Skip to main content

How to Password Protect your Files and Folders

folder password
Do you have files and folders on your computer that you absolutely don’t want anyone else to see? Or do you even carry important documents on those easy-to-misplace USB drives?
If the answer is yes, you should definitely download a copy of SafeHouse Explorer – it’s a free and incredibly easy-to-use file encryption utility that will hide all your private files from prying eyes in few easy steps. You may use the tool to password protect files that are residing on your computer’s internal hard disk or even on external USB drives.

Tutorial: Encrypt and Password Protect your Files and Folders

SafeHouse Explorer, in simple English, works something like this. It creates a hidden storage area on your disk to hold all the files that you want to protect. These files and folders are hidden from normal view and will only become visible when you enter the correct password.
Here’s a more detailed tutorial on how you can protect your files with SafeHouse Explorer.
Step 1: Download and install SafeHouse Explorer to your hard-drive.
1a. Install 1b. Downloading Installer 1c. Installing Files on PC
The software works with XP, Vista and Windows 7 (both 32 and 64-bit editions). It is also portable so you may run it directly without installation.
Step 2: Once the installation is complete, click the “New Volume” button to create your hidden storage that will house your various files and folders.
You may either create one large volume to store all the “private” files or you can create multiple smaller-size volumes each corresponding to the type of files that they’ll store. For instance, you may have one volume for storing confidential documents and spreadsheets while another one could be for hiding those “personal” pictures and so on.
2a. Location 2b. Size 2c. Password 2d. Volume Created
For step 2b, choose a volume size based on the size of the folders that you’ll be storing inside that volume. The “Pre-initialize Volume with Random Data” basically means that your virtual drive will be filled with random data if there aren’t enough files to fill complete that volume. Use the default “on” setting.
Step 3. Now that your volume is created, open Windows Explorer (Win+E) and you’ll see a new “virtual drive” under My Computer. Just drag and drop any of your folders and files into this virtual drive and they’ll instantly get protected using encryption.
Once you have added all the files to the “protected” volume, make sure you delete them from the original location as the original copy is unencrypted and therefore anyone can open it without requiring a password.
Step 4. Switch to SafeHouse Explorer and choose File –> Close Volume to lock up the files. Congratulations. You have successfully created your first encrypted and password-protected folder on your computer that you can only access after typing the correct password.
access protected files
To access your protected files, simply navigate to the folder that houses your SafeHouse volumes and double-click the corresponding volume file to open it. Type the password and you should see all the files and folders under a virtual drive in Windows Explorer again.
Encryption is obviously a complex subject for most of us but what you’ll really like about SafeHouse Explorer is that it hides all the technical details from the end user.

Encrypt your USB Flash Drive and Email Attachments

The tool will also be extremely handy for people who carry around important and confidential files on USB drives and external hard disks.
Instead of copying files and folders to your external disk directly, first encrypt these files on the hard-drive (as explained above) and then copy the encrypted volume (the .sksk file) to your external disk. Now even if the drive gets misplaced, the finder won’t be able to read any of your files and, since the software uses 256-bit encryption, it will be nearly impossible for anyone to crack your password.
Similarly, you can add an extra layer of protection to your sensitive email attachments with SafeHouse. Encrypt the files, send them as email attachments and communicate the password to the recipient over another medium (like phone).

Comments

Popular posts from this blog

Email On Deck: A disposable email address that works

Today, Team Inforpioneer brings an interesting Email service for our reader which will definitely help our readers to improve their internet security and will benefit in some other ways.  Here is a short description of this service.  EmailOnDeck.com is the premier site for all things relating to temporary, disposable and throwaway email addresses. We want to help you avoid SPAM, protect your online privacy, and stop you from having to give away your personal email address to every company and person on the internet who insists on you giving it to them. We work hard and will continue to work hard to give you a disposable email address that works with any site or app. We hope to help give you back the control of deciding who you want to give your personal info to. Temporary emails are perfect for any transaction where you want to improve your online privacy. Use them when you buy or sell Bitcoins or trade cryptocurrency, at exchanges, or locally. They can be used for QA tes...

A Brief History of 9 Popular Blogging Platforms

E ven though Microsoft’s spell check insists that “blog” and “blogger” are not real words, they’ve been been in the dictionary since 2003 . Blogs and their platforms have a lengthy history. The beginnings of blogging was a time not unlike today: Plaid was in style, a beloved rock star had passed, and the Internet was just gaining momentum on college campuses. In 1994, then Swarthmore College student Justin Hall started an online diary called Justin’s Links from the Underground . The site, which first started as a guide to the web, soon became an account of Hall’s life, and earned him the surely coveted title of pioneer blogger. Three years later, Jorn Barger would coin the term “weblog,” and it’s short form, “blog,” was later coined by Peter Merholz. Today, the web is comprised of millions of blogs covering every topic imaginable. Here is short history of some of the medium’s most popular platforms. 1. Open Diary Founded in 1998 by Bruce Ableson, Open Diary was the first website that ...

SEO Optimizing A Website For Improved Value

SEO or search engine optimization is something that every web owner and creator should be aware of. Even if a website owner hires an expert to carry out the online marketing, understanding the very basics and how it really can improve a websites performance and popularity is important. Simply put, optimizing a website is important and is built around keywords that are valuable to a website and to the products or services it is trying to provide. By focusing on main keywords or key phrases for a business, and expanding on them over time, can improve the amount of visitors a website receives, in turn increasing profits or simply improving its popularity if it is an information website. SEO is valuable, and means a way of making a site appear at a higher ranking in search engines such as Google, Yahoo, AOL etc. Using this important type of online marketing can reap great benefits. It takes time to learn and time to complete, and is a constant job to keep a website performing well above co...