Chapter 17. Managing File Encryption

IMAGINE THIS PHONE CALL. IT'S 1:30 on a Wednesday afternoon. The voice at the other end of the line belongs to the CFO. She is in New York making a series of presentations to potential investors. She has just arrived back from lunch to discover that someone took her laptop from a meeting room where she was assured that it would be “perfectly safe.”

The CFO's most pressing concern is to get the files that she needs for her presentations, but your larger concern is for the data on the laptop's drive. If someone in the chain of criminals that handles the stolen laptop recognizes the nature of the data it holds, the machine takes on a whole new value. When the enormity of the vulnerability sinks in, company executives ...

Get Inside Windows® Server 2003 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.