The better to encrypt files. How to encrypt and hide a hard disk partition using CyberSafe

The privacy and security requirements of a computer are entirely determined by the nature of the data stored on it. It is one thing if your computer serves as an entertainment station and, apart from a few toys and a daddy with photos of your favorite cat, there is nothing on it, and it is quite another thing if there is data on the hard disk that is a trade secret, potentially of interest to competitors.

The first "line of defense" is the login password, which is requested every time the computer is turned on.

The next step of protection is file system permissions. A user without permissive privileges will get an error when trying to access files.

However, the described methods have one extremely significant drawback. They both work at the operating system level and can be relatively easily circumvented if you have a little time and physical access to the computer (for example, by booting from a USB flash drive, you can reset the administrative password or change file permissions). Full confidence in the security and confidentiality of data can be obtained only if you use the achievements of cryptography and reliably them. Below we will consider two methods of such protection.

The first method we are considering today will be Microsoft's built-in encryption. The encryption, called BitLocker, first appeared in Windows 8. It will not work to secure a separate folder or file with it, only encryption of the entire drive is available. This, in particular, implies the fact that it is impossible to encrypt the system disk (the system will not be able to boot), it is also impossible to store important data in system libraries such as "My Documents" (by default they are located on the system partition).
To enable built-in encryption, do the following:

  1. Open File Explorer, right click on the encrypted drive and select "Enable BitLocker".
  2. Check the "Use a password to unlock the disk" box, create and enter a password that meets the security requirements (at least 8 characters long, lowercase and uppercase letters, preferably at least one special $ character) and press the Next button. We will not consider the second unlocking option within the framework of this article, since smartcard readers are quite rare and are used in organizations that have their own information security service.
  3. In case the password is lost, the system offers to create a special recovery key. It can be attached to account Microsoft, save to file, or just print to a printer. Choose one of the methods and after saving the key, click "Next". This key should be protected from strangers because it, as insurance against your forgetfulness, can become a "back door" through which your data will leak.
  4. On the next screen, choose whether you want to encrypt the entire drive or just the occupied space. The second point is slower but more reliable.
  5. Choose an encryption algorithm. If you are not planning to migrate a disk between computers, choose the more stable and latest mode, otherwise, the compatibility mode.
  6. After configuring the settings, click the "Start encryption" button. After a while, the data on your disk will be securely encrypted.
  7. After logging off or rebooting, the protected volume will become inaccessible, and a password will be required to open the files.

DiskCryptor

The second crypto utility under review today is DiskCryptor, a free and open source solution. To use it, follow the instructions below:

  1. Download the program installer from the official website at the link. Run the downloaded file.
  2. The installation process is extremely simple, it consists in pressing the Next button several times and the final restart of the computer.

  3. After rebooting, start DiskCryptor from the program folder or by clicking on the shortcut on the desktop.
  4. In the window that opens, click on the disk to be encrypted and click the "Encrypt" button.
  5. The next step is to select an encryption algorithm and decide whether you need to erase all data from the disk before encrypting (if you do not plan to destroy information, be sure to select "None" in the "Wipe Mode" list).
  6. Enter the decryption password twice (it is recommended to come up with a complex password so that the "Password Rating" field is at least "High"). Then click "OK".
  7. After a while, the disk will be encrypted. After rebooting or logging out of the system, to access it, you will need to run the utility, click on the "Mount" or "Mount All" button, enter the password and click "OK".

The undoubted advantage of this utility in comparison with the BitLocker mechanism is that it can be used on systems that came out before Windows 8 (even Windows XP that has been removed from support is supported). But DiskCryptor has several significant disadvantages:

  • there are no ways to restore access to encrypted information (if you forgot your password, you are guaranteed to lose your data);
  • only unlocking with a password is supported, the use of smart cards or biometric sensors is not possible;
  • perhaps the biggest disadvantage of using DiskCryptor is that an attacker with administrative access to the system can standard means format disk. Yes, he will not get access to the data, but you will also lose it.

