Now, a lot of times, we all need some security software to protect our computers. Many users are asking, Tencent computer Butler How to use the created safe? Today, Xiao Bian will come to share with you Tencent computer Butler using the created safe method.
After the new click on the "open safe" or in the main program in the safe click on "Open" password verification will pop up similar to the Resource manager interface, this is the safe, you can operate as ordinary documents will need to put the file into the safe in the box by cutting/copying into the safe.
Tencent Computer Butler uses the created safe method
Tencent Computer Butler uses the created safe method
Close the Explorer interface without closing the safe, you can close the safe in the main interface of the file safe, or right click the icon of the tray area safe to exit the entire safe procedure.
Tencent Computer Butler uses the created safe method
Tencent Computer Butler uses the created safe method
The
can also be renamed to the safe, modify the location, modify the password, and so on, while opening a number of safe to click "View" can see the current safe information. "Remove safe" will also delete the files stored in the safe.