CN113505099A - File hiding method, device, equipment and storage medium of Windows system - Google Patents
File hiding method, device, equipment and storage medium of Windows system Download PDFInfo
- Publication number
- CN113505099A CN113505099A CN202110513151.7A CN202110513151A CN113505099A CN 113505099 A CN113505099 A CN 113505099A CN 202110513151 A CN202110513151 A CN 202110513151A CN 113505099 A CN113505099 A CN 113505099A
- Authority
- CN
- China
- Prior art keywords
- folder
- subfolders
- file
- windows system
- file hiding
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/16—File or folder operations, e.g. details of user interfaces specifically adapted to file systems
Abstract
The invention provides a file hiding method, a device, equipment and a storage medium of a Windows system, wherein the file hiding method comprises the following steps: newly building two layers of folders; copying the files to be hidden into subfolders of the two-layer folder; disguising the subfolder using a class identifier; restricting the subfolders from being accessed and deleted using a system retention key; and modifying the attribute of the root folder of the two-layer folder to hide the root folder. The file hiding method of the Windows system integrates a plurality of file hiding means, the hidden file is not easy to find and modify and delete, and the safety of the hidden file is improved.
Description
Technical Field
The present invention relates to the field of file hiding technologies, and in particular, to a file hiding method, device, apparatus, and storage medium for a Windows system.
Background
At present, in a Windows system, the operation of hiding a file can be realized by clicking right-click on the file and clicking attribute on a pop-up menu, and on a conventional tab, the operation of hiding can be finished by checking the attribute. The above is the file hiding function provided by the Windows system, so its effect is shallow, and cannot meet some requirements for hiding more safely and reliably to provide support.
Accordingly, the prior art is yet to be improved and developed.
Disclosure of Invention
The invention mainly aims to solve the technical problem that the existing file hiding method of the Windows system is not high in safety.
The first aspect of the present invention provides a file hiding method for a Windows system, where the file hiding method includes:
newly building two layers of folders;
copying the files to be hidden into subfolders of the two-layer folder;
disguising the subfolder using a class identifier;
restricting the subfolders from being accessed and deleted using a system retention key;
and modifying the attribute of the root folder of the two-layer folder to hide the root folder.
In an alternative implementation manner of the first aspect of the present invention, the disguising the subfolder using the class identifier includes:
renaming the subfolders using class identifiers to make the subfolders masquerade as system icons, and jumping to the system icons when accessed.
In an alternative implementation manner of the first aspect of the present invention, the disguising the subfolder using the class identifier includes:
newly building a folder configuration file in the subfolders;
editing the contents in the folder configuration file causes the subfolders to masquerade as system icons.
In an alternative implementation manner of the first aspect of the present invention, the using the system retention key to restrict the subfolder from being accessed and deleted includes:
renaming the subfolders by system-reserved keys in a command line manner such that the subfolders cannot be opened by double-clicking.
In an alternative implementation manner of the first aspect of the present invention, the modifying the attribute of the root folder of the two-layer folder to hide the root folder includes:
and modifying the attribute of the root folder of the two layers of folders into hiding and read-only to realize the hiding of the root folder.
In an alternative implementation manner of the first aspect of the present invention, the modifying the attribute of the root folder of the two-layer folder into hidden and read-only is implemented by an "attribute + s + r + h" command.
In an alternative embodiment of the first aspect of the present invention, the system icon comprises a management tool icon, a recycle bin icon, a my computer icon, or a network connection icon.
The second aspect of the present invention provides a file hiding apparatus for a Windows system, the file hiding apparatus comprising:
the new building module is used for building a two-layer folder;
the copying module is used for copying the files to be hidden into the subfolders of the two layers of folders;
a disguise module for disguising the subfolder using a class identifier;
an access control module for restricting the access and deletion of the subfolders using system retention keywords;
and the attribute modifying module is used for modifying the attribute of the root folder of the two-layer folder to hide the root folder.
A third aspect of the present invention provides a file hiding device for a Windows system, where the file hiding device includes: a memory having instructions stored therein and at least one processor, the memory and the at least one processor interconnected by a line;
the at least one processor calls the instructions in the memory to cause the file hiding device to execute any one of the file hiding methods of the Windows system.
A fourth aspect of the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the file hiding method of the Windows system as described in any one of the above.
