Password Protection With Ht access

You can first download a Folder locking software like folder lock(free version), install it on your PC, Lock the desired files on HDD, Protected Folder then copy the setup to your HDD. If the other PC doesn't have the software installed, you may run it directly from HDD itself.

Folder Lock is well built, flexible application that offers more than just locking down folders. You also have the option to create virtual encrypted Wallets, for storing data such as addresses and bank information. You can also back up all of your encrypted data to the cloud. Folder Lock's configuration settings are comprehensive and password protected for extra security.

While the steps below will guide you in creating a hidden and password protected folder, this method is not 100% secure. It will deter the average computer user enough, but an advanced user will be able to access the contents of this folder. If you want to create a truly secure and encrypted place to store files and folders that absolutely nobody will ever be able to access, see the tutorial How to Securely Store Files in Windows (which includes installing software, but it's completely free).

With a readable and writable encrypted disk image, you can treat it as a normal folder and copy, delete, or move files from the image. Anything brought into the image while mounted will become encrypted automatically under the same protective layer with the same password. When you are finished working with the folder and want it password protected again, simply unmount the disk image. Regaining access again will require the password before it can be mounted and available.

Depending on how sensitive the material is, you can pursue a couple of different tiers of protection. Locking a folder is a simple barrier that puts a basic level of protection on your files, but encrypting the folder 5 Effective Tools to Encrypt Your Secret Files 5 Effective Tools to Encrypt Your Secret Files We need to pay closer attention than ever before towards encryption tools and anything designed to protect our privacy. With the right tools, keeping our data safe is easy. Read More is much better if you really want to keep it private — this process uses a cipher to make the data contained within completely unreadable, so it can't be circumvented as easily.