A copy of the raw data on physical disk of an inaccessible source file is
automatically generated in an accessible target file. When accessed, the
copy of the raw data of the inaccessible source file in the accessible
target file can be read allowing a user or application to evaluate the
data of the accessible target file, and thus indirectly the raw data of
the inaccessible source file. In some embodiments, the copy of the raw
data is evaluated for malicious code, allowing a user or application to
take protective actions, such as deleting the inaccessible source file.
Where the raw data of the inaccessible source file is encrypted, the copy
of the raw data is automatically decrypted by the operating system when
read yielding unencrypted data. Where the raw data of the inaccessible
source file is compressed, the copy of the raw data is automatically
decompressed by the operating system when read yielding uncompressed
data.