Protect the folder windows 7. Computer repair: How to put the fence deleted files? Important information about the disc and the fence

Golovna / Optimization of work

How to put a fence to remove files?

Master's note:

Practice in local lines, Most of the blame for the need for the defender of information is less in the form of spying, and in the case of other incorrect actions of other coristuvachiv. For the help of Windows, you can save the deleted files from the global access.

Let's go to the system as an administrator. At the menu "Keruvannya panel" open the menu "Folder authority", go to the "View" tab and select the item under the name "Vykoristovuvat simple sleeping access ...".

At the “Dyuchi Permit” depositor, there is a double click on free city at the distribution “Elements of Permissibility”. At the dialogue window, which was heard, we press “Change” and enter it in the name of the oblique record, the recorder of which cannot see the files. To confirm the operation, press "OK".

Dali at the window "Elements of the razdilnoi zdatnosti" in significant proportions the checkbox "Zaboronity" and the points "Vidalennya" and "Vidalennya pіdpapok i filіv". At the time of need, it is necessary to collect and іnshі dії for this oblіkovogo record. We confirm everything by pressing the "OK" button.

If the tab "Security" is not available, it clicks the row "Vіdkriti" from the "Start" menu or by using the Win + R keys. Enter the command gpedit.msc and expand the snap-in under the names "Koristuvach configuration", "Administrative templates", "Windows components".

Gave us from the papacy "Providnik" we need to review the policy "See the "Safety" tab". If it’s turned on, then right-clicking the bear, calling up the menu, choosing “Power” and moving the radio button to the “Not Tasks” position. Then press "OK" to confirm the operation.

If we have Windows Home Edition installed on our PC, then making these changes can be done in safe mode. Reboot the computer and press F8 after the first power supply. At the option menu, choose the “Safe Mode” row.

On the nutrition system for those who continue the work in this mode, apparently "So". After Windows is taken over, right-click the mouse on the desired folder, select "Power" and go to the "Safety" tab - in this mode it will be available.

At this article, we are able to feed the important files on the computer with a path of fence from their removal.

Such nutrition is even more relevant for all coristuvachiv PCs, both as informed and as early as possible. Nobody cares about the important data that is on the hard disks of the computer, for example, after the non-written data of other koristuvachiv, like you can access to your PC, that one of your own, and that number! Buvaє, scho th professionals to slacken pardons vipadkovo and, unfortunately, irrevocably vandalyayuchi files and folders. You can argue that deleted files eat at the cats, the stars of them can be turned on the plate.

As you can see on the screenshot, there is a variant of files being deleted irrevocably, bypassing the cat. And one more thing - the files can be too big and not fit into the box, then the OS will see them ignoring the rest. Without a hitch, with a safe method, you can create backup copies important materials on the computer, save them on znіmnyh noses to save money for force majeure conditions, on the server of your site, on the servers of other sites, to give such opportunities, for example, on Dropbox, Yandex and Google drives, in e-mail, etc.

But you can drink more simply and for the sake of saving files, just keep them away. І the simplest thing you can do is to grow, zastosuvavsya vikoristovuvannoy operating system, without going into the installation additional programs such directly.

Qia article to describe the description of access control to operational Windows systems 8, Windows Server 2012 and Windows RT.

Don't get overwhelmed with access parameters without special needs! You can do it so well that later it will be important to open your folders yourself!

To change access parameters, you need to:

Voloditi with the rights of the administrator of the computer ( control panelob_kov_ records koristuvachіv).

Rewire the file system. Press the right mouse button on the vibranium disk and open the power. What do you have file system NTFS, then it will not support access rights:

With the right mouse button, click on the file, which is supposed to protect and select Power. In the window, select the Security tab. The upper part has respect for the title Groupi chi koristuvachi. Choose a group Koristuvachi:

Press the Change button and change the permissions for the Koristuvach group. Choose the required option. Behind the barns, you can choose the same access fence:

File nі vіdkriti, nі poshkoditi chi vidaliti not vdas. When you try, you will appear ahead of time:

Rotate a file (folder)

1 . To enable access to a file (folder), having administrator rights, press the mouse button to the right, select Authority → Security ... Win everything in the reverse order. There is nothing complicated here.

2 . If you chose the option of Povna fence, then when you try, turn the right and when you open the Bezpeka tab, you can open it up, in which way to write, what we need to take into account, let us read. Tisnemo Dodatkovo button:

3 . Open window, read the information on the tab Allow, press the Continue button:

4 . At the devil's vіknі on deposit Let's marvel at the record let's go and in a row, de Farrowed by Koristuvachi…, timidly clicking on the mouse, otherwise we see the record and press the Change button:

5 . At the vіknі, scho again vіdkrylos, at the very top, there is a minus type: Fencing on Permission and marveling that all the jackdaws stood in Zagalni allowedі tisnemo skrіz OK і Zastosuvati:

The remote fence allows you to save data without a line from the link with legal authorities and other needs.

Yakshcho koristuvach swindle the data, how to fall under such a fence, stink call s yogo tech, but stay safe at the Safe. As long as there is a fence, you can know the data and export.

Important information about the disc and the fence

Filey, on the yakі the fence of the out-of-doors is expanding, it can be seen by the coristuvachi.

Once the fence is closed, the files will be visible to the stench, navit as a rule of saving the transmission of their access.

