{"id":1484,"date":"2019-01-24T17:20:02","date_gmt":"2019-01-24T17:20:02","guid":{"rendered":"http:\/\/por.tw\/Rich\/?p=1484"},"modified":"2019-01-24T17:20:02","modified_gmt":"2019-01-24T17:20:02","slug":"%e8%b3%87%e6%96%99%e5%a4%be%e5%af%86%e7%a2%bc%e4%bf%9d%e8%ad%b7%e9%8e%96-folder-lock-7-1-5","status":"publish","type":"post","link":"https:\/\/por.tw\/Rich\/%e8%b3%87%e6%96%99%e5%a4%be%e5%af%86%e7%a2%bc%e4%bf%9d%e8%ad%b7%e9%8e%96-folder-lock-7-1-5\/","title":{"rendered":"\u8cc7\u6599\u593e\u5bc6\u78bc\u4fdd\u8b77\u9396 Folder Lock 7.1.5"},"content":{"rendered":"<p><strong>\u8cc7\u6599\u593e\u5bc6\u78bc\u4fdd\u8b77\u9396 Folder Lock 7.1.5<\/strong><\/p>\n<p><strong>\u8cc7\u6599\u593e\u9396\u662f\u5feb\u901f\u7684\u6a94\u6848\u7684\u5b89\u5168\u8edf\u9ad4\uff0c\u53ef\u4ee5\u4f7f\u7528\u5bc6\u78bc\u4fdd\u8b77\uff0c\u9396\u5b9a\uff0c\u96b1\u85cf\uff0c\u52a0\u5bc6\u4efb\u610f\u6578\u91cf\u7684\u6a94\u6848\uff0c\u8cc7\u6599\u593e\uff0c\u78c1\u789f\u6a5f\uff0c\u5716\u7247\u548c\u6a94\u6848\u5728\u5e7e\u79d2\u9418\u3002\u9396\u5b9a\u7684\u6a94\u6848\u662f\u4e0d\u53ef\u522a\u9664\uff0cunrenamable\u7684\uff0c\u4e0d\u62bd\u53d6\u5f0f\u7684\uff0c\u96b1\u85cf\u7684\uff0c\u7121\u6cd5\u8a2a\u554f\u3002\u60a8\u53ef\u4ee5\u9396\u5b9a\uff0c\u64fe\u78bc\uff0c\u6216\u52a0\u5bc6\u901f\u5ea6\u548c\u5b89\u5168\u6027\u4e0a\u7684\u6839\u64da\u3002\u8cc7\u6599\u593e\u9396\u662f\u5b8c\u5168\u53ef\u79fb\u690d\u7684\uff0c\u56e0\u6b64\u53ef\u4ee5\u4fdd\u8b77\u60a8\u7684USB\u5feb\u9583\u8a18\u61b6\u9ad4\u78c1\u789f\u6a5f\uff0c\u78c1\u789f\uff0cCD-RW\u7684\u7b46\u8a18\u672c\u96fb\u8166\uff0c\u786c\u789f\u4e0a\u7684\u6a94\u6848\uff0c\u5b83\u4e0d\u9700\u8981\u5b89\u88dd\u5728\u53e6\u4e00\u53f0\u96fb\u8166\u4e0a\u3002\u8cc7\u6599\u593e\u9396\u4fdd\u8b77\u7684\u6a94\u6848\u5728Windows\uff0cDOS\u548c\u5b89\u5168\u6a21\u5f0f\uff0c\u5373\u4f7f\u5728\u60a8\u8b8a\u66f4\u60a8\u7684\u64cd\u4f5c\u7cfb\u7d71\u6216\u5f9e\u78c1\u789f\u555f\u52d5\u3002\u8cc7\u6599\u593e\u9396\u4e0d\u6703\u8b93\u4f60\u522a\u9664\u5b83\u81ea\u5df1\u7684\u57f7\u884c\u6a94\u593e\u4e2d\uff0c\u4e26\u6c92\u6709\u6b63\u78ba\u7684\u5bc6\u78bc\uff0c\u5b83\u4e0d\u80fd\u88ab\u5378\u8f09\u3002\u5176\u4ed6\u9078\u9805\u5167\u542b\u96b1\u5f62\u6a21\u5f0f\uff0c\u9ed1\u5ba2\u5617\u8a66\u76e3\u63a7\uff0c\u7a0b\u5f0f\u904b\u884c\uff0c\u5728\u8cc7\u6e90\u7ba1\u7406\u4e2d\u507d\u88dd\u8cc7\u6599\u593e\uff0c\u81ea\u52d5\u9396\u5b9a\uff0c\u81ea\u52d5\u95dc\u9589\u96fb\u8166\uff0c\u9396\u5b9a\u60a8\u7684\u96fb\u8166\uff0c\u522a\u9664PC\u8ecc\u9053\uff0c256\u4f4d\u7684Blowfish\u52a0\u5bc6\uff0c\u5728\u8cc7\u6e90\u7ba1\u7406\u5668\u7684\u4e0a\u4e0b\u6587\u9078\u55ae\u3002<\/strong><\/p>\n<p><a href=\"https:\/\/visdacom.com\/Rich\/wp-content\/uploads\/2012\/09\/ok102.jpg\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1485\" title=\"\u8cc7\u6599\u593e\u5bc6\u78bc\u4fdd\u8b77\u9396 Folder Lock 7.1.5\" src=\"https:\/\/visdacom.com\/Rich\/wp-content\/uploads\/2012\/09\/ok102.jpg\" alt=\"\u8cc7\u6599\u593e\u5bc6\u78bc\u4fdd\u8b77\u9396 Folder Lock 7.1.5\" width=\"277\" height=\"249\" srcset=\"https:\/\/por.tw\/Rich\/wp-content\/uploads\/2012\/09\/ok102.jpg 277w, https:\/\/por.tw\/Rich\/wp-content\/uploads\/2012\/09\/ok102-222x200.jpg 222w, https:\/\/por.tw\/Rich\/wp-content\/uploads\/2012\/09\/ok102-200x180.jpg 200w\" sizes=\"(max-width: 277px) 100vw, 277px\" \/><\/a><\/p>\n<p><span style=\"color: #ff0000;\"><strong>\u8cc7\u6599\u593e\u5bc6\u78bc\u4fdd\u8b77\u9396 Folder Lock 7.1.5\u7522\u54c1\u7279\u9ede\uff1a<\/strong><\/span><br \/>\n<strong>\u2027\u4f7f\u7528\u8005\u53ef\u4ee5\u9078\u53d6\u662f\u5426\u8981\u300c\u52a0\u5bc6\u300d\u6216\u300c\u9396\u5b9a\u300d\uff0c\u300c\u6709\u7528\u7684\u5169\u9593\u96fb\u529b\u4f7f\u7528\u8005\u548c\u81e8\u6642\u4f7f\u7528\u8005\u7684\u9078\u53d6\u3002\u8ab0\u60f3\u8981\u6700\u7d42\u5b89\u5168\uff0c\u53ef\u4ee5\u9078\u53d6encrypiton\u7684\u3002\u90a3\u4e9b\u8ab0\u60f3\u8981\u6975\u9650\u901f\u5ea6\uff0c\u53ef\u4ee5\u9078\u53d6\u9396\u5b9a\u3002<\/strong><br \/>\n<strong>\u2027\u6709\u6c92\u6709\u52a0\u5bc6\u6bcf\u500b\u6a94\u6848\u7684\u4e0d\u540c\u4f4d\u7f6e\u7684\u9ebb\u7169\u3002\u60f3\u60f3\uff0c\u4f60\u5c07\u7bc0\u7701\u591a\u5c11\u6642\u9593\uff0c\u7c21\u55ae\u5730\u628a\u6240\u6709\u7684\u6a94\u6848\u548c\u8cc7\u6599\u593e\u5728\u4e00\u500b\u4f4d\u7f6e\u3002\u65b9\u4fbf\u7684\u52a0\u5bc6\u548c\u89e3\u5bc6\u767c\u751f\u5728\u98db\u3002<\/strong><br \/>\n<strong>\u2027\u52a0\u5bc6\u548c\u9396\u5b9a\u901f\u5ea6\u662f\u975e\u5e38\u5feb\u7684\u3002\u6c92\u6709\u7af6\u722d\u5c0d\u624b\u63d0\u4f9b\u9019\u6a23\u7684\u901f\u5ea6\uff0c\u540c\u6642\u63d0\u4f9b100\uff05\u5b89\u5168\u7684256\u4f4dAES\u52a0\u5bc6\u3002<\/strong><br \/>\n<strong>\u2027\u5132\u7269\u6ac3\u4e0d\u80fd\u88ab\u522a\u9664\u5b89\u88dd\u7684\u96fb\u8166\u4e0a\u7684\u8cc7\u6599\u593e\u9396\u548c\u8cc7\u6599\u593e\u9396\\ t\u5378\u8f09\u6c92\u6709\u6b63\u78ba\u7684\u5bc6\u78bc\u3002<\/strong><br \/>\n<strong>\u2027\u4f7f\u7528\u8005\u60f3\u7528\u5bc6\u78bc\u4fdd\u8b77\u7684\u8cc7\u6599\u593e\u5728\u591a\u500b\u5730\u9ede\u5c0d\u4ed6\u5011\u7684\u786c\u789f\u4e0a\uff0c\u800c\u4e0d\u53ea\u662f\u5728C\uff1a\u78c1\u789f\u6a5f\uff0c\u53ef\u4ee5\u5f88\u5bb9\u6613\u5730\u4fdd\u8b77\u4ed6\u5011\u7684\u53e6\u4e00\u500b\u5206\u5340\u4e0a\u7684\u6a94\u6848\u901a\u904e\u8907\u88fd\\\u4fdd\u96aa\u7bb1\\\u5f9e\u4e00\u500b\u5730\u65b9\u5230\u53e6\u4e00\u500b\uff0c\u6216\u901a\u904e\u7c21\u55ae\u5730\u4f7f\u7528\\\u9396\\\u529f\u80fd\u3002<\/strong><br \/>\n<strong>\u2027\u5b89\u5168\u548c\u5f88\u5f37\u7684\u52a0\u5bc6\u3002\u5f37\u5927\u7684\u884c\u696d\u6a19\u6e96\u7684256\u4f4dAES\u52a0\u5bc6\u662f\u7528\u4f86\u6700\u5927\u7a0b\u5ea6\u7684\u4fdd\u8b77\u60a8\u7684\u6a94\u6848\u9032\u884c\u52a0\u5bc6\u3002\u9019\u662f\u6700\u503c\u5f97\u4fe1\u8cf4\u7684\u7f8e\u570b\u8ecd\u4e8b\u4f7f\u7528\u7684\u52a0\u5bc6\u7b97\u6cd5\u4e4b\u4e00\u3002<\/strong><br \/>\n<strong>\u2027\u8cc7\u6599\u593e\u9396\u63d0\u4f9b\u5168\u9762\u7684\u4fbf\u651c\u6027\uff0c\u5b83\u751a\u81f3\u53ef\u4ee5\u4fdd\u8b77CD \/ DVD-RW\uff0c\u4e0d\u53ea\u662fUSB\u5feb\u9583\u8a18\u61b6\u9ad4\u78c1\u789f\u6a5f\uff0c\u8a18\u61b6\u68d2\u548c\u8edf\u789f\u3002\u70ba\u4e86\u4fdd\u8b77\u9019\u4e9b\u78c1\u789f\u6a5f\u4e0a\u7684\u8cc7\u6599\uff0c\u4f60\u53ef\u4ee5\u7c21\u55ae\u5730\u8907\u88fd\u5230\u8a72\u78c1\u789f\u6a5f\u6216\u71d2\u9304\u4f60\u7684\u8863\u6ac3\u3002<\/strong><br \/>\n<strong>\u2027\u5132\u7269\u6ac3\uff0c\u4e5f\u53ef\u4ee5\u5728\u969b\u7db2\u8def\u4e0a\u901a\u904e\u96fb\u5b50\u4fe1\u4ef6\u50b3\u9001\u7d66\u67d0\u4eba\u3002\u4ed6\u5011\u8d0f\u5f97\u4e86\\ T\u662f\u80fd\u5920\u770b\u5230\u52a0\u5bc6\u7684\u6a94\u6848\u6c92\u6709\u60a8\u7684\u5bc6\u78bc\/\u6b0a\u9650\u3002\u5373\u4f7f\u6709\u4eba\u7a81\u7834\u548c\u6aa2\u67e5\u60a8\u7684\u96fb\u5b50\u4fe1\u4ef6\u9644\u4ef6\u4e4b\u9593\uff0c\u4ed6\u8d0f\u5f97\u4e86\\ T\u6c92\u6709\u6b63\u78ba\u7684\u5bc6\u78bc\uff0c\u5c07\u7121\u6cd5\u89e3\u5bc6\u6216\u4f7f\u7528\u8a72\u8a0a\u606f\u3002<\/strong><br \/>\n<strong>\u2027\u8cc7\u6599\u593e\u9396\u5b8c\u7f8e\u7684\u4f5c\u54c1\u5168\u90e8\u4e0b\u4e00\u9801\u6280\u8853\u7684Windows\uff0c\u5982Windows Vista\u4e2d\/ 2003 \/ XP \/ 2000 \/ NT\u3002\u5b83\u4e5f\u5b8c\u5168\u76f8\u5bb9\u6240\u6709\u7684\u78c1\u789f\u78c1\u789f\u6a5f\u985e\u578b\uff0c\u5167\u542bFAT16\uff0cFAT32\uff0cNTFS\u548cEFS\u3002<\/strong><br \/>\n<strong>\u2027\u53ef\u4ee5\u589e\u52a0\u4f60\u7684\u8863\u6ac3\u7684\u5927\u5c0f\uff0c\u53ea\u9700\u52a0\u5165\u66f4\u591a\u7684\u6a94\u6848\u548c\u8cc7\u6599\u593e\u5230\u4f60\u7684\u8863\u6ac3\u3002\u5373\u4f7f\u4f60\u7559\u5728\u4f60\u7684\u8863\u6ac3\u7a7a\u9593\u4e0d\u5927\uff0c\u4f60\u53ef\u4ee5\u96a8\u6642\u589e\u52a0\u5b83\u7684\u5927\u5c0f\u3002<\/strong><br \/>\n<strong>\u2027\u883b\u529b\u958b\u88c2\u662f\u4e0d\u53ef\u80fd\u7684\uff0c\u56e0\u70ba\u8a72\u8a08\u5283\u62d6\u5ef6\u4e86\u4e00\u6bb5\u6642\u9593\uff0c\u4e00\u65e6\u8f38\u5165\u5bc6\u78bc\u3002\u9019\u5c07\u9632\u6b62\u9ed1\u5ba2\u53ef\u80fd\u5617\u8a66\u4e86\u5f88\u591a\u4e0d\u540c\u7684\u5bc6\u78bc\u7d44\u5408\uff0c\u4ee5\u7372\u5f97\u60a8\u7684\u6a94\u6848\u3002\u8a72\u8a08\u5283\u9084\u7522\u751f\u4e00\u500b\u8ca0\u8f09\u55f6\u8072\u6642\u8f38\u5165\u7684\u5bc6\u78bc\u4e0d\u6b63\u78ba\uff0c\u53ef\u80fd\u7684\u9ed1\u5ba2\u4f01\u5716\u5411\u7ba1\u7406\u54e1\u767c\u51fa\u8b66\u5831\u3002<\/strong><br \/>\n<strong>\u2027\u5bc6\u78bc\u5f37\u5ea6\u8868\u986f\u793a\u4f60\u7684\u5be6\u529b\u5728\u60a8\u9375\u5165\u7684\u5bc6\u78bc\uff0c\u7576\u4f60\\\u91cd\u65b0\u8a2d\u5b9a\u4e00\u500b\u65b0\u5bc6\u78bc\u3002\u57fa\u672c\u7684\u7d93\u9a57\u6cd5\u5247\u662f\u4f7f\u7528\u7684\u5bc6\u78bc\uff0c\u5bb9\u6613\u8a18\u4f4f\uff0c\u4f46\u5f88\u96e3\u731c\u6e2c\u3002<\/strong><br \/>\n<strong>\u2027\u8cc7\u6599\u593e\u9396\u4e0d\\ T\u5132\u5b58\u5728\u8a3b\u518a\u8868\u6216\u78c1\u789f\u7684\u5bc6\u78bc\uff0c\u9632\u6b62\u9ed1\u5ba2\u548c\u9905\u4e7e\u3002<\/strong><br \/>\n<strong>\u2027\u8cc7\u6599\u593e\u9396\u9084\u63d0\u4f9b\u4e86\u81ea\u52d5\u4fdd\u8b77\u548c\u81ea\u52d5\u95dc\u6a5f\u529f\u80fd\uff0c\u8a2d\u5b9a\u81ea\u52d5\u9396\u5b9a\u6216\u95dc\u6a5f\uff0c\u5982\u679c\u8d85\u904e5\u4e0d\u6b63\u78ba\u7684\u5bc6\u78bc\u8f38\u5165\u5617\u8a66\u89e3\u5bc6\u7684\u6a94\u6848\u3002<\/strong><br \/>\n<strong>\u2027\u8cc7\u6599\u593e\u9396\u6e05\u9664\u8ecc\u9053\u7684\u4f7f\u7528\u8005\uff0c\u7576\u4ed6\u5011\u9ede\u64ca\u9396\u5b9a\u6309\u9215\u3002\u522a\u9664\u6700\u8fd1\u6587\u4ef6\u6b77\u53f2\u8a18\u9304\uff0c\u6a94\u6848\u548c\u8cc7\u6599\u593e\u7684\u200b\u200b\u6b77\u53f2\u548c\u526a\u8cbc\u7c3f\u4e2d\u7684\u8cc7\u6599\uff0c\u7576\u60a8\u95dc\u9589\u4e86\u66f4\u8863\u5ba4\u3002<\/strong><br \/>\n<strong>\u2027\u4fdd\u8b77\u91cd\u8981\u6a94\u6848\u514d\u53d7\u75c5\u6bd2\uff0c\u9ed1\u5ba2\uff0c\u9905\u4e7e\uff0c\u6728\u99ac\uff0c\u60e1\u610f\u8edf\u9ad4\uff0c\u9593\u8adc\u8edf\u9ad4\uff0c\u8815\u87f2\uff0c\u60e1\u610f\u7a0b\u5f0f\u548c\u8173\u672c\u3002\u4fdd\u8b77\u7db2\u8def\u4e2d\u7684\u96fb\u8166\u4e2d\u7684\u6a94\u6848\uff0c\u5982\u679c\u4f60\u4e0d\u5e0c\u671b\u7db2\u8def\u4e0a\u5171\u4eab\u6a94\u6848\u3002\u9084\u53ef\u4ee5\u4fdd\u8b77\u9ed1\u5ba2\u5de5\u5177\u7684\u6a94\u6848\uff0c\u7576\u60a8\u9023\u7dda\u5230\u969b\u7db2\u8def\u3002<\/strong><br \/>\n<strong>\u2027\u7576\u4f7f\u7528\u9396\u5b9a\u529f\u80fd\uff0c\u4f7f\u7528\u8005\u53ef\u4ee5\u9078\u53d6\u540c\u6642\u9396\u5b9a\u548c\u96b1\u85cf\u81ea\u5df1\u7684\u6a94\u6848\u3002\u9396\u5b9a\u548c\u96b1\u85cf\u6a94\u6848\u662funrenameble\u7684\u7684\uff0c\u4e0d\u53ef\u522a\u9664\uff0c\u4e0d\u62bd\u53d6\u5f0f\u7684\uff0c\u5b8c\u5168\u7121\u6cd5\u8a2a\u554f\u3002\u8cc7\u6599\u7684\u5927\u5c0f\u6216\u985e\u578b\u7684\u6a94\u6848\uff0c\u60a8\u53ef\u4ee5\u4fdd\u8b77\u662f\u6c92\u6709\u9650\u5236\u7684\u3002<\/strong><br \/>\n<strong>\u2027\u6e1b\u5c0f\u6a94\u6848\u5927\u5c0f\u548c\u7dca\u6e4a\u7684\u8a2d\u8a08\uff0c\u8cc7\u6599\u593e\u9396\u53ea\u9700\u89813.5 MB\u7684\u786c\u789f\u7a7a\u9593 &#8211; \u9ad4\u7a4d\u5c0f\uff0c\u4fbf\u65bc\u651c\u5e36\uff0c\u6613\u65bc\u4fdd\u6301\u3002\u7531\u65bc\u6700\u65b0\u7684\u58d3\u7e2e\u6280\u8853\u3002 GUI\u548c\u4ecb\u9762\u8a2d\u8a08\uff0c\u5b83\u770b\u8d77\u4f86\u50cfWindows XP\u4e2d\u7684\u4e00\u500b\u7d44\u6210\u90e8\u5206\u3002<\/strong><br \/>\n<strong>\u2027\u8cc7\u6599\u593e\u9396\u4e0d\u662f\\ T\u5728\u4efb\u4f55\u6642\u5019\u90fd\u9700\u8981\u904b\u884c\u3002\u6b64\u5916\uff0c\u5b83\u4e26\u4e0d\\ T\u4efb\u4f55\u5167\u5bb9\u5132\u5b58\u5230\u8a3b\u518a\u8868\u4e2d\/\u904b\u884c\uff0c\u9019\u6a23\u4f7f\u7528\u8005\u5c31\u6c92\u6709\u4efb\u4f55\u8a18\u61b6\u554f\u984c\u6216\u7a0b\u5f0f\u7684\u7a69\u5b9a\u6027\u554f\u984c\u3002<\/strong><\/p>\n<p><strong>Folder Lock is fast file-security software that can password-protect, lock, hide, and encrypt any number of files, folders, drives, pictures, and documents in seconds. Locked files are undeletable, unrenamable, unmovable, hidden, and inaccessible. You can lock, scramble, or encrypt depending on speed and security. Folder Lock is fully portable, so you can protect your files on USB flash drives, disks, CD-RWs, notebooks, and hard disks, and it doesn&#8217;t require installation on another PC. Folder Lock protects files in Windows, DOS, and Safe modes, even when you change your OS or boot from a disk. Folder Lock doesn&#8217;t let you delete its own program folder, and it can&#8217;t be uninstalled without the correct password. Additional options include Stealth Mode, Hacker Attempt Monitoring, Shred files, AutoLock, Auto Shutdown PC, Lock your PC, Erase PC tracks, 256-bit Blowfish Encryption and Context Menu in Explorer.<\/strong><\/p>\n<p><strong>Features:<\/strong><br \/>\n<strong>\u2022 Users have an option whether to Encrypt or Lock, choices useful for both power users and casual users. Those who want ultimate security, can choose encrypiton. those who want ultimate speed, can choose locking.<\/strong><br \/>\n<strong>\u2022 There\u2019s no longer the hassle of encrypting each and every file on different locations. Think how much time you will save simply by putting all your files and folders in one location. Convenient encryption and decryption happens on-the-fly.<\/strong><br \/>\n<strong>\u2022 Both Encryption and Locking are exceptionally fast. No competitor is offering this speed while offering 100% secure 256-bit AES Encryption.<\/strong><br \/>\n<strong>\u2022 The Lockers can\u2019t be deleted on the computer where Folder Lock is installed and Folder Lock can\\t be uninstalled without the correct password.<\/strong><br \/>\n<strong>\u2022 Users who want to password protect folders on multiple locations on their hard disk, not just on the C: drive, can easily protect their files on another partition by copying the \\Lockers\\ from one place to another or by simply using the \\Lock\\ feature.