Encryption does not rely on passwords

  
File encryption is a common means of protecting files, but memory passwords have become a big problem. Many files are useless for a while. When you remember to use them, you find that the passwords don't remember. Have you ever had this? The experience, the following system home Xiaobian tells you that encryption does not rely on passwords, alternative encryption methods. Pharaoh, who manages the data, has recently encountered a very embarrassing thing. In the past, in order to save some important information, the documents were encrypted. Now I can’t remember it. I tried a lot of possible passwords before. After a few days of "reflection", I finally found a string of letters that I wrote down to prevent password loss on a dusty notebook. In fact, for most computer users, they have encountered more or less problems encountered by Pharaoh. In fact, if the encryption relies entirely on the password, the password becomes the only key to the confidentiality, which will greatly reduce the encryption effect. The password leakage of many websites that appeared before is proof. If you are already immune to password memory, you can encrypt the confidential file by the following method. First, the split software to encrypt this introduction of a segmentation software, let you have a new understanding of encryption. The software is BDBZM, which provides us with a new way to protect files ——“disguise”. The disguised document is not only encrypted but also more secure. The principle is to use BDBZM to disguise the confidential file segmentation as a beautiful picture, so that it loses the ability to run as a separate file. Once someone with ulterior motives gets your confidential file, it can only appreciate the beauty, but can't really get the original secret. The file is so well protected for your own secrets. When you use it yourself, you can use BDBZM to merge and split files to get complete commercial confidential files, which is safe and does not affect normal use. In addition, it is flexible and diverse in terms of splitting and merging, and the processing speed is very fast, and it supports split masquerading of files of any format and size. It can split small files in 9 formats, such as JPG and PDF. Users can also create and extend camouflage plug-ins and add passwords. It is a rare encryption software. The software download address: http://www.skycn.com /down.php?uri=http://hzcnc4.skycn.com/down/BDBZM.exeStep1: regular encryption run BDBZM green Chinese version of the tool, switch to “ Split the & rdquo; tab, as shown in Figure 1, click on the "original file to be split" & rdquo; after the "Browse" button, select the confidential file to be disguised, and then select from the "BBM file save location" The split masquerading file save location. Select “Specify Size" The sub-file name & rdquo; check box, and then set the format of the camouflage file, such as JPG, PDF, DAT, etc. Then set the size of the image file obtained by splitting under "Split size". Next, enter the password for the merge under the password on the right, and cancel the checkmark of the “Automatic classification of subdirectories” and click the “Execute” button to start splitting the confidential file. A success prompt is given, at this time, a plurality of BBM format recovery files disguised as pictures are generated in the corresponding folder. Into the set folder, we can see that there are two types of divided files, namely, disguised "Beauty Pictures" and a BBM recovery file. At this point, double-clicking on the image opens, only the image browsing function can be realized, and the original content has been completely blocked. To combine the split files, switch to "Combined", select the BBM format recovery file that was previously split under "BBM file location", and then set it in the "Consolidated storage location". The location of the merged confidential file is stored, and the previously set merge password is entered after the password. After selecting all the parameters, the size and number of the confidential file are displayed under the file information. Click the “Execute” button to start the merge. After the merge is completed, the completion prompt is given, and the right side shows the previous split. List of picture files. Click “Start” The original file is quickly restored. If some of the split camouflage files are damaged, select the BBM format recovery file or the camouflage file that saves the recovery information after the “BBM file position”, and reselect in the “Split Source File” box. The original confidential file, then select the masquerading file to be restored from the right side, click “ Start & rdquo; to restore the damaged masquerading file. Step2 Advanced segmentation camouflage uses the conventional segmentation camouflage method. After segmentation camouflage, a BBM format recovery file and several camouflage files are obtained, which is still not very secure. Then let the recovery file of the BBM format not appear, it is safer to completely split and disguise into several image files. Switch to the "Settings" tab, as shown in Figure 2, select "Add BBM file to the last file" item, and a prompt box will pop up, indicating that when the split camouflage is installed, the recovery file in BBM format will not be generated, and the recovery information will be It is saved in the last file of the split masquerade. Switch to the "Split" label, split the camouflage confidential file, set the parameters to be split, click the “Start” button to start the split, and then give the prompt information that the recovery information is saved in the last file of the split camouflage. In this way, only some image files are obtained by splitting the camouflage, and the concealment is stronger. When you need to merge the contents of the non-BBM document, switch to “ combine & rdquo;, click “ BBM file location & rdquo; after & ldquo; browse & rdquo;, pop-up "Open", select “ file type & rdquo; for & ldquo ;All”, select the image file in which the recovery information is saved in the split camouflage file, and enter the previously combined password to restore the confidential file. Step3 adds camouflage images. Because there are only 10 images used in the software's own camouflage, if you need to split the disguised files, you will get a lot of beautiful photos of the same content, which will cause hidden problems, but we can ourselves Add more camouflage plug-in images to better confuse others. Click the "plug-in editor" button under the "Set" tab, open the “Make camouflage plug-in image" window, enter the name after "file name" " "note" Drag the image file as a camouflage plug-in into the space below, click the “Save” button to make it quickly and give a prompt. When splitting a disguised confidential file, first go to the “Settings> tab, and search for the camouflage plugin used in the splitting, and then select the camouflage plugin file to use from the list, so that when splitting the camouflage Use the image information you added earlier. This article comes from [System Home] www.xp85.com
Copyright © Windows knowledge All Rights Reserved