Category Archives: Gilisoft File Lock Pro

How to Password-Protect a USB Flash Drive

USB flash drives are widely used for storing and transferring personal photos, work documents, and even sensitive financial records due to their portability. However, this very feature makes them prone to loss or theft, posing a risk of data leakage. Setting password protection for USB drives through encryption is a core method to ensure data security. This article focuses on the Gilisoft software suite, detailing targeted encryption solutions for four tools (Gilisoft File Lock Pro, Gilisoft USB Encryption, Gilisoft Full Disk Encryption, and Gilisoft Private Disk) to meet USB security needs in different scenarios.

I. Using Gilisoft Software Suite to Password-Protect a USB Flash Drive

The Gilisoft encryption software suite is designed to address different USB security requirements, covering file-level, partition-level, full-disk, and virtual disk encryption. Whether you need to protect only specific files or encrypt the entire drive with high intensity, it provides suitable solutions.

1. Gilisoft File Lock Pro: Precise File-Level Encryption for USB Drives

Use Case: Ideal for encrypting specific files or folders on a USB drive (e.g., “2024 Contract Documents,” “Personal Photo Album”) without encrypting the entire drive. This avoids wasting encryption resources on non-sensitive data and saves operation time and storage space. The tool primarily achieves precise protection through the “Lock File” and “Hide File” functions under the “External Disk” module, with an operation path that fully aligns with the actual software interface design.

Operation Steps:

  1. Preparation: Install and launch Gilisoft File Lock Pro on a Windows computer. Insert the USB drive to be encrypted and wait for system recognition (ensure the USB drive is displayed as a removable disk in “This PC,” such as Drive G or Drive H).
  2. Access the External Disk Module: In the left menu bar of the software, find and click the “External Disk” option (this is the actual functional category of the software, covering encryption management for all removable storage devices like USB drives and external hard drives, not the “USB Disk” option).
  3. Select the Target USB Drive: After entering the “External Disk” page, the software will automatically list all currently connected external storage devices. Identify the target USB drive using its name, capacity, and file system, then click to select it— the drive name will be highlighted to prevent selecting the wrong device.
  4. Choose Encryption Function (Lock/Hide):
    1. For “Lock File” (encrypt and restrict access): Click the “Lock File” tab at the top of the page to enter the USB drive file directory interface. Browse to find the files/folders to be encrypted, hold the Ctrl key to select multiple files in batches, or hold the Shift key to select consecutive files. After selection, click the “OK” button in the lower right corner.
    1. For “Hide File” (encrypt and hide to prevent discovery): Switch to the “Hide File” tab. The operation logic is the same as “Lock File” — check the target files/folders and click “OK.” Once hidden, the files will no longer be displayed in Windows Explorer.
  5. Set Encryption Password: A password setup window will pop up. Enter a strong master password (it is recommended to include uppercase letters, lowercase letters, numbers, and special symbols, with a length of at least 8 characters; avoid using easily crackable information like birthdays or phone numbers). You can optionally check “Password Hint” and enter a hint related to the password without directly revealing it (e.g., “My first computer model”). Re-enter the password for confirmation and click “Next.”
  6. Complete Encryption and Unlocking: After clicking “Apply,” the software will automatically perform encryption/hiding on the selected files. The completion of the progress bar indicates successful setup.
    1. Unlocking “Locked Files”: Re-enter the “External Disk” → “Lock File” tab, select the target from the list of encrypted files, click the “Unlock” button on the right side of the interface, and enter the password to restore normal access and operation permissions.
    1. Showing “Hidden Files”: In the “External Disk” → “Hide File” tab, select the hidden files/folders, click “Unhide” and verify the password. The files will be displayed again in Windows Explorer.

Core Features:

  • Two-Mode Protection: “Lock” focuses on restricting access (requiring a password to open and modify), while “Hide” focuses on physical invisibility (requiring a password to display). You can flexibly choose based on the sensitivity of the data to meet different protection needs.
  • Precise Filtering: Supports filtering targets by file type (documents, images, videos, etc.), file size, and modification time, eliminating the need to manually search through massive files and improving operation efficiency.
  • Cross-Device Compatibility: Encrypted files can be normally unlocked on other Windows computers with Gilisoft File Lock Pro installed, without being bound to a specific device, adapting to multi-device office scenarios.

2. Gilisoft USB Encryption: Dedicated Partition/Full-Disk Encryption for USB Drives

Use Case: Optimized specifically for USB drives, it is suitable for users who need “partition encryption” (storing sensitive data in some areas and ordinary files in others) or “full-disk encryption” (protecting all data on the drive) for USB drives. It is especially ideal for scenarios where USB drives are frequently plugged and unplugged across different computers, as no additional software is required for unlocking.

Operation Steps:

  1. Insert the USB drive to be encrypted. There is no need to install software on the USB drive; directly run Gilisoft USB Encryption on the computer (supports portable version, which can be used after decompression without complex installation procedures).
  2. The software will automatically scan and list all removable disks connected to the current computer. Find the target USB drive in the list (distinguishable by disk capacity and drive letter), click to select it, then click the “Encrypt” button in the center of the interface.
  3. Select Encryption Mode:
    1. Full-Disk Encryption: Encrypts all data on the USB drive. After encryption, the entire USB drive requires a password to unlock and access, suitable for scenarios where all data on the USB drive is sensitive information.
    1. Partition Encryption: Customize the size of the encrypted partition and non-encrypted partition (e.g., in a 16GB USB drive, allocate 10GB to the encrypted partition for storing work files and 6GB to the non-encrypted partition for daily data). Adjust the ratio by dragging the partition slider and click “Next” to confirm.
  4. Select the encryption algorithm (AES-256 encryption is used by default, which complies with international security standards and has the same encryption strength as bank-level security, balancing security and compatibility). Enter and confirm the password (it is recommended to change the password regularly to enhance account security).
  5. Click “Start Encryption.” The software will display an encryption progress bar and remaining time (the encryption time depends on the USB drive capacity and data volume; a 16GB USB drive usually takes 5-10 minutes). Do not plug in or unplug the USB drive during this period to prevent data damage or encryption failure.
  6. After encryption is completed, insert the USB drive into any Windows computer. The system will automatically pop up a password input window. Enter the correct password to access the USB drive data normally — no additional software installation is required on other computers, enabling “plug-and-play + password protection.”

Core Features:

  • USB Optimization: Optimizes the encryption process based on the read-write speed characteristics of USB drives, reducing encryption waiting time without affecting the normal service life of the USB drive.
  • Format Compatibility: Supports mainstream USB file systems such as exFAT, FAT32, and NTFS. Direct encryption is possible without formatting the USB drive, avoiding the trouble of data migration.
  • Abnormal Protection: In case of unexpected power failure, computer crash, or accidental USB drive unplugging during encryption, the encryption progress can be restored after restarting the software, effectively preventing data loss.

3. Gilisoft Full Disk Encryption: High-Intensity Full-Disk Encryption for USB Drives

Use Case: Designed for USB drives storing highly confidential data (such as business secrets, legal documents, and medical records), it provides “military-grade” full-disk encryption. It not only encrypts user-visible data but also covers deep areas such as disk boot sectors and hidden partitions, preventing data access through technical means to bypass encryption.

Operation Steps:

  1. Install Gilisoft Full Disk Encryption on a Windows computer. After installation, launch the software, insert the USB drive to be encrypted, and switch to the “Removable Disk” tab in the software interface.
  2. Find the target USB drive in the “Removable Disk” list (the software will display detailed information such as disk hardware ID, capacity, and used space to avoid confusion with local disks). Click to select it, then click the “Encrypt Disk” button at the top of the interface.
  3. Select Encryption Algorithm: Three internationally recognized high-intensity encryption algorithms are supported: AES-256, Twofish, and Serpent. Among them, AES-256 has the widest compatibility and is suitable for most scenarios; if ultimate security is pursued, the Serpent algorithm can be selected (it has higher encryption intensity but slightly slower encryption speed).
  4. After setting the master password, it is recommended to click the “Generate Recovery Key” option. Save the generated recovery key file to a secure location (such as an encrypted computer hard drive or offline storage device; do not store it with the target USB drive) for restoring USB drive access rights if the password is forgotten.
  5. Before clicking “Confirm Encryption,” special attention is required: this operation will erase all existing data on the USB drive. Be sure to back up important files on the USB drive to another storage device in advance; after confirming the backup is complete, click “Next” to start encryption.
  6. During the encryption process, the software will display the progress bar and remaining time in real time. After encryption is completed, click “Finish” to close the window. When accessing the USB drive later, launch Gilisoft Full Disk Encryption, select the target USB drive in the “Removable Disk” list, enter the password, and click “Mount.” After successful mounting, the USB drive will be displayed as a normal drive letter in “This PC”; click “Unmount” after use to lock the USB drive again.

