homeAppSaved.com WINDOWSWINDOWS WEBWEB MACMAC IOSIOS ANDROIDANDROID LINUXLINUX

File Lock

the utility locks files quickly

thumb of File Lock
  • Publishers:
    TopLang Software
  • License: Trial
  • Capacity: 902,5 KB
  • Saved: 63
  • Update:
  • System: Windows NT/2000/XP/2003 Server/Vista/7/8

File Lock is a unique security software that helps users limit access to their files and folders. With it, they can lock files, folders and drives as well as hide them or set password protection.

Picture 1 of File Lock
The main interface of the File Lock folder locking software

This software will protect files and folders without changing them nor slowing down the system speed. In addition, users can also define different protection modes for each user at a separate time. With an intuitive interface, you will easily protect any file or folder by dragging it into the main File Lock window.

The main feature of the file protection software File Lock

Hide folders and files

File Lock can hide your files and folders. Once the data is hidden, they are completely invisible to the user and look as if they no longer exist on the system.

Lock files and folders

File Lock can lock your files and folders. This data will be displayed but not accessible to the user. No one can read, write, edit, move or rename locked files or folders.

Set password to protect files and folders

File Lock can set a password to protect your files and folders. When the user tries to access a file or folder with password settings, File Lock will ask for a password to grant access.

File Lock will be extremely effective when you have to use the same computer with other users and need to ensure the privacy of data stored on the computer.

File Lock's interface includes a standard window for adding files and folders to be locked. You can use regular file browsing or drag and drop files into File Lock. Batch processing is supported to lock, unlock, encrypt multiple files at the same time, saving your valuable time.

Picture 2 of File Lock
The settings of the File Lock software hide files

File Lock supports scheduling (daily, weekly, monthly or regular folder locking), hiding folders, managing multiple accounts, disabling plugins, configuring advanced options (like clicking activate or deactivate File Lock, go to invisible mode, integrate context menu in Windows Explorer) as well as change fonts, interface languages.

This security application consumes a low amount of system resources, has comprehensive help files that help users easily access and not affect the current work on the computer.

In summary, File Lock is a good tool to lock, hide, encrypt files, folders, drives to ensure the privacy of data stored on computers. If the features that File Lock provides to meet your needs, then why not download File Lock and install on your computer?

Instructions for using File Lock to lock files

From the main working interface of the program, click the File menu and select Lock Files (if you want to lock all types of formats available on your computer), Lock Folder (the key specifies any folder) and Lock Drive (if want to lock a partition or drive on the machine). The list of files, folders, drives when selected will appear as a list for you to manage later.

Picture 3 of File Lock To adjust the security parameters, double-click the corresponding file name in the list, in the Lock Item window that appears, click the Item tab and select Lock This Item if you want to lock files. (files that are locked are still present in the computer but cannot be accessed) or Hide Iteam (makes hidden files).

If you want to set the time to lock files at what time and files will be 'free to use' at any time you click on the Schedule tab, in the Schedule Options section you have lock types such as Always ( always locked), Daily (daily lock), Weekly (specified day of the day or days of the week), Monthly (locked each month or months of the year).

Then set the lock start time at Start Time and the end time to lock at the last Set End Time click the OK button to confirm the operation just made. When you want to return to the original working status for files with the lock list page, click the corresponding file name and select Unlock .

The program also integrates data security features by encrypting confidential data on the device, to encrypt files from the main working interface of the program, click on the Encryt Files option and then select the files that need to be encrypted. Localize the device in Source Files , enter the path to save encrypted files in Destination File , click the Encrypt button, then enter the password to encrypt. When you want to decode, you just need to perform the above operations again but instead of clicking Encrypt , you click the Decrypt button.

The special feature of the program is that in addition to data security by setting protection time, the program also integrates a feature of 'disguising' a folder into another format.

For example, turning your My Documents folder into a web file in Html, Printer, Control Panel . And so when strangers access the confidential data contained in this 'disguised' folder, the result they receive is just dummy destinations you set.

To exploit this feature from the main working interface of the program, click the Disguise Folder option, click the Browse button, and then select a folder on your computer to 'disguise', at the bottom of the Browse button please. Click the down arrow icon to select the desired type of camouflage, and then click the Apply button to confirm the operation just made. When you want to bring the folder back to normal, perform the above operations again and then click the Reset To Normal State option .

In addition, you should also set up a new account to manage the settings contained in the program as well as the right to log in and remove the program by going to Tools > User .

Here you can click on the Add New Account option to create additional accounts to manage the program with similar powers.

However, you also need to know that each account can only set parameters to the liking of the account, but not edit the parameters of the other account.

This method is very useful when a PC has many users in common and they can preserve their own confidential data individually without fear that it will be illegally exploited.