-
1. If you don't want to use any encryption software, you want to use the functions of the system to encrypt the folder.
Find one on the Internet to run "cmd" in the starter program to encrypt, provided that the disk must be NTFS.
Run – cmd – enter.
Input: New MD drive letter: lpt1 enter (lpt1-lpt9 are acceptable).
Open Double-click to do it.
Remove rd drive letter: LTP1 carriage return.
or New MD Drive: Folder name. Press Enter (two dots after the folder name).
Open the start drive letter: folder name. Enter.
Delete rd drive letter: Folder name. Enter.
2. Use encryption software, I have been using the "Hongjie encryption" software, the next one on the Internet can be, after installing the encryption software, right-click on the file and there will be "Encrypt the file with ***", click on this to encrypt the folder.
Hope it helps.
-
It is recommended that you use the free forever version of Stealth.
Stealth Man privacy folder encryption software is the latest online, it is a privacy encryption tool, can encrypt U disk, computer hard disk, mobile hard disk and other storage information, green without plug-ins. Easy to use and high safety factor. It is the "China Software Innovation and Application Gold Award" (secret disk tool category) and the China Software "Golden Bull Award" (document encryption category).
Support win7 win vista winxp win2000 win2003 win9x operating system. The safety factor is very high, and this product has obtained a number of certifications such as the PLA "Military B" certification (the highest level for civilian use) and the certification of the State Secrets Bureau.
-
Encrypt software with folders.
Folder encryption supermaster.
Very good, you try.
-
In addition, the network behavior control function of Domain Shield is also very powerful, and the management of employees' online behavior norms is very comprehensive, which is suitable for company use.
1.Transparent encryption and decryption.
The system encrypts the corresponding files according to the management policy, and the user access needs to be connected to the server, and the access is restricted by permission, and the unauthorized access will be limited, and more access control can be achieved through sharing, offline and outgoing management.
2.Leak control.
Print, memory steal, drag, and clipboard controls on applications that open encrypted documents, and users cannot actively or passively leak confidential data.
3.Approval management.
Shared, offline, and outgoing documents are supported, and administrators can configure whether to force approval for these operations according to actual work needs. When users perform operations such as sharing, offline, and outgoing encrypted documents, they will be subject to the permission of the administrator and may need to be approved by the approval administrator.
4.Offline document management.
For employees who cannot access the network when they go out, the offline management function of the system can be adopted. This function authorizes a specified user to easily access encrypted data without being connected to the network for a certain period of time, while the corresponding security policies of the user are still in effect, the corresponding data is still controlled, and the file permissions are the same as those used on the Internet.
5.Outgoing document management.
This function is mainly to solve the threat of secondary data leakage, so that the issued documents are still under control. After approving and authorizing the documents to be issued through this function, users can easily access the controlled files without installing an encrypted client, and can control the operation authority and lifecycle of the files.
-
There are 3 ways to encrypt folders on your computer:
1. Use the system's built-in EFS encryption, but this encryption is transparent to the user, you can't see the encryption effect, and it is also very dangerous.
2. Use Winara, a compression software with encryption function, but encryption is slow and troublesome.
3. It is recommended to use professional encryption software-
Folder encryption super master, this encryption software is currently a very mature and secure encryption software in China, there are 5 encryption methods for folders to meet their respective encryption needs.
-
How do I set a password for a folder?
-
The system comes with a hidden, but also encrypted, but this encryption is not so secure, if your information is very important, it is best to use encryption software, high security, please adopt.
-
on Windows
In the operating system, this is not possible.
But if you are using Windows7U
version, you can encrypt the drive.
-
How do I set a password for a folder?
-
How to encrypt folders.
At present, the most used, the best evaluation of encryption software, is Feng Yuanzheng's endorsement of the "stealth man", permanently free, support a variety of win systems, can be in hard disks, mobile hard disks, U disks, ***, etc. to create a confidential space, from regular manufacturers, compared with personal software, more professional and formal. >>>More
Encrypt folders, I use folder encryption super masters, this software is very simple to encrypt folders. >>>More
in your case.
It is recommended. >>>More
You have a firewall, and you can't be controlled.
If it's a hidden file, the upstairs said. >>>More
Common document formats are: txt, doc, xls, ppt, docx, xlsx, pptx, etc. >>>More