Whenever we go online, the computer hard drive has a lot of important or undisclosed privacy or files, such as private photos or customer information! At this time, you can easily steal your hackers by surfing the Internet. These documents, to solve this problem is to encrypt the file, let me tell you some small methods that are easy to operate:
The first method is still useful for general users.
use the Group Policy tool, the privacy of data stored hard disk partition as inaccessible. Specific methods: First, select the Start menu & ldquo; & rdquo ;, run input gpedit.msc, press Enter to open the Group Policy configuration window. Select & ldquo; user profile & rdquo; - & gt; & ldquo; Administrative Templates & rdquo; - & gt; Windows Components - & gt; & ldquo; Windows Explorer & rdquo ;, double-click on the right & ldquo; prevent from & ldquo; My Computer & rdquo; to access the drive & rdquo ; select & ldquo; & rdquo ;, then enabled in & ldquo; a selection of the following combinations & rdquo; the drop-down combo box, select the drive you want to limit, click OK on it. Make sure you double-click to open after trying to drive is restricted, you will get an error dialog box prompts & ldquo; this operation due to the limitations of this computer are canceled. Please contact your system administrator & rdquo ;. This will prevent most hacking programs and viruses from invading your privacy.
The second method is just an encryption method that can only prevent gentlemen and cannot prevent villains. Because a computer expert is likely to know this technique, not to mention the virus, virus writers certainly know this technique.
Modify the settings in the registry to set a drive to be hidden. The hidden drive method is as follows: Create a new DWORD value in the HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer of the registry, name it NoDrives, and assign it the corresponding value. For example, if you want to hide the drive C, you will assign a decimal 4 (note that you must set it to decimal 4 in the assignment dialog). If our new NoDrives want to hide the three drives A, B, and C, then just add the DWORD values corresponding to the A, B, and C drives. Similarly, if we need to hide the D, F, G drives, then NoDrives should be assigned 8+32+64=104. How about, you should understand how to hide the corresponding drive. Most of the features of disk hiding software are currently implemented using this little trick. After hiding, WIndows can't see the drive below, so you don't have to worry about others peeking at your privacy.
The third is a little-known secret, using the Windows built-in "disk management" component can also achieve hard disk hiding!
The steps are as follows: right click "My Computer & rdquo;-> Management", open the “Computer Management" configuration window. Select “storage”->“disk management”, select the drive you wish to hide, right click and select “Change drive name and path”, then select “Delete” in the dialog box that appears. .
Most users don't dare to choose "delete" here, and they are afraid of losing the data. In fact, there is no need to worry about it. I can't try to delete a disk with no data first! Because the system is tight Just delete the path so you can't find it! You want to restore it directly by repeating the above steps.
The first three encryption methods are implemented using the functions provided by Windows itself. The encryption strength is low and not suitable for business. Level needs. Here are a few more secure encryption methods.
The fourth is to use software to encrypt, many can be found online. And this encryption method is absolutely safe. Moreover, the encryption method differs from manufacturer to manufacturer. The principle of encryption is different.
Using WinRAR, you can securely encrypt your data. Whenever you mention WinRAR, you will always think of its powerful compression function. In fact, WinRAR's encryption function is also very powerful. WinRAR uses one-way encryption, and one-way encryption is impossible to crack.
Encryption using commercial-grade encryption software. Software encrypted on the Internet can be easily accessed by Baidu. For example, Enigma Protector is a powerful tool designed to add high-strength protection to your application.
There are also PGP and Nuclear Shield Data Guard. PGP uses virtual disk technology, which is characterized by emulating a hard disk drive with a large file and encrypting and decrypting the data stream during the reading and writing process. The nuclear shield data guard directly encrypts the physical sector of the hard disk, and can write the world's first powerful functions such as protecting the hard disk partition, encrypting the hidden hard disk partition, and locking the USB and optical drive. The technical principles of the two softwares are different, but the security and encryption and decryption speeds are reassuring and suitable for both personal and enterprise users. There are also some encryptions that require payment for encryption. The degree of encryption should be absolutely assured.
How to convert MP4 video format to Winfox system Ifox video format: 1. Change the downloaded video
Intel launched the new Skylake architecture six generations of processors this year, which requires
The free upgrade to win10 official version of the system is only less than a month, many users upgra
Before we introduce the specific method, lets talk about the memory function. In fact, the memory fu
Win7 system blue screen failure 0X0000007E solution
How to open the registry in win7 system?
Windows7 prompts "An unexpected error prevented you from copying the file" What to do
How to solve Ghost installation Win7 error message 10100 problem
How to solve the problem that the Win7 system 360 browser can't open the webpage
Win7 system prohibits users from creating new accounts
The solution that the optical mouse flashing light is always on after the computer is turned off
Win7 computer wallpaper automatically changed how to be solved by malicious tampering
Win7 system sent a message QQ music songs becomes smaller influence how do
Win7 desktop program icon disappears only the name of the processing measures
How to hide files in win8? Win8 system to save files to the picture tutorial
Unable to open Win my computer and my documentation common method
No need to wait for Win9, teach you to play Win7/Win8.1 Microsoft virtual desktop
How to quickly open the Charm column in Win10 system
Win10 preview version 9879 new changes exposure: file resource manager new layout (two)
Win7 system uses Windows BitLocker to encrypt the disk drive protection graphic tutorial
CF National Day team wins points gold equipment for non-stop
Win7 system enter the wrong password 3 times lock how to set
How to set up the shrimp music to quit regularly? Shrimp music timeout exit setting method