Several practical methods for file encryption

Source: Internet
Author: User

1. Hide the folder to be encrypted
 
 
1.1 right-click the folder to be hidden (it is better to rename it a name you can remember), select "properties", select "hide", and "Hide only this file or folder ", OK.
 
 
1.2 open tools, folder options, and view in the menu bar ".
 
 
1.3 click "do not show hidden files and folders" in "Advanced Settings" and click "OK.
 
 
The content you want to hide is invisible. When you want to use it, you only need to enter the name of the folder in the address bar and it will jump out. For example, you have hidden the 123 folder under drive E. When you want to view it, you only need to open drive E and then E: \ and then enter 123.
 
 
2. Create a blank folder
 
 
To create a folder, you must rename it. If you do not rename it, the system will also give it the default name "create folder"
 
 
So how to create a folder named blank? Don't worry, if you just enter a space during the rename, it will be totally ineffective-the result is still the default name of the system. Let me teach you a little trick: press ALT and enter 0160 on the keyboard to relax. You can get a blank character. This is a blank folder!
 
 
3. Create a readable but inaccessible folder in DOS
 
 
Are there some secrets on your computer that you don't want to be seen? Next I will teach you a way to put it on the desktop without being noticed. In addition, this special folder can protect important materials.
 
 
In Windows, the "\" symbol is the path separator. For example, "C: \ Windows \ System.exe" indicates the System.exe file in the Windows folder of partition C. What if the file name contains the "\" symbol? If "damojinghong \" is the name of a folder, which is located in "F: \", its path is "F: \ damojinghong \". When we try to access it, windows will think that the file we want to open is the "damojinghong" folder under the F partition, rather than the "damojinghong \" folder, so Windows cannot accurately open and change the folder, an error message is returned because the preceding path does not exist.
 
 
Create a directory and bypass it:
 
 
However, we cannot directly create the "damojinghong \" folder in the system, and the system will prompt "the file name cannot contain the '\' symbol". It seems that we have to use other methods to create a "special" folder.
 
 
In the "run" column, run the "CMD" command to open the Command Prompt window and use the md command to create a folder. Now, create a folder named damojinghong in the root directory of drive E as an example.
 
 
Type md E: \ damojinghong \. Note that there are two vertices and a slash. This is the key!
 
 
Now, open the resource manager and you can see that a folder named "damojinghong." is created under drive E. However, this folder cannot be opened or deleted. It cannot be opened because its actual path is "E: \ damojinghong \" (we can determine its actual path because it was created by ourselves), but in the resource manager, the file name is changed to "damojinghong. when trying to open it, the system actually tries to open "E: \ damojinghong. \ ", which cannot be opened. The system considers that the folder does not exist, so an error is reported. The reason is that the folder cannot be deleted. Since such folders will not be deleted in Windows, you can safely save hacking tools or important files. These folders cannot be opened in the resource manager, but can be opened in the "run" column, provided that the real path of the folder is known. For example, you can open this folder by typing "E: \ damojinghong \" in the "run" column and pressing the Enter key.
 
 
Finally, let's talk about how to delete these folders. In cmd, enter rd E: \ damojinghong \ to delete the file.
 
 
As you can see, many friends may find that creating such a folder can not only be deleted by mistake, but also store some important data to achieve the effect of alternative encryption, ordinary people cannot solve this secret.
 
 
4 folder disguise
 
 
There is a more secure and completely risk-free way to protect privacy than encrypted files, which is disguised as folders. Folder disguise is to convert a private folder icon into an icon for any other files (such as rar and mp3). When you double-click this folder, the disguised fake file is opened; for example, what others see is an mp3 file. When double-clicking the icon, an mp3 file is opened, but it is actually a folder. What others see is just an illusion, this method completely hides privacy. If someone else cannot find your privacy, they will not be able to crack it.
5. Recycle Bin Encryption
 
 
The system's built-in recycle bin can also meet normal encryption requirements.
 
 
For example, to encrypt the C: \ Date folder, you only need to select the Date folder and press the F2 key to rename the folder, and then add ". {645FF040-5081-101B-9F08-00AA002F954E} "(excluding quotation marks, the preceding point cannot be missed). In this way, the changed folder icon becomes the recycle bin icon. Double-click to open the folder. The content of the recycle bin is displayed. The content originally saved in the Date folder is gone.
 
 
To restore the encrypted folder content, you only need to ". {645FF040-5081-101B-9F08-00AA002F954E} "delete to display properly. But remember that this method is dangerous, as long as the recycle bin data is cleared.
 
 
6. Compress with compression software
 
 
Right-click folder> Add to compressed file> advanced> set the password!
 
 
7. Use administrator privileges to manage files and folders
 
 
When others use your computer, they log on with a guest or ordinary user account. If you manage your computer as an administrator, set the permissions of other users as follows:
 
 
7.1 The partition format of your computer must be NTFS.
 
 
7.2 open the disk or folder you want to set. In the menu "Tools", "Folder Options", and "View", remove the check box before "use simple folder sharing (recommended, OK
 
 
7.3 right-click the target disk and choose "properties" and "security ".
 
 
7.4 set "Guest" or "Users" under the group or user name to set the corresponding permissions.
 
 
Hide the folder to be encrypted.
 
 
Then, click the tools-Folder option and change the folder attribute to "do not show hidden files or folders" in the view. Next, call the Group Policy, the specific method is to click Start-run-Enter "gpedit. msc "to enter the Group Policy, and then click User Configuration-management template-WINDOWS Components-WINDOWS Resource Manager, there is a menu named" delete folder option from the tool menu "in it, and then exit, refresh the folder directly. Now, you can take a look and click the tool option. There is no "folder option" in it. Without this option, no one else can modify the properties of your hidden folder, you can change it when you want to watch it.
 
 
8. Port the encrypted folder in Window2000 to XP.
 
 
Encrypt Windows 9x/2000 folders. By encrypting a folder, all files in the folder can be protected. The result is that when you double-click to enter the folder, the system prompts you to enter the password. If the password is correct, it will enter, and the error will be automatically returned to the root directory of the hard disk --- very easy to use!
 
 
8.1 enter the folder you want to encrypt and protect, in the blank space
 
 
Right-click and select "Custom folder ..." Option;
 
 
8.2 click "Next", select "Custom", select "select or edit the Html template for this folder" in the "secondary selection" box, and click "Next ";
 
 
8.3 select "standard" in "select template type", select the "Edit template" option, and click "Next ".
 
 
8.4 find <script language = "JavaScript"> in the pop-up "Folder" file, and enter the following content at the bottom of the file:
 
 
Var pass = prompt ("Enter Password") "Enter Password" as a system prompt
 
 
If (pass! = "123") Replace "123" with your own password {window. location = "c :"}
 
 
8.5 save the "Folder" file and select "complete". The Folder encryption is complete.
 
 
9 use third-party specialized encryption software
 
 
It is good to have special encryption software, but it must be ensured that it is green. Sometimes it is very difficult to download data from the Internet, and the risk is a little high. Of course, the official release is still possible.
 
 
10 Conclusion
 
 
Many of the methods described in this article are for people who are not very familiar with computers. It is not very useful for professional users. In fact, it is best to use a certificate, but it must be backed up, otherwise, the system will be reinstalled. Another point is that you will have unexpected gains by combining various methods.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.