Core Features:

  • Deep Encryption: The encryption scope covers disk boot sectors and MBR (Master Boot Record), preventing data access by modifying boot files or using disk tools to bypass the password. Its security is far higher than that of ordinary file encryption.
  • Hardware Acceleration: Supports CPU hardware encryption acceleration technologies such as Intel AES-NI and AMD-V. For USB drives with a capacity of 128GB or more, the encryption speed can be increased by 30%-50%, reducing waiting time.
  • Multi-System Compatibility: In addition to Windows systems, it can also be normally unlocked and accessed on Linux systems with the Gilisoft client installed, adapting to cross-system office scenarios and meeting diverse usage needs.

4. Gilisoft Private Disk: Creating an Independent Virtual Encrypted Disk on a USB Drive

Use Case: Suitable for users who want to separate sensitive data from ordinary data on the same USB drive (e.g., storing “work files” and “daily downloads” separately). An independent encrypted area is created by establishing a “virtual encrypted disk,” which exists as a single file and does not affect the original data structure and usage of the USB drive.

Operation Steps:

  1. Run Gilisoft Private Disk, insert the target USB drive into the computer, and click the “Create Private Disk” button on the main interface of the software to enter the virtual disk creation wizard.
  2. In the “Storage Location” option, click “Browse” to find and select the root directory of the USB drive (it is recommended to store the virtual disk in the root directory of the USB drive for easy subsequent searching and mounting), and specify the save path of the virtual disk.
  3. Configure Virtual Disk Parameters:
    1. Capacity Setting: Customize the virtual disk capacity based on the available space of the USB drive (e.g., in an 8GB USB drive, set a 5GB virtual disk capacity for storing sensitive data and reserve 3GB of space for ordinary files). The maximum capacity shall not exceed the remaining available space of the USB drive.
    1. File System: Select FAT32 (compatible with Windows and macOS systems, suitable for cross-system use) or NTFS (supports single files larger than 4GB, suitable for exclusive use in Windows systems).
    1. Encryption Algorithm: AES-128 (fast encryption speed, suitable for general sensitive data) or AES-256 (high encryption intensity, suitable for highly confidential data) can be selected based on data security requirements.
  4. Enter and confirm the access password for the virtual disk, click the “Create” button. The software will generate a virtual disk file with the suffix “.gpd” in the USB drive (e.g., named “WorkData.gpd” for easy identification of its purpose).
  5. Using the Virtual Disk: Click the “Mount” button on the main interface of the software. In the pop-up window, find the “.gpd” virtual disk file in the USB drive, select it, enter the password, and click “OK” to mount it. The virtual disk will be displayed as an independent drive letter (such as Drive F) in Windows Explorer. You can copy, edit, and save files like a normal disk, and all operations will be encrypted in real time without additional steps.
  6. Locking the Virtual Disk: After use, select the mounted virtual disk in the software and click the “Unmount” button. The virtual disk will be locked immediately, and the drive letter will disappear from the explorer; if you need to hide the virtual disk file, you can enable the “Stealth Mode” of the software to hide the “.gpd” file in Windows Explorer, further enhancing security.

Core Features:

  • Portability: The virtual disk exists as a single file and can be copied and backed up to computer hard drives, other USB drives, and other devices. When restoring, you only need to remount it in Gilisoft Private Disk, enabling flexible and convenient data migration.
  • Isolation: The virtual disk is completely isolated from other areas of the USB drive. Even if the data in the ordinary area of the USB drive is deleted, formatted, or infected with a virus, the virtual disk file remains unaffected, ensuring the security of sensitive data.
  • Multi-Account Support: Multiple access passwords can be set for the same virtual disk, and different permissions (such as “Read-Only” and “Full Control”) can be assigned. It is suitable for permission management when USB drives are shared in teams, preventing data from being modified or deleted by mistake.

II. Conclusion

When choosing a password protection solution for a USB drive, the core is to match your data sensitivity level and usage scenario:

  • If you only need to protect specific files (such as personal photos and scattered documents) and want to flexibly choose between “encrypt to restrict access” or “hide to prevent discovery,” the “External Disk” module of Gilisoft File Lock Pro best meets your needs, with precise operations and simple steps.
  • If you frequently use USB drives across different computers and pursue “plug-and-play” without additional software installation, the partition/full-disk encryption of Gilisoft USB Encryption is the optimal solution, balancing convenience and security.
  • If you store highly confidential data such as business documents and legal files and need to resist technical cracking, the deep full-disk encryption of Gilisoft Full Disk Encryption can provide the highest security level.
  • If you need to separate sensitive data from ordinary data on the same USB drive to achieve “one drive for two purposes,” the virtual disk function of Gilisoft Private Disk can meet your needs, balancing data isolation and usage convenience.

Regardless of which tool you choose, you must note: set a strong password of 12 characters or more (avoid weak passwords such as “123456” and “password”), regularly back up the recovery key or password hint, and do not store the key with the USB drive. Through “tool adaptation to scenarios + good usage habits,” you can maximize the security of USB drive data. Even if the USB drive is lost or stolen, you don’t have to worry about data leakage.

How to Hide Folders and Files Using GiliSoft File Lock Pro

GiliSoft File Lock Pro simplifies the process of hiding sensitive folders and files on Windows systems (compatible with Windows 11, 10, 8, 7), ensuring they remain invisible to unauthorized users—even in regular File Explorer or search tools. Whether you need to conceal personal photos, confidential work documents, or private data, this software provides intuitive methods to keep your files completely out of sight. Below is a detailed step-by-step guide to hiding folders and files, along with tips for managing hidden items.

Step 1: Launch GiliSoft File Lock Pro and Verify the Master Password

Before hiding any items, ensure you can access the software using your Master Password (the core password set during initial software setup, which controls all protection settings):

  1. Open GiliSoft File Lock Pro from your desktop shortcut, Windows Start menu, or by searching for the program.
  2. When prompted, enter your Master Password and click OK to log into the main dashboard.
  • Note: If you forget the Master Password, you may lose access to hidden items. Store it securely in advance (e.g., in a password manager).

Step 2: Hide Folders and Files via the Main Dashboard (2 Methods)

GiliSoft File Lock Pro offers two primary ways to hide folders and files: using the “Hide” wizard (for guided operation) or manual selection (for quick use). Both methods ensure hidden items are invisible in Windows File Explorer and third-party file managers.

Method 1: Use the “Hide” Wizard (Guided Operation)

This method is ideal for first-time users, as it walks you through selecting items and confirming visibility settings step by step:

  1. On the main dashboard, locate and click the Hide Files/Folders button (usually marked with a folder/file icon paired with a “hide” symbol, such as a faded or crossed-out icon).
  2. A wizard window titled “Hide Files and Folders” will pop up. Click Next to proceed to the item selection step.
  3. In the file browser window:
  • Navigate to the folder or file you want to hide (e.g., C:\Users\YourUsername\Documents\PrivateNotes or D:\Photos\FamilyVacation).
  • Select single or multiple items: Hold the Ctrl key to pick multiple files/folders, or the Shift key to select a range of consecutive items.
  • Click Add to move the selected items to the “Items to Hide” list.
  1. After adding all the items you want to hide, click Next. The wizard will prompt you to confirm visibility settings:
  • Ensure the “Completely hide selected items (invisible in File Explorer)” option is checked (this is the default setting).
  • Avoid selecting “Partial Hide” (if available)—this option only restricts access rights and does not hide items.
  1. Click Finish to apply the hide settings. The software will process the items immediately, and they will no longer appear in Windows File Explorer afterward.

