Skip to main content

Lock and Hide Your Folders without Any Software.



Lock and Hide Your Folders without Any Software.


In order to secure your privacy on your pc, u might need to lock certain folders. It’ll only take a couple of steps and you’re done
The default password is “yourpasswordhere”. This is the only thing you’re gonna change in the code.


1. Copy the code below to notepad

cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA­­-1069-A2DD-08002B30­3­09D}" goto UNLOCK
if NOT EXIST Locker goto MDCAPRIOFILES
:CONFIRM
echo Are you sure to Lock this folder? (Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA­­-1069-A2DD-08002B30­3­09D}"
attrib +h +s "Control Panel.{21EC2020-3AEA­­-1069-A2DD-08002B30­3­09D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock Your Secure Folder
set/p "pass=>"
if NOT %pass%== yourpasswordhere goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA­­-1069-A2DD-08002B30­3­09D}"
ren "Control Panel.{21EC2020-3AEA­­-1069-A2DD-08002B30­3­09D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDCAPRIOFILES
md Locker
echo Locker created successfully
goto End
:End

2. Save this file as “locker.bat”.

3. Now double click on locker.bat.

4. It will create a folder named Locker with automatic lock. After creation of the folder, place the contents (your files & folders) you want to lock inside the Folder

6. Double click locker.bat again. It will ask to lock the folder Y/N. If you press y then enter. it will lock the folder and your folder will be hidden.

7.To unlock runlocker.bat again, it will ask to enter password, type in correct password then enter, you can see your folder back.

8. Please don’t change anything except password, otherwise this lock may does not work.
***The default password is “yourpasswordhere”. This is the only thing you’re gonna change in the code.***

So Enjoy!!

Comments

Popular posts from this blog

View Private Facebook Profile Picture in Full Size

An Easy Trick to view Private Facebook Profile Picture in Full Size 1.Some people on Facebook set  their image privacy settings to  "Only  me".We will not be able to see  their images in full size.Here is a  simple  work around technique using which you can see the image in full size. 2.Go to the Timeline of the  person(I  know its mostly a girl ). 3.Right click on the profile pick  and  choose the option open image  in a new tab from the menu. 4.Then the image will open in a  separate window. 5.Now just remove s160X160  from  the url of the screenshot and  hit enter . 6.Now you will be able to see the image in full size. Hit like if it worked. #iospranav #TechnologyReforms

Now Don't Let Unwanted Software And Plugins Get Installed On Your Pc

      Tired of unchecking unrelated offers while installing Then DON'T worry your friend UNCHECKY is here . Introducing Unchecky! Keeps your  check boxes  clear. Have you ever felt, while installing software, that the installer tries to push additional unwanted programs at all cost? Ever missed a  check box , and spent hours afterwards removing  ad-ware ? Ever opened your browser after an installation, only to find out that you have a new homepage, a new search engine, or even a new browser? Unchecky aims to keep potentially unwanted programs out of your computer. Unchecks Unchecky automatically unchecks unrelated offers, both saving you mouse clicks and making it less likely to miss a checkbox of an unwanted offer. Warns Installers often try to sneak additional programs as a natural part of the installation. Unchecky warns you when you try to accept a potentially unwanted offer, which makes it less likely to be accepted accidentally.

How To Know If Someone Hacked Your Computer!

  HOW TO KNOW IF SOMEONE HAS HACKED YOUR COMPUTER! Steps : 1. Click "Start," then type "cmd" into the quick search. Right-click the app link and click "Run as administrator." 2. Type "netstat -an" and press "Enter." Wait a few moments for the utility to run. 3. Look through the results in the command-line tool "netstat" (network statistics). The first column tells you the type of connection, the   second shows you the local address, the third the foreign address, and the final column shows the status of the connection. 4. Check the port numbers for an intrusion. The port numbers follow the IP or server address in the following format: ":XXXXX." Ports between 0 and 1023 are safe; ports between 1024 and 49151 are relatively safe; and you should be suspicious of ports between 49152 and 65535. Certain peer-to-peer software applications use the final port range, so close any P2P software and