The zone of the fence to lie down in the way that it is laid

  • Data storage on the Disk zastosovuєtsya to files that lie coristuvachevі or organizations, yakі add to tsієї zaboroni, as well as to files, to any coristuvachevi or organization given direct access. Here you can see the files on the disks, which are given direct access to the coristuvachev, regardless of which one is the participant of the disk.
  • Like a fence zastosovuetsya to sleeping disks, it also zastosovuetsya and to sleeping disks, the participants of such fences, like falling down to the fence.
  • It is not possible to install the fence on the sleeping disk. Deputy of whom, set up a fence for the participants of this disk and install a warrant Zastosovuvat to sleeping disks.
For some minds of the fence, there are no data on the spilnyh disks?

Files on hard discs are not saved from hovering down.

  • participant sleeper disk:
    • move the file from the disk, and the participant is not added to the fence;
    • I saw from the burning disc of one of the participants, what kind of fence.
  • The one of the participants in the sleeping disk was not completed before the fence was removed.

How to install the Disk's Data Protection Fence

  1. Create or open a folder to avenge the fence.
  2. Press Create a fence.
  3. Enter the unique name of the fence.
  4. Choose Disk.
  5. Specify who the fence should be extended to:
    • Cloud records. Enter addresses email need koristuvachiv.
    • Organization. Viberit pіdrozdіl zі the list, scho rozkryvaetsya.
    • Set ensign Include files from linked disks. To di fence expand on that content of spilny disks, which is available we will need coristuvachas, and not only on the official data on the Disk.
  6. Press save.

How to change fence parameters

You can change the parameters of the fence, but not the type of data.

In rich coristuvachіv PK є especially important data, yakі in the same time cannot be spent. Obviously, you can make a dozen copies of a particularly important file on different carriers - from the disk to the e-mail screen. Ale є sposіb sposіbіtsya without dodatkovih programs ta vitrat. Let's take a look at the algorithm for Windows 7.

Instruction

  • Change, you have the rights of the computer administrator. Otherwise, you will not be able to run and adjust the necessary access parameters. It's even easier to convert: press the "Start" button, then open the "Control Panel". Run the submenu clacks of the menu "Oblіkovі records koristuvachіv". There will be re-secured all oblique records, like on a computer, and below the name there will be an entry "Administrator" or "Oblikovy oblikovy record".
  • Another thing that needs to be rewritten is that the file system is victorious. For example, the file is located on the D drive, then open "My computer" and right-click on the D drive icon. Select the "Power" menu item - you will immediately see information about the logical drive. Find out what is written opposite the words "File system". Nebhіdno, schob tse bula system NTFS - the very same podtrimuє rozpodіl access rights. If the system is FAT32, then you can format logical drive V NTFS systems. Just don't forget important moment- Formatting removes all data from the disk.
  • Let's assume that you have the rights of the computer administrator, and the appropriate file system is NTFS. Find a file that needs to be protected from removal. Right-click on the file icon and select the Power menu. You will appear at a window with different bookmarks, in which you know and select the “Safety” tab.
  • At the top half of you, add a list of groups of correspondents, so that you can access this file. To save the deleted file, change the rights of the coristuvachs. rights different types for example, "Ready access", "Change", "Reading", "Reading that change", "Special permission". Sob nothing, krim you, not a moment to see specific file, pіdіyde access to reading - the same file can be opened, but it won't be possible to see it, change it, delete it (like the text).
  • To change the access rights to the file, press the "Change" button. It may appear the same way: at the upper part of the resurrected coristuvach, at the lower part - the category of access rights. Ale with one note: on the contrary, two words will be right - “Defend” and “Permit” - with the possibility of putting a tick next to the skin row.
  • To save the deleted file, press the button "Dodatkovo", and then - "Change allowed". It’s new vіkno, in which place a tick in the item “Let us follow”. To show up in advance of the warnings about the withdrawal of the declined permits. Select the “Visibility” button for someone else and confirm the pressing of the “Stop” button. After that, repeat points 3, 4 and 5, put the fence on the next access and press “Zastosuvati”.
  • Porada added 23 May 2011 Porada 2: How to fence off the removal of the number of computers in order to improve access to certain folders, it is necessary to make changes to the installation of these directories. Full access to folders and files allows you to browse whether they are, which can lead to unimportant results, for example, the removal of necessary files. In order to block files, it is necessary to remove them from the fence, and the option to edit files is to be left active.

    you need

    • Redaguvannya nalashtuvan access.

    Instruction

  • To create a folder for shared access, select a folder in the explorer, right-click the mouse on it, in context menu select the item "Common access and security". In the window, put a check mark next to the item “Allow access to this folder”, then mark the item “Allow files to be changed through the link”. After clicking on the "Stop" button on the screen, a window will appear, in which the process of changing the attribute of the files will be displayed, which will be displayed at the selected folder.
  • Created double access to the folder, now it is possible to edit any file of the selected folder. To remove the file from the shared access folder, you need to right-click on the mouse on the folder, select the “Power” item from the context menu. At the end, go to the "Security" tab. Select the name of the koristuvach, under which you entered the system, press the "Dodatkovo" button.
  • At the end, on the "Allow" tab, press the "Change" button. In the new window “Element of storage space for a folder”, put icons next to the items “View folders and files” and “View”. Let's press the "OK" button.
  • On the tab "Razdilna zdatnist" press the button "Zostosuvat". You will see a window of warning about changing the elements of the fence, press the "So" button. Let's press the double button "OK".
  • Open the shared folder and try to see if there is a file. After a small ochikuvannya s'appear at a glance, like to warn the file about the pardon.
  • How to fence a remote - version for a friend

    © 2022 androidas.ru - All about Android