Skip to main content

Two ways to Hide your drive or partition on your computer.

Day by day hackers are creating new ways to steal the confidential data that are residing on your hard disks by compromising your computer.In order to avoid this type of issue,in this tutorial i am gonna show you how to hide your hard disks using cmd and local group policy editors.so let's see how to hide them.
Two ways to Hide your drive or partition on your computer.

Steps:

Method 1:Using CMD:

1.Run CMD using Administrator rights(Recommended).
2.Now enter "DISKPART" command in it.
3.Optional:In order to see the the entire hard disk enter "list disk".
4.If you want to see the list of drives that are residing on your computer Enter "List volume".
5.Now select the volume which you want to hide.In order to select a volume or drive Enter "select volume "number if the volume" "
6.Now in order to hide the disk,enter "remove letter C or D or E ".After entering the command the specified drive will become invincible.
7.If you want to unlock the drive ,select the volume as done in step 5 and enter "assign letter C or D or E".
Gif image showing how to hide drive using cmd

Video tutorial:

Method 2:Using group policies:

1.Open Run and type 'gpedit.msc'.
2.Now a window will pop up.In that browse to the path given below.
User configuration>>Administrative templates>>Windows components>>Windows explorer.
3.From the list double click on "Hide these specified drives in My computer".
choose 'hide drive'option from windows explorer in gpedit.msc
4.Now choose enable option and the number of drives to be restricted and press ok.
choosing number of drives to be hide in gpedit.msc
5.If you want to unlock the drive,once again go the path and choose disable option.

Video tutorial:


That's it friends i hope you enjoyed the post,if you have any queries feel free to ask us through comments.

Comments

Popular posts from this blog

How to make an Installation file(setup file) using Iexpress.

Hi guys welcome to worldtech360. In this tutorial or article I  am going to show you how to create an installation file(setup file) for the .EXE file which you have created using an inbuilt option in windows 7 named ‘ iexpress ’. So let’s see how to do this. Note: You can also create an installation file for .bat file files or .VBS files or any other files which are executable. Steps: 1. Choose an .EXE file or any other file for which you want to create a setup file or installation file. In this I am going to use .VBS file 2. Open Run and type “ iexpress ” or “ iexpress.exe ” and hit enter. 3. After hitting enter, iexpress wizard window will popup. On the screen you will see two options i.e. “ create new self-extracting directive file ” and the other is “ open existing self-extracting directive file ”. I recommend you to choose the first option as you are going to create a self-extracting file and click next. 4. In the next window select “ Extract files on...

8 Important Tips to Protect Your Magento Store from Hacking

Protection of eCommerce and financial websites is necessary because these websites deal with monetary transactions and stand first as a victim in the list of cyber crime. Magento is the most popular eCommerce platform which also comes under threat of hacking by accessing unauthorized logins and other attacks. Magento Platform is rich in security features but security is needed on the admin level to protect it from cyber criminals. Here are some security tips that help you to protect your Magento store and keep your site safe: 1.Admin Path Customization: It is the first step you can take to keep your Magento site safe is to customize the admin path because the normal login pages and admin pages can easily be accessed by just hit and trial methods and it is very easy to navigate to admin page by hackers if the path remains unchanged. With the use of many hacking software available online, it is easy to guess user name and password combinations and these software can guess user n...

How to Check & Stop Keyloggers in Your PC/Laptop

Do you use public computers, Cyber-Cafe or PC? Then you must know about keyloggers. Keylogger is a small software that can be installed or hidden in your pc without your knowledge. That record user activity (keystroke) and make a log file. It is used by hackers or in companies in surveillance employees’ systems. It can capture your email login details, every click, visited website URLs and even your confidential data like, your bank account number, passwords, credit/ debit card details etc. Keylogger transmit your information to third parties and you can be a victim of an internet scam or frauds. It would be better to understand and protected you from them. In this post I will tell you how to get rid of keyloggers in easy steps. First, we should know how keylogger can be installed in your PC. How keylogger could attack your PC: By using infected pendrives/hard drives. While Downloading torrents, cracks, keygens from internet. Installed by person who wants to track you pc. ...