by zsolt » Mon Dec 10, 2012 8:47 pm
Hello
Question 1
I need to get document directly from the back up of the disk image in the "Application support" folder. I have the disk image (stored on an USB key), I reinstalled all my system.
How to open the encrypted image disk to get my files?
I tried my Espionage password an computer password, and it didn't work.
#############
If you are indeed using espionage 3, then it is a bit more complicated, or read it "secure". In Espionage 2 you had to define the password for each protect folder. Espionage 3 does this for you, this is nice as you do not have to worry about it, it is more secure because Espionage will create a reaally strong password for you, the disadvantage is that you do not know the password, only Espionage does. To get it, you have to click onto small "i" near the folder name in the espionage, and this will bring you to the folder options. Now, click onto copy password button and paste it into a text file. This is the password you can open the disk image with.
But, the dialog you get by dubleclicking the disk image does not allow you to paste the password, so you have to use disk utility to mount it, I think there you can paste the passwords.
Question 2
I tell about espionage to my client because I like it. But I have a client who saved data in the unlock mode and the locked mode, so he have two version of the file (and he give me s**t about it, because I told him to buy Espionage).
We should not be able to save in the folder when it's lock
#############
Yes and now. If the user does not use the software as he supposes to, he cannot blame the software for not getting the result he expects. But if you provide him with a nice explanation you can turn this situation in you advantage. When the folder is locked, you can place any file into the folder. Once you unlock the folder, the files will temporarily disappear and your real files will appear. So what you can do is: put some dummy files into the locked folder, some files which will mislead some potential intruder providing him with false information. He will never suspect that these are fake, because this folder does not reveal anywhere that it is protected in any way. So this is in fact a good and not a bad thing. User just have to be aware of this.
I hope this helps.
Let me know if you have further questions.
rgds
Zsolt
Follow for news! | For general Mac support, please visit