Protect important documents without encryption software
Computers & Technology → Technology
- Author Johnson Lisele
- Published August 27, 2014
- Word count 483
There are some confidential documents more or less in person's computer hard drive. In order to be safe, some people use encryption software to encrypt these files. In fact, needn’t so trouble, it can play the same effect if we hidden the partition which stored these files to prevent other people to visit them.
How to hidden partition? Just follow the steps:
Click "Start" – "Control Panel" – "Performance and Maintenance" – "Administrative Tools" – "Computer Management", then found "a storage disk management" entry in the list on the left. All hard disks Usages will be listed on the right window. Right-click the partition you want to hide then select "Change Drive Letter and Paths" in shortcut menu. At last, click the "Delete" button in Pop-up window and click "Yes" button in the pop-up confirmation dialog box,.
Now, the partition is disappeared in "My Computer". You can’t open the disk even if you type the name of the drive or partition in the address bar or the command prompt.
How to restore the hidden partition when we want to visit it? Steps are here:
If you want to restore the hidden partition, you can "Start" – "Control Panel" – "Performance and Maintenance" – "Administrative Tools" – "Computer Management" at first, and then click the hidden partition in Disk Management window. Next, select "Change Drive Letter and Paths "in Pop-up shortcut menu and then click "Add" button in the pop-up dialog box. At last, select symbol of the hidden disk in "assign the following partition" drop-down list. That’s all. You can see and visit the hidden partition now.
Although the method above achieve to hidden partition, it is too trouble because we need to change hidden partition every time when we want to visit to the district. We can use the following method to solve this problem: After deleting the partition, right-click the deleted partition, then select "Change Drive Letter and Paths" and click the "Add" button. Next, click" mount in the following empty NTFS folder " in "Add drive Letter and path " window, and then click" Browse "button to select a blank folder, and finally click" OK "button, so that you can open the folder to access the hidden partition later.
Tips: The blank folder selected must be created in the NTFS file system and don’t be stored in a visible location.
Before reinstall the system, please remember to restore the hidden partition.
Finally: This method is only "hidden", not "encryption", so there is no password. That’ means, most persons does not know to get it out, but it doesn’t safe for computer technicians because it wasn’t encrypt at all in fact.
If you feel this method is not only too trouble or complex but also can’t really encrypt files you want to be encrypted, recommend you to use folder protector software, such lockdir, 7-zip or other folder encryption software to protect your important files.
I am a technical writer from kakasoft. I aways care about data safety issues like encryption program for windows or perfect keylogger for mac . Welcome to change views with me.
Article source: https://articlebiz.comRate article
Article comments
There are no posted comments.
Related articles
- CNC Milling In The Prototype-To-Production Process: How It Speeds Up Product Development
- Agency OSINT: Intelligence & Interception Use Cases
- From Prototype To Mass Production: A Step‑By‑Step Guide For Launching Plastic Parts Via Injection Moulding
- Cognitive Fingerprinting - Pioneering a New Era in AI with Precision Cognition, Psychology, and Complementarity
- Why Businesses Need DevOps Services and Solutions for Faster Innovation
- SOC 2 and GRC Compliance: Why They Matter for Modern Businesses
- Why Hiring a Vancouver Software Developer Can Boost Your Business
- How an AI Receptionist Is Shaping the Modern Client Experience
- Top Benefits of Offshore Outsourcing Services for Growing Businesses
- The Real Risk of Tokenized Assets: Legal Black Holes
- Why the Best Colocation in Israel Could Save Your Infrastructure – 10 Questions Every IT Leader Should Ask.
- Choosing the Right Generative AI Solution for Your Business — Calance
- Top CRM Tools to Manage and Track Solar Appointments Efficiently
- Influence of People Counting in Optimizing Staff Scheduling and Preventing Lost Sales
- Digital Silence: Creative Uses of Invisible Characters in Everyday Online Life
- 8 Challenges in B2B Logistics and How Moovick Solves Them
- Fix 'OLM File Not Opening' Error in Windows – Complete Guide
- Expert Managed IT Support in Washington, DC for Modern Businesses
- Why Outsourced HR Payroll Services Are a Game-Changer for Growing Businesses — Ignite HCM
- Why Modern Businesses Need Performance Management Software to Stay Competitive
- 5 Steps to Creating an Effective Payroll Contingency Plan – Ignite HCM
- Why Payroll Consulting Services Are a Smart Investment for Growing Businesses — Ignite HCM
- Free Test Management Tools: Top Picks for QA 2025
- Prompt Engineering in Salesforce: How to Optimize Prompts for Einstein GPT
- Vancouver E-Commerce Alert: The Top Tech Trends from ChatGPT to Cainiao
- Mastering Timesheet Approvals for Business Owners: From Bottlenecks to Breakthroughs.
- Top Benefits of Using Competency Management Software in Modern Organizations
- Maximize ROI with Personalized and Automated Lead Nurturing Solutions
- Maximize Sales Funnel Efficiency with Smart Automated Lead Nurturing Systems
- Boost Revenue and Team Efficiency with the Right Sales Enablement Platform Today