(The following content is partly from the Web, and element of it can be written for myself only to assist people who are victims of this computer software to retrieve files)
1. Regional encryption:
In fact just transfer all of the files in the folder for the recycle bin (RECYCLER) within the root directory in the partition where the current folder is located. This folder is typically hidden by the technique
To seek out the encrypted file, just use a normally utilized file management computer software TotalCommander to quickly uncover the encrypted file.
Soon after running the software, click the configuration selection show in turn, select Show system / hidden files. Then use the software to open the partition exactly where the encrypted file is situated and also you can see the Recycled folder. Double-click to enter, and after that enter the file using the longest file name, S-1-5-21-1060284298-811497611-11778920086-500, then enter the Info2 folder, after which continue towards the subsequent directory until we see our file. Each of the hidden files are displayed here. The so-called nearby encryption only moves the files in the original folder to right here. Get in touch with it high-strength encryption is definitely shit.
Hidden encryption is also the exact same principle, as well as the encrypted files may also be identified in other directories in the Info2 folder. The difference is that hidden encryption deletes the original folder, plus the encrypted information is stored subsequent to the transferred folder.
two. Mobile encryption:
Just after encrypting the original encrypted folder, Thumbs.dn,! Decryption and Encryption.exe, and Desktop.ini are generated inside. Desktop.ini is utilised to procedure the show from the folder icon;!
partition data recovery and Encryption.exe is really a The shell program is usually run without having the principle system.
partition recover tool - recover your partition guaranteed could be the place where the files inside the original folder just before encryption are stored. By adding the method extension to transform the effect of double-clicking, my laptop or computer displays the printer icon in the handle panel (double-clicking is like opening the printer inside the manage panel, about changing the folder icon to alter the method of double-clicking the folder to open diverse folder forms. Baidu Just search it)
Open the mobile encrypted folder by using TotalCommander, enter Thumbs.dn and you'll see desktop.ini, 117789687LIST.mem, 117789687, 1.mem, 1.mem, 2.mem, 3.mem, x.mem, behind The several .mem files are the files inside the original folder before encryption. There are actually couple of files and keep in mind what type of files are before encryption. Right-click and copy to other directories then modify * .mem towards the suffix name (for instance, it is 1 .doc is changed from 1.mem to 1.doc) and may be restored towards the original file. In case you do n’t remember the original file variety or the amount of files is massive, it is possible to produce a brand new folder anywhere around the pc and then move the encryption to set the simplest password, and then use TotalCommander to enter Thumbs.dn within the newly encrypted folder , Put the file 117789687 (note that there is certainly no extension and the file itself has only a small quantity of bytes, that's, the password file) after which put it inside the mobile encrypted folder to be cracked to replace the original 117789687 file, then Re-run! Decrypt and Encrypt.exe Enter the password you just set to unlock the password in the original encrypted file, no matter what the original password is, you can restore it. This dare to claim to be the encryption on the national defense pole. What a shit. I hope I will help pals that have forgotten their passwords or lost files and let pals that are utilizing or choose to register recognize that the so-called encryption is just to deceive the laptop, the encrypted file continues to be harmful, maybe someone utilizes TotalCommander at this time. Peeping your files, there is the possibility of becoming deleted by yourself (this machine is encrypted in the recycle bin, in case you use rabbit or optimization master to clean up the trash, it may be deleted).
=============================================
Associated software program downloads:
TotalCommanderV7.02a green Chinese simplified version
http://www.duote.com/soft/11953.html
Use this when the file is deleted-FolderSniffer V3.51
http://www.duote.com/soft/6681.html