Most of us have some rather sensitive files on our PCs. Whether its our tax returns, financial records, password lists (seriously, just use a password manager already), or just files you dont want anyone to see under any circumstances, we all have our reasons for wanting a bit more security. This means that its time to get into encryption, which is where a drive, file, or folder is encoded (encrypted) so as to make it unreadable to anyone except the person with the right key to decrypt it. The upside is that anyone attempting to access it without the password will fail, and the downside is that if you lose the encryption key (usually a password), whatever you had encrypted will be gone forever, unless theres a way to recover it.
Luckily, in Windows you have options on how to do this for absolutely no cost whatsoever. Windows 10/11 Pro users have encryption tools built into the OS; while users of the Home variant must use a free third-party utility. Whether you want full-drive encryption, or just a secure space to keep your important records, one of these tools will fit the bill.
Windows 10 or 11 Pro offers two built-in encryption tools: There is this simple tool, which can be used to encrypt any filehowever, in our testing we had issues with it, so we recommend using the other option, Bitlocker. Bitlocker offers full-drive encryption only, however, but thankfully you can choose between encrypting the entire drive, or just the space thats being used. Encrypting an entire drive does incur a performance penalty, but if its your work laptop and everything you are working on is on your C:/ drive, its a good option to consider. Its also a good option for external drives, as most of us have lost a few of those over the course of our lives, and lord knows what we had on them when we did so. Setting up Bitlocker is relatively painless, so follow along.
If you just type the word Bitlocker in Windows search itll appear, or you can find it in the Control Panel listed as Bitlocker Management. When you open it, youll be presented with a list of your attached storage devices, both internal and external. Were going to install it on our external drive, F.
Josh Norem/IDG
After youve enabled Bitlocker on the drive of your choice, Microsoft will ask you how you want to unlock the drive, either via a password or with a Smart Card; we chose a password. If you choose a Smart Card youll need a USB drive, which will be paired with a PIN code to unlock the drive.
Josh Norem/IDG
Next, Microsoft will ask you how you want to restore the recovery key, which could save your behind if you ever forget your password, or lose your Smart Card. We chose to have the recovery key accessible via our Microsoft Account, as that seems to be the most secure method of storing it, and definitely smarter than printing it out!
Josh Norem/IDG
One of the last steps is deciding how much of the drive to encrypt: all of it, or just the used space. We chose just the used space simply because it should result in faster drive performance.
Josh Norem/IDG
Youll also have to choose which encryption mode you want: one that works with newer PCs, or one thats compatible with older versions of Windows. Since we only have Windows 10/11 PCs in our house, we chose the newer version.
Josh Norem/IDG
Were all set now, so go ahead and click Start Encrypting. On our 256GB test drive, the encryption process took just a few seconds. Once its complete, your data is now encrypted.
Josh Norem/IDG
Going forward, inserting the now-encrypted drive results in the error seen below, instead of just automatically opening like it does for external storage.
Josh Norem/IDG
Youll also get a pop-up from Windows asking you to type the encryption password, or the recovery key. Thankfully, Windows gives you the option of automatically unlocking on a certain PC, which is handy if youre using it a lot on a home PC as opposed to a laptop.
Josh Norem/IDG
If you have the Home version of Windows, you can still get in on the encryption game with Veracrypt, which is a free utility that can encrypt a folder, drive, or partition. This handy tool lets you mount an encrypted virtual disk in Windows, MacOS, and Linux. When you enter your password the disk is mounted and your files appear, but when you close the program, the disk unmounts and the files are no longer accessible. We didnt test the disk or partition encryption, so these instructions only apply to creating an encrypted folder. Lets jump in, shall we?
To get started, download the free utility and fire it up. To begin, youll need to create the encrypted volume, so click on Create Volume.
Josh Norem/IDG
On the next screen we chose Create an encrypted file container, as were just looking for a repository for our sensitive documents and media.
Josh Norem/IDG
Next we chose Standard Veracrypt volume as its fine for the vast majority of home users.
Josh Norem/IDG
Next you have to choose the location for this file, so consider the size of the folder you will create, and make sure your storage device has enough room to hold it. We made a folder on one of our hard drives labeled Veracrypt since were good at hiding things, and then typed the name of the file into the dialogue box that appeared, resulting in what you see in the screenshot. Also note you can create this volume on a removable drive too.
Josh Norem/IDG
Next you have a lot of encryption options, but just select AES and click through. AES-256 encryption is considered the strongest form of encryption and cannot be cracked with brute strength, so it should work for your purposes.
Josh Norem/IDG
Now decide how big you want your container to be. You cant go back and make it bigger later, so shoot for the moon, assuming you have enough room. We decided to make ours 1GB.
Josh Norem/IDG
With that information inputted, the program is ready to create the volume on your drive. Dont be afraid by all the hacker looking stuff on the screen, just click Format and youre off to the races.
Josh Norem/IDG
Once the process is completed, it will show you that the volume is ready.
Josh Norem/IDG
You can now navigate to where the container is just to verify its existence and see its file size, if that is important to you. Youll note that clicking on it does nothing, as you have to use the Veracrypt program to actually open it, so lets do that now.
Josh Norem/IDG
Now its time to access our encrypted volume. Open Veracrypt and choose Select File from the main menu, then navigate to the folder where its located. Youll also need to choose a volume letter from the list provided, so choose one that is not in use like X or M, something like that. Once youve chosen the volume letter, and navigated to the file, click Mount.