Method 2: Hide via Right-Click Menu in File Explorer (Quick Hide)

If you need a more convenient way to hide files/folders without opening the software’s main dashboard, you can use the right-click menu directly in Windows File Explorer (the software automatically adds this shortcut option after installation):

  1. Open Windows File Explorer (press the Win + E shortcut key) and navigate to the location of the folder or file you want to hide. For example:
  • A desktop folder, a file in D:\WorkDocuments, or an item on an external USB drive.
  1. Locate the target folder/file, then right-click it. In the pop-up right-click menu, find and select “Hide with GiliSoft” (or simply labeled “Hide”—the exact name may vary slightly by software version, but it usually includes the GiliSoft logo or identifier).
  2. A GiliSoft verification window will pop up (to ensure authorized operation). Enter your Master Password and click OK.
  • Instant Result: After verification, the selected folder/file will disappear from File Explorer immediately. To confirm, refresh the current directory or reopen File Explorer—the item will be completely invisible.

Step 3: Hide Items on External Drives (USB/Portable Hard Drives)

GiliSoft File Lock Pro also supports hiding folders and files on external storage devices (e.g., USB drives, portable hard drives), ensuring your data remains hidden even when the drive is connected to another computer:

  1. Connect the external drive to your computer (ensure it is detected by Windows, e.g., labeled “Removable Disk (F:)”).
  2. Open Windows File Explorer, find the external drive, double-click to access it, and locate the folder or file you want to hide.
  3. Follow Method 2 (Right-Click Menu in File Explorer) above: Right-click the target item, select “Hide with GiliSoft,” and enter your Master Password for verification to complete the hiding process.
  • Key Advantage: Hidden items on external drives remain invisible even when the drive is plugged into another Windows PC—only someone with GiliSoft File Lock Pro and your Master Password can unhide them.

Step 4: Verify That Hidden Items Are Truly Invisible

After hiding folders/files, confirm they cannot be accessed through regular methods:

  1. Open Windows File Explorer (press Win + E).
  2. Navigate to the original location of the hidden item (e.g., check your desktop if you hid a desktop folder, or open Drive D: if you hid an item there).
  3. The hidden item should not appear in the file list—even if you enable “Show hidden files, folders, and drives” in the “View” tab of File Explorer (GiliSoft bypasses this Windows setting to ensure items stay truly hidden).
  4. Try searching for the hidden item using Windows Search (press Win + S) or a third-party search tool (e.g., Everything). The item will not appear in the search results.

Step 5: Manage Hidden Items (Unhide, Pause/Resume Hiding)

When you need to access hidden folders/files or adjust their visibility, use the following management tools:

Unhide Specific Items

To make a hidden folder/file visible again, you must use the software’s main dashboard:

  1. Open GiliSoft File Lock Pro and log into the main dashboard with your Master Password.
  2. Go to the Hidden Items tab (a dedicated section listing all currently hidden files/folders, showing each item’s name, original path, and hiding time).
  3. Locate the item you want to unhide: Use the search bar (if available) to quickly find it by name or path.
  4. Right-click the item and select Unhide Selected Item (or “Set Visibility > Visible”).
  5. Click Yes in the confirmation window. The item will immediately reappear in its original location in Windows File Explorer.

Pause/Resume Hiding for All Items

If you need to access multiple hidden items at once (e.g., during a work session), you can temporarily pause hiding for all items—no need to unhide them one by one:

  1. On the main dashboard, click the Pause Hiding button (usually located at the top of the window, marked with a “pause” icon and the word “Visibility”).
  2. A prompt window will appear. Enter your Master Password (to confirm authorization) and click OK.
  3. All hidden items will temporarily become visible, allowing you to access, edit, or move them normally.
  4. When you finish working, click the Resume Hiding button on the dashboard. The software will rehide all items, restoring their invisible status.

(Optional) Set a Shortcut Key for Quick Pause/Resume Hiding

For even faster access to pause/resume hiding, configure a custom shortcut key:

  1. In GiliSoft File Lock Pro, go to Settings (located in the top menu bar, marked with a gear icon).
  2. Select the Hotkeys tab and find the “Pause/Resume Hiding” option.
  3. Click the “Set Hotkey” input box, then press your desired key combination (e.g., Ctrl + Alt + H). Ensure the combination does not conflict with other Windows shortcut keys.
  4. Click Save to apply the shortcut key setting. From now on, you can press your custom key combination at any time to toggle hiding on or off (you will still need to enter your Master Password for security).

Important Notes About Hidden Items

  • Do Not Hide System Files: Never hide system folders/files (e.g., C:\Windows, C:\Program Files). Hiding these can cause Windows to crash, prevent programs from running, or disrupt system updates.
  • Safe Operation Before Uninstallation: If you decide to uninstall GiliSoft File Lock Pro, first unhide all items (via the “Hidden Items” tab). If you uninstall the software without unhiding items, they may remain invisible permanently—you will need to reinstall the software and use your Master Password to restore their visibility.
  • Free Trial Functionality: The free trial version of GiliSoft File Lock Pro includes full hiding features. It is recommended to test with non-essential files first to familiarize yourself with the process before hiding sensitive data.

With GiliSoft File Lock Pro, hiding folders and files is simple, secure, and reversible. By following the steps above, you can ensure sensitive data remains hidden from others while maintaining easy access to it when you need it.

How to Lock Folders and Drives with Passwords Using GiliSoft File Lock Pro

GiliSoft File Lock Pro is a powerful tool designed to secure sensitive data on Windows systems (compatible with Windows 11, 10, 8, 7) by password-locking folders and drives. Whether you need to protect personal documents, work files, or prevent unauthorized access to non-system drives, this software provides an intuitive and customizable solution. Below is a detailed step-by-step guid. Locking it will prevent normal access to system files, causing severe issues like boot failures, program crashes, and disrupting your computer’s functionality.

Step 1: Launch GiliSoft File Lock Pro and Set Up the Master Password

Before you start locking items, you first need to set a Master Password to control access to the software itself, ensuring only you can manage protection settings:

  1. Download and install GiliSoft File Lock Pro from the official website (you can use the free trial version first or purchase a full license).
  2. Launch the software. On first run, you will be prompted to create a Master Password:
    • Enter a strong password (we recommend a combination of uppercase/lowercase letters, numbers, and symbols—avoid simple combinations like “123456”).
    • Re-enter the password to confirm and prevent typos.
    • (Optional) Set a password hint (in case you forget the Master Password), then click OK to save.
  3. Once the Master Password is set, you will access the main dashboard, where core features like “Lock Folders,” “Lock Drives,” and “Hide Files” are available.

Step 2: Lock a Folder with a Password (Avoid Critical System Directories on the System Drive)

There are two convenient ways to lock folders. When operating, do not lock system directories on the C: drive (e.g., “C:\Windows” or “C:\Program Files”). Only lock personal data folders (such as “C:\Users\YourName\Documents\Private Files”) or folders on non-system drives (D:, E:, F: drives).

Option A: Drag-and-Drop (Quick Lock)

  1. Open Windows Explorer and locate the target folder (e.g., D:\Work Data\Client Information or C:\Users\YourName\Desktop\Private Photos).
  2. Click and hold the folder, then drag it directly into the GiliSoft main window.
  3. A pop-up window titled “Set Password for Folder” will appear. Configure the following:
    • New Password: Set a unique password for unlocking this folder (we recommend using a different password than the Master Password).
    • Confirm Password: Re-enter the password to verify.
    • Access Type (Optional):
      • Full Access: After unlocking, you can read, write, modify, and delete files;
      • Read-Only: Only allows viewing—editing or deleting is prohibited.
  4. Click Lock. The folder will be marked as “Locked” in the software dashboard and cannot be accessed without the password.

Option B: Manual Folder Selection

  1. On the main dashboard, click the Lock Folders button (marked with a folder + lock icon).
  2. A file browser window will open. Navigate to the target folder (avoiding critical system directories), select it, and click OK.
  3. Repeat the password setup and access type configuration steps from Option A, then click Lock to complete the process.

Step 3: Lock a Drive with a Password (NEVER Lock the System Drive)

This feature supports locking non-system local drives (D:, E:, F:), external USB drives, and portable hard drives. However, you must NEVER lock the system drive (C: drive)—the C: drive stores core Windows operating system files. Locking it will prevent your computer from booting, loading drivers or programs, and may even require a system reinstall to fix. Follow these steps:

  1. On the main dashboard, click the Lock Drives button (marked with a drive + lock icon).
  2. A list of drives will appear. Only select non-system drives (e.g., “Local Disk (D:)”, “Removable Disk (E:)”)—do not check “Local Disk (C:)”.
  3. A pop-up window titled “Set Password for Drive” will open. Enter a unique password (we recommend using a different password than folder passwords) and confirm it.
  4. Click Lock. The drive will be encrypted: double-clicking it to access will trigger a password prompt, and the contents cannot be viewed without the correct password.