<\/strong><br \/>\n<strong>\u2022 Secure and very strong Encryption. A strong industry standard 256-bit AES Encryption is used to encrypt your files for maximum protection. It is one of the most trusted encryption algorithms used in United States Military.<\/strong><br \/>\n<strong>\u2022 Folder Lock offers fully portability and it can even protect CD\/DVD-RW, not just USB Flash Drive, Memory Stick and floppy disks. To protect data on these drives, you can simply copy or burn your Locker to that drive.<\/strong><br \/>\n<strong>\u2022 Lockers can also be emailed to someone over the internet. They won\\t be able to see your encrypted files without your password \/ permission. Even if someone breaks through and checks your email attachment in between, he won\\t be able to decrypt or use this information without the correct password.<\/strong><br \/>\n<strong>\u2022 Folder Lock works flawlessly on all Next Technology Windows, i.e. Windows Vista \/ 2003 \/ XP \/ 2000 \/ NT. It is also fully compatible on all disk drives types including FAT16, FAT32, NTFS and EFS.<\/strong><br \/>\n<strong>\u2022 You can increase the size of your Locker by simply adding more files and folders into your Locker. Even if you are left with little space in your Locker, you can always increase its size.<\/strong><br \/>\n<strong>\u2022 Brute force cracking is not possible, since the program delays for some time once a password is entered. This will prevent hackers who may try many different combinations of passwords to get through your files. The program also produces a load beep when an incorrect password is entered, to alert the administrator of possible hack attempt.<\/strong><br \/>\n<strong>\u2022 Password Strength meter shows you the strength of the password as you type, while you\\re setting a new password. Basic rule of thumb is to use a password that is easy to remember but hard one to guess.<\/strong><br \/>\n<strong>\u2022 Folder Lock doesn\\t save the password in the registry or the disk, preventing hackers and crackers.<\/strong><br \/>\n<strong>\u2022 Folder Lock also offers Auto Protect and Auto Shutdown features, this setting automatically locks or shutdown if more than five incorrect passwords are entered to try to decrypt the files.<\/strong><br \/>\n<strong>\u2022 Folder Lock erases tracks of users when they click the lock button. It deletes recent document history, find file and folder history and the data in clipboard when you close the Locker.