Use Windows with its own features to protect secrets from leaks

Source: Internet
Author: User
Tags password protection

Windows comes with the function, in order to facilitate our use, there is automatic recording function, but these features some things also put our "whereabouts" to expose, this time should do? Please look at the eight ways that this article introduces you, so that you can use the computer without trace.

1. Delete Files completely at once

First, you should remove files from the system that you think are definitely unused, and here we are referring to all of the junk files you dropped to the Recycle Bin. Of course, we can also empty the Recycle Bin when we think of it (double-click the Recycle Bin icon, select the File menu, and select the "Empty Recycle Bin (B)" command), but a better way is to turn off the Recycle Bin feature. To completely delete a file at once, right-click the Recycle Bin icon, select Properties, and then go to the Global tab, select all drives with the same setting (U), and delete the check box by deleting (R) without moving files to the Recycle Bin.

This step does not allow files that have been deleted to continue to lurk in the Recycle Bin.

2. Do not leave any traces of deleted documents

Even if prying people can't browse the contents of the document directly, they can learn about your work by viewing what files you have recently used in Microsoft Word or Excel's File menu. This temporary list even lists the files that you have recently deleted, so it's a good idea to turn off the feature. In Word or Excel, choose the Tools menu, select the Options menu item, and then go to the General tab, and in general Options, remove the check mark for the checkbox before the list of recently used files (R).

This step is to eliminate the traces left by the most recently deleted files, and to do this, clear the list of files from the File menu in Word, Excel, and other commonly used applications.

3. Hide Document Contents

You should hide the traces of the document that we are currently using. Open the Start menu and select the Document menu item, which lists about 15 files you have recently used. This makes it easy for others to browse through your work files or personal files without even having to search your hard disk. To hide your work, you should empty the list. To do this, you can click the Settings menu item on the Start menu, and then select Taskbar and Start menu, go to Taskbar and Start menu, select the Advanced tab, and click the Clear (C) button in the tab.

In this step, in the Windows Start menu, clear the files contained in the document menu item and hide the files.

4. Elimination of temporary files

Microsoft Word and other applications typically temporarily save your work to prevent accidental damage. Even if you do not save the file you are working on, many programs will also save text that has been deleted, moved, and copied by you. You should periodically remove temporary files stored in the Windowstemp folder by various applications to clear these fragmented text. You should also delete all of the corresponding files in its subdirectories, such as the fax and wordxx directories. Although many files have the extension TMP, they are actually complete doc files, HTML files, and even image files.

This step is to clear the temporary and unwanted files on your hard disk.

5. Protection of important documents

Password protection for important files, which is easy to implement in Word and Excel. Select File, click Save As, and then select General Options in Tools, and enter a password in the password to open and modify password, preferably by not using real words and dates as passwords, and by mixing letters, numbers, and punctuation, so that passwords are difficult to decipher. Of course, every time you open and modify a document, you must enter a password.

This step can add a lock to our important file.

6. Overwrite Web page access history

Browsers are another part of the protection that needs to be protected. Most users now use Internet Explorer as a browser for the Internet because they have installed Microsoft's Windows system. Internet Explorer lists all the objects that you have visited, including the pages you have browsed, the queries you have made, and the data that you have entered. Internet Explorer keeps Web Access history in a weekly or web-site-divided folder. We can delete individual addresses (URLs) individually, but the quickest way is to delete the entire folder. To clear all history, select Internet Options on the Tools menu, and then select the General tab, and click the Purge History button.

This step is to clear the history of the browser.

7. Enter the URL but not be recorded

Internet Explorer records each URL you enter in the browser, and you might as well verify: Enter a URL in the address window below the toolbar, and the browser will record the address in the Drop-down menu until another item replaces it. You can access the Web site in the following ways, and the URLs you use will not be recorded: You can press the Ctrl-o key in the browser, and then enter the URL address in the dialog box.

This step allows you to keep visited URLs from being logged.

8. Clear the information in the cache

Internet Explorer caches the pages you have recently visited on your hard disk. When you visit these pages again, caching information can speed up access to the web, but it also opens up your secrets to prying eyes. To clear the information in the cache, in Internet Explorer, select Internet Options on the Tools menu, and then go to the General tab and click the Delete File button.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.