Step 4: Unlock a Protected Folder or Drive

When you need to access locked data, follow these steps to unlock:

  1. Locate the target in Windows Explorer:
    • For folders: The icon may appear grayed out or marked with a lock. Double-clicking it will trigger a password prompt.
    • For drives: Double-clicking the drive in “This PC” will directly open the password window.
  2. Enter the corresponding password and click OK. The folder/drive will be temporarily unlocked, allowing you to read and write files normally.

Step 5: Manage Protection Settings (Re-lock, Pause, and Customize)

Re-lock Automatically or Manually

  • Automatic Re-lock: When you close the Explorer window containing the unlocked item, the software will prompt, “Lock the following item?” Click Yes to re-lock it immediately.
  • Manual Re-lock: Right-click the unlocked folder/drive and select Lock with GiliSoft (this option is added to the right-click menu by default).

Pause Protection (Requires Master Password)

If you need to access multiple locked items at once (e.g., during a work session), you can temporarily pause protection:

  1. Launch GiliSoft File Lock Pro and log in with your Master Password.
  2. Click the Pause Protection button on the main dashboard—all locked items will be temporarily unlocked.
  3. When you finish working, click Resume Protection to re-lock all items with one click.

Customize Settings

  • Right-Click Menu Configuration: Go to Settings > Context Menu and check the “Lock/Unlock” options to ensure quick access via the right-click menu.
  • Hide Feature: For enhanced privacy, you can choose to “Hide” folders/drives (instead of just locking them). Hidden items will disappear from Windows Explorer and can only be restored via the software (again, avoid system directories).

Critical Safety and Operation Tips

  1. NEVER Lock the System Drive (C: Drive): The system drive is tied to Windows startup and program operation. Locking it will cause irreversible system failures—always double-check the drive type before proceeding.
  2. Password Management: The Master Password is key to managing the software—never share it with others. It is recommended to record passwords and store them in a secure location (e.g., an encrypted password manager) to avoid data inaccessibility due to forgotten passwords.
  3. Trial and Uninstallation: The free trial version offers full functionality for testing. To uninstall, use the Windows Control Panel—no residual files or usage restrictions will remain.
  4. Data Backup: Before locking important data, back up copies to prevent permanent data loss due to software malfunctions or password loss.

By following these steps, you can safely use GiliSoft File Lock Pro to protect sensitive data while avoiding system disruptions caused by incorrect operations.

How to Create a Private Folder with Gilisoft File Lock Pro (for Windows 11 and 10)

Do you often share your PC with family, friends, or colleagues but worry about sensitive files—like work contracts, personal photos, or financial records—being accidentally deleted, edited, or snooped on? Or maybe you’re working on a confidential project and want to keep it hidden until it’s finished? With Gilisoft File Lock Pro, you can easily create a private folder to secure your important data, either by hiding it from view or locking it with a password. Here’s a step-by-step guide to get you started.

Step 1: Download and Install Gilisoft File Lock Pro

First, you need to get Gilisoft File Lock Pro on your Windows 11 or 10 PC:

  1. Visit the official Gilisoft website (ensure you download from a trusted source to avoid malware) and find the “Gilisoft File Lock Pro” download page.
  2. Click the “Download” button—most versions offer a free 30-day trial with full functionality, and no credit card is required to start.
  3. Once the installer file is downloaded, double-click it to launch the setup wizard.
  4. Follow the on-screen prompts: agree to the user license agreement, choose an installation path (the default path works for most users), and click “Install” to start the process.
  5. After installation, click “Finish” to launch the software (you can also check the “Create a desktop shortcut” box for easier access later).

Step 2: Launch Gilisoft File Lock Pro and Set a Master Password

The first time you open Gilisoft File Lock Pro, it will prompt you to set a master password—this is the key to accessing the software and managing your private folders, so choose a strong one (mix of letters, numbers, and symbols) and remember it:

  1. In the pop-up window, enter your desired master password twice (to confirm no typos).
  2. Optional: You can set a password hint (e.g., “birthday + pet’s name”) to help you recover the password if you forget it.
  3. Click “OK” to save the master password. The software will now open to its main dashboard, where you can see all protection options (e.g., “Lock File/Folder,” “Hide File/Folder,” “Protect USB Drive”).

Step 3: Choose the Folder to Make Private

Before setting up protection, decide which folder you want to secure. For testing (if you’re new to the software), we recommend creating a test folder on your Desktop or in the “Documents” folder (e.g., name it “Test Private Folder”) and adding a few dummy files to it. Once you’re ready:

  1. On the Gilisoft File Lock Pro main dashboard, select either “Lock File/Folder” or “Hide File/Folder” (choose based on your needs—see below for details):
    • Lock Folder: The folder will still be visible in File Explorer, but anyone who tries to open it will need to enter the password.
    • Hide Folder: The folder will be completely invisible in File Explorer—even if someone enables “Show hidden files, folders, and drives” in Windows settings, it won’t appear.
  2. Click the “Add” button (usually a “+” icon) in the top-right corner of the selected tab.
  3. In the file browser window that pops up, navigate to the folder you want to protect, select it, and click “OK.” The folder will now appear in the list of “Pending Protection” items on the software dashboard.

Step 4: Customize Protection Settings (Optional)

Gilisoft File Lock Pro lets you tweak protection settings for more control:

  • For Locked Folders: After adding the folder, you can set a separate password for it (instead of using the master password). To do this:
    1. Right-click the folder in the “Locked Folders” list and select “Set Password.”
    2. Enter a unique password and confirm it, then click “Save.” This is useful if you want to share access to a specific locked folder with someone (without giving them your master password).
  • For Hidden Folders: No extra password is needed here—hiding a folder relies on the software’s system-level protection to make it invisible. However, you can choose to “Exclude from Protection” for specific users (e.g., let your admin account see the hidden folder while hiding it from other user accounts). To do this:
    1. Right-click the hidden folder in the list and select “User Settings.”
    2. Uncheck the boxes next to the user accounts you want to exclude (e.g., “Administrator”), then click “Apply.”

Step 5: Enable Protection for the Private Folder

Once you’ve added the folder and adjusted settings (if needed), it’s time to activate protection:

  1. Double-check that the correct folder is selected in the list (a checkmark should appear next to it).
  2. Click the “Protect” button (usually a green “Shield” icon) at the bottom of the dashboard.
  3. A confirmation pop-up will appear—click “Yes” to confirm. The software will now apply the protection:
    • If you chose “Hide Folder”: The folder will disappear from File Explorer immediately.
    • If you chose “Lock Folder”: The folder will have a small “Locked” icon overlay in File Explorer, and opening it will prompt for the password.

Step 6: Access the Private Folder Later

When you need to open, edit, or add files to your private folder, follow these steps:

  1. Launch Gilisoft File Lock Pro from your desktop shortcut or the Start menu.
  2. Enter your master password to unlock the software.
  3. To access a hidden folder:
    • Go to the “Hide File/Folder” tab, find your folder in the list, and uncheck the box next to it.
    • Click the “Apply” button— the folder will now reappear in File Explorer, and you can use it like any other folder.
  4. To access a locked folder:
    • You can either:
      1. Go to the “Lock File/Folder” tab, right-click the folder, and select “Unlock” (enter the password if prompted), or
      2. Navigate to the folder in File Explorer, double-click it, and enter the folder’s password when prompted.

Step 7: Resume Protection After Using the Folder

Don’t forget to re-enable protection once you’re done with the private folder:

  1. If you unlocked a hidden folder: Go back to the “Hide File/Folder” tab, check the box next to the folder, and click “Apply”—it will disappear again.
  2. If you unlocked a locked folder: Go to the “Lock File/Folder” tab, right-click the folder, select “Lock,” and click “Apply”—it will be locked again.
  3. You can also close Gilisoft File Lock Pro directly— the software will automatically prompt you to “Resume Protection” if any folders are temporarily unlocked. Click “Yes” to confirm.

Why Use Gilisoft File Lock Pro?

