im using the correct password, any ideas what happened here. Could the image be corupted but still want me to authenticate?
    I have not tried to open the file since Dec. 17th (via last modified date) I have check all the permissions on the eternal drive where the file is stored... also ran Techtool on the drive and found no errors... I am out of ideas...

    I have encountered the same problem on two protected disk image files as well. Once in January and then again a few days ago.
    I first thought that the first lockout was a fluke. Now after the second image lockout I'm very vary of opening another encrypted backup. I'm losing data. Even copies of the .dmg on different drives fail to authenticate. Searching for answers I found this thread.
    Is it possible that a kernel panic / forced shutdown can corrupt an encrypted file? I wonder, but my encrypted home directory (FileVault sparsebundle) is fine.
    Any insights would be appreciated.
    This is my log:
    Last login: Sun May 11 07:35:13 on ttys000
    kevin:~ kevin$ hdiutil attach -debug /Volumes/kevin/busted.dmg calling DIHLDiskImageAttach with
    agent: hdiutil
    drive-options:
    debug: true
    image-options:
    verbose: false
    quiet: false
    main-url: /Volumes/kevin/busted.dmg
    2008-05-12 18:11:17.015 hdiutil[1745:1c03] using helper tool at "/System/Library/PrivateFrameworks/DiskImages.framework/Resources/diskimages-he lper".
    2008-05-12 18:11:17.040 hdiutil[1745:1c03] connectToFramework
    2008-05-12 18:11:17.141 hdiutil[1745:1c03] sendOperationToHelper: about to ask proxy to start operation
    status proc called: initialize
    2008-05-12 18:11:17.173 diskimages-helper[1747:1603] _imageOptions: {
    "enable-keychain" = 1;
    2008-05-12 18:11:17.176 diskimages-helper[1747:1603] _driveOptions: {
    autodiskmount = 1;
    "unmount-timeout" = 0;
    2008-05-12 18:11:17.178 diskimages-helper[1747:1603] DIHelperAttach: initializing framework
    DILoadDriver: checking for disk image driver...DILoadDriver: DI_kextExists() returned 0x00000000 (0)...DIIsInitialized: returning NO2008-05-12 18:11:17.188 diskimages-helper[1747:1603] -checkForPreviouslyAttachedImage: entry
    2008-05-12 18:11:17.189 diskimages-helper[1747:1603]
    file://localhost/Volumes/kevin/busted.dmg - (null) ((null), (null)). perm=0
    DIIsInitialized: returning YESDIBackingStoreNewWithCFURL: entry with
    file://localhost/Volumes/kevin/busted.dmg
    skip-permissions-check: true
    DIBackingStoreInstantiatorProbe: entry
    file://localhost/Volumes/kevin/busted.dmg
    skip-permissions-check: true
    DIBackingStoreInstantiatorProbe: probing interface 0 CBSDBackingStore
    CBSDBackingStore::newProbe score 100 for file://localhost/Volumes/kevin/busted.dmg
    DIBackingStoreInstantiatorProbe: probing interface 1 CBundleBackingStore
    CBundleBackingStore::newProbe score -1000 for file://localhost/Volumes/kevin/busted.dmg
    DIBackingStoreInstantiatorProbe: probing interface 2 CRAMBackingStore
    CRAMBackingStore::probe: scheme "file": not ram: or ramdisk: scheme.
    CRAMBackingStore::probe: score -1000 for file://localhost/Volumes/kevin/busted.dmg
    DIBackingStoreInstantiatorProbe: probing interface 3 CCarbonBackingStore
    CCarbonBackingStore::newProbe: setting initial rval to +100
    CCarbonBackingStore::newProbe: has resource fork, +100
    CCarbonBackingStore::newProbe score 200 for file://localhost/Volumes/kevin/busted.dmg
    DIBackingStoreInstantiatorProbe: probing interface 4 CDevBackingStore
