(Powerful file and folder encryption software (supports the latest vista operating system), and also has functions such as completely hiding the disk and preventing the use or read-only use of USB storage devices, data destruction and deletion. Software features: 1 pair of folders with five encryption methods: Lightning encryption: instantly encrypts folders in your computer or on a mobile hard disk, no size limit, avoids imitation, copying and deletion after encryption, and is not affected by the system , Even under reinstallation, GH/OST recovery, DOS and safe mode, the encrypted folder remains encrypted and cannot be decrypted by other software under any circumstances. Hide encryption: Hide your folders in an instant. The encryption speed and function are the same as lightning encryption. The encrypted folders cannot be found and decrypted without this software. Comprehensive encryption: Use the world's most sophisticated encryption algorithm to fully encrypt all files in the folder at one time, which one needs to be opened during use, which is convenient and safe. Golden Diamond Encryption: Use the world's most sophisticated encryption algorithm to pack and encrypt folders into encrypted files. Mobile encryption: Use the world's most sophisticated encryption algorithm to encrypt folders into Exe executable files. You can encrypt important data in this way and then use it on the machine without [Folder Encryption Super Master] installed through the network or other methods. These five encryption methods can meet a variety of different needs. 2. Temporary decryption of encrypted files and folders; when decrypting encrypted files and folders, enter the correct password and choose to open, and they are in a temporary decryption state. After use, the files and folders are automatically restored to the encrypted state, and do not need to be encrypted again. 3 The disk is completely hidden; when the disk is completely hidden, it cannot be found under any circumstances. 4. Prevent the use or read-only use of USB storage devices; 5. Not only can encrypt folders, but also encrypt files; encrypted files are also encrypted with encryption algorithms to ensure the confidentiality of your top-secret files. 6 Destruction and deletion of files and folders; files and folders that have been destroyed and deleted cannot be recovered by data recovery software. 7 also has auxiliary functions such as system security settings, system optimization, and system garbage cleaning. how? Has a perfect data encryption and maintenance solution appeared in front of you, so what are you waiting for? ??)