  • Dual Protection Modes: Hide folders completely or lock them with passwords—choose what works best for your needs.
  • System-Level Security: Hidden folders won’t appear even if Windows “Show hidden files” is enabled, and locked folders can’t be bypassed with basic Windows tricks.
  • Easy to Use: The dashboard is intuitive, and you can manage all protected folders in one place.
  • Extra Features: It also supports protecting USB drives, encrypting files, and setting access permissions for different user accounts.

Ready to secure your private files? Download Gilisoft File Lock Pro for free (30-day trial, no credit card required) and start creating your private folder today. Happy (and secure) computing!

In-depth Comparison Between USB Lock and File Lock Pro: Functional Differences, Application Scenarios, and Selection Guide for USB Drive Security Protection

In digital office work and personal data storage, USB drives have become an important carrier for data transmission due to their portability. However, they also face security risks such as data leakage and unauthorized access. As two mainstream security protection software for USB drives, USB Lock and File Lock Pro construct protection systems from different dimensions respectively. This article will conduct an in-depth comparison of the core functional differences between the two, and provide users with an accurate software selection guide based on practical application scenarios.​

I. Core Functional Differences: The Divergence Between “Device Management” and “File Protection” Paths​

There is an essential difference in the functional design logic between USB Lock and File Lock Pro. The former focuses on “device-level access and behavior management”, while the latter emphasizes “file-level encryption and permission locking”. The specific differences are shown in the following table and detailed explanations:​

Functional Dimension​Core Capabilities of USB Lock​Core Capabilities of File Lock Pro​
Core Protection Logic​Device access control to block unauthorized USB drive access and irregular operations​File entity protection to restrict file access and copying through encryption and hiding​
Encryption Mechanism​Only encrypts transmission data of authorized devices, without actively encrypting files in USB drives​AES-256 high-strength encryption, converting files into exclusive formats (.gfl/.exe) that require a password for decryption​
Anti-copy Implementation​Prohibit USB drive write permissions or restrict device access to block copying from the source​Does not prevent recording/printing; indirectly prevents copying by making files invisible and inaccessible through “deep hiding + password locking”​
Device Management Scope​Covers almost all external devices such as USB/SD drives, CD/DVDs, mobile phones, printers, and Bluetooth​Only targets files in USB drives and storage devices, with no external device management capabilities​
Logging and Monitoring​Records detailed USB device access time, file operations (creation/deletion/modification), and authorization/denial history​No device operation logging function; only records file encryption/decryption operations within the software​

1. USB Lock: Building a Security Boundary with “Device Management”​

(1) USB Device Access and Permission Management​

As a core function, USB Lock supports a “whitelist mechanism”, which only allows trusted USB drives added by administrators to access the computer. Unauthorized devices (such as employees’ personal USB drives and external storage devices) will be directly blocked, and a custom prompt message (e.g., “Unauthorized USB drives are prohibited on this device”) can be set when blocking. At the same time, the software can flexibly set the read and write permissions of USB drives:​

  • Read-only Mode: Allows reading data from the USB drive but prohibits writing, suitable for public computers (such as school computer labs) to prevent virus intrusion;​
  • Write-only Mode: Allows writing data to the USB drive but prohibits reading, applicable to enterprise “data collection” scenarios (e.g., employees can only write reports to designated USB drives);​
  • Complete Disabling: Completely blocks the read and write access of USB drives, suitable for high-risk scenarios such as industrial control and confidential office work.​

(2) Multi-device Collaborative Management and Log Tracing​

In addition to USB drives, USB Lock can extend management to CD/DVD drives (disabling reading/burning), mobile phones (prohibiting data transmission via USB connection), Bluetooth/infrared devices (blocking wireless data transmission), and even disable hardware interfaces such as serial ports (com ports) and parallel ports (lpt ports), forming an “all-external-device protection network”.​

Meanwhile, the software’s logging function can retain operation records for more than 6 months, including information such as “device access time, device number, operator (needs to be bound to a computer account), and file transmission path”. In case of data leakage, administrators can quickly locate the responsible person through logs, meeting the audit needs of enterprises.​

2. File Lock Pro: Achieving Precise Protection with “File Protection”​

(1) AES-256 Encryption and Deep Hiding​

File Lock Pro adopts the internationally recognized AES-256 encryption algorithm to perform “byte-by-byte encryption” on files in USB drives. Encrypted files cannot be opened in a conventional way (e.g., encrypting a .doc document into a .gfl format, which requires launching the software and entering a password to decrypt after double-clicking). Even if the USB drive is lost, third parties cannot crack the file content without the password.​

In addition, the software’s “deep hiding” function is far superior to the built-in hiding function of the system: hidden files are not only invisible in the regular file manager but also cannot be detected when the Windows “Show hidden files” option is enabled, when entering safe mode, or when using third-party file recovery tools. They can only be retrieved through the “hidden file management” function within the software, making it suitable for protecting highly sensitive personal privacy or enterprise core files.​

(2) File Anti-copy and Permission Locking​

It should be clearly stated that the “anti-copy” function of File Lock Pro does not prevent recording or printing but is achieved through “permission blocking”:​

  • Undecrypted Files: Cannot perform operations such as copying, dragging, compressing, or renaming, and the system will prompt “insufficient permissions”;​
  • Decrypted but Set to “Read-only” Files: Only allow viewing the content, and prohibit modification, deletion, or format conversion.​

For example, for a USB drive storing enterprise product design drawings, setting it to “encryption + read-only” mode can ensure that authorized employees can only view the drawings and cannot copy or tamper with them privately, avoiding the leakage of core technologies.​

II. Application Scenarios: Matching Needs to Maximize Protection Value​

The functional differences between the two software determine the boundaries of their application scenarios. The selection should be based on factors such as the user (enterprise/individual) and scenario risks (data leakage/device abuse). The specific adaptation situations are as follows:​

1. USB Lock: Suitable for Scenarios Requiring “Unified Management of External Devices”​

(1) Medium and Large Enterprise Office Scenarios​

  • Core Requirement: Prevent employees from using personal USB drives to copy company data, avoid virus spread through external devices, and realize traceability of device operations.​
  • Adaptation Logic: Through the “whitelist + read-write permission management”, only allow USB drives uniformly purchased by the enterprise to access, and prohibit the use of personal devices; the logging function can monitor the USB operations of departments such as sales and R&D to prevent the leakage of customer information and technical documents.​
  • Case: An Internet company managed 500 office computers through USB Lock, added 200 enterprise-exclusive USB drives to the whitelist, and no data leakage incidents caused by USB drives occurred within 3 months.​

(2) Public Computer Locations​

  • Core Requirement: Protect the resources in public devices from tampering or copying, and prevent users from accessing USB drives with viruses to affect device stability.​
  • Adaptation Logic: Set the USB drive to “read-only mode” to allow users to read public resources (such as e-books in libraries) but prohibit data writing; at the same time, disable the CD/DVD burning function to avoid private copying of public resources.​
  • Case: A university computer lab managed 100 computers through USB Lock, only opening the “read-only USB permission”. Within one semester, the virus infection rate of the computer lab decreased by 90%, and no leakage of public teaching materials occurred.​

(3) Industrial Control and Confidential Scenarios​

  • Core Requirement: Block the intrusion of external devices into the industrial control system, and prevent malicious programs from disrupting the production process or stealing confidential data.​
  • Adaptation Logic: Completely disable all external device ports such as USB interfaces, Bluetooth, and infrared, and only retain the connection permission of industrial-specific devices (such as PLC programmers) to build a “physical isolation protection”.​
  • Case: An automobile factory installed USB Lock on 30 control computers of the production line, disabled all external devices, and effectively avoided production interruptions caused by industrial control virus intrusion through USB drives.​

2. File Lock Pro: Suitable for Scenarios Requiring “Precise Protection of Sensitive Files”​

(1) Enterprise Core Departments (R&D/Finance)​

  • Core Requirement: Protect highly sensitive files such as technical patents and financial data, and prevent private copying by internal employees or theft by external personnel.​
  • Adaptation Logic: Perform AES-256 encryption + deep hiding on R&D drawings, financial statements, and other files, and only allow authorized department heads to have the decryption password; at the same time, set “read-only permissions” to avoid file tampering.​
  • Case: The R&D department of a medical device company encrypted 500 product design documents through File Lock Pro, and only 10 core personnel had the decryption permission, with no leakage of technical materials.​