    CDevBackingStore::newProbe: not /dev/disk or /dev/rdisk (/Volumes/kevin/busted.dmg).CDevBackingStore::newProbe score -1000 for
    DIBackingStoreInstantiatorProbe: probing interface 5 CCURLBackingStore
    CCURLBackingStore::probe: scheme is
    file
    CCURLBackingStore::probe: not recognized URL scheme.
    CCURLBackingStore::probe: score -1000 for file://localhost/Volumes/kevin/busted.dmg
    DIBackingStoreInstantiatorProbe: probing interface 6 CVectoredBackingStore
    CVectoredBackingStore::newProbe not "vectored" scheme.
    CVectoredBackingStore::newProbe score -1000 for file://localhost/Volumes/kevin/busted.dmg
    DIBackingStoreNewWithCFURL: CCarbonBackingStore
    DIBackingStoreNewWithCFURL: instantiator returned 0
    DIBackingStoreNewWithCFURL: returning 0x00000000
    2008-05-12 18:11:17.190 diskimages-helper[1747:1603] -checkForPreviouslyAttachedImage: resolving file://localhost/Volumes/kevin/busted.dmg returned 0
    2008-05-12 18:11:17.191 diskimages-helper[1747:1603] -checkForPreviouslyAttachedImage: imageUID (
    "d234881039:i8914"
    ) shadowUID (null)
    *** testing:
    0: d234881039:i9111
    (null)
    (null)
    *** testing:
    0: d234881039:i9111
    (null)
    (null)
    *** testing:
    0: d234881039:i9111
    (null)
    (null)
    2008-05-12 18:11:17.194 diskimages-helper[1747:1603] DIHelperAttach: resolving disk image
    DIIsInitialized: returning YESDIIsInitialized: returning YESDIBackingStoreNewWithCFURL: entry with
    file://localhost/Volumes/kevin/busted.dmg
    enable-keychain: true
    image-path: /Volumes/kevin/busted.dmg
    DIBackingStoreInstantiatorProbe: entry
    file://localhost/Volumes/kevin/busted.dmg
    enable-keychain: true
    image-path: /Volumes/kevin/busted.dmg
    DIBackingStoreInstantiatorProbe: probing interface 0 CBSDBackingStore
    CBSDBackingStore::newProbe score 100 for file://localhost/Volumes/kevin/busted.dmg
    DIBackingStoreInstantiatorProbe: probing interface 1 CBundleBackingStore
    CBundleBackingStore::newProbe score -1000 for file://localhost/Volumes/kevin/busted.dmg
    DIBackingStoreInstantiatorProbe: probing interface 2 CRAMBackingStore
    CRAMBackingStore::probe: scheme "file": not ram: or ramdisk: scheme.
    CRAMBackingStore::probe: score -1000 for file://localhost/Volumes/kevin/busted.dmg
    DIBackingStoreInstantiatorProbe: probing interface 3 CCarbonBackingStore
    CCarbonBackingStore::newProbe: setting initial rval to +100
    CCarbonBackingStore::newProbe: has resource fork, +100
    CCarbonBackingStore::newProbe score 200 for file://localhost/Volumes/kevin/busted.dmg
    DIBackingStoreInstantiatorProbe: probing interface 4 CDevBackingStore
    CDevBackingStore::newProbe: not /dev/disk or /dev/rdisk (/Volumes/kevin/busted.dmg).CDevBackingStore::newProbe score -1000 for
    DIBackingStoreInstantiatorProbe: probing interface 5 CCURLBackingStore
    CCURLBackingStore::probe: scheme is
    file
    CCURLBackingStore::probe: not recognized URL scheme.
    CCURLBackingStore::probe: score -1000 for file://localhost/Volumes/kevin/busted.dmg
    DIBackingStoreInstantiatorProbe: probing interface 6 CVectoredBackingStore
    CVectoredBackingStore::newProbe not "vectored" scheme.
    CVectoredBackingStore::newProbe score -1000 for file://localhost/Volumes/kevin/busted.dmg
    DIBackingStoreNewWithCFURL: CCarbonBackingStore
    opening /Volumes/kevin/busted.dmg setPermission 1723
    CBSDBackingStore::OpenLockFriendly: mapping flags 0x00000002 -> 0x00000026 (locks are MANDATORY)
    (RW lock acquired)
    closing /Volumes/kevin/busted.dmg setPermission 1731
    DIBackingStoreNewWithCFURL: instantiator returned 0
