Discover how to unlock hard drive password, include the articles, news, trends, analysis and practical advice about how to unlock hard drive password on alibabacloud.com
I wrote a hard drive lock in the previous period, took out to exchange with everybody, at the same time have a question, hope everybody can help me to think about.
First of all, I would introduce my program, I was written in a compilation, the program has 2 files: Hdlock.exe
Hdlock.dat, where Hdlock.dat is the hard drive
Settings \ Administrator \ Local Settings \ Temp" directory in Windows. Pai_^7. Set the "mount point" by yourself"In Windows, we can use "create folder" to store a class of things, of course, in Linux. In addition to this method, you can also set a "mount point" when "Partitioning" (in fact, the function is equivalent to setting up a special place to store special things ")There are many others. I will not elaborate on them one by one. The following figure shows the functions of various folders
I have installed the USB flash drive many times, but I cannot find the file. Finally, I found a blog to see how to install dual systems. Finally, I found that I could use hard disks for installation. After more than five hours, it was finally completed. ^-^. 1. The first is Partitioning. you can use the built-in Disk Management Program of Window7 to partition. (Ps I used CentOS to install the disc partition
One of the best ways to improve your computer's performance is to optimize your hard drive. The features included in Windows help you optimize the various types of drives that your computer uses today. No matter what type of drive your computer is using, Windows automatically chooses the optimal way to fit the drive.
How do I encrypt a removable hard drive?
With a removable hard drive, it is easier to transfer files and store files. Mobile hard drive is naturally to carry, inevitably sometimes lost, once lost, the data inside will become no
\ Administrator \ Local Settings \ Temp" directory in windows. Pai_^7. Set the "mount point" by yourself"In Windows, we can use "create folder" to store a class of things, of course, in Linux. In addition to this method, you can also set a "mount point" when "Partitioning" (in fact, the function is equivalent to setting up a special place to store special things ")
There are many others. I will not elaborate on them one by one. The following figure shows the functions of various folders and st
No matter what device can be used to boot the system, this situation is mostly the hard drive is infected by the virus, the "logic lock" lock. After the logical lock, no matter what device can not properly boot the system.
The way to unlock a logical lock is to modify the IO of a startup disk using the binary Editing tool on a normal machine. SYS "file, w
One of the best ways to improve your computer's performance is to optimize your hard drive. The features included in Windows help you optimize the various types of drives that your computer uses today. No matter what type of drive your computer is using, Windows automatically chooses the optimal way to fit the drive.
in the specified position can not read the correct information and multiple positioning caused by. If the hard drive has an abnormal sound, you should turn off the power immediately. Do not blindly repeated power to try to avoid deformation of the magnetic head on the disk surface formation scratches, resulting in irreparable loss. In this case, the disk cavity must be opened in a clean room, and a good se
In many cases, when a computer is poisoned, our remote control software will view important data on your hard disk and steal it.
How can we prevent this situation? In fact, you can add a password to the hard disk. However, if Intruders use remote control software to access your hard disk, they do not need to enter a
Many times when a computer is poisoned, our remote control software will look up the important data of your hard disk and steal it.
How do we prevent this from happening? In fact, you can add a password to the hard drive. But if the intruder uses remote control software to access the
and file data. Such tools replicate meaningless files to all partitions on your hard disk, then format and install the operating system so you can safely sell or donate your computer to others.
Use software to remove or encrypt mobile hard drive data
If you want to delete the files on the mobile hard d
Modify Grub_timeout= "10"Then enter sudo update-grub in the terminalThe update command automatically finds the Windows 7 Startup items. and automatically update the/boot/grub/grub.cfg file. This will enable you to enter windows in a reboot. (3) Finally enter Windows 7, open EASYBCD Delete the Menu.lst file that you changed when installing, press remove . Then go to our C drive to delete the Vmlinuz,initrd.lz and the system ISO file. With EASYBCD You
install the boot launcher, you can select our sub-region or create a new/boot area.(2) If you restart, you will find that Windows is not in.Open Terminal Input Commandsudo gedit/etc/default/grubModify Grub_timeout= "10"Then enter sudo update-grub in the terminalThe update command automatically finds the Windows 7 Startup items. and automatically update the/boot/grub/grub.cfg file. This will enable you to enter windows in a reboot.(3) Finally enter Windows 7, open EASYBCD Delete the Menu.lst fil
flash drive after it is removed. If you want to Log out automatically after the USB flash drive is removed, you can select "Log off when the disk is removed ".
2. in the "Log on to Windows" drop-down list box, select "Log on when disk is connected" (automatically Log on to the system when a USB disk is linked to it). In this way, if the USB disk is not connected after it is started, you cannot enter the sy
When you need to remove the removable hard disk or flash memory, we usually perform the "safely Delete hardware" operation, but we often encounter the "unable to deactivate the universal volume" prompts, making the user afraid to pull out the USB connection.
There are several reasons for this, which is often mentioned in the online tutorials because it opens a file on the mobile hard
installed, streamlined installation, the speed is considerable. But the U disk is too small, installed to be able to use the basic words, the user available space is only 100M, so can only be reserved for emergency. In addition, the operating system for a long time on the U disk operation, but also affect the life of flash memory, so this time with mobile hard disk to install, ready for longer term use. This mobile
to the network hard disk, and then to the company to download, so that we extract and save data, saving U disk trouble, and if you are concerned about some data loss, you can add a password to the network hard drive to back up, just in case. The role of network hard disk, s
. Complete21. Make sure you choose the right one.21.1. Your mobile hard drive will be occupied, if the U disk will disappear, do not worry (the next time to pay attention to whether the movement is normal connection)----------------------------------------------------------------------------------------------------22. Select the Graphics Installation page (This step does not occur directly with the above er
. Complete21. Make sure you choose the right one.21.1. Your mobile hard drive will be occupied, if the U disk will disappear, do not worry (the next time to pay attention to whether the movement is normal connection)----------------------------------------------------------------------------------------------------22. Select the Graphics Installation page (This step does not occur directly with the above er
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.