Saturday , February 22 2020
Home - Code - How to Protect Folders With Passwords.. ??

How to Protect Folders With Passwords.. ??

Neither Windows or Mac OS X natively support adding a password to your folders. There are still ways to protect your files, however. Follow this guide to get started.

1. Windows XP

  • Create a compressed folder : Right-click on your desktop or whatever location you’d like your folder to be. Select New, then click Compressed (zipped )Folder. This will make a new .zip file that you can add files to as if it were a folder.
  • Move your files : Copy and paste or click and drag your files into the new .zip file. You can move as many files and folders over as you’d like.
  • Add a password : Open the .zip file. Click File, then select Add a Password. Enter a password of your choosing, then enter again to confirm it. You will now need this password every time you access the .zip file.
  • Delete the original : Once the .zip file is created, you will have two copies of your folder: the original and the .zip file. Delete or move your original so that it cannot be accessed.

2. Windows Vista and Later

  • Download and install a third-party compression software : 7-Zip is one of the most popular free options available. This guide will be based on using 7-Zip.
  • Create the compressed file : Select the folder that you want to password protect. Right-click and select 7-Zip from the menu. From the second menu, select “Add to archive…” This will open 7-Zip.
  • Adjust the settings : You can rename the file that will be created. Choose .zip from the “Archive format” menu if you want the folder to be compatible on systems without 7-Zip installed.
  • Add a password : On the right side of the 7-Zip window, there will be two fields to enter and confirm a password for the file. You can also select your form of encryption, and whether or not you want the names of the files encrypted as well. Click OK when you are done.
  • Delete your original : Creating a compressed file will leave you with two copies of your data: the original and the compressed file. Delete or move the original so that it cannot be accessed.

3. Mac OS X

  • Create an encrypted sparse image : To password protect files and folder in Mac OS X, you will be creating an encrypted disc image, which you will mount whenever you want to access the files. You will specify the size that you want the image to be, but it will only occupy as much space on your hard drive as the contents do.
  • Open the Disk Utility tool : You can find this in the Utilities folder which is in the Applications folder. Once the program is running, click File, then select New. Pick Blank Disk Image. A new window will open; choose Sparse Disk Image from the Image Format menu.
  • Choose a size : There will be a list of predetermined sizes that you can choose from, or you can enter your own with Custom. Pick a size that is larger than the size of all the files you are adding, that way you can add more later if you’d like.
  • Choose your encryption : You’ll have a choice between 128-bit or 256-bit. 128-bit AES encryption is very strong, and most users won’t need anything higher than that. Encrypting in 256-bit can take significantly longer.
  • Name the image : This is the name that will appear in your system. Click Create. You will be prompted to enter and confirm a password.
Uncheck the Remember Password option to make sure that the password needs to be entered every time the image is accessed. ]
  • Fill the image : Once you create the image, the file and mounted image will both appear. Add files to the mounted image, then drag it to the trash can to unmount it. When you want to access them again, open the image file. You will be prompted for the password and then the image will be mounted.

” Indian Institute of Code, Networks and Security ( IICNS ) “, industry relevant skills are what we develop. The rigorous training provided at IICNS equips students with Knowledge, Skills and Attitude to succeed. The IICNS Programs are based on inovation and interactive training methodologies derived from one experiences of providing training in corporate world. In effort, at the IICNS, we bring corporate to the classroom.

Why Choose this course ?

Degree type: BS(Hons)
Duration: 3 years (full-time) or 2.6 years (accelerated)

One of the greatest threats to information security could actually come from within your company or organization. Inside ‘ attacks ’ have been noted to be some of the most dangerous since these people are already quite familiar with the infrastructure. It is not
always disgruntled workers and corporate spies who are a threat. Security is to justify the value of a Cyber Security . After all, Cyber Security concerns more than the Information Technology (IT) and BCP/COOP departments.

As the world becomes increasingly interconnected, Business Continuity/COOP professionals must pay more attention to the security of their organization’s connections. It seems like every week there are new headlines about hackers bringing an organization to its knees. The stolen funds, bad publicity, and embarrassing revelations are front page news. How can you protect your organization from these issues? The best protection is to focus will be on u nin formed users who can do harm to your network by visiting websites infected with malware, responding to phishing e-mails, storing their login information in an unsecured location, or even giving out sensitive information over the phone when exposed to social engineering.


About Anant Dubey

Check Also

Why Information Technology is the best field to choose?

12th std the most important thing in our lives when we think of our career, …

%d bloggers like this: