Windows optimization Master Wopti file encryption method

Source: Internet
Author: User
Tags decrypt

Believe that many people in order to make their own important files more secure, will give their own files encryption. To further secure the user's important files, the Windows Optimizer master provided the Wopti file encryption module to the consumer. Wopti file encryption device can encrypt a variety of files to store, not only improve the security of user files and save disk space occupied. Today, Xiao-bian will give you a share of Windows optimization Master Wopti file encryption method.

Encryption Note: For non-executable program files, the file name is stored after encryption: the original filename + '. Womec '. For example, if the file to be encrypted is "sysfile.bmp", the file is "Sysfile.bmp.womec" after encryption, and the filename remains unchanged for the executable file (file with file name extension exe, COM, BAT). It is noteworthy that, whether the execution of the executable or the execution of the program files, encryption can be after the correct password verification, directly open or run. Before you encrypt, the user can set in the Wopti file encryption set option to "delete original files after successful encryption," "Encryption if the password entered when the empty string, then use the first password as a password," "Encryption using Windows Optimization Master compression algorithm compression level" and other items.

Decryption instructions: For encrypted files, the Wopti file encryption device can be decrypted to the original file. It is noteworthy that the encrypted file is decrypted after the file name is stored as the original file name. For example, if the original file is "about writing a report of the calling DLL. doc", the encrypted file is "about writing the call DLL report. Doc.womec", even if the user changes the encrypted file name to "A.doc.womec" and then decrypts the report about writing the calling DLL. doc ". Before decrypting, the user can set the "Decrypt successfully delete encrypted file" item in the setting option of the Wopti file encryption device.

Select the file you want to process. After the user enters the Wopti file cipher, select the folder in the lower left folder where the file is to be processed, and then select the file to be processed in the file list on the lower right and add to the list of files to be processed. You can add it by double-clicking the file in the lower-right file list, or by holding down the CTRL or SHIFT key and dragging it to the list of files you want to work with. Alternatively, you can click the "Browse" button to add the Pending file.

Click "Refresh" to refresh the file list and click "Options" to set the Wopti file encryption settings.

Windows optimization Master Wopti file encryption method

Encryption and decryption operations. If the user has entered an encrypted password, click the Encrypt button to encrypt the pending files that have been added. During encryption, if the Wopti file cipher checks that the file has been encrypted, the user is prompted to skip the file, and click the Decrypt button to decrypt the added pending file , during the decryption process, if the Wopti file cipher checks that the file has not been encrypted, the user is prompted to skip the file.

Windows optimization Master Wopti file encryption method

"Delete original file after successful encryption": Select this to delete the original file in the list of files to be processed in the encryption process if the encryption succeeds.

"When adding/decrypting if the password entered is an empty string, the first password is used as the password": Select this, in the addition/decryption process, if the file is being processed in the list of files do not have a password, the Wopti file encryption in the first item to be added/decrypted file password as an encryption password, so that users can bulk Add/ Decrypt the file.

"Use the compression level of the Windows Optimizer Master compression algorithm when encrypting": Users can set the Wopti file encryption in the encryption process using Windows Optimization Master compression algorithm compression level is: the fastest compression rate (compression speed is the fastest, but the compression rate is small, so compressed files occupy a larger disk space) ; default compression rate (Windows Optimization Master default compression rate, faster, higher compression rate, compressed files occupy less disk space); The maximum compression rate (compression speed is slow, compression rate is the highest, compressed files occupy the smallest disk space).

"Delete encrypted file after decryption is successful": Select this key, in the decryption process, if decryption succeeds will delete the encrypted file in the list of files to be processed.

Click "OK", save "set-normal" settings, click "Cancel", do not save the current settings, return to the Wopti file encryption program.

"Pop-up prompt after operation complete": Select this, in the process of encryption or decryption, each processing completed one, will pop-up prompt information window to the user report the success or failure of the processing results.

Automatically empty the Pending files list after the operation is complete: Select this option to automatically empty the list of files to be processed at the end of the encryption or decryption process.

Check file association on startup: Select this to automatically check the association of encrypted files each time you start the Wopti file encryption device. This option is set up for users to be able to open an encrypted file (Womec file) that is not executed directly, advising the user to choose.

"Double-click Add Pending File": Select this to add a file to the list of files to be processed when you double-click the file in the file list on the bottom right of the mouse.

Click "OK", save "settings-Other" settings, click "Cancel", do not save the current settings, return to the Wopti file encryption program.

Windows optimization Master Wopti file encryption method

Note: For Windows operating system startup Autorun executable files, the dynamic link libraries, font files, and so on that the application will invoke during use should not be encrypted so as not to affect the normal operation of the system and applications.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.