How to Use Gilisoft Privacy Protector
Home > How to Use > Gilisoft Privacy Protector

Gilisoft Privacy Protector User Guide

How to Install GiliSoft Privacy Protector?

Download Gilisoft Privacy Protector from the button below.
After downloading, please run the setup file, then follow the wizard to complete installation.
Set your password for the account of Gilisoft Privacy Protector when you run at the first time.
 
Note: Make sure to remember your password or keep it in a safe place, because you can not run this program without it.

How to uninstall GiliSoft Privacy Protector?

Click "Uninstall GiliSoft Privacy Protector" from the Start Menu.
Enter uninstall password.
Click the OK button to continue the uninstall progress.
 
Note: If uninstall the progtam, the locked data will not be protected. Before uninstalling the program, we suggest you backup the data on private disk into your safe place.

How to Hide Files/Folders/Drives?

Gilisoft Privacy Protector can hide files/folders on local disk or hide disk to help users protect privacy, if you need hide files on USB disks, please use GiliSoft File Lock Pro.

1. How to hide files?

Run Gilisoft Privacy Protector and then click on the "Hide Data " module.
You can select "Hiding Files" under the module of "Hide Data ".
Click on the "Add File(s)" button to select the file you want to hide. Then they will be add to the list. You can add files as many as you want.
Click on the "Hide File(s)" button to hide.

2. How to Hide Folder?

3. How to Hide Disks?

How to Lock Local Files/Folders/Drives with Password?

Gilisoft Privacy Protector can lock files/folders on local disk or lock disk to help users protect privacy, if you need lock files on USB disks, please use GiliSoft File Lock Pro.

1. How to Lock Files?

2. How to Lock Folder?

3. How to Lock Disks?

How to Deny Write Local Files/Folders/Drives?

1. How to Deny write files?

2. How to Deny Write Folder?

3. How to Deny Write Disks?

How to Change or Retrieve password ?

To retrieve the password, you can click "Retrieve Password" button, the password will be sent into your e-mail box.

How to Access the Locked Folders/Drives?

Double click the locked file, folder or drive.
Enter the master password of privacy protector to acess it.

[Tip]
After open the locked data, please close the explorer window after read it. As you know, the data will be protected again automatically with Privacy Protector.

How to Securely Delete Data on Local Disk or on an External Hard Drive?

Using the Safe Delete options you can select and securely delete any of files on your PC.
- British HMG IS5 (Baseline) (1 pass) Your data is overwritten with zeroes with verification.
- Russian GOST P50739-95 (2 passes) GOST P50739-95 wipe standard calls for a single pass of zeroes followed by a single pass of random byte.
- British HMG IS5 (Enhanced) (3 passes) British HMG IS5 (Enhanced) is a three pass overwriting algorithm: first pass - with zeroes, second pass - with ones and the last pass with random bytes (last pass is verified).
- US Army AR380-19 (3 passes) AR380-19 is a data wipe standard specified and published by the U.S. Army. AR380-19 is a three pass overwriting algorithm: first pass - with random bytes, second and third passes with certain bytes and with its compliment (with last pass verification).
- US Department of Defense DoD 5220.22-M (3 passes) DoD 5220.22-M is a three pass overwriting wipe algorithm: first pass - with zeroes, second pass - with ones and the last pass with random bytes. With all passes verification.
- the US Department of Defense DoD 5220.22-M (E) (3 passes) DoD 5220.22-M (E) is a three pass overwriting wipe algorithm: first pass - with certain bytes, second pass - with its complement and the last pass - with random bytes.
- NAVSO P-5239-26 (RLL) NAVSO P-5239-26 (RLL) is a three pass overwriting wipe algorithm with last pass verification.
- NAVSO P-5239-26 (MFM) NAVSO P-5239-26 (MFM) is a three pass overwriting wipe algorithm with last pass verification.
- the US Department of Defense DoD 5220.22-M(ECE) (7 passes) DoD 5220.22-M(ECE) is a seven pass overwriting wipe standard: first and second passes - with certain bytes and with its compliment, then two passes with random character, then two passes with character and its complement and the last pass - with random character.
- Canadian RCMP TSSIT OPS-II (7 passes) RCMP TSSIT OPS-II is a seven pass overwriting wipe standard with three alternating patterns of zeroes and ones and the last pass - with random character (with last pass verification).
- German VSITR (7 passes) The German wipe standard calls for each sector to be overwritten with three alternating patterns of zeroes and ones and in the last pass with character.
- Bruce Schneier (7 passes) The Bruce Schneier wiping standard has seven passes: first pass - with ones, the second pass - with zeroes and then five times with random characters.
- Peter Gutmann (35 passes) Peter Gutmann wiping algorithms has 35 passes.

1. How to Securely Delete Files?

2. How to Securely Delete Folders?

3. How to Securely Delete Entire Hard Drive?

How to Secure Clean the Free Space on Drive?

Using the Safe Delete->Wipe disks->Clean Free Space function, you can safely delete the free space on your disk.

How to use Private Disk?

We suggest you save your personal information on the Private Disk to protect your privacy.

[Tip]
If you want to uninstall GiliSoft Privacy Protector, please backup the data on private disk into your safe place.

How to Clean up All Traces of Your Computer Activity?

We suggest you use the Erase History options you can clean up all traces of your computer activity.

1. How to Erase the Windows history?

2. How to Erase the Application history?

3. How to Erase the Internet history?

Gilisoft Privacy Protector

Hide and Lock Data on Disk

The Best and Easiest to Use Privacy Protecting Software
$39.95  $49.95

Media Review

"GiliSoft Privacy Protector is an all-in-one privacy protection software. Helps me a lot when my computer is used by other people...."- www.softpedia.com
"With Gilisoft Privacy Protector I can easily protect private data in computer by hiding files, blocking access to folders and even creating temporary virtual secure drives...."- www.download.com
Top