It is well known that Windows Optimizer can optimize the system and improve the efficiency of the system, but do you know that it is still a good file encryption software. After the Windows Optimizer is installed, there is a "Windows File Encryption" program in its "Start" menu program group. This is the Windows Optimizer's encryption module. It is a stand-alone program that can be run separately from the Windows Optimizer.
First, encryption /decryption instructions
Windows file encryptor can encrypt and store various files, which not only improves the security of user files, but also saves disk space. For non-executable program files, the file name stored in the Windows file encryptor after encryption is: original file name + ".womec". For example, if the file to be encrypted is "Minimum is not allowed to view .jpg", the encrypted file name is "Minimum is not allowed to view .jpg.womec". For executable program files (files with file extensions EXE, COM, BAT), the file name remains unchanged after encryption. The encrypted file, the Windows file encryptor is represented by a unified icon (Figure 1). After the file is encrypted, whether it is a non-executable program file or an executable program file, it can be opened or run directly after the password verification is correct after encryption.
For encrypted files, the Windows File Encryptor can decrypt it as the original file. It is worth noting that the file stored after the encrypted file is decrypted is named the original file name. For example, if the original file is “bank deposit.xls”, the encrypted file is “bank deposit.xls.womec”, even if the user changes the encrypted file name to “normal form.xls.womec”, it will still be “bank” after decryption. Deposit .xls".
Second, encryption /decryption operation The basic use of the Windows file encryptor is as follows:
1. Select the file to be processed. After the user enters the Windows file encryptor, as shown in FIG. 2, select the folder where the file to be processed is located in the folder at the lower left, and then select the file to be processed in the file list at the lower right and add it to the list of pending files. You can add it by double-clicking the file in the file list on the bottom right, or holding down the Ctrl or Shift key to drag and drop it into the list of pending files. Alternatively, the user can click the "Browse" button to add a pending file.
2. Encryption and decryption operations. If the user has already entered the encrypted password, click the “Encrypt” button to encrypt the added file to be processed. In the encryption process, if the Windows file encryptor detects that the file has been encrypted, the user will be prompted to skip. The file; click the "decrypt" button to decrypt the added file to be processed. During the decryption process, if the Windows file encryptor checks that the file has not been encrypted, the user will be prompted to skip the file.
Third, encryption /decryption settings
In order to improve the efficiency of encryption /decryption, you can encrypt /decrypt the file, in the Windows File Encryptor "Settings" dialog box (click the menu bar The "Options → Settings" can be opened in the reasonable settings (Figure 3).
1. "Delete original file after encryption is successful": Select this item. In the encryption process, if the encryption is successful, the original file will be deleted.
2. "If the input password is an empty string during encryption/decryption, the password of the first item is used as the password": Select this item, in the encryption/decryption process, if the file to be processed is in the list If a file does not have a password, the Windows file encryptor uses the first password to be encrypted/decrypted as the encryption/decryption password, which is convenient for users to encrypt/decrypt files in bulk.
3. "Encryption level using Windows optimization master compression algorithm": Users can set the Windows file encryptor to use the compression level of Windows Optimizer compression algorithm in the encryption process: as shown in Figure 3, the fastest Compression rate (the fastest compression speed, but the compression ratio is small, so the disk space occupied by the compressed file is larger); the default compression ratio (the default compression ratio of Windows Optimizer, faster, higher compression ratio, compressed file) The disk space is small); the maximum compression ratio (slow compression speed, highest compression ratio, and the smallest disk space occupied by compressed files).
4. “Delete encrypted file after decryption successfully”: Select this item to delete the encrypted file if decrypted successfully during decryption.
5. “Prompt message after operation is completed”: Select this item. During the process of encryption or decryption, each time a file is processed, the prompt information window will pop up to report the success or failure of the processing result to the user. //This article comes from the computer software and hardware application network www.45it.com
6. “Automatically clear the list of pending files after the operation is finished”: Select this item to encrypt or decrypt all files in the file list to be processed. When finished, the list of pending files will be automatically cleared.
7. "Check file association at startup": Select this option to automatically check the association of encrypted files each time you start the Windows file encryptor. This option is set up so that users can directly open encrypted files (womec files) of non-executable programs. Users are advised to choose.
8. "Double-click to add pending files": Select this item and double-click the file in the file list at the bottom right to add the file to the list of pending files.
Windows Optimizer is a relatively good domestic shareware. It is installed on most people's computers. Even if you don't register, you can use the full function of Windows File Encryptor. It is recommended to use it to encrypt you. Important files to improve the security of these files.
Download the five-character root table method: " right mouse button" Click on the five-str
Today, we introduce WinRARs new application skills to readers. 1. Unzipable can also rename ZIP inte
To download the Wubi root table method: " right mouse button" click on t
Disks with Paragon Hard Disk "Change Cluster Size" & "Merge Disk Partitions> Tutor
How to remove redundant startup items How to delete redundant startup items
360leakfixer.exe in 360 security guards is the process
Using the compression compression software to quickly verify the compression package
Sogou input method can not be input normally
Manually recovering files deleted by mistake in NTFS volumes
Kingsoft PowerWord 2007 Frequently Asked Questions
How can I get help information for computer input method?
OpenSSL generates a random MAC address method
How to recover the memory card format? Data recovery method after the memory card is formatted
Windows optimization master: system optimization assistant
Win7 system to create a KTV singer effect method
Demystify Win8 Developer Preview in advance for OEMs
Make Win8 boot directly skip the start and quickly enter the traditional desktop
Windows 8.1 comes with screenshots can not be used how to do
Microsoft admits that Windows 7 TV ads are misleading consumers
Familiar with system shortcuts Easy to play Win8
Final Fantasy Zero HD how to switch teammates Final Fantasy Zero HD Switch Teammate Guide
Sotec GTX760 market price 1599
Win8 notebook cancels the open cover automatic boot setting method