Implement encryption protection for office build applications
Word:
A. By default, word uses the rc4 encryption algorithm.
B. Understand the risk of passwords.
1. Set the office password.
2. Crack the office password. Use Accent Office Password Recovery.
3. Process:
A. Install software
B. Start the software.
C. Open the cracked file and click Start.
D. the pop-up prompt shows whether your password has certain characters.
E. Character Set, next step
F. Note: Do you remember part of the password
directories
It is worth noting that if you need to upgrade/usr/sbin/someprogram, you should remove the someprogram file and the immutable attribute of the directory/usr/sbin.Use Encrypted File System (EFS)
The following describes how to use dm-crypt to create an encrypted file system. Compared with other methods for creating an encrypted file system, the dm-crypt system has unparalleled advantages: it is faster and easier to use. In addition, it is
without restriction, it will no longer be yours .) When you are at the airport, you may think that one day, when you fly home, your laptop may not be with you. In addition to spending a sum of money to purchase a laptop, you may have handed over important data (or personal information, this loss is far greater than the hardware overhead.The Encrypting File System (EFS) running on NTFS allows you to encrypt the selected files and folders on the hard d
partition is not the current login user, but a useless user, so right-click the drive letter, select "attribute", and then select "security ", delete useless users, add their usernames, and change their permissions. In addition, note that you can click the "advanced" button in the security options and select the "owner" tab, select "Replace sub-container and object owner ". If there is no security option, you can remove the check before "use simple file sharing" in the folder option (open my co
the system users can only in the set within the security zone to surf the Internet.
Because Group Policy has intuitive names and functional explanations, it is simple to use and convenient for both administrators and end-users, but its functionality is far from limited and can be used as a security tracking tool. For example, you can use Group Policy to find traces of shared directory access.
This is very important for user monitoring within the LAN. Because in the network, once the illegal u
testers, the impact of full-disk BitLocker encryption on system performance is negligible.
Some disadvantages of BitLocker
BitLocker is not a perfect technology. Because it can only protect the volume of the operating system in the computer, or the hard disk with the operating system, for those systems with multiple volumes or multiple disks, bitLocker alone cannot protect all data. In this regard, Microsoft recommends using EFS for non-operating sys
:/ S3.51cto.com/wyfs02/m01/70/96/wkiol1w50u7big9zaahftxrlinq577.jpg "border=" 0 "/>Choose the root CA, for the general enterprise, a root CA is enough, do not make too complex.650) this.width=650; "height=" 552 "title=" clip_image007 "style=" border:0px; "alt=" clip_image007 "src=" http:/ S3.51cto.com/wyfs02/m02/70/96/wkiol1w50u_dpminaaibnrdzhzs747.jpg "border=" 0 "/>In the next options, choose Create new private key, encryption option default, key length at least 2048 bits, other options defaul
Document directory
Hi, everyone. after reading the previous two articles about the use, deployment, and maintenance of EFs in a domain environment, do you have some inspiration and help to reinforce the security of important documents of the company? As I mentioned at the end of this article, EFS, as a system application with a long history, has gradually faded out of everyone's vision and scope of con
that initialization often fails during a debugging. Once successful, the initialization always succeeds. At first, I thought it was caused by no shutdownwinioi () after initializewinio (). Later I checked the C example of winio to prove that the process can be completed once the process is completed, just like initializewinio, the resources initialized by initializewinio will naturally end. So there is no impact on the last operation. Later, we suddenly found that the DLL, VxD, and SYS related
One, the consummation user manages the function
Windows XP uses the Windows 2000/nt kernel to be very secure in user management. Any additional users can see it when they log in, unlike Windows 2000, a user who has been added to an administrator group by hackers cannot find it. Using the NTFS file system, you can restrict user access to a folder by setting security options for a folder, such as a warning when a normal user accesses a document for another user. You can also enable auditing on a
unreliable, potentially harmful code for user data in a "transparent" manner that protects your computer from all kinds of viruses, trojans, and worms that are transmitted via e-mail or Web pages, ensuring data security.
Iii. supporting the NTFS file system and Encrypting File System (EFS)
The Encrypting File System (EFS) in Windows XP is based on public keys and leverages the default
Your Windows logon password, which is entered every time you start the machine, does not effectively protect your files.
The intention of setting a logon password is not to protect your files, but to prevent others from entering your computer in your name.
Why is this important? Because on your computer, only the operations you allow can be performed, such as reading emails. Unless you have set the mailbox client and require that you enter the password for each startup, anyone who can log on t
As we all know, Windows Vista has made great improvements in security to ensure the confidentiality of user data. The system-level security protection BitLocker provided in Windows Vista Enterprise and Ultimate can provide the complete drive encryption function, this effectively prevents Windows Vista users from being threatened by data theft or leakage due to PC hardware loss, theft, or improper elimination. Even if an illegal user starts another system and browses files stored in a protected d
click "Next" after the phone is activated, click Modify serial number, enter new serial number to choose "Update", if back to the previous screen, Then choose to activate later and reboot again, and repeat the previous steps until the modification succeeds and reactivate. Click OK to install SP1.
If you can't reboot after installing SP1, press F8 when you start, choose Use Last Known Good Configuration, and then repeat the process. This method applies to Windows XP Professional.
4. Add
, you need to consider extending the CRL time
First, build a simulation environment to tryBasic Environment:R2 Domain Control DC1R2 Certificate Server CA2 (new CA)R2 Certificate Server CA1 (old CA)R2 Web Server WEB1Window 7 Client Win7650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/74/78/wKioL1Ye4xOBfQ79AACWalPgcik289.jpg "title=" 1.PNG " Style= "Float:none;" alt= "wkiol1ye4xobfq79aacwalpgcik289.jpg"/>Experimental process: Issuing EFS
% SystemRoot % \ system32 \ oobe \ msoobe.exe/a, activate by phone, click Next, and modify the serial number, after entering the new serial number, select "Update". If it is returned to the previous screen, activate it later and restart it. Repeat the previous steps until the modification is successful and reactivate it. Click OK to install SP1.
If you cannot restart after installing SP1, press F8 at startup, select "Last correct configuration", and then repeat the above process. This method
File System
New File system
Dbr
DOS Boot Record
DOS Boot Record
FDT
File Directory Table
File directory Table
BPB
BIOS Parameter Block
BIOS Parameter Block
Efs
Encrypting File System
Encrypting File System
FEK
File Encryption Key
File encryption key
2. NTFS system
NTFS file system benefits: Security, recoverability, file compression, dis
As one of the core services of cloud computing, storage services are used by every user. However, the current situation is: most customers in addition to virtual machine data disk (persistent disk), and does not fully utilize the storage services. Let's look at a typical scenario: for example, a Web application needs a user to upload an invoice scan (image file). At the code implementation level, the image files uploaded by the user are usually saved directly to the disk file system. In a tradit
I. Introduction and features of XFS was initially developed by SiliconGraphics, Inc. In early 1990s. At that time, SGI found that their existing File System (EFS) was quickly becoming unable to adapt to the fierce Computing Competition at that time. To solve this problem, SGI decided to design a brand new high-performance 64-bit file system, instead of trying to adjust some defects of EFS in the innate desi
Q: The computer uses Windows XP system, and the partition format is NTFS. A few days ago, I used the "Encrypt" feature in properties for My Documents, after the previous folder (c:documents and Settings user name) has been encrypted, now "My Documents" in the file can not open, decrypt the top folder or not open, the separate decryption of "My Documents" file, prompting file to apply property error denied access. Excuse me, how can I open the file in My Documents?
A: Before resolving the failur
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.