Has the advantages that: the invention provides a file hiding method, a device, equipment and a storage medium of a Windows system, wherein the file hiding method comprises the following steps: newly building two layers of folders; copying the files to be hidden into subfolders of the two-layer folder; disguising the subfolder using a class identifier; restricting the subfolders from being accessed and deleted using a system retention key; and modifying the attribute of the root folder of the two-layer folder to hide the root folder. The file hiding method of the Windows system integrates a plurality of file hiding means, the hidden file is not easy to find and modify and delete, and the safety of the hidden file is improved.
Drawings
FIG. 1 is a schematic diagram of an embodiment of a file hiding method for a Windows system according to the present invention;
FIG. 2 is a schematic diagram of an embodiment of a file hiding apparatus of a Windows system according to the present invention;
fig. 3 is a schematic diagram of an embodiment of a file hiding device of a Windows system according to the present invention.
Detailed Description
The embodiment of the invention provides a file hiding method, a file hiding device, file hiding equipment and a storage medium of a Windows system.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be practiced otherwise than as specifically illustrated or described herein. Furthermore, the terms "comprises," "comprising," or "having," and any variations thereof, are intended to cover non-exclusive inclusions, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
For convenience of understanding, a specific flow of the embodiment of the present invention is described below, and with reference to fig. 1, a first aspect of the present invention provides a file hiding method for a Windows system, where the file hiding method includes:
s100, newly building a two-layer folder; the two-layer folder comprises a root folder and subfolders located in the root folder;
s200, copying files to be hidden into subfolders of the two layers of folders; the subfolders in the embodiment are used for storing files needing to be hidden;
s300, disguising the subfolders by using class identifiers; the main function of the step is to ensure that the subfolders cannot enter and be accessed by direct double-click, skip is generated, and the files in the subfolders are protected;
s400, using a system reserved keyword to limit the access and deletion of the subfolders; the main function of the step is to ensure that the subfolders cannot enter and be accessed by direct double-click, the system prompts no authority and cannot be deleted, and the system still prompts no authority when deleting;
s500, modifying the attribute of the root folder of the two-layer folder to hide the root folder. This step functions to make the two-tier folder a system-hidden folder.
The technical idea of the technical scheme of the invention is that a multilayer common folder is firstly manufactured on a target partition, then a file/folder to be hidden is copied into a second layer of folder, and then a plurality of special folder creation modes are used for combining and operating to operate a subfolder in which the hidden file is positioned, so that the hiding effect of the file/folder is achieved, thus the hidden file is not easy to find and modify and delete, and the file is recovered to carry out a reverse operation process.
In an alternative implementation manner of the first aspect of the present invention, the disguising the subfolder using the class identifier includes:
renaming the subfolders using class identifiers to make the subfolders masquerade as system icons, and jumping to the system icons when accessed.
In this embodiment, the folder is disguised using the class identifier (CLSID), so that the folder cannot be accessed by directly double-clicking, and a jump is generated to protect the files in the folder.
For example, a file name "123. {645ff040-5081-101b-9f08-00aa002f954e }" is created and displayed as a trash can in the system, because {645ff040-5081-101b-9f08-00aa002f954e } is the CLSID of the recycle bin, and when the mouse is double-clicked, the effect of entering the recycle bin is the same, the files under the folder cannot be directly seen, and the list of CLSID and corresponding icon types is as follows:
in an alternative implementation manner of the first aspect of the present invention, the disguising the subfolder using the class identifier includes:
newly building a folder configuration file in the subfolders;
editing the contents in the folder configuration file causes the subfolders to masquerade as system icons.
In this embodiment, disguising of the subfolders may also be implemented in another manner, that is, a folder configuration file (desktop.ini file) may be used, for example, a desktop.ini file is created in the target folder test, and the contents are:
echo[.ShellClassInfo]
echo CLSID={645FF040-5081-101B-9F08-00AA002F954E}
and a system + hiding + read-only attribute is added to the desktop. ini file, and a test folder is set to be the system + hiding + read-only attribute, so that the effect of disguising the folder can be achieved.
In an alternative implementation manner of the first aspect of the present invention, the using the system retention key to restrict the subfolder from being accessed and deleted includes:
renaming the subfolders by system-reserved keys in a command line manner such that the subfolders cannot be opened by double-clicking.