    DIBackingStoreNewWithCFURL: returning 0x00000000
    DIResolveURLToBackingStore: processing level 1 encodings.
    DIFileEncodingNewWithBackingStore: entry for encoding level 1
    DIFileEncodingInstantiatorProbe: entry for level 1
    enable-keychain: true
    image-path: /Volumes/kevin/busted.dmg
    DIFileEncodingInstantiatorProbe: probing level 1 interface 0 CMacBinaryEncoding
    CBSDBackingStore::openDataFork: about to open /Volumes/kevin/busted.dmg
    opening /Volumes/kevin/busted.dmg openDataFork 1904
    CBSDBackingStore::OpenLockFriendly: mapping flags 0x00000002 -> 0x00000026 (locks are MANDATORY)
    (RW lock acquired)
    closing 3 /Volumes/kevin/busted.dmg closeDataFork 1984
    00000000: 656e 6372 6364 7361 0000 0002 0000 0010 | encrcdsa........ |
    00000010: 0000 0005 8000 0001 0000 0100 0000 005b | ...............[ |
    00000020: 0000 00a0 548a 2877 86c1 4f17 877b cf66 | ....T.(w..O..{.f |
    00000030: beea 6066 0000 1000 0000 0002 780e 1734 | ..`f........x..4 |
    00000040: 0000 0000 0001 e000 0000 0001 0000 0001 | ................ |
    00000050: 0000 0000 0000 0060 0000 0000 0000 0268 | .......`.......h |
    00000060: 0000 0067 0000 0000 0000 03e8 0000 0014 | ...g............ |
    00000070: d369 cd83 75e8 bb7c 72e5 020d fdd3 68a9 | .i..u..|r.....h. |
    diskimages-helper: fileNameLength $0000006E
    diskimages-helper: resourceForkLength $60000000
    diskimages-helper: dataForkLength $00000000
    diskimages-helper: commentLength $00006700
    diskimages-helper: MacBinary III signature (0x00000000)
    diskimages-helper: header CRC $0000FDD3
    diskimages-helper: minimum decoder version $0000000D
    diskimages-helper: encoder version $00000002
    no MacBinary III signature - checking for MacBinary I or IIDIFileEncodingInstantiatorProbe: probing level 1 interface 1 CAppleSingleEncoding
    CBSDBackingStore::openDataFork: about to open /Volumes/kevin/busted.dmg
    opening /Volumes/kevin/busted.dmg openDataFork 1904
    CBSDBackingStore::OpenLockFriendly: mapping flags 0x00000002 -> 0x00000026 (locks are MANDATORY)
    (RW lock acquired)
    00000000: 7263 6e65 6173 6463 0000 0002 0000 0010 | rcneasdc........ |
    00000010: 0000 0005 8000 0001 0000 0100 0000 005b | ...............[ |
    00000020: 0000 00a0 548a .... .... .... .... .... | ....T........... |
    closing 3 /Volumes/kevin/busted.dmg closeDataFork 1984
    CAppleSingleEncoding::isAppleSingleFile loadAppleSingleHeader failed with error 22
    DIFileEncodingInstantiatorProbe: probing level 1 interface 2 CEncryptedEncoding
    CBSDBackingStore::openDataFork: about to open /Volumes/kevin/busted.dmg
    opening /Volumes/kevin/busted.dmg openDataFork 1904
    CBSDBackingStore::OpenLockFriendly: mapping flags 0x00000002 -> 0x00000026 (locks are MANDATORY)
    (RW lock acquired)
    CEncryptedEncoding::copyHeaderInformation: inBackingStore->openDataFork returned 0
    CEncryptedEncoding::copyHeaderInformation: inBackingStore->getDataForkLength (stub header) returned 0
    CEncryptedEncoding::copyHeaderInformation: backingStore data fork length is 0x0000000278100000 (10604249088)
    CEncryptedEncoding::copyHeaderInformation: reading V1 header from offset 0x00000002780FFB04 (10604247812)
    CEncryptedEncoding::copyHeaderInformation: inBackingStore->readDataFork (stub header) returned 0
    CEncryptedEncoding::copyHeaderInformation: not recognized as v1 header
    CEncryptedEncoding::copyHeaderInformation: reading V2 header from offset 0x0000000000000000 (0)
    CEncryptedEncoding::copyHeaderInformation: inBackingStore->readDataFork (stub header) returned 0
