Exclusive Content:

8-year-old boy, sole survivor of bus accident that killed 45 people

At least 45 people died this Thursday on board...

Intel gives us Microsoft Copilot move requirements: an in-depth look

During the event held in Taipei, Intel confirmed the...

Three best ways to protect information on your computer

Today, no one can fool folders by obscuring them as banal or renaming them to something banal and uninteresting like “coursework” or “recipes”. Fortunately, there are several alternative and effective methods.

Access rights

Let’s start with the built-in capabilities of Windows. This method will work for computers whose users have different accounts.

  • Find the folder you want to close from the other person. Right click on it and select “Properties”.
  • Next, select the “Security” menu and under the user list “Change”.
  • If the account you want to hide your information from is not in the users list, add it. To do this, click the “Add” button and enter the name of the account in the subfield. It can be both Latin (English) and Ukrainian letters. After that, click “Check Names” and select the found account. Press OK.
  • Then select the newly added account with one click of the mouse and select the required ones below in the “Permissions” column, in the “Ban” column. “Full access” – If you click the “Prohibit” checkmark, all of the following will automatically change. Confirm the operation with the “OK” button. If Windows asks for clarification, say yes.
  • You will now be able to access the selected folder from your account, but not from any other folder. Note that the folder itself (but not the content) will still be visible.

Third-party programs

Today, developers a large number of programs for Windows of all versions that allow you to easily set a password in a folder, without having to go through the lengthy settings of the operating system. There can be both paid and free versions. Of course, the former will have more advantages and options for settings and less likely to hide malicious code.

We will not give specific names, but we note that search engines easily find dozens of names for the corresponding query.

archivists

However, another method involving the use of third-party programs is somewhat different from the previous one in its disadvantages. We will talk about archivists. For example, creating an archive, The user can create a password in the free WinRAR program.that the system will ask when trying to open or open data.

  • Right-click on the desktop or the folder you want to archive and select “WinRAR Archive” from the “Create” menu. If prompted, specify the name.
  • After that, unzip the archive. The thing is that when you simply transfer files to the archive icon, the program will not ask you to set a password. However, if the window is open and you send the files to the archive with a simple drag and drop method, you can set various options, including a password. The password button is in the lower right corner.
  • Set a password, re-enter it to confirm and click OK. complete

Cons

  • This method is more suitable for storing small volumes of data, because Searching for files in archivers is more difficult than Windows Explorer. Large thumbnail previews are not available here, even for images. Therefore, you will have to open each file individually, either by entering a password (switching with keyboard arrows will not work here) or by opening the data each time.
  • Of course, in this case, you can assign each file its own understandable name, but the following minus should be taken into account: the list of files in the archive appears in the form of icons and filenames.

Source: 24 Tv

Latest

8-year-old boy, sole survivor of bus accident that killed 45 people

At least 45 people died this Thursday on board...

Intel gives us Microsoft Copilot move requirements: an in-depth look

During the event held in Taipei, Intel confirmed the...

Local authorities may be banned from using Telegram

The proposed ban will be implemented if Telegram is...

Newsletter

Don't miss

8-year-old boy, sole survivor of bus accident that killed 45 people

At least 45 people died this Thursday on board...

Intel gives us Microsoft Copilot move requirements: an in-depth look

During the event held in Taipei, Intel confirmed the...

Local authorities may be banned from using Telegram

The proposed ban will be implemented if Telegram is...

10 comments

One of the best things about working...

8-year-old boy, sole survivor of bus accident that killed 45 people

At least 45 people died this Thursday on board the bus that connected Botswana with the South African city of Moria and that he...

We submitted an application to determine the authorship of anonymous Ukrainian texts on the Internet

The Ukrainian Scientific Center for Linguistic Research presented a project to determine the authorship of anonymous Ukrainian texts on the...

Intel gives us Microsoft Copilot move requirements: an in-depth look

During the event held in Taipei, Intel confirmed the key requirements that we need to meet in order to move Microsoft Copilot locally, and...

LEAVE A REPLY

Please enter your comment!
Please enter your name here

pron india eroteenies.info sex mumbai video lupusregina beta hentai hentaifile.com cumflation hentai kolkata local sexy video brostube.info desipapacom rostom padilla teleseryeepisodes.com jared bahay isai mini.com dunato.mobi tamil sex lady hentai isekai hentaiup.net hentai massive tits سكس موظف forzaarab.com افلام سكس نيك في الطيز owl hentai hentaihq.org henita manga marvadi sexi hairyporntrends.com malayalam hidden cam sex pron indian cowporn.info xvedios indian favorite seneka sex photos tubeshere.info odia six vido سكس ياباني محارم pornolodim.net نيك زوجة مصرية www xxxindin verpornos.org xxxxnxx india wap sextoyporntrends.com school fucking videos 3x blue film hindi xxxvideohd.net sex mms vedio