In the Windows system, part of the system retains keywords, and the file name is not generally allowed to be created, but the names of the CON, the PRN, the AUX, the NUL, the COM (0-9) and the LPT (0-9) are not used as the names of the files or the folders, and the system can report errors. By the way, the folder type can be created under the command line environment, and the command line 'mkdir \ \ text \ \ com 1' can be used to create the folder type by taking the case of creating the com1 subfolder under the D: \ \ test folder as an example, and the effect of creating the folder type is 2: 1. direct double-click cannot enter and be accessed, and the system prompts no authority; 2. can not be deleted, and still prompts no authority when deleted.
In an alternative implementation manner of the first aspect of the present invention, the modifying the attribute of the root folder of the two-layer folder to hide the root folder includes:
and modifying the attribute of the root folder of the two layers of folders into hiding and read-only to realize the hiding of the root folder.
In the Windows system, there are 4 basic attributes for files and folders in the system, which are read-only, system, hidden, and archive attributes, respectively. There is a hidden attribute, the default setting of the system is to not display the files and folders of the hidden attribute, but the setting option is global to the system.
In an alternative implementation manner of the first aspect of the present invention, the modifying the attribute of the root folder of the two-layer folder into hidden and read-only is implemented by an "attribute + s + r + h" command. In this embodiment, the property modification of the root folder can be done using the command line atterb, such as: attrib + s + r + h "folder path", which is more convenient and faster.
In an alternative embodiment of the first aspect of the present invention, the system icon comprises a management tool icon, a recycle bin icon, a my computer icon, or a network connection icon.
The exemplary file hiding method of the Windows system of the invention is as follows:
under the C partition, a two-layer directory is created, which is assumed to be C: \ Demo \ Sub;
copying a file or folder to be hidden into C \ Demo \ Sub;
the name protection of C \ Demo \ Sub is firstly hidden by using CLSID and reserved key words, and then the attribute of C \ Demo is modified to carry out hiding and disguising.
An example procedure for disguising is as follows:
executing a command:
ren"\\.\C:\Demo\Sub""com2.{d20ea4e1-3957-11d2-a40b-0c5020524153}"
newly building desktop.ini under C: \ Demo, the contents are as follows:
echo[.ShellClassInfo]
echo CLSID={645FF040-5081-101B-9F08-00AA002F954E}
executing a command: attrib + s + r + h C \ Demo \ desktop. ini;
executing a command: attrib + s + r + h C: \ Demo.
Referring to fig. 2, a second aspect of the present invention provides a file hiding apparatus for a Windows system, where the file hiding apparatus includes:
the new building module 10 is used for building a two-layer folder; the two-layer folder comprises a root folder and subfolders positioned in the root folder;
a copy module 20, configured to copy a file to be hidden into a subfolder of the two-layer folder;
a disguising module 30 for disguising the subfolders using the class identifiers;
an access control module 40 for restricting the subfolders from being accessed and deleted using a system retention key;
and the attribute modifying module 50 is used for modifying the attribute of the root folder of the two-layer folder to hide the root folder.
In an alternative embodiment of the second aspect of the present invention, the disguising module comprises:
and the disguising unit is used for renaming the subfolders by using the class identifiers so as to make the subfolders disguise as system icons, and jumping to the system icons when being accessed.
In an alternative embodiment of the second aspect of the present invention, the disguising module comprises:
a new creating unit, configured to create a folder configuration file in the subfolder;
and the editing unit is used for editing the content in the folder configuration file to enable the subfolders to be disguised as system icons.
In an optional implementation manner of the second aspect of the present invention, the access control module includes:
and the renaming unit is used for renaming the subfolders by using system reserved keywords in a command line mode so that the subfolders cannot be opened by double clicking.
In an alternative embodiment of the second aspect of the present invention, the attribute modification module includes:
and the modifying unit is used for modifying the attribute of the root folder of the two layers of folders to be hidden and read-only so as to realize the hiding of the root folder.
In an alternative embodiment of the second aspect of the present invention, the modifying the attribute of the root folder of the two-layer folder to be hidden and read-only is implemented by an "attribute + s + r + h" command.
In an alternative embodiment of the second aspect of the present invention, the system icon includes a management tool icon, a recycle bin icon, a my computer icon, or a network connection icon.