<\/strong><br \/>\n<strong>\u2022 Protects important files from viruses, hackers, crackers, trojans, malware, spyware, worms, malicious programs and scripts. Protects files from network computers if you do not want to share files on network. Also protects files from hacker tools when you connect to the internet.<\/strong><br \/>\n<strong>\u2022 While using the Lock feature, users can choose to lock and hide their files simultaneously. Locked and Hidden files are unrenameble, undeletable, unmovable and totally inaccessible. There is no limit to the size of data or the type of files you can protect.<\/strong><br \/>\n<strong>\u2022 With its reduced file size and compact design, Folder Lock takes only 3.5 MB of hard disk space &#8211; small, portable and easy to keep. Thanks to the latest compression techniques. The GUI and interface is so well designed, it looks like an integral part of Windows XP.<\/strong><br \/>\n<strong>\u2022 Folder Lock isn\\t required to run at all times. Moreover, it doesn\\t save anything to the registry\/run so that users do not have any memory problems or stability problems with the program.<\/strong><\/p>\n<p><strong><span style=\"color: #ff00ff;\">\u8cc7\u6599\u593e\u5bc6\u78bc\u4fdd\u8b77\u9396 Folder Lock 7.1.5<\/span> | Home Page www.newsoftwares.net<\/strong><\/p>\n<p><strong><span style=\"color: #0000ff;\">\u8cc7\u6599\u593e\u5bc6\u78bc\u4fdd\u8b77\u9396 Folder Lock 7.1.5<\/span> \/ Size: 9.17 MB<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u8cc7\u6599\u593e\u5bc6\u78bc\u4fdd\u8b77\u9396 Folder Lock 7.1.5 \u8cc7\u6599\u593e\u9396\u662f\u5feb\u901f\u7684\u6a94\u6848\u7684\u5b89\u5168\u8edf\u9ad4\uff0c\u53ef\u4ee5\u4f7f\u7528\u5bc6\u78bc\u4fdd\u8b77\uff0c\u9396\u5b9a\uff0c [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1485,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[22],"class_list":["post-1484","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-11","tag-22"],"_links":{"self":[{"href":"https:\/\/por.tw\/Rich\/wp-json\/wp\/v2\/posts\/1484"}],"collection":[{"href":"https:\/\/por.tw\/Rich\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/por.tw\/Rich\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/por.tw\/Rich\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/por.tw\/Rich\/wp-json\/wp\/v2\/comments?post=1484"}],"version-history":[{"count":0,"href":"https:\/\/por.tw\/Rich\/wp-json\/wp\/v2\/posts\/1484\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/por.tw\/Rich\/wp-json\/wp\/v2\/media\/1485"}],"wp:attachment":[{"href":"https:\/\/por.tw\/Rich\/wp-json\/wp\/v2\/media?parent=1484"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/por.tw\/Rich\/wp-json\/wp\/v2\/categories?post=1484"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/por.tw\/Rich\/wp-json\/wp\/v2\/tags?post=1484"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}