    CEncryptedEncoding::copyHeaderInformation: reading auth-entry count from offset 0x0000000000000048 (72)
    CEncryptedEncoding::copyHeaderInformation: inBackingStore->readDataFork (auth entry count) returned 0
    CEncryptedEncoding::copyHeaderInformation: reading auth table from offset 0x0000000000000048 (72)
    CEncryptedEncoding::copyHeaderInformation: inBackingStore->readDataFork (auth entry count) returned 0
    closing 3 /Volumes/kevin/busted.dmg closeDataFork 1984
    max-key-count: 1
    blocksize: 4096
    uuid: 548A2877-86C1-4F17-877B-CF66BEEA6066
    version: 2
    passphrase-count: 1
    private-key-count: 0
    CBSDBackingStore::openDataFork: about to open /Volumes/kevin/busted.dmg
    opening /Volumes/kevin/busted.dmg openDataFork 1904
    CBSDBackingStore::OpenLockFriendly: mapping flags 0x00000002 -> 0x00000026 (locks are MANDATORY)
    (RW lock acquired)
    closing 3 /Volumes/kevin/busted.dmg closeDataFork 1984
    CBSDBackingStore::openDataFork: about to open /Volumes/kevin/busted.dmg
    opening /Volumes/kevin/busted.dmg openDataFork 1904
    CBSDBackingStore::OpenLockFriendly: mapping flags 0x00000002 -> 0x00000026 (locks are MANDATORY)
    (RW lock acquired)
    closing 3 /Volumes/kevin/busted.dmg closeDataFork 1984
    diskimages-helper: DiskImages secure mode enabled
    CEncryptedEncoding:unclockCANTHROW: trying to unlock with normal keychain
    UNLOCK: cannot find passphrase in keychain search list.
    UNLOCK: SessionGetInfo returned 0
    UNLOCK: sessionHasGraphicAccess
    UNLOCK: sessionHasTTY
    UNLOCK: sessionWasInitialized
    UNLOCK: using TTY to prompt for passphrase
    Enter password to access "busted.dmg":
    unlockCoreFromTTY: passphrase is wrong
    DIFileEncodingNewWithBackingStore: returning 0x00000050
    DIResolveURLToBackingStore: level 1 encoding match failed. 80.
    DIResolveURLToDiskImage: resolving backing store/file encoding failed. 80.
    status proc called: attach
    error code: 80
    status proc called: cleanup
    2008-05-12 18:11:41.081 diskimages-helper[1747:1603] DIHelperAttach performOperation: returning 80
    2008-05-12 18:11:41.082 diskimages-helper[1747:1603] -decrementBackgroundThreadCount: _backgroundThreadCount is now 0.
    2008-05-12 18:11:41.082 diskimages-helper[1747:10b] DIHelper reportresults: reporting {
    payload = {
    "result-code" = 80;
    2008-05-12 18:11:41.083 hdiutil[1745:1c03] reportResultsToFramework: proxy has finished operation
    2008-05-12 18:11:41.084 hdiutil[1745:1c03] reportResultsToFramework: results are: {
    payload = {
    "result-code" = 80;
    2008-05-12 18:11:41.084 hdiutil[1745:1c03] reportResultsToFramework: _threadResultsError is 80
    2008-05-12 18:11:41.085 hdiutil[1745:1c03] reportResultsToFramework: disconnecting from helper.
    2008-05-12 18:11:41.186 hdiutil[1745:1c03] disconnectFromHelper: removing observers
    2008-05-12 18:11:41.187 hdiutil[1745:1c03] disconnectFromHelper: terminating proxy
    2008-05-12 18:11:41.189 diskimages-helper[1747:10b] DIHelper: terminateHelper: entry.
    2008-05-12 18:11:41.190 hdiutil[1745:1c03] disconnectFromHelper: terminated proxy
    2008-05-12 18:11:41.290 diskimages-helper[1747:10b] -DIHelperAgentMaster terminateUIAgentConnection.
    DIHLDiskImageAttach() returned 80
    2008-05-12 18:11:41.293 diskimages-helper[1747:10b] DIHelper dealloc.
    2008-05-12 18:11:41.294 diskimages-helper[1747:10b] -DIHelperAgentMaster terminateUIAgentConnection.
    hdiutil: attach failed - Authentication error
    kevin:~ kevin$