Fig. 3 is a schematic structural diagram of a file hiding device of a Windows system according to an embodiment of the present invention, which may generate relatively large differences due to different configurations or performances, and may include one or more processors 60 (CPUs) (e.g., one or more processors) and a memory 70, and one or more storage media 80 (e.g., one or more mass storage devices) for storing applications or data. The memory and storage medium may be, among other things, transient or persistent storage. The program stored on the storage medium may include one or more modules (not shown), each of which may include a series of instruction operations in a file hiding device for a Windows system. Further, the processor may be configured to communicate with a storage medium, and execute a series of instruction operations in the storage medium on a file hiding device of the Windows system.
The file hiding device of the Windows system may also include one or more power supplies 90, one or more wired or wireless network interfaces 100, one or more input-output interfaces 110, and/or one or more operating systems, such as Windows Server, Mac OS X, Unix, Linux, FreeBSD, etc. Those skilled in the art will appreciate that the file hiding device structure of the Windows system shown in fig. 3 does not constitute a limitation of the file hiding device from the Windows system, and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The present invention also provides a computer-readable storage medium, which may be a non-volatile computer-readable storage medium, or a volatile computer-readable storage medium, wherein instructions are stored in the computer-readable storage medium, and when the instructions are executed on a computer, the instructions cause the computer to execute the steps of the file hiding method for the Windows system.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses, and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.
Claims (10)
1. A file hiding method of a Windows system is characterized by comprising the following steps:
newly building two layers of folders;
copying the files to be hidden into subfolders of the two-layer folder;
disguising the subfolder using a class identifier;
restricting the subfolders from being accessed and deleted using a system retention key;
and modifying the attribute of the root folder of the two-layer folder to hide the root folder.
2. The file hiding method for Windows system as claimed in claim 1, wherein said disguising said subfolder with a class identifier comprises:
renaming the subfolders using class identifiers to make the subfolders masquerade as system icons, and jumping to the system icons when accessed.
3. The file hiding method for Windows system as claimed in claim 1, wherein said disguising said subfolder with a class identifier comprises:
newly building a folder configuration file in the subfolders;
editing the contents in the folder configuration file causes the subfolders to masquerade as system icons.
4. The file hiding method for Windows system as claimed in claim 1, wherein said restricting access and deletion of said subfolders using system-retained keywords comprises:
renaming the subfolders by system-reserved keys in a command line manner such that the subfolders cannot be opened by double-clicking.
5. The file hiding method for the Windows system according to claim 1, wherein said modifying the property of the root folder of the two-layered folder to hide the root folder comprises:
and modifying the attribute of the root folder of the two layers of folders into hiding and read-only to realize the hiding of the root folder.
6. The file hiding method for the Windows system as claimed in claim 5, wherein the modifying the attribute of the root folder of the two-layer folder to hide and read only is implemented by an "atterb + s + r + h" command.
7. The file hiding method for Windows system as claimed in claim 2 or 3, wherein the system icon includes a management tool icon, a recycle bin icon, a my computer icon or a network connection icon.
8. A file hiding apparatus of a Windows system, the file hiding apparatus comprising:
the new building module is used for building a two-layer folder;
the copying module is used for copying the files to be hidden into the subfolders of the two layers of folders;
a disguise module for disguising the subfolder using a class identifier;
an access control module for restricting the access and deletion of the subfolders using system retention keywords;
and the attribute modifying module is used for modifying the attribute of the root folder of the two-layer folder to hide the root folder.
9. A file hiding device of a Windows system, the file hiding device comprising: a memory having instructions stored therein and at least one processor, the memory and the at least one processor interconnected by a line;
the at least one processor calls the instructions in the memory to cause the file hiding device to perform the file hiding method of Windows system according to any of claims 1-7.