(2) Personal Privacy Protection Scenarios​

  • Core Requirement: Prevent personal privacy (such as family photos, medical records, and bank statements) from being viewed by others after the USB drive is lost.​
  • Adaptation Logic: Encrypt and hide privacy files. Even if the USB drive is found, third parties cannot find the files or decrypt the content without the password.​
  • Case: A user encrypted a USB drive storing personal medical reports through File Lock Pro. Later, the USB drive was accidentally lost, but the finder could not decrypt it, resulting in no privacy leakage.​

(3) Industry-compliant Storage Scenarios​

  • Core Requirement: Meet the compliance requirements for data storage in industries such as medical care and finance (e.g., Data Security Law, Personal Financial Information Protection Technical Specifications), and ensure encrypted storage of sensitive data.​
  • Adaptation Logic: Encrypt files such as patient medical records and customer financial information, and retain encryption records to meet the audit requirements of regulatory authorities.​
  • Case: A hospital encrypted USB drives storing electronic patient medical records through File Lock Pro, which met the compliance requirements for encrypted data storage in the medical industry and passed the inspection of regulatory authorities.​

III. Selection Guide: Three Steps to Lock in the Most Suitable USB Drive Security Solution​

When facing the two software, there is no need to struggle with “which one is better”. You can make an accurate selection only by judging based on “protection goals, application scenarios, and management costs” in three steps:​

Step 1: Clarify the Core Protection Goal​

  • If the goal is to “prevent unauthorized USB drive access and manage device operation behaviors”, prioritize USB Lock (it mainly solves the problem of “device abuse”);​
  • If the goal is to “protect files in USB drives from being cracked, copied, or tampered with”, prioritize File Lock Pro (it mainly solves the problem of “file leakage”).​

Step 2: Match Practical Application Scenarios​

Application Scenario​Recommended Software​Key Decision Points​
Enterprise-wide office device management​USB Lock​Needs to uniformly manage external devices of a large number of computers, and the logging function can meet audit needs​
Sensitive file protection for individuals/small teams​File Lock Pro​No device management permission is required, only precise file protection is needed, and it is easy to operate without professional technology​
Public computers (computer labs/libraries)​USB Lock​Needs to prevent users from abusing USB drives, and the read-only mode can balance “resource sharing” and “security protection”​
Compliant storage in medical/financial industries​File Lock Pro​AES-256 encryption meets industry compliance requirements, and deep hiding can protect customer/patient privacy​
Industrial control/confidential scenarios​USB Lock​Needs to disable all external devices to build physical isolation protection and avoid device intrusion risks​

Step 3: Consider Management Costs and Operation Threshold​

  • USB Lock: Requires administrators to perform unified configuration (such as setting whitelists and assigning permissions), suitable for enterprises with IT teams; the operation threshold is relatively high, and individual users may need learning costs.​
  • File Lock Pro: No complex configuration is required, and individuals or small teams can use it directly (e.g., right-click to encrypt files); it can be used without administrator permissions, suitable for non-technical users.​

IV. Conclusion: Not “Either/Or”, but “Matching Needs”​

USB Lock and File Lock Pro are not opposites but protect USB drive security from different dimensions:​

  • USB Lock is a “device doorman”, which builds a “macro security boundary” by managing external device access and operations;​
  • File Lock Pro is a “file safe”, which realizes “micro-precise protection” by encrypting and hiding to lock file permissions.​

In practical applications, “collaborative protection” can even be realized: for example, an enterprise first manages USB drive access permissions through USB Lock, and then encrypts core files in USB drives through File Lock Pro, building a “device + file” dual security system to minimize the data security risks of USB drives.

How to Fix “Can’t Locate Hidden Folder”? File Lock Pro Makes Hiding & Unhiding Folders Easier

Recently, we received a user’s message that reads:​

“Dell desktop, Windows 11, a USB cable connected external hard drive. I want to HIDE A FOLDER. Then, at another time, I want to UNHIDE THAT FOLDER and work with files (videos and JPGs) by adding files, deleting files, reorganizing files and editing their filenames. Then I would want to again HIDE THAT FOLDER. Can your ‘File Lock Pro’ program do that? I am asking this specific question because I tried a different company’s program and it couldn’t locate the hidden folder when I wanted to unhide it.”​

This user’s request is actually quite common. Many people have the need to hide important or private folders when using computers—these could be precious family photos and videos, or sensitive work files. However, his previous experience was rather frustrating: after trying software from another company, when he wanted to unhide the folder, the software couldn’t even locate the hidden folder. This undoubtedly caused great trouble for file management, and even risked making important files “lost.”​

I believe many of you have had similar worries: you’re afraid of losing the folder after hiding it, but also worried about file security if you don’t hide it; you’re even more afraid of having to search repeatedly in complex software interfaces every time you need to operate, which wastes time and reduces efficiency. The launch of “File Lock Pro” is precisely to solve these pain points. In particular, its powerful folder lock function not only enables secure hiding but also achieves ultimate convenience, perfectly meeting users’ dual needs for folder hiding and efficient management.​

Unlike the software the user tried before, “File Lock Pro” is accurate, stable, and convenient throughout the entire process of hiding and unhiding folders. When you need to hide a folder, simply select the target folder in “File Lock Pro,” enable the lock-and-hide function, and the folder will instantly “disappear” from the regular view, effectively preventing others from viewing it at will. What’s more considerate is that after the locking process is completed, the software will automatically leave a dedicated program icon in the original location of the folder—this means you don’t need to open the main interface of “File Lock Pro” every time to find hidden files. When you need to operate later, just double-click this program icon left in the original location and enter the preset password, and the hidden folder will be displayed immediately, completely eliminating the embarrassment of “not being able to find hidden files.”​

After the folder is displayed again, you can operate it just like a regular folder: freely add videos and JPG files to it, delete unnecessary content, organize and categorize files, or rename files. The entire process is smooth and unobstructed, with no additional operational thresholds. When you finish all file operations, there’s no need for complicated steps either—just click “Relock” through the program icon in the original location again, or directly enable the lock function in the folder operation interface. The folder will quickly return to its hidden state, ensuring privacy and security while saving you the trouble of switching between software repeatedly.​

DRM Protection

If you have also been troubled by other folder-hiding software that cannot locate hidden folders, or if you hope to “get it done in one step” every time you operate hidden files without searching repeatedly in the software, then “File Lock Pro” is definitely your best choice. With its thoughtful design of “leaving a trace in the original location + quick password activation” combined with professional encryption and hiding technology, it makes file management both secure and efficient. You no longer have to make trade-offs between hiding folders, convenient operation, and file security.

Gilisoft File Lock Pro: How to Lock/Unlock Files on Local & External Drives [Complete Guide 2025]

In the digital era, securing sensitive files is non-negotiable. Gilisoft File Lock Pro is a top-tier tool for encrypting and protecting data—whether on your computer’s internal drive or external storage like USBs. This step-by-step tutorial will show you how to lock and unlock files with ease, plus answer common questions to avoid mistakes.

How to Lock & Unlock Files on Local Hard Drives

Local drives (e.g., C: drive, internal SSDs) store most of your daily files. Here’s how to secure them with Gilisoft File Lock Pro:

Step 1: Lock Files on Local Drives

  1. Launch the software: Open Gilisoft File Lock Pro and enter your master password (set during first use).
  2. Select the module: Click the “Local Disk” tab—this is designed for internal storage.
  3. Choose what to lock:
    • To lock individual files: Click “Lock File(s)” and browse to select the files you want to protect (e.g., documents, photos).
    • To lock folders or drives: Use “Lock Folder” or “Lock Drive” instead for bulk protection.
  4. Set a password: You can use your master password or create a unique password for the selected files. Tip: Avoid weak passwords like “123456”!
  5. Confirm locking: Click “Lock” to finish. Locked files will now be inaccessible—you can’t read, edit, or delete them without unlocking.

Step 2: Unlock Files on Local Drives

If you need to access locked files again:

  1. Open the software: Go to the “Local Disk” tab and find the “Locked Files/Folders” list.
  2. Select the target: Choose the file/folder you want to unlock.
  3. Enter the password: Click “Unlock” and input the password used during locking.
  4. Alternative: Right-click unlock: In Windows Explorer, right-click the locked file, select “Gilisoft File Lock Pro > Unlock”, and enter your password.

