(Safe, reliable, powerful file encryption software, folder encryption software. The software selects sophisticated and leading encryption algorithms, encryption methods and underlying file system drivers to achieve super high encryption strength after file encryption and folder encryption, and to avoid deletion, imitation and movement. The main features of Folder Encryption Super Master: Folder encryption function Lightning encryption: instantly encrypt the folders in your computer or on the mobile hard disk, no size limit, avoid copying, copying and deletion after encryption, and it is not affected by the system , Even under reinstallation, GH/OST recovery, DOS and safe mode, the encrypted folder remains encrypted and cannot be decrypted by other software under any circumstances. Hide encryption: Hide your folders in an instant. The encryption speed and effect are the same as lightning encryption. The encrypted folders cannot be found and decrypted without this software. Comprehensive encryption: Use the world's most sophisticated encryption algorithm to fully encrypt all files in the folder at one time, which one needs to be opened during use, which is convenient and safe. The file encryption function selects the leading encryption algorithm, so that after your file is encrypted, it truly reaches the ultra-high encryption strength, so that your encrypted file is impeccable and cannot be decrypted without a password. It also has the function of temporary decryption after the file is encrypted: after the file is encrypted, enter the exact password when using it, and choose to open. After the end of use, it will automatically return to the encrypted state, and there is no need to encrypt it again. Disk maintenance function The disk maintenance function can perform primary, intermediate and high-level maintenance on the disks in the computer. The highly maintained disk partition is completely hidden and cannot be found under any circumstances. Enhanced functions also include the destruction and deletion of folders and files, and folder pretending, sorting system LJ and system optimization and security settings, and preventing the use of USB devices, read-only use of U disks and mobile hard disks, etc.)