Introduction:
Creating a encrypted disk is a file hiding tool that can protect your files and privacy. After the encrypted disk is created successfully, a "Ephemeral disk K" will be displayed on the computer. This disk is used to open the encrypted disk, and the operations on this disk are exactly the same as those on normal disks. You can put the file to be hidden in this disk and click "hide secret disk". The disk will disappear and Windows resource manager will not be able to find it anyway, the file cannot be accessed. If you do not want to use the encrypted disk, click "Destroy encrypted disk. In addition, the password is the only way to verify your identity, so be sure to remember! Password is required for all operations in "password control!
Opening a secret disk actually exploits the Windows vulnerability and creates a storage area outside windows Resource Manager, so that Windows Resource Manager cannot access this area at all.
All passwords involved in the encrypted disk are encrypted with original encryption.AlgorithmEncryption with MD5 is very secure.
It is very secure to store files on encrypted disks, so there will be no data loss or damage (many software on the Internet may lose user data due to immature algorithms ).
Tip:
Because it takes up a certain amount of space to open a encrypted disk, it is necessary to bind the disk. If you bind a password disk to your D disk (that is, create a password disk on the d disk), the capacity of the password disk is the capacity of the d disk. The two share the capacity but will not affect each other, they are also invisible to each other. The encrypted disk is independent from the bound disk.
Who can analyze the principles of this encrypted disk? Please contact me!
Software: