Alright, how about a different approach.
I used EFS on a text file that contained the login and password information for a LOT of websites i go to that are pretty important, including ebay, paypal, my bank, my credit card, my webhosting, etc.
while i was testing out different ways to lock a client's kid out of certain items, i tested out EFS on a couple of picture files i had. I used the same account for both my password file and the pictures, and therefore they should have the same key.
windows xp pro started acting up, and i did a fresh install, not realizing that the files were still encrypted.
i've used the Cipher command to attempt to define a recovery agent and managed to generate a couple of new keys, but the keys only allow me access to the file genericly, and will not allow me to see the contents. i'm also trying with a hex-editor, but at last attempt, was unable to allow access to the file to Ultra-Edit.
my idea comes like this....i found the pciture files accidently since they were just a test..i had forgotten that i encrypted them and just left them...but as they were just a test, i actually had completely untouched, unencrypted versions of the files. The password files was not a test, that was for real, and i would like to get that info back, though it's not looking good. Also, one of the pictures went bad on the backup, so now my only copy of that is encrypted.
i have 10 picture files, 5 unencrypted, 5 encrypted with 1 key. is there a way to do a hex level comparison to try to hunt down the key? it would be the same for each one, wouldn't it?
just a theory, not much hope in it.
thanx in advance
/<