  • Disk Image Password and File Questions

    Hi, I created a sparse disk image to protect some files and included the password in my keychain.  Can I reverse this decision?  Also, if I delete the files in the sparse disk image, are the files deleted totally from my iMac, or are they just no longer encrypted and password protected?  Thanks.

    Thanks a lot, now when I open the image a password is requested which I prefer.  Still, I've saved my Turbo Tax file in the image, but I'm able to open TT without supplying the password, shouldn't I be prompted for the password since it's in a password protected disk image?  Unfortunately TT no longer protects files on a computer, a user is supposed to create an Intuit account to save the tax file password online. What a hassle.

  • How do I make Automator unmount a disk image everytime I quit Entourage?

    I've found a way to password protest my email, by sticking my entourage data files in an encrypted disk image and then making an alias to link into that password protected disk image. My question is how do I make an Automator workflow that unmounts that disk image automatically when I quit Entourage. There has got to be a way to do this. It should be the most simple script.
    On Entourage Quit: Unmount disk image [x]
    But I can't seem to find out how to get this done.
    Can anyone help?

    Encore does have a fit-to-disc feature, called "automatic transcoding", which chooses the bit rate based upon how much media there is to encode, how much room is currently on the disc, and applying format-legal restrictions (minimum and maximum bit rates allowable by the format).
    So for instance, 30 minutes of video will never fill a disc because the required bit rate to do so would be higher than allowable by the format.

  • Disk Image - can't remove?

    I read a recent article in MacWorld about how to lock data on an external drive by creating a password protected disk image on that drive.
    I decided to dedicate 800 Gb of a new 1 Tb drive to this so I could have a repository for all my finished projects for years to come. After working with it for a couple days, I decided I didn't really like the way this worked, so I decided to just erase the entire drive and start from scratch. I used the Disk Utility to erase it using Mac OS Extended just as I had a few days before when I first set up the drive.
    However, now that I'm adding data to this drive, it almost seems like there are remnants from the disk image because I seem to be running out of space more quickly than should be the case.
    I dismounted and remounted the drive and the disk image seems to be gone. I restarted my computer to see if that would make a difference. Again, the disk image is gone, but the 1 TB drive seems to be running out of room.
    Any thoughts about what I'm missing here?

    A disk image file would not survive a successful volume erase by Disk Utility. If what you see in the Finder doesn't seem to add up to the "Used" space reported when you Get Info on the external volume, I would first check the volume for directory damage by using Disk Utility's Repair Disk, and then would try running the freeware utility [OmniDiskSweeper|http://www.omnigroup.com/products/omnidisksweeper]. This can be useful for showing disk space utilization, including space used by hidden files.

Maybe you are looking for