Privacy Protection in Windows

Source: Internet
Author: User

How can we protect personal data faster and more effectively without the preparation of specialized software? Today, based on my experience and usage by others, I will talk about how to protect my privacy and important files with "bare hands" (without using special software) in Windows. These moves are even higher than each other!

The first move is silver-free.

Security level:★

Hide: by default, files and some system files are hidden in Windows. If not, set it by yourself. The steps are to open the "My Computer> View> Folder Options> View> files and folders" options in order, in the displayed dialog box, select "do not show hidden files" or "do not show hidden files or system files", and click "OK". The setting ends. Next, set the files you want to hide, select them, right-click them, select "properties", tick them before "hide", and press "F5" to refresh, the file will disappear.

Appearance: This method belongs to the "pediatrics" level of confidentiality. You can only find "cainiao". For "laruence", you only need to follow the above method to gradually enter the "View" dialog box, if you cancel the "do not show hidden files" or "do not show hidden files or system files" setting and change to "show all files", the hidden files will be exposed again. Therefore, even if you use this stealth technique, you can't sit back and relax.

Second, rename the Domain Name

Security level:★★

Hide: Change the extension name of your file to another extension name. For example, change "my.txt" to "my. abc ". It is naturally difficult for others to guess what type of file was originally. Only you know.

Appearance: Restore the extension!

Third, empty city beauty

Security level:★★★

Hide: Enter the folder where the file to be hidden is located, right-click the folder, select "Custom folder", click "Next", and then "Next". Select the "Edit template" check box, next, click "Next" to exit the notepad editing state, delete all the content, and save the content. When you open the folder next time, you will find a blank space.

Appearance: click "View" on the toolbar of the window to cancel "view by webpage" (this function is not available in Windows Me ). Or you can see it in DOS mode. When restoring, you only need to enter the folder, right-click the folder, select "Custom folder", click "Next", select "delete custom settings check box", and click "Next" until it is complete.

Tip: use NotePad to open the "desktop. ini file (because you cannot see "desktop. ini file, so this method is special. In notepad, select "File> open", locate the folder, and enter "desktop. ini, click "open"), edit it, and set "PersistMoniker = file: // Folder SettingsFolder. change "htt" to "PersistMoniker = file: // path of a known JPG file", for example, PersistMoniker = file: // d: txm1.jpg. Save, refresh, and jump into the eyes of a beautiful beauty map-this may satisfy his curiosity! Then, he will naturally not pay attention to the real things you want to hide.

Appearance: The file is not visible in the folder window, but any program can open the file.

Step 4: tangmen Yirong

Security level:★★★★

Note: In Windows, the Class Identifier is abbreviated as CLSID. It is a 128-bit long symbolic code (16 bytes) consisting of curly braces and digits and letters, it is used to identify objects such as applications, files, and controls, just like an ID card of the file type.

Hide: hidden. Double-click it. Instead of entering the folder, the Media Player is started. The folder seems to have become a sound file, but it prompts that the file cannot be opened. Others will think it is a damaged sound file.
Show up: select the file (in fact, it is a folder, it is really like a file), right-click and select "open.

Tip: In fact, you don't need to remember such a long Class Identifier. When you need to use it, you can open the Registry Editor (Run Regedit) to search for "waveform sound" at any time ", you can quickly find its class identifier. Copy the file and get it done now!
  
When it comes to class identifiers, there is a question:

If you receive an email with an attachment like this: " .txt ", are you sure it is a plain text file? Not necessarily! The Upload File name can be downloaded by the following example: .txt. {3050F4D8-98B5-11CF-BB82-00AA00BDCE0B }". In the registry, this string of characters indicates the association of HTML files. ". If you double-click it and think it will open notepad, but it calls the browser to run it, then only days will know what it is going to do and delete the file? Format the hard disk? All possible! Therefore, do not open attachments of emails at will.

The fifth move

Security level:★★★★★

Hide: Enter "Winfile" in the "run" dialog box and press Enter. At this time, you will find that "File Manager", the product of its original Windows 3.2, is gradually forgotten due to the prevalence of "Resource Manager, but now it is the key-opened. Click the "by file type" menu item in the "View" menu.

In the pop-up "by file type" dialog box, select the "show hidden/system files" check box, and click "OK" to exit. Press F5 to refresh the display, in the directory list on the left of File Manager, you will find an extra hidden directory named "RECYCLED" (which is actually a "recycle bin" folder ), in normal times, we can only see deleted files in "Resource Manager". Other files are not displayed.

We use this to drag the file to be hidden. No matter how you clear the recycle bin, You cannot delete it. It is absolutely safe!

Appearance: Open File Manager and find the "RECYCLED" folder. Select the file to be restored and move it elsewhere!

Tip: Use the inventory file manager to move the file to the recycle station and rename winfile.exefolder in Windows as another example. If someone wants to use the File Manager to snoop on your secret, he may not be able to find it. Haha.

Appearance: you should know! Run "CMDG.

Summary: Will you have all the above five moves? In fact, there is also one of the most amazing moves, that is, the "loop Plan". There is no fixed pattern for this move. For example, you can combine the "Three, four" two moves, it can also be combined with three moves: "three, four, and five". In this way, the security level can be described as "unlimited "! However, we still need to remind everyone not to take it lightly. Everything is fine. Be careful when encountering "out-of-the-world talents" and "dedicated tests. It is best to use professional software to lock the secret to the safe.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.