Function GetVolumeInformation Lib "kernel32 "_Alias "GetVolumeInformationA" (ByVal lpRootPathName As String ,_ByVal pVolumeNameBuffer As String, ByVal nVolumeNameSize As Long ,_LpVolumeSerialNumber As Long, lpMaximumComponentLength As Long ,_LpFileSystemFlags As Long, ByVal lpFileSystemNameBuffer As String ,_ByVal nFileSystemNameSize As Long)Private Const MAX_FILENAME_LEN = 256Public Function DriveSerial (ByVal sDrv As String) As Long'Usage:'Dim ds As Long'Ds = DriveSerial ("C ")Dim RetVal As
Http://www.truecrypt.org/docs/
Download:
Http://files.cnblogs.com/wucg/TrueCryptSetup7.1a.zip
Http://www.truecrypt.org/downloads
Introduction
The documentation is not guaranteed to contain no errors and is provided without warranty of any kind. For more information, please see disclause.
Truecrypt is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device ). on-the-fly encryption means that da
In Windows7, the computer has its own tools for the security of mobile HDD, let's take a look at the specific setup steps.
1, the first mobile hard disk or U disk inserted into the USB interface, and then open "My Computer" in My computer can see "Removable Disk", and then click the right mouse button, in the Drop-down menu, we choose to start "BitLocker", as sh
Encryption can be divided into two types, namely, hardware encryption and software encryption.
1: What is the difference between hardware and software encryption
Hardware encryption for keyboard encryption, card-type
Win7 system disk after encryption forgot password how to retrieve?
1, in encryption, we should all use U disk backup encryption key, where the default everyone has backed up the key, the U disk inserted in the computer, now open
U disk and other mobile devices can be used to store files, install the system, but also can be used to make cryptographic dogs. This article refers to the encrypting dog that only pointers to the Windows system boot up the dog. Its role is to avoid others casually open their own computer to view their own private information, in addition to setting personal password, but also through a simple setting so that the computer can only be inserted into the
Because of the lightweight and convenient disk, easy to carry, now more and more people use, but also because it is convenient to carry to our data security brought trouble, imagine, when you leave the computer when others use a U disk to the computer important data are copied, if it is important confidential, this can be a big trouble. Is there any way to allow others to use U
Because of the lightweight USB flash drive, easy to carry, now more and more people use, but also because it is convenient to carry to our data security has brought trouble, imagine, when you leave the computer when others use a U disk to the computer's important information are copied, if it is important confidential, this can be a big trouble. Is there any way to let others use the U-disk when they have t
In the usual work, we often need to backup some important files to the USB drive, generally we will choose to use WinRAR tools such as hand-made the required files into a compressed package, for data security, we usually also encrypt the file, and then move it to the USB drive. Such operations are more complex, in fact, the use of Windows "Send to" menu, you can achieve more efficient encryption compression operations.
Enter SendTo in the Start Run m
= password. After saving and restarting the computer, when you log in to the Grub menu page again, you will not be able to directly use the e command to edit the start tag, you must first use the P command, enter the correct password before you can edit the boot tag. It is not safe to set the plaintext password, and you can modify the Grub boot tag to modify the root password if someone else has the plaintext password. 2, MD5 encryption method: E
control notification Handler code hereunsigned long s1,s2;unsigned char vendor_id[]= "------------";//CPU provider IDCString STR1,STR2,STR3;The following is the assembly language instruction for obtaining the CPU ID_ASM//Get CPU provider Information{XOR Eax,eax//will eax clear 0CPUID//command to get CPUIDmov dword ptr vendor_id,ebxmov dword ptr vendor_id[+4],edxmov dword ptr vendor_id[+8],ecx}Str1. Format ("CPU provider id:%s", vendor_id);_ASM//Get high 32 bits of CPU ID{MOV eax,01hXOR Edx,edxC
How to turn the ordinary U disk into a USB u disk? After the USB disk drive to our data security to bring higher security protection. Here is a simple introduction to the general U disk into an encryption U disk.
1. Here first to
As the computing and storage capabilities of smartphones increase, mobile phones will store more and more private data, and the leakage of such data may cause serious consequences. Mobile phone information security has always been one of our key points. For some important functions, we need to authenticate them before they can be used. However, this can only block novice hackers, and it can only protect against gentlemen and prevent villains, therefore, we hope to encrypt important data before s
The first step: first copy a small volume of JPG and WAV format files to the U disk, and then set the U disk permissions to allow only the current account (LCR) Full Control. Now open Notepad to enter the following and save it as a lock.bat batch, placed in the C: Table of contents.
REM Note: To access the USB disk, please run the desktop "Open u
Name/etc/crypttab-encrypted block device table The fourth field, if present, is a comma-delimited list of options. the following options are recognized: cipher = cipher Specifies the cipher to use; see cryptsetup (8) for possible values and the default value of this option. A cipher with unpredictable IV values, such as aes-cbc-essiv: sha256, is recommended. size = size Specifies the key size in bits; see cryptsetup (8) for possible values and the default value of this option. hash = hash Specif
Fedora16 uses the Anaconda installer. The previous Fedora version can be easily installed on encrypted LVM partitions. If you want to install the system on encrypted non-LVM partitions, Anaconda does not provide automatic options. But it will change from Fedora16. For details about Anaconda, refer to region.
Fedora 16 uses the Anaconda installer. The previous Fedora version can be easily installed on encrypted LVM partitions. If you want to install the system on encrypted non-LVM partitions, An
1, first open the U disk, and then in the U-packing directory under the mouse right click the new text document, and renamed it "Suo.txt";
2, then in the U-disk and then the new Notepad input the following code;
If not exist H:suo.txt shutdown-t 3-s-C "Sorry! The system has been locked and the system will be shut down immediately!"
(where "H" for the U disk co
Write protection has two kinds, one is hardware, is often said to write protection switch, one is software write protection, is through the management tool to protect the files inside the U disk.
Delete method:
1. In DOS, go to the directory where the hidden files are located
Use dir/a to find out the hidden file under DOS name (do not forget the suffix name), and then use attrib this command to remove the relevant properties of the file, attrib us
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.