B
Brian Komar
Guest
Not a good idea.
The first time that you forget to import the PKCS#12 before you attempt to
access a file, a new EFS certificate will be generated
From that point on, all newly encrypted files will use the new default EFS
key
If you want to have the removal of the EFS certificate from software, then I
recommend you move to Vista and use a smart-card based EFS certificate
Brian
"bagassa" <not@available.com> wrote in message
news:e8Eqa9INJHA.5692@TK2MSFTNGP02.phx.gbl...
> Good afternoon everyone,
>
> What I like to do is lock some of my sensitive files using the windows EFS
> encryption so that if someone were to steal my computer and somehow hack
> the password into my account, they still would not be able to read the
> files.
>
> If I were to:
>
> 1. encrypt the files
> 2. then export the "encrypting file system" certificate from the
> certificate manager (in the personal folder) to a thumb drive (and a
> backup drive).
> 3. delete the certificate managers copy
> 4. Every time I want to access the files, I plug the thumb drive in, and
> use it to decrypt the files.
>
> Is this a good way to do it ? Any red flags here ?
>
> Thanks for your time and help
>
> Peter
>
The first time that you forget to import the PKCS#12 before you attempt to
access a file, a new EFS certificate will be generated
From that point on, all newly encrypted files will use the new default EFS
key
If you want to have the removal of the EFS certificate from software, then I
recommend you move to Vista and use a smart-card based EFS certificate
Brian
"bagassa" <not@available.com> wrote in message
news:e8Eqa9INJHA.5692@TK2MSFTNGP02.phx.gbl...
> Good afternoon everyone,
>
> What I like to do is lock some of my sensitive files using the windows EFS
> encryption so that if someone were to steal my computer and somehow hack
> the password into my account, they still would not be able to read the
> files.
>
> If I were to:
>
> 1. encrypt the files
> 2. then export the "encrypting file system" certificate from the
> certificate manager (in the personal folder) to a thumb drive (and a
> backup drive).
> 3. delete the certificate managers copy
> 4. Every time I want to access the files, I plug the thumb drive in, and
> use it to decrypt the files.
>
> Is this a good way to do it ? Any red flags here ?
>
> Thanks for your time and help
>
> Peter
>