
In modern versions such as Windows 8.1/8, and Windows 7, whenever you right click a file/folder to share it using the Share With menu or click the Share button in Properties, it uses the Sharing Wizard by default. The older concept of modifying only share permissions got renamed to "Advanced Sharing" and Windows introduced a new Sharing Wizard to share files. This concept has completely changed in newer versions of Windows. Whenever you stopped sharing a folder, the share was deleted. An overlay icon showing a sharing hand was displayed on that folder.

Our guide on protecting your smart home will get you started.įor more on keeping your personal information safe, be sure to check out these tips to prevent identity theft and our picks for the best identity theft protection tools.In older versions of Windows such as Windows XP, whenever you shared a folder, only the network share permissions were set, to allow or deny other users on the network from accessing the share. Using strong passwords, choosing the right smart home tech, and more can prevent bad actors from accessing your files. Installing the extra protection of an antivirus or anti-malware program helps keep your whole system safe as well as individual files and folders. You can store them in a lockbox on a USB drive or external hard drive. As an extra measure, make an unprotected archived copy of documents that you password protect. Use a password manager to keep track of file and folder passwords. Make sure to keep a backup of all your important files and folders.įew things are worse than forgetting the password to an important document. Some, like 7-Zip, are free, while others like Folder Guard must be purchased.Įven if something is protected with a password, it can still be deleted. There are a number of programs available to help you encrypt data or password protect folders and files. You can archive sensitive files, compress them, and encrypt the contents with a required password.

Because it’s difficult to set up foolproof file protection from a determined hacker, it’s smart to use redundant security protocols and other privacy tools when possible beyond a locked folder with encrypted files.
