I encrypted (with TrueCrypt) all my hard drives and had the passwords stored in an encrypted file on my USB disk. The passwords are all (except one) 50 character randomly-generated ciphers, there's no way I could remember them. I decided that I wanted to securely wipe my USB disk real fast so I put the passwords file on my hard drive for a moment, ran TrueCrypt on the USB drive to perform a secure wipe, then re-formatted it with Windows to be used as a non-encrypted drive. As I was about to move the passwords file back to the drive, there was a freak power outage (at 12:30am on a calm, clear night)... Suffice it to say, my computer shut off, my passwords file is still on the encrypted disks, and now all 4 of my disks I've used for the past 10 years remain inaccessible to me.
I'm guessing the answer is no, but is there any reasonable way I could decrypt my disk, esp. knowing which algorithms and such which were used? Also, one of the disks has a password that is basically a sentence with a few extra random characters. I remember about 95% of this sentence. Is there a way I could brute force it without having to click Auto-Mount, Enter the password, wait for it, click ok, and repeat with 1 character different?