Skip to main content

How to Password Protect your Files and Folders

folder password
Do you have files and folders on your computer that you absolutely don’t want anyone else to see? Or do you even carry important documents on those easy-to-misplace USB drives?
If the answer is yes, you should definitely download a copy of SafeHouse Explorer – it’s a free and incredibly easy-to-use file encryption utility that will hide all your private files from prying eyes in few easy steps. You may use the tool to password protect files that are residing on your computer’s internal hard disk or even on external USB drives.

Tutorial: Encrypt and Password Protect your Files and Folders

SafeHouse Explorer, in simple English, works something like this. It creates a hidden storage area on your disk to hold all the files that you want to protect. These files and folders are hidden from normal view and will only become visible when you enter the correct password.
Here’s a more detailed tutorial on how you can protect your files with SafeHouse Explorer.
Step 1: Download and install SafeHouse Explorer to your hard-drive.
1a. Install 1b. Downloading Installer 1c. Installing Files on PC
The software works with XP, Vista and Windows 7 (both 32 and 64-bit editions). It is also portable so you may run it directly without installation.
Step 2: Once the installation is complete, click the “New Volume” button to create your hidden storage that will house your various files and folders.
You may either create one large volume to store all the “private” files or you can create multiple smaller-size volumes each corresponding to the type of files that they’ll store. For instance, you may have one volume for storing confidential documents and spreadsheets while another one could be for hiding those “personal” pictures and so on.
2a. Location 2b. Size 2c. Password 2d. Volume Created
For step 2b, choose a volume size based on the size of the folders that you’ll be storing inside that volume. The “Pre-initialize Volume with Random Data” basically means that your virtual drive will be filled with random data if there aren’t enough files to fill complete that volume. Use the default “on” setting.
Step 3. Now that your volume is created, open Windows Explorer (Win+E) and you’ll see a new “virtual drive” under My Computer. Just drag and drop any of your folders and files into this virtual drive and they’ll instantly get protected using encryption.
Once you have added all the files to the “protected” volume, make sure you delete them from the original location as the original copy is unencrypted and therefore anyone can open it without requiring a password.
Step 4. Switch to SafeHouse Explorer and choose File –> Close Volume to lock up the files. Congratulations. You have successfully created your first encrypted and password-protected folder on your computer that you can only access after typing the correct password.
access protected files
To access your protected files, simply navigate to the folder that houses your SafeHouse volumes and double-click the corresponding volume file to open it. Type the password and you should see all the files and folders under a virtual drive in Windows Explorer again.
Encryption is obviously a complex subject for most of us but what you’ll really like about SafeHouse Explorer is that it hides all the technical details from the end user.

Encrypt your USB Flash Drive and Email Attachments

The tool will also be extremely handy for people who carry around important and confidential files on USB drives and external hard disks.
Instead of copying files and folders to your external disk directly, first encrypt these files on the hard-drive (as explained above) and then copy the encrypted volume (the .sksk file) to your external disk. Now even if the drive gets misplaced, the finder won’t be able to read any of your files and, since the software uses 256-bit encryption, it will be nearly impossible for anyone to crack your password.
Similarly, you can add an extra layer of protection to your sensitive email attachments with SafeHouse. Encrypt the files, send them as email attachments and communicate the password to the recipient over another medium (like phone).

Comments

Popular posts from this blog

Email On Deck: A disposable email address that works

Today, Team Inforpioneer brings an interesting Email service for our reader which will definitely help our readers to improve their internet security and will benefit in some other ways.  Here is a short description of this service.  EmailOnDeck.com is the premier site for all things relating to temporary, disposable and throwaway email addresses. We want to help you avoid SPAM, protect your online privacy, and stop you from having to give away your personal email address to every company and person on the internet who insists on you giving it to them. We work hard and will continue to work hard to give you a disposable email address that works with any site or app. We hope to help give you back the control of deciding who you want to give your personal info to. Temporary emails are perfect for any transaction where you want to improve your online privacy. Use them when you buy or sell Bitcoins or trade cryptocurrency, at exchanges, or locally. They can be used for QA testing of e

Top 101 Ways to Promote a New Blog

Promoting a new blog can be quite daunting, but it doesn’t have to be. As you might expect, breaking down blog promotion into small, actionable tasks eliminates the mental road block you’ve probably experienced when trying to wrap you head around how to get people’s attention. You don’t have to do everything in this list, and some items will have a greater effect then others, but every tactic will at least drive some traffic, and any traffic is better than no traffic. Content 1. Write a list of over 100+ resources or ideas. 2. Write the definitive guide to something. Spend time making this awesome. 3. Release a manifesto . 4. Release 2 manifestos . 5. Interview cool people. People like talking about cool people. 6. After your articles are indexed in search engines, break them up into smaller articles and submit them to ezinearticles.com (and other article directories). 7. Or just pay someone to submit the articles for you . 8. Write a list of all the cool blogs and people in your nich

Cell Phone Buying Guide 2010

I outline some of the most important factors to look into when purchasing a new cell phone. When your old cell phone squeaks like a rusty door hinge, has more lint under the screen than your jean pockets, and lasts half an afternoon with a full charge, it’s time for a new one. But with most cell phone contracts lasting two years, a new phone shouldn’t be the type of purchase you make lightly. Check out our quick and dirty guide to your next phone purchase to make sure you cover all the bases on your shopping trip. Choosing a carrier Because most U.S. cell phone carriers heavily subsidize phone purchases in exchange for two-year contracts, and lock the phones to their networks, your choice of cell carrier will have more impact on which type of phone you end up with than any other factor. If you already have carrier and feel satisfied with it, the choice is easy. If not, you’ll need to choose one. AT&T, T-Mobile, Sprint, and Verizon dominate the cell phone market in the States. Speak