Summing up, I can say that if the operating system is installed on the computer starting with Windows 8, then it is better to use the built-in functionality.

Protecting important information from intruders and simply from prying eyes is the primary task of any user who is active on the Internet. Often, data is stored on hard drives in an open form, which increases the risk of theft from your computer. The consequences can be very different - from the loss of passwords for various services to parting with an impressive amount of money stored in electronic wallets.

In this article, we will look at several specialized programs that allow you to encrypt and password protect files, directories and removable media.

This software is perhaps one of the most famous ransomware. TrueCrypt allows you to create encrypted containers on physical media, protect flash drives, partitions and entire hard drives from unauthorized access.

PGP Desktop

This is a combine program for maximum protection of information on your computer. PGP Desktop can encrypt files and directories, including local network, protect email attachments and messages, create encrypted virtual disks, permanently delete data by multi-pass overwriting.

Folder Lock

Folder Lock is the most user-friendly software. The program allows you to hide folders from visibility, encrypt files and data on flash drives, store passwords and other information in a secure storage, can wipe documents and free disk space without a trace, has built-in protection against hacking.

Dekart Private Disk

This program is intended solely to create encrypted disk images. In the settings, you can specify which programs contained in the image will be launched when mounted or unmounted, as well as enable a firewall that monitors applications that try to access the disk.

R-Crypto

Another software for working with encrypted containers that act as virtual storage media. R-Crypto containers can be connected like flash drives or regular hard drives and disconnected from the system if the conditions specified in the settings are met.

Crypt4Free

Crypt4Free is a file system software. It allows you to encrypt ordinary documents and archives, files attached to letters and even information in the clipboard. The program also includes a generator of complex passwords.

RCF EnCoder / DeCoder

This little ransomware gives you the ability to protect directories and the documents they contain using the generated keys. The main feature of RCF EnCoder / DeCoder is the ability to encrypt the text content of files, as well as the fact that it only comes in a portable version.

Forbidden file

The smallest participant in volume this review... The program is downloaded as an archive containing one single executable file. Despite this, the software can encrypt any data using the IDEA algorithm.

This was a small list of well-known, and not so, programs for encrypting files and folders on computer hard drives and removable media. They all have different functions, but they perform one task - to hide user information from prying eyes.

A modern person is no longer able to imagine his life without gadgets (computers, cell phones, tablets, etc.). This technique not only allows you to diversify your leisure time, but also contributes to the quick finding of answers to many questions of interest. Besides, information Technology even allow you to make financial transactions without the need to visit bank branches. However, such advanced features become possible only if confidential information is introduced.

TOP programs for encrypting files and folders.

The user has to enter logins, email addresses and, of course, passwords. If someone with a criminal inclination gets hold of such information, the user will have to face dire consequences. It is unlikely that someone will be able to calmly relate to the loss of personal data. For this reason, many have serious concerns, and sometimes panic against the background of the lack of an answer to the “global” question for their understanding, how to protect their data and prevent theft of confidential information.

Purpose of programs for encryption

IT specialists develop all kinds of software, aimed at improving and accelerating user productivity, expanding capabilities, including data protection. Against the background of the existing need, programmers have developed a unique product in the form of programs for encrypting files and folders. Such programs are of interest not only to private users, but also to economists, accountants, lawyers and other performers who operate in the process of performing their professional activities with important information, access to which is limited and to which, even with an incredible desire, everyone is not entitled to get acquainted with it.

Store in open access confidential information is reckless, since a computer equipment or a mobile device can, by fatal accident, end up in the wrong hands. It is not difficult to log into the system with fraudulent intentions, besides, some users unknowingly miss the fact that information can be read not only where it was originally posted, but also in other places. After deleting folders, files, visiting Internet resources where passwords may have been entered, data may be saved on the computer in the temporary files storage. In order not to become "easy prey" for computer fraudsters, it is useful to read the recommendations on how to protect your personal data, which programs for encrypting confidential data are the best.

