Folder Lock is a fast data encryption and password protection security software for Windows. It can encrypt, lock and password protect your files, folders, drives, USB drives, and even CD/DVD-RW at the same time.
Folder Lock creates encrypted storages known as ‘Lockers’. You can keep a large number of your private files & folders in your Locker and password protect them with a single click. You can positively transfer, secure, and backup these Lockers. These Lockers are portable, in the sense that you can keep them in USB Flash Drives, CD/DVD (R-RW), & notebooks or transfer them via email or upload. Lockers cannot be deleted on the computer where Folder Lock is installed. A single user can create multiple Lockers with different passwords also.
With Folder Lock, you can choose either encrypting with 256-bit AES on-the-fly encryption or locking files, folders and drives anywhere on your computer. Each Locker can contain your encrypted files in addition to your personal list of locked items. Folder Lock’s options like hack attempt monitoring, data shredding, stealth mode, auto protection, and history cleaning can enhance data security beyond anything ever achieved.
In addition, a locker cannot be deleted, moved, and renamed since they are password protected to prevent data loss. Folder Lock is compatible with Windows Vista / 2003 / XP / 2000 and is the most downloaded File Security program in the market today.
5 steps to lock or hide a folder without software:
- To lock: create and save a file as Lock. bat with following content.
- ren .{21EC2020-3AEA-1069-A2DD-08002B30309D}
- To unlock: create another file Unlock. bat with following content.
- ren .{21EC2020-3AEA-1069-A2DD-08002B30309D}
- If you want to lock your folder , just create Lock. bat file and click on it.
- Now the properties of that folder changes.
- If you want to unlock then , just create Unlock. bat file and click on it.
You may also like to read:
Different Types Of Application Software
Should An Organization Go For MS Exchange Server?
Keystroke logging: Types of Keystroke loggers
Advantages of Barcodes In Libraries
Application Of Barcode Technology In Blood Banks
Difference Between RFID and Barcode Technology