The specific methods are as follows:
1, in encryption, we should all use U disk backup encryption key, where the default everyone has backed up the key, the U disk inserted in the computer, now open "My Computer";
2, double-click the encrypted disk;
Small knitting here to share with you about the file fast encryption compression backup to the U disk tips, u disk is our common tool to copy files, easy to carry, in peacetime work, we often need to back up some important files to the U disk, but also afraid of others to borrow U
Function GetVolumeInformation Lib "kernel32 "_Alias "GetVolumeInformationA" (ByVal lpRootPathName As String ,_ByVal pVolumeNameBuffer As String, ByVal nVolumeNameSize As Long ,_LpVolumeSerialNumber As Long, lpMaximumComponentLength As Long ,_LpFileSystemFlags As Long, ByVal lpFileSystemNameBuffer As String ,_ByVal nFileSystemNameSize As Long)Private Const MAX_FILENAME_LEN = 256Public Function DriveSerial (ByVal sDrv As String) As Long'Usage:'Dim ds As Long'Ds = DriveSerial ("C ")Dim RetVal As
U disk almost one person, many people use it to store their own important data. For this reason, U disk brings convenience to us, but also brings data security problems. So in the storage of important data we generally have to encrypt u disk. Now let's see what types of encryption are.
Http://www.truecrypt.org/docs/
Download:
Http://files.cnblogs.com/wucg/TrueCryptSetup7.1a.zip
Http://www.truecrypt.org/downloads
Introduction
The documentation is not guaranteed to contain no errors and is provided without warranty of any kind. For more information, please see disclause.
Truecrypt is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device ). on-the-fly encryption means that da
U disk has become a widely used equipment, although easy to use, but when it comes to security is worrying. The ordinary USB disk does not have the encryption function, as long as opens then can see the content. So, how to lift u disk security? Let's take a look at it!
Fast Mobile
Because of the lightweight and convenient disk, easy to carry, now more and more people use, but also because it is convenient to carry to our data security brought trouble, imagine, when you leave the computer when others use a U disk to the computer important data are copied, if it is important confidential, this can be a big trouble. Is there any way to allow others to use U
In our life, U disk can never be separated from the side, a small U disk to store a lot of information. But in case of a U disk lost how to do, a lot of people will worry about the information will be leaked, do not worry, now let the small series to tell you how to use the win7 system with the function to the U disk
1, fake encryption
This type of encrypted U disk does not have a real sense of encryption, only need to use password cracking tool can be the U disk did not read the data, security is poor.
2, soft encryption
Soft encryption
Disk folder Encryption The computer's external memory also uses a similar tape-like device, more commonly called a disk, the circular magnetic disc in a square sealed box, the purpose is to prevent the disk surface scratches, resulting in data loss. With the disk, people use
Before, often heard a U disk with encryption storage function, a U disk security level high such publicity. It should be said that this kind of products for the data security requirements of higher business people is very appropriate. But, often this function is promoted, the price aspect will not too let "the Heart Is Sweet". In fact, the
In the usual work, we often need to backup some important files to the USB drive, generally we will choose to use WinRAR tools such as hand-made the required files into a compressed package, for data security, we usually also encrypt the file, and then move it to the USB drive. Such operations are more complex, in fact, the use of Windows "Send to" menu, you can achieve more efficient encryption compression operations.
Enter SendTo in the Start Run m
Recently, due to work needs, I began to contact my laptop hard disk encryption.
In a rough view, there are three types of encryption implementation for laptops: computers containing encryption chips use BIOS to set disk password encrypt
As the computing and storage capabilities of smartphones increase, mobile phones will store more and more private data, and the leakage of such data may cause serious consequences. Mobile phone information security has always been one of our key points. For some important functions, we need to authenticate them before they can be used. However, this can only block novice hackers, and it can only protect against gentlemen and prevent villains, therefore, we hope to encrypt important data before s
BitLocker is a hardware encryption technology for Vista, combining the TPM (Trusted Platform module Trust platform modules) on the motherboard to encrypt the entire disk or a volume, not as NTFS EFS works at the file system level. Instead, work at the bottom of the disk and start working when the system starts.
The Vista Home Business Edition does not support B
With the wide use of U disk, U disk encryption has become more and more important, how to choose a good encryption software? In fact, in the Win7 system has been equipped with USB U Disk encryption security function--bitlocker. Bi
What is BitLocker Drive Encryption? It is a system-wide encryption that uses a string of characters as a voucher to ensure that your mobile storage facility can be lost without revealing the data. In Win8, this feature has a better experience than previous versions, so let's take a look at how to encrypt our USB drive using BitLocker driver encryption.
First we
In Linux, disk encryption mdash; luksLUKS (LinuxUnifiedKeySetup) provides a standard for Linux hard disk encryption. it not only applies to different Linux releases, but also supports multiple users/passwords. Because its encryption key is independent of the password, if th
How to choose good encryption software? In fact, in the Win7 system has a U disk encryption security function--bitlocker. BitLocker does not require users to modify Group Policy and other miscellaneous settings, as long as the administrator logged on to the WINDOWS7 system can be used.
1, insert a good u disk, in the
1. First of all, the "Encryption Wizard" copy to the USB drive to execute, pop-up operation of the main interface.
2. Then start the encryption function according to the order identified in the following figure, and click the "Make Configuration Effective" button to confirm it.
3. Set the encryption area password, u disk
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.