Preview

Lock Tool

Good Essays
Open Document
Open Document
564 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lock Tool
How to Create a Password Protected Folder without any Extra Software

There are a lot of methods that you can use to create a password protected folder, most of which require the use of some third party software. Using this neat method you can hide your folders with a quick batch script.
It’s important to note that this will not actually conceal your data from somebody that knows what they are doing.
Create Your Password Protected Folder
Before you get started you need to create a folder that will house your password protected folder, this is just an ordinary folder and can be located anywhere and named anything.

Navigate into your newly created folder and create a new Text Document. This can easily be done from the context menu.

Open the document, now paste the following code into the contents of the document: cls @ECHO OFF title Folder Private if EXIST "HTG Locker" goto UNLOCK if NOT EXIST Private goto MDLOCKER :CONFIRM echo Are you sure you want to lock the folder(Y/N) set/p "cho=>" if %cho%==Y goto LOCK if %cho%==y goto LOCK if %cho%==n goto END if %cho%==N goto END echo Invalid choice. goto CONFIRM :LOCK ren Private "HTG Locker" attrib +h +s "HTG Locker" echo Folder locked goto End :UNLOCK echo Enter password to unlock folder set/p "pass=>" if NOT %pass%== PASSWORD_GOES_HERE goto FAIL attrib -h -s "HTG Locker" ren "HTG Locker" Private echo Folder Unlocked successfully goto End :FAIL echo Invalid password goto end :MDLOCKER

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 1 Study Guide

    • 508 Words
    • 3 Pages

    One technique is to restrict access to the password file using standard access control measures. Another technique is to force users to select passwords that are difficult to guess.…

    • 508 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    New project then give a file name as shown in figure 1 and go for next option.…

    • 419 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 6 Lab Report

    • 1088 Words
    • 5 Pages

    1. Create a new user called fileShare with password of p@ssw0rd. Set the account so it does not have to change the password as shown below:…

    • 1088 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Unit 9 Lab 1

    • 334 Words
    • 2 Pages

    5. Once a file has been initially encrypted, file sharing is enabled through a new button in the user interface (UI). A file must be encrypted first and then saved before additional users may be added. After selecting the Advanced Properties of an encrypted file, a user may be added by selecting the Details button. Individual users may add other users from the local machine or from the Active Directory, provided the user has a valid certificate for EFS.…

    • 334 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lockjaw Case Studies

    • 638 Words
    • 3 Pages

    One afternoon I was walking home from my friend's house along the railroad tracks barefoot and suddenly I felt a sharp prickly pain shooting up my leg, I look down and realized I had stepped on a broken piece of glass. When I got home my mother told me I should go get a tetanus immunization in case I had contracted tetanus. I did not know what tetanus is, so then I decided to do some research.…

    • 638 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    access control lists (ACLs) to directories and files within the lab to secure the file and…

    • 521 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    COMP230 Week 4

    • 458 Words
    • 4 Pages

    WScript.Echo "The IP Address in Room " & room & " for computer " & computer & " is " & ipAddress(room-100,computer-1)…

    • 458 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 7 Student

    • 1242 Words
    • 7 Pages

    This lab accompanies Chapter 5 (pp. 163-183 and pp. 196-201) of Starting Out with Programming Logic & Design.…

    • 1242 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    PT1420 Assign1 UNit6

    • 540 Words
    • 2 Pages

    7. Design an If- Then- Else statement ( or a flowchart with a dual alternative deci-sion structure) that displays “ Speed is normal” if the speed variable is within the range of 24 to 56. If speed holds a value outside this range, display “ Speed is abnormal.”…

    • 540 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The way messagebox works is by placing you're response into a location in memory referred to as LASTRESULT. To find out what this is we need to use a compare statement first.…

    • 1165 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    This document entitled « Windows 7 - Create a system repair USB key » from Kioskea (en.kioskea.net) is made…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    □ Secure a location- (see additional information as to how in step two of this toolkit)…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Handling Information

    • 269 Words
    • 2 Pages

    Only read the files in the secure office so they are not visible to people walking by…

    • 269 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Chapter 2

    • 389 Words
    • 2 Pages

    Folder Lock is a fast file-security program that can password-protect, lock, hide and encrypt any number of files, folders, drives, pictures and documents in seconds. Protected files are hidden, undeletable, inaccessible and highly secure. It hides files from kids, friends and co-workers, safeguards them from viruses, trojans, worms and spyware, and even protects them from networked PCs, cable users and hackers.…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Title

    • 1464 Words
    • 6 Pages

    Welcome to SanDisk® SecureAccess™! SanDisk SecureAccess is a fast, simple way to store and protect critical and sensitive files on any SanDisk® USB flash drive. Create a private vault and simply drag-and-drop your valuable files inside. Access to your vault is protected by a personal password, and your files are automatically encrypted – so even if you share your SanDisk USB flash drive or it becomes lost or stolen, access to your files are safe. SanDisk SecureAccess software also provides you the added protection of secure online backup with Dmailer Online (*Up to 2GB; registration required. Terms and conditions apply.) When it comes to protecting your private files, you can trust SanDisk®! Supported Operating Systems:  Windows® XP (Service Pack 2 is recommended)  Windows Vista®  Windows® 7  Mac OS® X v10.5+ Required Hardware:  Available USB port  SanDisk USB flash drive…

    • 1464 Words
    • 6 Pages
    Good Essays

Related Topics