10. A computer-readable storage medium having a computer program stored thereon, wherein the computer program, when executed by a processor, implements the file hiding method of the Windows system according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110513151.7A CN113505099A (en) | 2021-05-11 | 2021-05-11 | File hiding method, device, equipment and storage medium of Windows system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110513151.7A CN113505099A (en) | 2021-05-11 | 2021-05-11 | File hiding method, device, equipment and storage medium of Windows system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113505099A true CN113505099A (en) | 2021-10-15 |
Family
ID=78008441
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110513151.7A Pending CN113505099A (en) | 2021-05-11 | 2021-05-11 | File hiding method, device, equipment and storage medium of Windows system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113505099A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102142069A (en) * | 2011-05-05 | 2011-08-03 | 北京思创银联科技股份有限公司 | Method for hiding folders |
CN102768717A (en) * | 2012-06-29 | 2012-11-07 | 腾讯科技(深圳)有限公司 | Malicious file detection method and malicious file detection device |
CN102831351A (en) * | 2012-09-04 | 2012-12-19 | 北京奇虎科技有限公司 | Method and device for indicating security attribute of computer icons |
CN106096395A (en) * | 2016-06-16 | 2016-11-09 | 北京奇虎科技有限公司 | A kind of protection treating method and apparatus of Android application |
CN106909855A (en) * | 2017-03-24 | 2017-06-30 | 腾讯科技(深圳)有限公司 | File hiding method and device |
CN107040540A (en) * | 2017-04-20 | 2017-08-11 | 北京奇虎科技有限公司 | A kind of cloud private data display methods and device, server and mobile terminal |
CN108959573A (en) * | 2018-07-05 | 2018-12-07 | 京东方科技集团股份有限公司 | Data migration method, device, electronic equipment and storage medium based on desktop cloud |
-
2021
- 2021-05-11 CN CN202110513151.7A patent/CN113505099A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102142069A (en) * | 2011-05-05 | 2011-08-03 | 北京思创银联科技股份有限公司 | Method for hiding folders |
CN102768717A (en) * | 2012-06-29 | 2012-11-07 | 腾讯科技(深圳)有限公司 | Malicious file detection method and malicious file detection device |
CN102831351A (en) * | 2012-09-04 | 2012-12-19 | 北京奇虎科技有限公司 | Method and device for indicating security attribute of computer icons |
CN106096395A (en) * | 2016-06-16 | 2016-11-09 | 北京奇虎科技有限公司 | A kind of protection treating method and apparatus of Android application |
CN106909855A (en) * | 2017-03-24 | 2017-06-30 | 腾讯科技(深圳)有限公司 | File hiding method and device |
CN107040540A (en) * | 2017-04-20 | 2017-08-11 | 北京奇虎科技有限公司 | A kind of cloud private data display methods and device, server and mobile terminal |
CN108959573A (en) * | 2018-07-05 | 2018-12-07 | 京东方科技集团股份有限公司 | Data migration method, device, electronic equipment and storage medium based on desktop cloud |
Non-Patent Citations (1)
Title |
---|
孤舟;: "类标识符助你玩出新花样", 个人电脑, no. 7, pages 135 - 136 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3535668B1 (en) | Storage isolation for containers | |
US5778389A (en) | Method and system for synchronizing computer file directories | |
US5778222A (en) | Method and system for managing access to objects | |
US9465518B1 (en) | Method and system for creation, analysis and navigation of virtual snapshots | |
US7146388B2 (en) | Method, system, and program for archiving files | |
US5905990A (en) | File system viewpath mechanism | |
US8775487B2 (en) | Filesystem access for web applications and native code modules | |
US6931544B1 (en) | Method and apparatus for executing multiple JAVA(™) applications on a single JAVA(™) virtual machine | |
TWI333614B (en) | Method, system, and program for processing a file request | |
US8799333B2 (en) | Delayed deletion of extended attributes | |
US20080098309A1 (en) | Managing virtual machines and hosts by property | |
US20060277218A1 (en) | Running internet applications with low rights | |
US10417179B2 (en) | Method for managing files and apparatus using the same | |
CN109684298B (en) | Database migration method, device, equipment and storage medium | |
US8266112B1 (en) | Techniques for recovery of application level objects | |
EP0628907B1 (en) | Method of running on a computer system an application not designed to run on the computer system | |
CN102819717B (en) | Method and device for carrying out protection processing on file | |
US7958097B1 (en) | Method and system for implementation of data storage quota | |
US5655154A (en) | Method and system for sharing utilities between operating systems | |
Paliy et al. | The logical structure of the software file archive formation as a part of industrial management | |
CN113505099A (en) | File hiding method, device, equipment and storage medium of Windows system | |
JP2008152519A (en) | Computer and its basic software | |
US11113127B2 (en) | Command line output redirection | |
US20060253858A1 (en) | Software service application and method of servicing a software application | |
CN100424652C (en) | Had disk self-recovery protecting method based on embedded operation system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |