Monday, December 27, 2010

Weak current College】 【file encryption of five methods.



Each computer's hard disk will have some inappropriate disclosure of privacy or confidential files, such as personal photos or customer information and things like that. Surfing the Internet, that information can easily be hackers steal and illegal use. The fundamental approach is to encrypt the key file, here are some common encryption method.
1. use of group policy tools to store privacy information for hard disk partition is set to no access. Specific measures: firstly in the start menu, select "run" and enter gpedit.msc, carriage return, open the group policy configuration window. Select the "user configuration"-> "Administrative Templates"-> "Windows Explorer", double-click on the right "from the" my computer "to access the drive", select "enabled", and then in the "select one of the following combinations" drop-down combo box, select the drive you want to limit, click OK.
At this point, if you double-click on trying to open is limited by the drive, an error occurs, prompt * box "this operation due to this computer from being cancelled. Please contact your system administrator. " This makes it possible to prevent most of the hackers and viruses invade your privacy. The vast majority of disk encryption software features are implemented using this trick. This encryption method is more practical, but its disadvantage is that the safety factor is low. Amazing little computer whiz or virus programs are usually know how to modify group policy, they can take the user to set group policy restrictions lifted off. Therefore this kind of encryption does not quite fit on confidential strength requirements higher user. For general users, this encryption method useful.
2. use the settings in the registry, some drive set to hidden. Hide drive method: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer in registry creates a new DWORD value named NoDrives, and it assigned the corresponding value. For example want to hide drive C, is assigned the last decimal 4 (note be sure to assign * the * box is set to decimal 4). If we want to hide the new NoDrives A, B, C three drive, then you only need to be A, B, C drive the corresponding DWORD value added up. Similarly, if we need to hide the D, F, G three drive, then they should be assigned the NoDrives 8 + 32 + 64 = 104. Well, you should understand how to hide the corresponding drive. At present most disk hidden software features are implemented using this trick. Hide the WIndows below after I lost sight of this drive, you do not have to worry about people stealing kui your privacy.
But this is just a can only defend the gentleman, cannot prevent the villain of the encryption method. Because a computer whiz could very well know this technique, a virus, not to mention that virus writers will certainly know this technique. Just make a registry change back the hidden drives it is back. Although encryption strength is low, but if you just deal with your child and other amateurs, this method is sufficient.
3. introduction of encryption on the network and encryption methods of the knowledge-based article has many, already familiar to everyone. But encryption method three relatively few people know. Experts are here to tell you a secret: use Windows with "disk management" of components can also implement hard drive hidden!
Specific steps are as follows: right-click "my computer"-> "management", open the "computer management" in the configuration window. Select the "store"-> "disk management", select the drive you want to hide, right-click to select "change drive letter and paths", and then ** box, select the "delete". Many users here do not dare to select the "delete", afraid of losing the data, in fact here completely worry Windows only removes the drive in kernel space, symbolic links, and does not delete the logical partition. If you want to unhide drives, repeat the above process, choose Select "add".
This method of safety factor and the preceding method almost, because other computer whiz or virus programs can also be the opposite, you hide the drive to get to.
The first three kinds of encryption methods are using the Windows own accompanying functions, encryption strength is low, not suitable for the business needs. The following then describes several absolutely safe encryption method.
4. use WinRAR can absolute security for your data encrypted. We always mention of WinRAR, think of its powerful compression features, in fact, the encryption function similarly WinRAR is very powerful. WinRAR is to encrypt, and one-way encryption is not likely to be cracked. Therefore, if we need to protect privacy, as long as these privacy files compressed into one package, and together with the password, it is absolutely safe. Any hackers and computer whiz could steal your privacy.
Use WinRAR encryption while absolute safety, but encryption is very slow, but each time it is used to decrypt and encrypt, more trouble. Therefore, the encryption method for four applies only to the strength of encryption require a high level of user.
5. the use of commercial grade encryption software for encryption. This encryption method is absolutely safe. This area of representation software PGP and nuclear shield data guardian. These two kinds of software can be found on the Internet free of charge. PGP uses a virtual disk technology, it features a large file simulates a hard drive, read and write to the data flow in the process of encryption and decryption. Nuclear shield Data Guard is directly on the hard disk physical sector is encrypted, you can write-protected hard disk partition, the encrypted hard disk partition, lock hidden USB and cdrom drives, and other powerful features the world's first. These two software technology principle is different, but the security and encryption and decryption speed isYou can make people at ease. Comparison applies to individual and enterprise users.

No comments:

Post a Comment