Josh Norem/IDG
After that completes youll see the same window with the path to your file in blue. Double-click that and the volume will open. You will also see the same volume appear in This PC as well, if you prefer that method.
Josh Norem/IDG
Et voilahere are our encrypted files! These are quite sensitive cat photos, obviously, but feel free to throw anything you want in there, knowing its about as secure as it can possibly be for now.
Josh Norem/IDG
One final note: As long as the volume is mounted, it is accessible. So that means if you open it up, put some files in it, then just walk away from your PC, anyone with physical access to it can also look at the files. To complete the process, you have to click Dismount on the main screen of Veracrypt to shut the door on your encrypted folder. Once youve dismounted the volume, it will no longer be accessible without the encryption password.
Josh Norem/IDG
If you want to encrypt your drive to prevent unauthorized access, its built right into Windows Pro versions, so it is worth it on something that might get smashed and grabbed from a car, such as a laptop. For your desktop PC that never moves, the benefits are debatable. We do like having an encrypted folder via Veracrypt, however, for all of our tax returns and similar documents. Just be absolutely sure you keep the password somewhere safe, since you will never get back into that secure disk if you lose it.
Continued here:
How to encrypt files in Windows - PCWorld
- Report: NSA building comp to crack encryption types [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Report: NSA looking to crack all encryption with quantum computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Sound Advice: Explaining Comcast cable encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA Building Encryption-Busting Super Computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA researches quantum computing to crack most encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Advanced Encryption Standard - Wikipedia, the free encyclopedia [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- How Encryption Works - HowStuffWorks "Computer" [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - MB Technology Solutions - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Toshiba WT8 Full Disk Encryption, Miracast, Easy Stand - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Australian Encryption | Text encryption software for the protection of your privacy - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- njRAT v0 6 4 server Clean Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- AlertBoot New Encryption Compliance Reports Prepare Covered Entities For HIPAA Audits [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- BlackBerry denies using backdoor-enabled encryption code [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What Is Encryption? (with pictures) - wiseGEEK [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- HowStuffWorks "How Encryption Works" [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Gambling with Secrets Part 5 8 Encryption Machines - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- The Benefits of Hosted Disk Encryption - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quill Encryption - what's that? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- WhatsApp Encryption - Shmoocon 2014 by @segofensiva @psaneme - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo2 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Seven - Encryption Official Lyric Visual - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quantum Computers - The Ultimate Encryption Backdoor? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Eric Schmidt: Encryption will break through the Great Firewall of China [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- From NSA to Gmail: Ex-spy launches free email encryption service [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Tennessee bill takes on NSA encryption-breaking facility at Oak Ridge/SHUT. IT. DOWN. - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Substitute for:Measurements. 1 Episode. Strength of the encryption algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- RSA Encryption Checkpoint - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets 8 8 RSA Encryption 1 - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Google chairman says 'encrypting everything' could end China's censorship, stop NSA snooping [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Ex-spy launches free email encryption service [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- 3 2 The Data Encryption Standard 22 min - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 3 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 2 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- aes tutorial, cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Townsend Security Release First Encryption Key Management Module for Drupal [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- RSA Encryption step 5 - Video [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Lavabit case highlights legal fuzziness around encryption rules [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- A Beginner's Guide To Encryption: What It Is And How To Set It Up [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- How App Developers Leave the Door Open to NSA Surveillance [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- Intro to RSA Encryption step 1 - Video [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- “Honey Encryption” Will Bamboozle Attackers with Fake Secrets [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Encryption - A Life Unlived (DEMO) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Baffle thy enemy: The case for Honey Encryption [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- New AlertBoot Encryption Reports Make Dental HIPAA Compliance Easier [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - The Protest - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - New Life - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Intro - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Blank Canvas - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Security First SPxBitFiler-IPA encryption pattern for the IBM PureApplication System - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Revolutionary new cryptography tool could make software unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- viaForensics webinar: Mobile encryption - the good, bad, and broken - Aug 2013 - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- K.OStream 0.2 File Encryption Test - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Tumblr adds SSL encryption option, but not as the default [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Latest Java Project Source Code on Chaotic Image Encryption Techniques - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Encryption - University of Illinois at Urbana–Champaign [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- A Beginner's Guide to Encryption: What It Is and How to ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Real Data Encryption Software is More Important than Ever ... [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Caesar Cipher Encryption method With example in C Language - Video [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Hytera DMR 256 bit encryption - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Townsend Security Releases Encryption Key Management Virtual Machine for Windows Azure [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Unitrends Data Backup Webinar: Utilizing The Cloud, Deduplication, and Encryption - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Main menu [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Use of encryption growing but businesses struggle with it – study [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- SlingSecure Mobile Voice Encryption Installation Video for Android - Video [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Data breaches drive growth in use of encryption, global study finds [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 2 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 1 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How do I configure User Local Recovery in Endpoint Encryption Manager 276 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Symmetric Cipher (Private-key) Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- SafeGuard File Encryption for Mac - Installation and Configuration - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Fundamentals of Next Generation Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Tutorial: Einrichten der EgoSecure Endpoint Removable Device Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- 'PGP' encryption has had stay-powering but does it meet today's enterprise demands? [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Fact or Fiction: Encryption Prevents Digital Eavesdropping [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- RHCSA PREP:answer to question 20 (Central Authentication Using LDAP with TLS/SSL Encryption) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Protect+ Voice Recorder with Encryption - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]