Overview of Rescue Procedures
BestCrypt Volume Encryption provides the user with a number of procedures to avoid losing encrypted data accidentally.
For example, this could become necessary when physical sectors where critical data is stored become damaged (like encrypted volume headers).
Recovering encrypted data is possible if the user has a Rescue File for the volume. By default, BestCrypt Volume Encryption creates and updates
the Rescue File (rescue.rsc) in the folder where the software is installed. The user can change location where the software automatically saves
the Rescue File by running the ->Rescue data default location command. Since the folder where the software
is installed can also be encrypted or even stored on damaged disk, BestCrypt Volume Encryption suggests the user should use commands from menu
to copy the Rescue File to safe place.
Several accidental situations are possible:
-
An encrypted Boot/System volume is damaged. If physical damage of the volume occurs, it will be impossible to boot the computer.
BestCrypt Volume Encryption suggests the user should run the ->Save rescue data command and create
a Rescue Bootable Disk (CD or USB). The bootable disk contains the Rescue File and special
recovery program that starts upon booting the computer from the rescue disk.
The recovery program displays information about volumes and, after confirmation, starts decrypting process.
- An encrypted regular volume is damaged. In this case it is possible to run BestCrypt
Volume Encryption program, select the damaged volume in the main window of the program,
and run the ->Decrypt with Rescue File
command. The program allows using a Rescue File located on any disk.
-
A lost encryption token device can render it impossible to access the encrypted volume. So it is strongly recommended
to copy keys stored on the token you use for everyday work to another token and then keep the backup token in a safe place.
The command -> Encryption key -> Backup keys to other external storage is added for that purpose.
-
BestCrypt Volume Encryption on a Windows Bootable CD is also possible. In some situations, it might be more convenient to to solve problems
without decrypting the entire computer by booting the computer with a bootable Windows Live CD, and then accessing the necessary encrypted volumes.
Learn more here about how to create a Windows Live CD with the BestCrypt Volume Encryption plugin, so that encrypted disk volumes can be mounted
after booting the computer with the Live CD.