Best programs

For many years, the leading position was held by the TrueCrypt program, which provides encryption of information and folders on a computer. IN this moment it continues to be used by users, but name it the best product is no longer possible. In addition, this IT project is currently closed. There is no need to be sad or anxious about this, as the new VeraCrypt product is an excellent successor to TrueCrypt, which comes with the original open source... During the development of VeraCrypt, the TrueCrypt code was taken as a basis, which was refined and improved, thanks to which the quality of encryption was significantly improved.

In particular, there has been a significant improvement in generating a key from a password. Also, users who want to encrypt not only individual documents, but a complete hard drive, can easily perform such manipulations. At the same time, the programmers introduced a completely different encryption mode. hard drives... In particular, XTS is now used instead of CBC. This change provides for the addition of the sector number and intra-segment offset during encryption. We hasten to draw your attention to the fact that even this improved VeraCrypt program is not out of competition. At the moment, it is possible to download and start working with one of several programs, the action of which is aimed at data encryption.

If you want to deny access to all unauthorized persons to folders and files on your computer and removable media, then you can use the excellent Anvide Lock Folder program. This little program is accompanied by a clear interface, so you don't need to have any special knowledge at all. However, this little "miracle" really limits access to everything that you prohibit, subject to encryption. The advantage of the Anvide Lock Folder program is the ability of the user to change the interface, adjusting it to his own preferences. This program also attracts users by the fact that it is free.

Popularity is accompanied by such a utility as Folder Lock. It also allows you to successfully encrypt data, but as a bonus, users get the ability not only to encrypt, but also to hide folders from the attention of third parties. Hidden files with a password are doubly protected against theft. Unfortunately, some users may face the fact that it is not possible to download the Folder Lock utility for free. Indeed, depending on the operating system of the computer on which you plan to download and start actively using Folder Lock, the network offers both a free and a paid version of the utility. By the way, this program perfectly copes with encryption tasks not only on computer technologybut also on smartphones.

The Hide Folders utility has similar capabilities and characteristics, accompanied by tools that any user without special technical knowledge can easily deal with. Only those who correctly enter the previously set passwords have access to encrypted folders.

Wise Folder Hider is a program that provides easy and fast encryption of files, folders on your hard drive, removable media. Moreover, this utility is capable of providing double protection. The program requires you to enter a password initially to start, and then to access encrypted folders or documents.

A good option for providing reliable protection of confidential information is the Secret Disk program. She got this name for a reason. Using such a utility, the user creates virtual disk, which can only be accessed by the owner of the password. As a result, this program allows you to create a reliable storage of a variety of information.

Many advanced users prefer to work with the CryptoARM program due to its advanced functionality. CryptoARM allows you to encrypt not every single folder, but to start batch processing, which accelerates the encryption process. In addition, the CryptoARM program allows you to:

  • decryption of folders and documents;
  • imposition of an electronic signature.

We will try to introduce the uninitiated into the course that there is a whole science (cryptography) aimed at finding and improving methods of ensuring confidentiality, authentication, and data integrity. Of course, each user does not need to dive into it headlong, but it is still useful to know that it is easy to find the right "helpers" reliable protection personal data, as well as the ability to easily create effective passwords.

To prevent unauthorized access to the system and data, Windows 7/10 provides the ability to set a password, including a graphic one, but this method of protection cannot be considered as reliable. The password for the local account can be easily reset by third-party utilities, and most importantly, nothing prevents you from gaining access to file systemby booting from any LiveCD with a built-in file manager.

To truly protect your data, you need to use encryption. The built-in BitLocker feature will work for this, but it's better to use third-party programs... TrueCrypt was the preferred encryption application for a long time, but in 2014 its developers scrapped the project, claiming that the program was not more secure. Soon, however, work on it was resumed, but with a new team, and the project itself received a new name. This is how VeraCrypt was born.

In fact, VeraCrypt is an improved version of TrueCrypt and we propose using this program to protect your information. In this example, we use VeraCrypt "to the maximum", encrypting with its help all hDD with system and user sections. This encryption method has certain risks - there is a fraction of the probability, albeit a very small one, that the system will not be able to boot, so we advise you to resort to it only when you really need it.

Installing and basic configuration of VeraCrypt

The VeraCrypt installation procedure is no different from installing other programs, with one exception. At the very beginning, you will be asked to choose between installation modes Install or Extract.

In the first case, the program will be embedded in the OS, which will allow you to connect encrypted containers and encrypt itself system partition... Extract mode simply unpacks the VeraCrypt executable files, allowing you to use it as a portable application. Some functions, including disk encryption with Windows 7/10, become unavailable.

Go to the menu immediately after launch Settings - Language, since by default the program is installed in English.

Disk encryption

Despite the seeming complexity of the task, everything is very simple. Select the option "Encrypt system partition / disk" from the "System" menu.

In the wizard window that opens, select "Normal" as the method (this is enough), the encryption area is the entire disk.

After completing the search for hidden sectors (the procedure may take a long time), specify the number operating systems and…

encryption algorithm (it is better to leave everything by default here).

Note: if while searching for hidden windows sectors will stop responding, force restart your PC and skip this step next time by choosing “No”.

Create and enter a password in the fields.

Chaotically moving the mouse, generate a key and click "Next".

At this stage, the program will offer to create a VRD - recovery disc and burn it to flash or optical media.

When the screen prompts you to perform a system encryption pre-test, click Test.

A computer restart is required. After turning on the PC, the VeraCrypt bootloader screen will appear. Here you will need to enter your invented password and PIM - the number of encryption iterations. If you haven't entered PIM anywhere before, just press enter, the option value will be set to default.

After a few minutes, Windows will boot in normal mode, but the Pretest Completed window will appear on the desktop - preliminary testing has been completed. This means that you can start encrypting. Click the "Encrypt" button and confirm the action.

The encryption procedure will start. It can take a long time, it all depends on the size of the disk and its fullness of data, so be patient and wait.

Note: if the disk has an EFI encrypted partition, which is typical for latest versions PC, at the beginning of encryption, you may receive a notification "It looks like Windows is not installed on the disk ...". This means that you will not be able to encrypt such a disk using VeraCrypt.

After the entire contents of the disk are encrypted, the VeraCrypt bootloader window will appear every time you turn on the computer and each time you will need to enter the password; there is no other way to access the encrypted data. With disk decryption, everything is much easier. All you need to do is start the program, select the option "Permanently decrypt the system partition / disk" from the "System" menu and follow the instructions of the wizard.

Loss or theft of equipment is a tangible loss, not only because of the device itself, but also because of the risk of our personal data falling into the wrong hands, so it's worth knowing how to protect them correctly.

Encryption is a process during which simple text, which can be read and understood by every user, is changed into a string incomprehensible to outsiders. We call such an incomprehensible text encrypted. Returning it to a readable form is possible only if you know the key.

There are many encryption algorithms, and it is from them, as well as the degree of complexity of the password - key, that the security of encrypted data depends. Some of the algorithms use one key (symmetric), while others use two private and public (asymmetric).

Encrypted - protected

Many people cannot imagine how they can leave their home without a mobile device that provides communication with the world and does not let them get bored. But when traveling or walking, it's easy to lose your guard. Therefore, it is important to take measures in advance to protect equipment and personal data in order to facilitate recovery in case of loss and to avoid the transfer of confidential information into the wrong hands.

The best security and encryption software

Here is a list of tools that provide optimal protection of equipment from loss and theft, and data from unauthorized access:

Find your lost or stolen laptop

  • Prey Project - allows in the browser window track device and remotely run selected applications

Encrypt or hide files on disk

Protect data in the cloud

  • Boxcryptor is an application for encrypting data stored in popular cloud services; can work as a browser add-on