Computer store news When we go online every day, the computer hard drive has many important or unopenable privacy or documents, such as private photos or customer information! At this time, you can easily steal these files from hackers. To solve this problem is to encrypt the files. Let me tell you some small methods that are easy to operate: The first method is for ordinary users, this encryption is still useful. Use the Group Policy tool to set the hard disk partition where private data is stored to be inaccessible. Specific method: First select "Run" in the start menu, enter gpedit.msc, press Enter to open the Group Policy Configuration window. Select "User Configuration"->"Administrative Templates"->Windows Components->"Windows Explorer", double click on the right "Prevent from "My Computer" Access Drive " ;, select "Enabled", then select the drive you wish to limit in the "Select one of the following combinations" drop-down combo box, click OK. After confirming that you double-click to try to open the restricted drive, an error dialog will appear, prompting "This operation was cancelled due to the limitations of this computer. Please contact your system administrator ". This will prevent most hacking programs and viruses from invading your privacy. The second method is just an encryption method that can only prevent gentlemen and cannot prevent villains. Because a computer expert is likely to know this technique, not to mention the virus, virus writers certainly know this technique. Modify the settings in the registry to set a drive to be hidden. The hidden drive method is as follows: Create a new DWORD value in the HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer of the registry, name it NoDrives, and assign it the corresponding value. For example, if you want to hide the drive C, you will assign a decimal 4 (note that you must set it to decimal 4 in the assignment dialog). If our new NoDrives want to hide the three drives A, B, and C, then just add the DWORD values corresponding to the A, B, and C drives. Similarly, if we need to hide the D, F, G three drives, then NoDrives should be assigned 8+32+64=104. How should I understand how to hide the corresponding drive. Most of the features of disk hiding software are currently implemented using this little trick. After hiding, WIndows can't see the drive below, so you don't have to worry about others peeking at your privacy. The third is a little-known secret, using Windows' own "disk management" component can also realize hard disk hiding! The steps are as follows: Right click "My Computer"->"Manage", open the "Computer Management" Configuration window. Select "storage"->"disk management", select the drive you wish to hide, right-click and select "change drive name and path", then select "delete" in the dialog that appears . Most users don't dare to choose "delete" here, afraid to lose the data, in fact, there is no need to worry about fear here, it is impossible to delete a disk without data first! Because the system removes the path tightly, you can't find it! Want to restore the direct repeat of the above steps to add. The first three encryption methods are implemented using the functions provided by Windows itself, the encryption strength is low, not suitable for commercial level needs. Here are a few more secure encryption methods. The fourth is to use software for encryption, which can be found on the Internet. And this encryption method is absolutely safe. Moreover, the encryption method differs from the manufacturer. The principle of encryption is different. The following is a brief introduction. You can use WinRAR to securely encrypt your data. Whenever you mention WinRAR, you will always think of its powerful compression function. In fact, WinRAR's encryption function is also very powerful. WinRAR uses one-way encryption, and one-way encryption is impossible to crack. Encryption is done using commercial-grade encryption software. Software that is encrypted online can be easily accessed by Baidu. For example, Enigma Protector is a powerful tool designed to add high-intensity protection to your applications, as well as PGP and Shield Data Guard. PGP uses virtual disk technology, which is characterized by emulating a hard disk drive with a large file and encrypting and decrypting the data stream during the reading and writing process. The nuclear shield data guard directly encrypts the physical sector of the hard disk, and can write the world's first powerful functions such as protecting the hard disk partition, encrypting the hidden hard disk partition, and locking the USB and optical drive. The technical principles of the two softwares are different, but the security and encryption and decryption speeds are reassuring and suitable for both personal and enterprise users. There are also some encryptions that require payment for encryption. The degree of encryption should be absolutely assured.
Want to know how hackers view the remote computer win7 system process? The method is very simple, th
First, the cause analysis: 1, 721 error is caused by your computer in the internal network, because
Now no network is not computer, no network, using the computer is almost no fun, but in the process
In the process of using Win7 computer, browsing the webpage is an indispensable part. Recently, some
Win7 notebook wireless Internet settings
Optimize Win7 to play online games without card
Notebook win7 system can not read u disk how to do
Win7 printer sharing setup tutorial
Do not reinstall Windows7 system to open AHCI mode tutorial
How to hide the administrator account of the win7 system
Win7 primary partition set to logical drive skills
Solving Windows 7 Favorites can't expand
Blue Screen Code Meaning and Solution
Windows7 system hard disk merge partition method
Win8 consumer preview version of Chrome can not set the default browser
Easily crack WINDOWS 7 login password
Windows 7 installation process (multiple map details)
Window10 timed shutdown setting method
How to reset the text tuner of Win8 system
Windows 7 memory is a big reason - Superfetch memory management
How does Win7 disable virtual memory? Steps to disable virtual memory in Win7
How to clear Win8 remote desktop login history traces
What should I do if the Win 8 start menu disappears? Start8 is here to help you
How does the win10 app store switch to the national area? Win10 store switching area two ways