1, we open the phone oppo R9 mobile phone with the butler, click "Privacy",-"program encryption" effect as shown below
2, there is an "application encryption" the default is not open, we just open on it, now we take a look at how to open, click to enter can choose their own encryption of the application, if the album encryption, select album Confidential
3, then set up to
1. Under the Standby page, click "Application".
2. Click "Set".
3. Click "More".
4. Click "Security".
5. Click on "Encryption Device".
6. Click on "Encryption Device".
7. Enter the previously set password and click "Continue".
8. Click on "Encryption Device".
9. The phone starts to encrypt, please wait for you.
waiting for the phone
1, D on the phone to open the "Storm audio" software and then click as shown in the "local cache" and then click on it to open;
2, in the local cache interface we click on "My Private Collection", as shown in the picture click Open;
3, the first use need to set the password, set the digital password, click OK;
4, if there is no password we just click "To add local video" to add to encrypt
After completing the above preparations, the following describes how to encrypt the SD card:1. Click application on the standby page ].2. Click set ].3. Move the screen up and select security ].4. Select encrypt external SD card ].5. Check the required items based on your actual needs. Here, select encryption as an example and click continue ].6. Enter the password you set and click next ].7. The system pro
sometimes in order to protect personal privacy, mobile phone numbers need to be treated confidentially.
This can be solved in 2 ways, by entering any formula in the C2 and filling the formula down.
=left (b2,3) "* * *" right (b2,4)
=replace (b2,4,4, "* * *")
Copy the contents of column C to column B and paste it as a value.
The cell phone number in column B is encrypted, and the formula
When you process some files, if you think it is important, you will set a password for the file, just like setting a password for your phone. If you need to view the password, you need to enter the password, in fact, the principles are similar. How can we encrypt a PDF file? Next let's take a look at the small series of operation methods.
1: In the first step, we can create a new folder and add the PDF fil
more secure, here are a few examples
1. Use HTTPS. You can even use HTTPS login, and then redirect to the HTTP page, to ensure that your page load fluency
2. Just use HTTP. The password + timestamp is encrypted and transmitted, the server decrypts, and the login is allowed in the way of timestamp 3s. This also strengthens the security ps:3s is my yy ha
3. Follow the QQ Web version login mode
function getencryption (password, UIn, Vcode, isMd5) { var str1 = Hexchar2bin (isMd5? PASSWORD:M
1. Download let ' s encrypt2. Generate the key, call before you need to stop NginxCertbot certonly--standalone-d www. domain name 1.com-d www. domain name 2.comThe build succeeds with the following promptsIMPORTANT NOTES:-congratulations! Your certificate and chain has been saved at/etc/letsencrypt/live/"Here is your domain name"/FULLCHAIN.PEM. Your cert would expire on "here is the expiry time". To obtain a new or tweaked version of this certificate on the future, simply run Certbot-auto
How to compress files, how to encrypt compressed files, and how to encrypt compressed files
We often encounter File compression and file encryption in our daily lives and work. Sometimes, they simply don't want others to see it; sometimes, they provide downloads but cannot share them, and they are used to get profits. So how to compress a file or a folder? At the same time, how can we
Use ascii to encrypt strings and ascii to encrypt strings
Algorithm: replace the original letter with the fourth letter after the original letter.Plaintext: China ciphertext: Glmre
# Include
1, first right click on the folder to encrypt, select the property options, as shown:
2, click the Advanced button in the Folder option, as shown in the picture:
3, choose the option as shown in the picture:
4. Select hidden option and click OK button, as shown in figure:
A lot of netizens feedback how to encrypt PDF documents? for PDF encryption Small series recommended you use Adobe Acrobat software, you can download online!
The specific encryption method is as follows:
1, open an arbitrary PDF document;
2, select the "Document" menu bar;
3, select "Document" in the "Security" column;
4, and then select "Security" in the "Display the security settings for this document" column
5, this entered the "D
Let's Encrypt to website plus HTTPS full guide 2016A period of time in the Beijing Unicom 3G Mobile network, found that their site was unicom hijacked injected into the disgusting charge of the phone, decided to let my website forced use of HTTPS, avoid ISP hijacking.Some doubts before using HTTPSIt's 2016, and using HTTPS is not as expensive as it was a few years ago. Of course, I also understand a circle
Android uses jni to encrypt and decrypt strings for analysis. androidjni
Analysis of string encryption and decryption using jni in android
Recently, a demand for projects is to encrypt users' sensitive information, such as users' account passwords, mobile phone numbers, and other private information. In java, we can use the AES algorithm to
How to encrypt apple photosnewly bought an iphone, the phone's camera function is very good, but also has the effect of automatic beauty, with very cool. But later found that there are a lot of pictures in the mobile phone, there are some pictures of others, some of the download, people are always private. In particular, we are living in the internet era, people more and more use of the network to convey im
A prefaceThe first thing to clarify is the confusion of names:1 SSL (Secure Socket Layer) is a secure transport protocol designed primarily for the web by Netscape Corporation. This kind of protocol has been widely used on the web.The 2 IETF (www.ietf.org) standardizes SSL, RFC2246, which is called TLS (Transport Layer Security), and technically, the difference between TLS1.0 and SSL3.0 is very small. Since this article does not deal with the small differences between the two, the two names in t
Using let's Encrypt for free SSL Certs with NetscalerIf you haven ' t heard, let's Encrypt (https://letsencrypt.org/) has it free and the open CA service up and running and publ IC Beta.That's means right now, and you can go to get yourself free SSL certificates for any web property that's you own.These SSL certs is cross-signed by identrust, meaning they would be trusted by all major browsers. The premise
Let ' s encrypt as a public and free SSL project is gradually spread and use by the vast number of users, is by Mozilla, Cisco, Akamai, Identrust, eff and other organizations to launch, The main goal is also to promote the Web site from HTTP to https over the process, there are more and more businesses to join and sponsorship support.
The advent of let's encrypt free SSL certificate will also be a blow to t
How to Use DM-Crypt to encrypt a Linux File System?
Readers often ask us how to implement a file system encryption method for Linux. Before discussing this topic in depth, I would like to clarify two points:
First, it is difficult to find enough information on the Internet. So I will introduce you to a few really great resources that are hard to find (actually several tutorials ).
Second, it is important to understand the technical details of this is
How to encrypt configuration files
Address: http://www.cnblogs.com/jfzhu/p/4039216.html
Reprinted please indicate the source
In the web. config or app. config file, we often store some sensitive information, such as connectionStrings or appSettings, such as the following files.
using System;using System.Configuration;namespace WebConfigEncryptTest{ public partial class WebForm1 : System.Web.UI.Page { protected void Page_Load(object send
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.