Protect my files and encrypt the files with my bare hands.

Source: Internet
Author: User
Usually there are some privacy files on the computer need to encrypt or hide, whether using encryption tool or EFS, once encountered password loss, or file corruption, important data will be difficult to recover, the consequences of unimaginable. If you can achieve the purpose of encryption without using other assistive software and only by setting a few tricks, that would be nice. Here are a few simple ways to encrypt: Path delimited folder encryption encryption: Everyone knows that in Windows either a "\" or a two "\" symbol represents a delimited symbol of the path. , such as "C:\WINDOWS\System." EXE "means system in the Windows folder in the C partition. EXE file, if the file name contains a "\" symbol, will be the file name into the "\" before the directory section and "\" After the File name section, Windows can not open the file containing "\", will prompt an error. If you want to create "S\" in "explorer" or "My Computer," Windows prompts you that the "\" symbol is not the name of the file or folder. However, this type of file name is valid under Windows command line. To test this conclusion, we can create a test directory under D: "Start/Run", enter "cmd" into the command line, the specific verification process is as follows: C:\>d: (enter D disk) D:\>CD test (enter test directory) D:\TEST>MD S. \ (The representative set up the S. Directory under test, the system did not complain, successfully created the S. folder, but in the "explorer" and "My Computer" open this folder will be an error.) To verify that this folder is working properly, we can then copy a file 123.log to the test folder) D:\test>copy 123.log S. \ (prompted to copy 1 files, indicating successful file replication) through the steps above we successfully hid a folder S. \ and copy a file 123.log into this folder, no matter how you set up using "Explorer" and "My Computer" it is impossible to open this folder to see the files inside. Tip: If you create a folder, we create a folder named "s. \a ", you can make the folder completely hidden, cannot be seen anywhere. Decryption: Because we can not open the folder directly, also can not see the content inside, in order to use, we could copy the contents of the inside. The specific operation is: C:\>d: (enter D disk) D:\>CD test (enter the test directory) d:\test>copy S. \a\123.log (123.log Copy to the current directory, you can use) in order to facilitate the use of this method, you may improve the specific steps as follows: C:\>d: (enter D disk) D:\>CD test (enterTest directory) D:\TEST>MD S. \ (create S. directory under Text) D:\MD s (set up S directory under text) D:\test>copy 123.log S. \ (copy 123.log to S. \ cannot open s at this time. \) Set up a batch jiami.bat placed in the text directory, the contents are as follows: copys\*s.\*del/qs\* to create a jiemi.bat placed in the test directory, as follows: copys.\*s\* operation, Copy the files to be encrypted to the S directory, run Jiami.bat, you can confidential all files, to use when running Jiemi.bat can be in the S directory to restore all files. DOS Command binding Class table recognition Hyphen Decryption folder encryption: Now the operating system is more and more large, the computer program does not have tens of thousands, even if the folder is also multilayer, usually accidentally forgot where to put the file, find it is also quite troublesome, if we can encrypt the folder in turn to copy transferred to a multi-level directory, Can play a certain protective role, the specific steps are as follows: in D: Set up a test directory, in the test directory to create a JM directory, and then establish a batch file Jiami2.bat, the contents are as follows: xcopy/y/s/ijmc:\winnt\ System32\jmdel/qjm\. Pause files that need to be encrypted are copied to the D:\TEST\JM directory, executing Jiami2.bat, and files are hidden under C:\WINNT\system32, because C:\Winnt and C:\Winnt\System32 are system folders, Ordinary people do not dare to open, played a certain role in encryption. Decryption: To be used, the batch jiemi2.bat can be used to implement the following: Xcopy/y/s/ic:\winnt\system32\jmjmpause This encryption method does not hide the folder itself, if someone accidentally opens your c:\winnt\ System32, you may find your secret, how can you do it without being recognized by others? Using Class table identifiers is a good idea, when a folder name contains class table identifiers, the folder appears as the file type diagram for that class of table identifier and opens the folder using the appropriate association program. We can create a new folder on our desktop named S.wav. {00020c01-0000-0000-c000-000000000046}, after we find out what we see is a s.wav wav file, double-click, then start the Media Player prompt file format error. If we put the folder that needs to be encrypted as a WAV file, then someone else wants to getGetting our confidential documents is even harder. This gives the contents of the cryptographic batch jiami3.bat: xcopy/y/s/i JM C:winnt\jm.wav. {00020c01-0000-0000-c000-000000000046} Del/qjm\. Pause decrypt the contents of the batch Jiemi3.bat: xcopy/y/s/i C:\winnt\jm.wav. {00020c01-0000-0000-c000-000000000046} Jmpause described above are two ways to hide folders, if you want to hide a file, it is more simple, change the file name, a deeper directory, to make a self-extracting process, and so on, there are many kinds of methods. Responsible Editor Zhao Zhaoyi#51cto.com TEL: (010) 68476636-8001 to force (0 Votes) Tempted (0 Votes) nonsense (0 Votes) Professional (0 Votes) The title of the party (0 Votes) passed (0 Votes) Text: Protect my files to encrypt the file back to the network security home
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.