Three strokes to make your hard drive data stealth

Source: Internet
Author: User

In the day when we surf the Internet, the computer hard disk has many important or non-public privacy or files, such as private photos or customer information, or anything! You can easily be hacked by hackers to steal your files, to solve this problem is to encrypt the file, I will tell you some easy to operate the small method:

The first method is useful for a typical user, such encryption.

Use the Group Policy tool to set the hard disk partition that holds your private data to inaccessible. How to do this: first select "Run" from the Start menu, enter Gpedit.msc, return, open the Group Policy Configuration window. Select User Configuration, Administrative Templates->windows components, Windows Explorer, double-click Prevent access to drives from my computer on the right, select Enabled, and then in the select one of the following combinations Select the drive you want to limit in the dropdown combo box, click OK. After you have determined that you double-click the drive you are trying to open, an error dialog box will appear, prompting "This operation was canceled due to restrictions on this computer." Please contact your system administrator. This will prevent most hacking programs and viruses from violating your privacy.

The second method is just a kind of encryption method that can only prevent the gentleman, can't prevent the villain. Because a computer whiz probably knows this technique, the virus is not to mention, virus writers certainly know this technique.

Modify the settings in the registry to set a drive to be hidden. The hidden drive method is as follows: Create a new DWORD value in the Hkey_current_usersoftwaremicrosoftwindowscurrentversionpoliciesexplorer of the registry, named NoDrives, and assigns the corresponding value to it. For example, to hide drive C, assign a decimal 4 (note that you must set the value in the Assignment dialog box to 4 in decimal). If our new nodrives wants to hide the A, B, and C three drives, then only the DWORD value corresponding to the A, B, and C drives can be added together. Similarly, if we need to hide the D, F, G three drives, then the nodrives should be assigned a value of 8+32+64=104. How, should understand how to hide the corresponding drive bar. Most of the features of the disk-hiding software are now implemented using this little trick. After you hide it, you can't see the drive under Windows, so you don't have to worry about people spying on your privacy.

The third is a little known secret, using the Windows-based "Disk Management" component can also implement hard disk hiding!

Here are the steps: Right-click My Computer, manage, and open the Computer Management Configuration window. Select storage, Disk Management, select the drive you want to hide, right-click Change drive name and path, and then select Delete in the dialog box that appears.

Most users here dare not choose "Delete", afraid to lose the data, in fact, there is no need to worry about fear, it is not possible to delete a disk without data to try! Because the system tightly delete the path so you can not find it! To restore directly to repeat the above steps to add

The previous three encryption methods are implemented using the features included with Windows itself, which is less powerful and less suitable for business-grade needs. The following is an introduction to some of the absolute security encryption methods.

The Forth is to use software to encrypt, can find many on the net. And this encryption method is absolutely safe. And this encryption method due to the different manufacturers and the principle of encryption is different below a brief introduction of several

With WinRAR, you can securely encrypt your data. Everyone mentions WinRAR, always think of its powerful compression function, in fact, winrar encryption function is also very powerful. WinRAR uses one-way encryption, and one-way encryption is impossible to crack.

Use commercial-grade encryption software for encryption. Online encryption software can be casually Baidu to, such as Enigma Protector is a powerful tool designed to add high-intensity protection to your application

There are also PGP and Nuclear shield data defenders. PGP uses the virtual disk technology, which is characterized by a large file simulation of a hard disk drive, read and write the data stream during the encryption and decryption. Nuclear shield data defender is directly to the hard disk physical sector encryption, can write to protect the hard disk partition, encryption hidden hard disk partition, lock USB and optical drive, such as the world's first powerful features. Although the technical principles of the two software are different, the security and decryption speed can be reassuring, and the comparison is applicable to both individual and enterprise-level users. There are also the encryption levels that require a fee for encrypted house arrest to be absolutely reassuring.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.