answersLogoWhite

0

Only the administrator can decrypt these files. He does it by going to the file's Properties dialog box, click the Advanced button. In the Advanced Attributes dialog box, uncheck Encrypt contents to secure data.

User Avatar

Wiki User

15y ago

What else can I help you with?

Related Questions

How do you decrypt a copyright?

Copyright is not encrypted.


How can you decrypt an encrypted mp3?

Apply the encryption key to the file.


A user has encrypted important data files and now is no longer working for your company How do you decrypt these files so they can be read?

From the file's Properties dialog box ,click the Advanced button. In the Advanced Attributes dialog box, uncheck Encrypt contents to secure data


Can super user read your encrypted files?

Not without knowing your secret keyword to decrypt them.


What is a characteristic of public key cryptography?

If data is encrypted with the public key, only the private key can decrypt itAnswer Explanation: Public key encryption uses an asymmetric algorithm, which uses a public key and private key combination for the encryption and decryption process. If data is encrypted with the public key, only the private key can decrypt the data. The public key cannot decrypt a message that was encrypted with the public key. Alternatively, if data is encrypted with the private key, only the public key can decrypt the data.


What are characteristics of public key cryptography?

If data is encrypted with public key, only private key can decrypt it. AGN


Trying numerous possible character combinations to find the key that will decrypt encrypted data is known as a what?

brute force attack


How do you decrypt?

Decrypt this encrypted messageThe sentence below is encrypted. Your job is to break thecode by substituting letters for the symbols. Here are a few clues:O = t X = f S = uJHAHW FH DXWDCN OM OWG VMZHOLCJQ JHK,UWMXHVVCMJDPV FSCPO OLH OCODJCT, FSO DZDOHSWVFSCPO OLH DWB !


Your ms-access table data is encrypted how to decrypt?

xtau la kawe weii <<< gilo nate nih... baso bengong...


Why does encrypted data often look like gibberish to unauthorized users?

The purpose of encryption is to make a message/data unreadable to someone who does not have the key to decrypt it, so it is highly likely that encrypted data will appear to be gibberish.


What attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data?

a brute force attack


What window tool allows an administrator to decrypt a file that is not available because the user account that encrypted the file is no longer accessible?

Cipher