In the daily we go online, the computer hard drive has a lot of important or undisclosed privacy or documents, such as private photos or customer information! At this time, you are easily hacked by hackers. Your documentation, to solve this problem is to encrypt the file, I will tell you some small methods that are easy to operate:
The first method is useful for general users.
Use the Group Policy tool to set the hard disk partition for storing private data to be inaccessible. Specific method: First select "Run" in the start menu, enter gpedit.msc, press Enter to open the Group Policy Configuration window. Select "User Configuration" -> "Administrative Templates" -> Windows Components -> "Windows Explorer", double click on the "Prevent access to the drive from My Computer" on the right, select "Enabled", then Select the drive you wish to limit in the drop-down combo box of "Choose one of the following combinations" and click OK. After confirming that you double-click to try to open the restricted drive, an error dialog will appear stating "This operation was cancelled due to the limitations of this computer. Please contact your system administrator." This will prevent most hacking programs and viruses from invading your privacy.
The second method is just an encryption method that can only prevent gentlemen and cannot prevent villains. Because a computer expert is likely to know this technique, not to mention the virus, virus writers certainly know this technique.
Modify the settings in the registry to set a drive to be hidden. The hidden drive method is as follows: Create a new DWORD value in the registry HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\PolicIEs\\Explorer, name it NoDrives, and assign it the corresponding value. For example, if you want to hide the drive C, you will assign a decimal 4 (note that you must set it to decimal 4 in the assignment dialog). If our new NoDrives want to hide the three drives A, B, and C, then just add the DWord values corresponding to the A, B, and C drives. Similarly, if we need to hide the D, F, G drives, then NoDrives should be assigned 8+32+64=104. How about, you should understand how to hide the corresponding drive. Most of the features of disk hiding software are currently implemented using this little trick. After hiding, you can't see the drive under Windows, so you don't have to worry about others peeking at your privacy.
The third is a little-known secret. You can also use the "Disk Management" component that comes with Windows to hide the hard disk!
The operation steps are as follows: Right click "My Computer" -> "Manage" to open the "Computer Management" configuration window. Select "Save" -> "Disk Management", select the drive you wish to hide, right click and select "Change drive name and path", then select "Delete" in the dialog box that appears.
Most users are afraid to choose "delete" here, afraid to lose the data, in fact, there is no need to worry about fear here, it is impossible to delete a disk without data first! Because the system is deleted The path can't be found! You want to restore and repeat the above steps to add.
The first three encryption methods are implemented by using the functions provided by Windows itself. The encryption strength is low, which is not suitable for commercial level. . Here are a few more secure encryption methods.
The fourth is to use software to encrypt, a lot can be found online. And this encryption method is absolutely safe. And this encryption method is different from the manufacturer's different encryption principle. A brief introduction to the following
Use WinRAR to securely encrypt your data. Whenever you mention WinRAR, you will always think of its powerful compression function. In fact, WinRAR's encryption function is also very powerful. WinRAR uses one-way encryption, and one-way encryption is impossible to crack.
Encryption using commercial-grade encryption software. Software encrypted on the Internet can be easily accessed by Baidu. For example, Enigma Protector is a powerful tool designed to add high-intensity protection to your application.
There are PGP and Nuclear Shield Data Guard. PGP uses virtual disk technology, which is characterized by emulating a hard disk drive with a large file and encrypting and decrypting the data stream during the reading and writing process. The nuclear shield data guard directly encrypts the physical sector of the hard disk, and can write the world's first powerful functions such as protecting the hard disk partition, encrypting the hidden hard disk partition, and locking the USB and optical drive. The technical principles of the two softwares are different, but the security and encryption and decryption speeds are reassuring and suitable for both personal and enterprise users. There are also some encryptions that require payment for encryption. The degree of encryption should be absolutely assured.
A friend who uses the Windows 7 operating system may have such a doubt. Why do some files in the win
According to foreign media reports, Windows 7 and Windows Server 2008 R2 users recently rep
Users who are used to Windows XP operating mode, when faced with Windows 7, there are many desktop f
Windows7 is a new generation of operating system released by Microsoft after WindowsVista system, be
Teach you to get back the Windows 7 system wireless password
Can Windows 7 virtual memory be disabled?
Bad optimization cheats can't hide Windows 7 menu bar (1)
Two strokes will get the automatic login of Windows 7 system.
Windows 7 system function for U disk encryption
You must know the top ten habits of using Windows 7
"telnet" command application in Windows 7
How to change the color of the computer folder? Colorful folder icon set tutorial
Windows 8 system activation method and various basic knowledge editor
Windows XP Folder Icon Settings
Broadband problem can't be delayed! Win7 encounters error 711 how to do
Win8.1 Microsoft account login has been showing "Please wait later" solution
Win7 printer sharing setting method (graphic)
What should I do if the Win7 system mouse wheel fails?
How does the XP system make a batch associated with the repair EXE file?
Win8.1 computer automatically restart after the shutdown solution