Though it may seem to be a simple task, neither Windows nor Mac OS X features native utilities specifically designed for password protecting folders. Thankfully, there are a handful of workaround methods for doing so on both operating systems, each of which is relatively simple to understand, quick to implement and freely available to users. One requires third-party encryption software, the other a built-in disk utility, but both will render your folders inaccessible to the average user or snoopy passerby. No batch-script tampering or premium folder-lock utilities are required either. You can use Rights Protected Folder Explorer to create a Rights Protected Folder that protects files in a shared folder so that only authorized users can access the files, regardless of where the container is located. This ensures that the files in the container are protected both in the shared folder as well as wherever the container is copied or moved. Step 4: Remove the original folder — Once the password-protected folder has been created, delete the original folder so it can no longer be accessed. There's no need to have two instances of the same data, especially since the original folder will remain unprotected. Test to make sure the resulting, compressed file is password protected. You may still be able to view file and folder names, but extracting the files will require your users to enter your designated password when prompted. Feel free to breathe a sigh of relief. Rights Protected Folder Explorer provides a solution to this problem by letting you attach a Rights Protected Folder that protects its contents even after it has been removed from the message it was attached to. When you create the Rights Protected Folder, you can choose to protect it with a protection policy that is different from the policy you use to protect the email message itself. That way you can pass protected files to another person (such as the owner of a shared file folder) without making those files available to that person. This is only really good to use if you're just trying to keep curious people out of your stuff. It'll keep most people out of your stuff, but occasionally people might take the time to open up the batch file and get the password, so it isn't suitable for private company documents and the such. In that case you would be better off using a third-party program or an encryption service.
0 Comments
Leave a Reply. |
Details
ArchivesCategories |