How to Lock & Unlock Files on External Drives

External drives (USB flash drives, portable HDDs) are easy to lose—securing them is critical. Here’s how Gilisoft File Lock Pro handles them:

Step 1: Lock Files on External Drives (USB/Portable HDD)

  1. Connect your device: Plug in the external drive (USB/portable HDD) and ensure your PC recognizes it.
  2. Open the software: Launch Gilisoft File Lock Pro and go to the “External Disk” module.
  3. Add files to lock:
    • Click “Lock File(s)” or “Lock Folder” and navigate to your external drive (e.g., E: drive).
    • Select the files you want to protect (e.g., work reports, personal backups).
  4. Set password & lock: Use your master password or a new one, then click “Lock”. The files will be locked even if you plug the drive into another computer.

Step 2: Unlock Files on External Drives

To access locked files on an external drive:

  1. Keep the drive connected: Ensure it’s detected by your PC.
  2. Use the software: Go to “External Disk > Locked Files” and select the item to unlock.
  3. Unlock with password: Click “Unlock” and enter the correct password.
  4. Quick unlock via right-click: Right-click the locked file on the external drive, choose “Gilisoft File Lock Pro > Unlock”, and input your password.

Common Questions (FAQ)

  • Q: What if I forget the password?
    A: If you used the master password, reset it via the software’s “Password Recovery” (requires registered email). For unique file passwords, premium versions offer recovery tools.
  • Q: Will locked files work on other computers?
    A: No—locked files on external drives stay protected unless unlocked with the correct password, even on other devices.
  • Q: Is Gilisoft File Lock Pro compatible with Windows 11?
    A: Yes, it supports Windows 10/11, 8, 7, and macOS (check official site for updates).

By following these steps, you can fully leverage Gilisoft File Lock Pro to secure files on both local and external drives. Always remember your password—It’s the key to your data’s safety!

USB Encryption vs. File Lock Pro: A Comparison of Users, Features, and Scenarios for USB Encryption

Here is a summary of the core differences between Gilisoft USB Encryption (a dedicated USB drive encryption tool) and Gilisoft   File Lock Pro (a comprehensive file security tool) in terms of user groups, features, and application scenarios:

I. Differences in User Groups

Typical Users of USB Encryption

  • Enterprise IT Departments / Data Security Managers: Need centralized control over USB drives, such as separating confidential and public areas (e.g., technical documents vs. public materials in internal corporate collaboration), and can accept administrator permission requirements.
  • Research Institutions / Military-Industrial Units: Have extremely high demands for USB encryption strength, requiring resistance to brute-force attacks and physical tampering, such as using AES-256 algorithms for underlying partition modification.
  • Fixed Partners / Supply Chain Stakeholders: Transfer data between controlled devices (e.g., design institutes exchanging drawings with construction parties) where both sides can coordinate to provide administrator permissions.

Typical Users of Gilisoft File Lock Pro

  • Individual Users / Freelancers: Need to protect both local private files (e.g., photos, diaries) and work materials on USB drives, and prefer a single tool to cover all scenarios.
  • Business Professionals Frequent Sending Files: Need to generate standalone encrypted EXE files (decryptable without software installation), such as lawyers sending contracts or designers delivering work.
  • Users of Public Devices: Often need to access USB drives in environments without administrator permissions, such as internet cafes or school computer labs—for example, students submitting assignments or job seekers presenting resumes.

II. Core Differences in Features

Core Features of USB Encryption

  • Full USB Encryption & Partition Isolation: Divides the USB drive into a “secure zone” (password-required access) and a “public zone” (direct read/write). For instance, enterprises can store technical solutions in the secure zone and meeting minutes in the public zone.
  • High-Strength Underlying Encryption: Achieves physical-level protection by modifying the USB drive’s partition table. Encrypted files cannot be recovered by ordinary tools, making it suitable for storing core data.
  • Limitations in Cross-Device Compatibility: Requires administrator permissions to install drivers when first used on another person’s computer, and encryption speed may be slow (e.g., 50% performance drop during large file transfers).

Core Features of Gilisoft File Lock Pro

  • Multi-Scenario File Protection:
    • Local File Encryption: Supports hiding files/folders (invisible even in safe mode) and setting read-only permissions (preventing modification or deletion).
    • Flexible USB Encryption: Allows encrypting only specific folders, with encrypted files retaining their original formats (e.g., Word, Excel) for normal editing.
    • Additional Security Tools: File shredding (permanently destroying sensitive files), log auditing (recording access operations), and time-locking (restricting file usage duration).
  • No Dependence on Administrator Permissions: On others’ computers, simply run the decryption program and enter the password to access—for example, no technical support is needed when demonstrating encrypted solutions on a client’s computer.
  • Cross-Platform Compatibility: Supports Windows and macOS, with generated EXE files decryptable on any system, ideal for international collaboration.

III. Scenario Differences & Selection Recommendations

Scenarios Where USB Encryption is Preferred

  1. Enterprise-Level Partition Management Needs:
    • Example: A manufacturing enterprise requires technical department USB drives to have encrypted zones (storing product design drawings) and public zones (storing production process instructions), limited to internal computer use.
    • Note: Accept slower encryption speeds (e.g., transferring 10GB files may take 50% longer) and potential file corruption risks.
  2. Environments with High Physical Security Threats:
    • Example: Research teams storing genetic data on USB drives in laboratories need protection against physical disassembly and cold-boot attacks (i.e., stealing keys via memory).
  3. High-Strength Transfers Between Fixed Devices:
    • Example: Design institutes and construction parties exchanging drawings via USB drives, where both IT departments can coordinate administrator permissions but require encrypted files to be unbreakable by third-party tools.

Scenarios Where Gilisoft File Lock Pro is Preferred

  1. Public Environments Without Administrator Permissions:
    • Example: Students submitting encrypted assignments in school labs or job seekers showcasing encrypted portfolios at recruitment events—access is granted directly with a password, no system permissions required.
  2. Mixed-Scenario Protection Needs:
    • Example: Freelancers need to encrypt both local financial reports (preventing prying eyes) and client data on USB drives, managed via a single tool.
  3. Flexible File Sharing & Collaboration:
    • Example: Lawyers generating encrypted EXE files for clients, who can double-click to decrypt and view contracts without installing software.
    • Designers can hide source files (e.g., PSD formats) on USB drives and only display JPG previews to prevent unauthorized copying.

IV. Key Risks & Trade-Offs

  • Potential Risks of USB Encryption:
    • Performance Loss: Encryption may slow down USB read/write speeds, and frequent operations may cause file corruption.
    • Poor Cross-Device Compatibility: Inaccessible on computers without driver installation—e.g., re-authorization is needed if partners temporarily switch devices.
  • Potential Risks of Gilisoft File Lock Pro:
    • Limited Encryption Depth: Relies on software-layer password verification; if the USB drive is physically lost, it may be bypassed by professional tools (e.g., key extraction via memory).
    • Scattered Features: Local file management functions may seem redundant if only USB encryption is needed.

Summary: How to Choose?

  • Choose USB Encryption if you need physical-level USB encryption and partition isolation, and can accept administrator permission requirements and performance losses—e.g., for internal enterprise sensitive data transfers.
  • Choose Gilisoft File Lock Pro if you need permission-independent flexible encryption and multi-scenario coverage—e.g., personal privacy protection, frequent file sharing, or use on public devices.

The essential difference lies in this: USB Encryption is a “physical defense” tool, while Gilisoft File Lock Pro is a “permission-based protection” tool. The choice depends on balancing security, convenience, and costs in practical scenarios.

