![]() ![]() enter new password that will be used to encrypt data and click “Encrypt Folder” button.ĭone.Open Encrypt Folder dialog, choose empty folder within OneDrive or Google Drive location on your Computer.Install and Open Rohos Disk application. ![]() How to encrypt OneDrive, Google Drive, Dropbox folder In order to stop access you need to use “Disconnect” menu. Here is how Rohos Disk application provides access to encrypted files via Drive letter T:Īll of the data are decrypted and encrypted on the fly. This is how it looks on OneDrive via web browser: When cloud folder is encrypted, the files within the synchronization folder are all encrypted and their names are scrambled entirely. In order to work with the files you need to enter password and use special drive letter within Explorer or Any other application. Now Rohos is able to encrypt arbitrary files on a computer and thus Cloud Synchronization and Backup tools uploads fully encrypted data to the cloud since the sensitive data appeared on the computer. ![]() This feature that allows to encrypt your Cloud Storage folders like OneDrive, Google Drive and others. If you work in an absolutely trusted environment, then you can use single-factor authentication mode that allows replacing your password with a digital Key.We have published Rohos Disk Encryption v.2.7 with new experimental functionality “Encrypt Folder”. Unprotected user accounts may be hidden from the Windows Logon screen. ![]() PIN Pad window has numeric buttons, keyboard entry and auto-focused field.After 3 wrong PIN code attempts the Key gets locked for login For 2FA you can set a short PIN code to protect your key against “social engineers” around you.Emergency Logon Q/A helps to log in to Windows if you’ve lost your key or forgotten the PIN code.An unlimited number of authentication methods can be configured for a single user account.Use hardware security Key for console access and One Time Password generators like Google Auth/YubiKey/OATH for remote desktop access.While Rohos also provides you with complete usability in both, console or remote access cases: Today many services offer strong two-factor authentication to protect your password-based access with additional electronic devices. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |