|
Secrets Protector Pro 2006 3.09 - User Guide and FAQ
Screenshots - More Details
Adding a file/folder to the list
To add files and folders using drag and drop:
- In a file browser, select any number of files and folders.
- While holding down the mouse button, drag the mouse pointer over the Secrets Protector window.
- Release the mouse button to drop the files and folders.
To add files and folders using the Add Button:
- Click on the Add Button
- Select any file or folder in the File/Folder Browser, and click OK
You can also open the File/Folder Browser using the Add option from the context menu (Right click over the File List of the interface) or using the Ctrl+O shortcut.
! Remarks:
- If you Add a folder to the Item List you add by default all its subfolders and files.
- Adding a file already enlisted in the file list won't have any effect.
- Adding a folder which contains a File or a Subfolder already enlisted, will have as effect the moving of the enlisted item in the new added folder from the list.
- Adding a file whose parent folder appears already in the list, falls into the same case as point No.2.
Removing a file/folder from the list
Remove an item from the list (a File or a Folder) using the Remove button:
- Select the item to remove
- Click the Remove button
You can also use the Delete key or the Remove option from the context menu (Right click over the File List of the interface).
! Remarks:
- You can remove only root elements from the Item List.
- By removing a folder you automatically remove all its contents from the list.
- You cannot remove hidden items from the list.
Hide
Select one item from the list and press the Hide button. Wait till the hiding process completes.
! Remark: You cannot hide already hidden items.
Unhide
Select one hidden item from the list and press the Unhide button. Wait till the unhiding process completes.
Warnings!!!
Formatting the system drive may cause data loss, so before reinstall the operating system or formatting a drive unhide your secret information!
Converting from NTFS to FAT will cause data loss, before doing such a conversion unhide your information!
! Remarks:
- You can Unhide only hidden items.
- If you chose to unhide the selected item to a different location you can use the Unhide To ... option from the Context Menu (Shortcut: Shift+Ctrl+U) .
- If the selected hidden file is already replaced in his original location you will be asked to overwrite it or to unhide to a different location.
Erase
Select one item from the list (a file or folder) and press the Erase button. Wait till the erasing process completes.
! Remark: You can erase both hidden or not hidden items.
Frequently Asked Questions - Secrets Protector Pro
- Can I use Secrets Protector Pro on FAT file system?
No because Secrets Protector uses some security features of NTFS file system, FAT file systems does not have any built-in security facilities. At least one drive must have NTFS file system on it. The system drive (if NTFS) or the first NTFS drive will be the "main drive". You can hide files on other non-NTFS partitions using the "main drive". FAT16 or FAT32 file systems can be easily converted to NTFS using "convert", a built-in command line utility of Windows.
- What is the difference between DELETE and ERASE?
When you delete a file using Windows Explorer the file remain in Recycle Bin and can be restored later. Files deleted by pressing "Shift + Del" and files eliminated from Recycle Bin are leaved on drive untouched and can be recovered using dedicated software tools. The erase (wipe, shred) process overwrites the files with some binary sequences before deleting them, stopping software and hardware recovery.
- Which eraser method should I use?
Secrets Protector Pro offers 5 eraser methods. The difference between them is the number of overwrites and the used pattern. In most of cases overwriting the files with zeroes or with a random pattern is enough, software recovery tools won't be able to get them back. Overwriting files using a one-pass method takes less time. For extra sensitive information we recommend using a DoD (US Department of Defense) standard. These methods make impossible hardware recovery using techniques like Magnetic Force Microscopy. "Peter Gutmann's method (35 passes)" is standing for classified data stored on very old magnetic storage and has a long run.
- Which encryption method should I use?
Secrets Protector Pro has 3 built-in encryption methods: DES, RC2 64-bit block algorithms and RC4 stream algorithm. There is a difference of encryption speed in the following descending order: RC4, DES, RC2. Any of them offers the maximal security.
Screenshots - More Details
|