Folder Lock 7.6.0 is the latest version of a security application, published by NewSoftwares.net. The Beaverton, Oregon company specializes in security software, manufacturing desktop and mobile apps. Folder Lock is the benchmark product of the enterprise. The program has both a desktop and a mobile version. Folder Lock supports most active versions of the Windows OS, including XP, Vista, 7, 8 and 10. Both the 32-bit and 64-bit variants of these operating systems are supported. The application also has versions for Android and Apple devices.
Folder Lock has a user-friendly user interface. The light design scheme contrasts with the seriousness of the program to make for a less stressful work regime. Of course, you need to maintain your focus while working with the utility. When using Folder Lock, you need to create passwords and remember them by heart. The passwords are at the core of the application’s security measures. To help safeguard your data at an optimal level, Folder Lock ranks the assigned password on an effectiveness scale. The evaluation is done in real-time as you enter the characters into the corresponding field.
Folder Lock provides seven features to operate with: Lock Folders, Encrypt Files, Secure Backup, Protect USB, Password Wallets, Shred Files and Clean History. Each of them applies an individual layer of protection. There are certain similarities between some of the features, as well as established connections between them.
The first two processes share a common concept. Folder Lock gives the option to protect files, located on your hard drive, without making copies, using external devices or data carriers. The Lock Folders function hides selected files and folders. You can unlock the chosen items at any given point to make them instantly available. There is an option to make the items visible on command and then hide them again. It should be pointed out that the function works in Safe Mode. This protection is superior to the hidden files option of Windows because the only way to show the items is by entering the password.
The Encrypt Files function performs a similar task. It encrypts files and folders and gives the user the option to assign a password. This feature makes use of the 256-AES (Advanced Encryption Standard) algorithm. There are two types of lockers you can create: a basic (NTFS) and a backup-able (FAT32) locker. When creating the locker, you will be asked to choose a range for its maximum capacity. The possible storage space of a locker extends between 300 MB and 2 TB.
The main difference between these two storage functions is the visibility. The lockers would be visible in the folder you have placed them. In this sense, the Lock Folders function is more secure, as it hides the lockers completely. On the other hand, the Encrypt Files function gives quicker access to your files and folders, without having to run the program. Both functions allow you to access and edit your files while they remain under active protection. If you choose passwords you later find to be too difficult to remember, do not stress. The passwords can be edited at any given point.
The Secure Backup feature is complementary of the Encrypted Files function. There is a strong bond between these two processes, as Secure Backup provides additional protection for the encrypted files. The feature allows you to backup, sync and restore your lockers. The backup would be your insurance in case your lockers get deleted. Secure Backup has a slightly different security mechanism, compared to the previous functions. The process is accessed through a user ID and a separate password.
The Protect USB feature has three independent functions, though they are not listed separately in the main menu. The flagship function is to copy your lockers to a USB device and convert them into .exe (executable) format. The second function performs a similar task. It burns the lockers into a CD or a DVD carrier and transforms them into an executable file. The third function produces a different end result. It protects important files by compressing them into a password-protected archive. The archive is stored into an email as an attachment. This option may be the least reliable of the three, as the email could be deleted if a hacker obtains access to your email account.
The next feature on the list is the Password Wallets catalog. It is used to store the credentials for your personal and financial accounts. You can enter the login details for your email accounts, banking and credit card platforms, ID numbers in your passport and driver’s license, medical and civil registrations, PIN codes and all other data you find important. This may be considered the most important archive. You should protect the list with the utmost caution. Make sure you choose a password of the highest security rank. This will be the most important password you need to remember, so make sure it is easy for you to memorize. To create a strong password, use more characters, numbers and special symbols.
The Shred Files function is listed as an additional feature. It has a different purpose, compared to the rest of the tasks. The Shred Files feature performs a permanent deletion. ‘Shredding’ files makes them irrecoverable. If you have stored a document, containing personal and financial information, you can delete it for good. This function is beneficial for your operating system, as well. Removing remnants from deleted files cleans your hard drive. By shredding files, you will have more free space and your disk will have fewer scattered fragments.
The last function in the menu is Clean History. It is listed as an additional feature like the Shred Files task. There is a conceptual similarity between the two processes. Clean History is used to delete traces from your tasks in your Windows OS, a selection of default programs and the Start Menu. The feature can erase the saved data from your recent activity on your operating system. The task history from the following programs can be deleted: Media Player, MS Paint and WordPad. The feature also clears the saved activity in Windows Explorer. Similar to the Shred Files process, Clean History disposes of the built up information on the hard drive and creates more free space.
The advanced settings of Folder Lock include: Password Security, Shred Settings, Auto Protection, Hack Security and Stealth Mode. The Password Security settings allow the user to compose and edit the Master Password, used for protecting Lockers and Wallets from deletion. The Shred Settings offer additional protection. They allow the user to select the default actions for the Shred Files feature. Auto Protection notifies the machine proprietor about prolonged activity, measured by mouse and keyboard usage. Hack Security is an internal protection option of Folder Lock. This feature warns the user about incorrect attempts at entering passwords for accessing the utility’s functions. Stealth Mode is the other internal security feature. Enabling this option makes Folder Lock accessible only through hotkeys.
Folder Lock maintains a 24/7 customer support service. The program provides a user guide and timely updates. You can connect with NewSoftwares.net, the application’s developers, through Google Plus, Facebook and Twitter. The company uses social media to publish the essential news and updates on its products in real-time. You can read opinions and recommendations from people who have used Folder Lock. There are embedded links to the social platform accounts in the tool’s user interface.
Folder Lock works at a fast pace. The program’s encryption speed is optimal. With a high capacity, the tool gives the option to store large archives of essential files and private data in protected carriers. The intention is to widen the availability of Folder Lock. Currently, the application only supports English. The developer team plans to translate the user interface into the following languages: German, French, Spanish, Portuguese, Italian, Dutch, Arabic, Japanese, Chinese (Traditional) and Chinese (Simplified).
Conclusion
Using Folder Lock does not require knowledge on file storage algorithms and protection mechanisms. The developers of the program have established optimal settings for the file manipulation processes. The user does not need to understand the high-tech aspects. The custom settings are for convenience and security optimization. They are described in detail. Folder Lock is operated on the same level as archives and zipped folders. The tool performs the lock and encryption tasks with impressive speed.