Five methods of file encryption

Source: Internet
Author: User

The hard disks of each computer contain private or confidential files that are not suitable for public use, such as personal photos or customer data. When surfing the Internet, this information is easily stolen and illegally used by hackers. The fundamental solution to this problem is to encrypt important files. The following describes several common encryption methods.

1. Use the group policy tool to set hard disk partitions for storing private data as inaccessible. Method: select "run" from the Start Menu, enter gpedit. msc, and press enter to open the Group Policy Configuration window. Choose "user configuration"> "management template"> "Windows Resource Manager", double-click "prevent access to the drive from" My Computer "on the right, and select" enabled ", select the drive you want to restrict from the drop-down box "select one of the following combinations" and click OK.

In this case, if you double-click to open the restricted drive, an error dialog box will appear, prompting "this operation was canceled due to the limitation of this computer. Contact your system administrator ". This prevents most hacking programs and viruses from infringing your privacy. Most of the functions of disk encryption software are implemented using this trick. This encryption method is more practical, but its disadvantage is that the security factor is very low. Computer experts or virus programs usually know how to modify group policies. They can also remove the group policy restrictions set by users. Therefore, this encryption method is not suitable for users with high confidentiality requirements. This encryption method is useful for general users.

2. Use settings in the Registry to hide some drives. The method for hiding the drive is as follows: in the Registry's HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesExplorer, create a DWORD Value, name it NoDrives, and assign the corresponding value to it. For example, if you want to hide the drive C, assign the four in decimal format (Be sure to set the four in decimal format in the value assignment dialog box ). If we want to hide the drive A, drive B, and drive C, we only need to add the DWORD values corresponding to drive A, drive B, and drive C. Similarly, if we need to hide the drive D, F, and G, NoDrives should be assigned 8 + 32 + 64 = 104. You should understand how to hide the corresponding drive. At present, most of the functions of the disk hiding software are implemented using this tips. After hiding it, you won't be able to see the drive in WIndows, so you don't have to worry about your privacy.

However, this is only a type of encryption method that can only defend against gentlemen and protect against villains. Because a computer expert may know this technique, not to mention viruses. virus writers certainly know this technique. As long as the registry is changed back, the hidden drive is back. Although the encryption intensity is low, this method is sufficient if you only want to deal with your children and other cainiao.

3. There have been many knowledge articles about encryption method 1 and encryption method 2 on the network, and they are already familiar to everyone. However, few people know the encryption method 3. Here, experts tell you the secret that hard disk hiding can also be achieved by using the "disk management" component provided by Windows!

The procedure is as follows: Right-click "my computer"-> "manage" to open the "Computer Management" Configuration window. Select "Storage"> "disk management", select the drive you want to hide, right-click and select "Change drive name and path", and select "delete" in the displayed dialog box. Many users do not dare to select "delete" here, so they are afraid to lose the data. In fact, there is no need to worry about this. Windows only deletes the symbolic link of the drive in the kernel space, logical partitions are not deleted. If you want to cancel hiding the drive and repeat the above process, select "add" here.

The security factor of this method is similar to that of the previous method, because other computer experts or virus programs can do the same and find your hidden drive.

The preceding three encryption methods are implemented by using the functions provided by Windows. The encryption strength is low, which is not suitable for commercial-level needs. Next we will introduce several absolute security encryption methods.

4. Use WinRAR to securely encrypt your data. When we mention WinRAR, we always think of its powerful compression function. In fact, WinRAR's encryption function is also very powerful. WinRAR adopts one-way encryption, which cannot be cracked. Therefore, if we need to protect privacy, we only need to compress these private files into a package and add the password, which is absolutely safe. No hacker or computer expert can steal your privacy.

Although WinRAR encryption is absolutely secure, it is very slow, and every time you use it, you need to decrypt it and then encrypt it again, which is troublesome. Therefore, Method 4 is only applicable to users with high encryption strength requirements.

5. Use commercial encryption software for encryption. This encryption method is absolutely secure. Representative Software in this field includes PGP and core SHIELD data guard. Both types of software can be found online for free. PGP uses the virtual disk technology, which is characterized by simulating a hard drive with a large file and encrypting and decrypting data streams during read/write. Core SHIELD data guard directly encrypts the hard disk physical sectors, which can write and protect hard disk partitions, encrypt and hide hard disk partitions, lock USB and optical drive, and other world-first powerful features. Although the technical principles of these two types of software are different, the security and encryption and decryption speed can be reassuring. Applicable to individuals and enterprise users.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.