Protect the folder windows 7. Computer repair: How to put the fence deleted files? Important information about the disc and the fence
How to put a fence to remove files?
Master's note:
Practice in local lines, Most of the blame for the need for the defender of information is less in the form of spying, and in the case of other incorrect actions of other coristuvachiv. For the help of Windows, you can save the deleted files from the global access.
Let's go to the system as an administrator. At the menu "Keruvannya panel" open the menu "Folder authority", go to the "View" tab and select the item under the name "Vykoristovuvat simple sleeping access ...".
At the “Dyuchi Permit” depositor, there is a double click on free city at the distribution “Elements of Permissibility”. At the dialogue window, which was heard, we press “Change” and enter it in the name of the oblique record, the recorder of which cannot see the files. To confirm the operation, press "OK".
Dali at the window "Elements of the razdilnoi zdatnosti" in significant proportions the checkbox "Zaboronity" and the points "Vidalennya" and "Vidalennya pіdpapok i filіv". At the time of need, it is necessary to collect and іnshі dії for this oblіkovogo record. We confirm everything by pressing the "OK" button.
If the tab "Security" is not available, it clicks the row "Vіdkriti" from the "Start" menu or by using the Win + R keys. Enter the command gpedit.msc and expand the snap-in under the names "Koristuvach configuration", "Administrative templates", "Windows components".
Gave us from the papacy "Providnik" we need to review the policy "See the "Safety" tab". If it’s turned on, then right-clicking the bear, calling up the menu, choosing “Power” and moving the radio button to the “Not Tasks” position. Then press "OK" to confirm the operation.
If we have Windows Home Edition installed on our PC, then making these changes can be done in safe mode. Reboot the computer and press F8 after the first power supply. At the option menu, choose the “Safe Mode” row.
On the nutrition system for those who continue the work in this mode, apparently "So". After Windows is taken over, right-click the mouse on the desired folder, select "Power" and go to the "Safety" tab - in this mode it will be available.
At this article, we are able to feed the important files on the computer with a path of fence from their removal.
Such nutrition is even more relevant for all coristuvachiv PCs, both as informed and as early as possible. Nobody cares about the important data that is on the hard disks of the computer, for example, after the non-written data of other koristuvachiv, like you can access to your PC, that one of your own, and that number! Buvaє, scho th professionals to slacken pardons vipadkovo and, unfortunately, irrevocably vandalyayuchi files and folders. You can argue that deleted files eat at the cats, the stars of them can be turned on the plate.
As you can see on the screenshot, there is a variant of files being deleted irrevocably, bypassing the cat. And one more thing - the files can be too big and not fit into the box, then the OS will see them ignoring the rest. Without a hitch, with a safe method, you can create backup copies important materials on the computer, save them on znіmnyh noses to save money for force majeure conditions, on the server of your site, on the servers of other sites, to give such opportunities, for example, on Dropbox, Yandex and Google drives, in e-mail, etc.
But you can drink more simply and for the sake of saving files, just keep them away. І the simplest thing you can do is to grow, zastosuvavsya vikoristovuvannoy operating system, without going into the installation additional programs such directly.
Qia article to describe the description of access control to operational Windows systems 8, Windows Server 2012 and Windows RT.
Don't get overwhelmed with access parameters without special needs! You can do it so well that later it will be important to open your folders yourself!
To change access parameters, you need to:
Voloditi with the rights of the administrator of the computer ( control panel → ob_kov_ records koristuvachіv).
Rewire the file system. Press the right mouse button on the vibranium disk and open the power. What do you have file system NTFS, then it will not support access rights:
With the right mouse button, click on the file, which is supposed to protect and select Power. In the window, select the Security tab. The upper part has respect for the title Groupi chi koristuvachi. Choose a group Koristuvachi:
Press the Change button and change the permissions for the Koristuvach group. Choose the required option. Behind the barns, you can choose the same access fence:
File nі vіdkriti, nі poshkoditi chi vidaliti not vdas. When you try, you will appear ahead of time:
Rotate a file (folder)
1 . To enable access to a file (folder), having administrator rights, press the mouse button to the right, select Authority → Security ... Win everything in the reverse order. There is nothing complicated here.
2 . If you chose the option of Povna fence, then when you try, turn the right and when you open the Bezpeka tab, you can open it up, in which way to write, what we need to take into account, let us read. Tisnemo Dodatkovo button:
3 . Open window, read the information on the tab Allow, press the Continue button:
4 . At the devil's vіknі on deposit Let's marvel at the record let's go and in a row, de Farrowed by Koristuvachi…, timidly clicking on the mouse, otherwise we see the record and press the Change button:
5 . At the vіknі, scho again vіdkrylos, at the very top, there is a minus type: Fencing on Permission and marveling that all the jackdaws stood in Zagalni allowedі tisnemo skrіz OK і Zastosuvati:
The remote fence allows you to save data without a line from the link with legal authorities and other needs.
Yakshcho koristuvach swindle the data, how to fall under such a fence, stink call s yogo tech, but stay safe at the Safe. As long as there is a fence, you can know the data and export.
Important information about the disc and the fence
Filey, on the yakі the fence of the out-of-doors is expanding, it can be seen by the coristuvachi.Once the fence is closed, the files will be visible to the stench, navit as a rule of saving the transmission of their access.
The zone of the fence to lie down in the way that it is laid
- Data storage on the Disk zastosovuєtsya to files that lie coristuvachevі or organizations, yakі add to tsієї zaboroni, as well as to files, to any coristuvachevi or organization given direct access. Here you can see the files on the disks, which are given direct access to the coristuvachev, regardless of which one is the participant of the disk.
- Like a fence zastosovuetsya to sleeping disks, it also zastosovuetsya and to sleeping disks, the participants of such fences, like falling down to the fence.
- It is not possible to install the fence on the sleeping disk. Deputy of whom, set up a fence for the participants of this disk and install a warrant Zastosovuvat to sleeping disks.
Files on hard discs are not saved from hovering down.
- participant sleeper disk:
- move the file from the disk, and the participant is not added to the fence;
- I saw from the burning disc of one of the participants, what kind of fence.
- The one of the participants in the sleeping disk was not completed before the fence was removed.
How to install the Disk's Data Protection Fence
- Create or open a folder to avenge the fence.
- Press Create a fence.
- Enter the unique name of the fence.
- Choose Disk.
- Specify who the fence should be extended to:
- Cloud records. Enter addresses email need koristuvachiv.
- Organization. Viberit pіdrozdіl zі the list, scho rozkryvaetsya.
- Set ensign Include files from linked disks. To di fence expand on that content of spilny disks, which is available we will need coristuvachas, and not only on the official data on the Disk.
- Press save.
How to change fence parameters
You can change the parameters of the fence, but not the type of data.
In rich coristuvachіv PK є especially important data, yakі in the same time cannot be spent. Obviously, you can make a dozen copies of a particularly important file on different carriers - from the disk to the e-mail screen. Ale є sposіb sposіbіtsya without dodatkovih programs ta vitrat. Let's take a look at the algorithm for Windows 7.
Instruction
you need
- Redaguvannya nalashtuvan access.