These Scenarios Demand Gilisoft File Lock Pro

In today’s world where data security and management needs are increasingly complex, ordinary file encryption tools can hardly cope with the challenges of diverse scenarios. Gilisoft File Lock Pro, as a comprehensive advanced data protection software, demonstrates irreplaceable value in several key scenarios, making it an inevitable choice for specific needs.​

DRM Protection

Enterprise – level LAN Shared Folder Protection Scenario​

In the internal LAN of enterprises, shared folders are important tools for team collaboration. However, the Windows system itself cannot set password protection for shared folders, which makes sensitive data face the risk of unauthorized access. The unique “Lock LAN Shared Folders” function of Gilisoft File Lock Pro can add a password barrier to these shared resources, and only users who enter the correct password can access them. Whether it is financial statements, customer data or project plans, this function can achieve refined permission control and effectively prevent internal information leakage of enterprises. In contrast, the basic version of File Lock cannot realize password protection for LAN shared folders, which has obvious shortcomings in enterprise collaboration scenarios.​

Encryption Scenario for Cross – device Data Transfer​

In the current era of mobile office, it is often necessary to transfer encrypted files between different devices. Gilisoft File Lock Pro supports encrypting files and folders into EXE format. This kind of portable encrypted file does not depend on the original software and can be opened by entering the password on any computer. For business people who often need to carry data on business trips and users who need to transfer sensitive files between home and work devices, this function greatly improves the convenience of using encrypted files. Although the basic version of File Lock supports EXE format encryption, it does not clearly define its cross – device compatibility, which may lead to problems of unable to access normally in actual cross – device use, making it difficult to meet the needs of mobile office.​

Repair Scenario for Multi – format Damaged Files​

In work, it is inevitable to encounter the situation that important files are damaged, such as videos cannot be played due to transmission interruption, images display abnormally due to storage errors, and documents cannot be opened due to software failures. Gilisoft File Lock Pro integrates a multi – format file repair function, which supports repairing damaged files in various common formats such as MP4, JPG, PDF and MP3, helping users recover key data. Whether it is creative materials of designers, video works of photographers or important documents of office workers, this function can reduce accidental losses. The basic version of File Lock has no file repair capability at all, and can do nothing when files are accidentally damaged, unable to meet users’ needs for ensuring data integrity.​

Efficient Management Scenario for Large – capacity Files​

With the surge of data volume, file storage and management have become a major problem. The file and image compression function provided by Gilisoft File Lock Pro can compress files into zip, 7z or exe formats, significantly reducing the storage space occupation. At the same time, it supports batch resizing of images, which is convenient for optimizing storage without affecting viewing. For photographers who need to manage a large number of photos and content creators who store massive materials, this function can effectively improve storage efficiency. The basic version of File Lock lacks such file management tools, and users need to install additional compression software, which increases the operation complexity and is difficult to meet the needs of efficient file management.​

Strict Security Audit and Monitoring Scenario​

For institutions or individuals with high requirements for data security, it is necessary to monitor and record file operations throughout the process. The folder/disk monitoring function of Gilisoft File Lock Pro can record all operations on specified disks and folders in detail, including modification, creation, deletion, etc., and generate program logs for users to check. This function is crucial in scenarios where it is necessary to trace data changes and investigate potential safety hazards, such as the management of confidential files in enterprises and the protection of experimental data in scientific research institutions. Although the basic version of File Lock supports file monitoring, it is inferior to the Pro version in the detail of log records and the integrity of functions, making it difficult to meet the needs of strict security audits.​

To sum up, when facing scenarios such as enterprise LAN sharing protection, cross – device encrypted file transmission, damaged file repair, large – capacity file management and strict security monitoring, Gilisoft File Lock Pro becomes an irreplaceable choice with its unique functions. It is not only an encryption tool, but also a comprehensive solution integrating data protection, management and repair, which can fully meet users’ diversified needs in complex scenarios.

Dual Shields in the Digital Age: Gilisoft File Lock Pro & LockVid – Building an Exclusive Security Fortress for Your Digital Assets

In today’s information-explosion era, data leakage risks are everywhere—whether it’s personal private files being snooped on or a company’s core video materials being illegally distributed, the losses could be incalculable. How to build an impenetrable security barrier for different types of files without compromising user experience? Two professional encryption tools from Gilisoft—File Lock Pro (the expert in universal file encryption) and LockVid (the master of video encryption)—offer a comprehensive solution through targeted technical design.

I. Universal File Encryption: Gilisoft File Lock Pro – Guarding the Core of Your Digital World

1. All-Scenario Encryption: Protection from Privacy to Office Work

  • Privacy Fortress: Completely hide private diaries, bank account information, and other sensitive files—they vanish from File Explorer entirely. Even in system safe mode, no one can detect their existence without a password, achieving true “digital invisibility.”
  • Enterprise-Grade Protection: Set read-only permissions for corporate files like design drawings and project plans, prohibiting copying, modification, or deletion. Even with administrator rights, unauthorized access is blocked, preventing internal data leaks.
  • Permanent Shredding, No Recovery Possible: Supports file shredding with multi-overwrite algorithms. Deleted files cannot be recovered even by data recovery software, eliminating residual risks of sensitive data.

2. Hardcore Technology: Balancing Security and Convenience

  • AES-256 Encryption Algorithm: Adopts military-grade encryption standards with a 256-bit key length. Brute-force cracking would require trillion-year-level computing resources, ensuring absolute security during file storage and transmission.
  • Self-Protection Mechanism: The software itself cannot be uninstalled. After five incorrect password attempts, it automatically locks and sends email alerts, preventing malicious attacks and cracking.
  • Portability & Compatibility: Generates independent executable files. Encrypted files can be opened on any computer without software installation, meeting mobile office needs.

3. Application Scenarios

  • Individual Users: Encrypt family photos and medical records to prevent privacy leaks if devices are lost or stolen.
  • Freelancers: Protect design drafts and code files from theft during sharing or transmission.
  • Enterprise Managers: Set access permissions for shared folders, control employee operation scopes, and ensure core data security.

II. Video Encryption: Gilisoft LockVid – Making Every Frame a Secret

1. Designed for Videos: Perfect Balance Between Playback and Security

  • Segmented Encryption, Decrypt While Watching: Only encrypts video and audio streams while retaining file headers and index structures. During playback, it dynamically decrypts the current segment—no need to wait for full file decryption. Instant playback with smooth performance.
  • Anti-Misidentification & Bypass: Encrypted files remain recognizable as standard formats (e.g., MP4) by players but only show black screens and noise when played, avoiding misclassification as invalid files.
  • Flexible Permission Control: Generates GEM encrypted files that require a playback password, preventing unauthorized distribution and copying.

2. Technical Advantages: Addressing Unique Video Challenges

  • Size Optimization: Designed for large GB-level files, with 30% faster encryption speed and 50% less memory usage during decryption, balancing efficiency and performance.
  • Format Compatibility: Supports mainstream formats like MP4, MKV, and AVI. Encrypted files play on mobile phones, tablets, smart TVs, and other devices without format conversion.
  • Anti-Screen Recording & Tampering: Uses dynamic key allocation—each video segment is encrypted with a unique key. Even if screen-recorded, the original content cannot be restored.

3. Application Scenarios

  • Content Creators: Encrypt teaching videos and commercial ads to prevent piracy and illegal distribution.
  • Corporate Training: Encrypt internal training videos, allowing authorized employees to watch via password, ensuring knowledge assets stay internal.
  • Individual Users: Protect travel videos and family gathering recordings from being intercepted when uploaded to cloud drives or social media.

III. How to Choose? A Scenario-Based Guide

Need TypeRecommended ProductCore Reason
Universal files (docs, images)Gilisoft File Lock ProSupports full decryption for editing with precise permission control, ideal for frequent use of original files.
Video filesGilisoft LockVidReal-time decryption during playback; segmented encryption doesn’t affect viewing, perfect for temporary watching and anti-distribution needs.
Mixed file typesCombine both productsEncrypt docs with File Lock Pro and videos with LockVid for all-round protection.

IV. Conclusion: Dual Shields, Building a Data Security Moat

Gilisoft File Lock Pro and LockVid are deeply optimized for the characteristics of universal files and videos—from encryption algorithms and file structures to usage scenarios. The former is an “all-round security butler,” guarding the integrity of your digital assets; the latter is a “video-exclusive bodyguard,” making every playback controlled and traceable. Whether you’re an individual user or an enterprise manager, these two tools form a “double insurance” for data security, letting you enjoy digital convenience while saying goodbye to leakage risks.

Take Action Now: Visit Gilisoft Official Website to download the trial version and experience the peace of mind and freedom brought by professional encryption technology!

Keywords & Descriptions

  1. Gilisoft File Lock Pro – A universal file encryption tool using AES-256, designed for docs, images, etc., with precise permission control and full decryption for editing.
  2. Gilisoft LockVid – A video-specific encryption tool with segmented encryption, enabling real-time decryption during playback, ideal for anti-piracy and smooth viewing.
  3. AES-256 Encryption – Military-grade algorithm used by File Lock Pro, ensuring ultra-secure encryption for universal files.
  4. Segmented Encryption – Core technology of LockVid, encrypting video/audio streams only for efficient real-time playback.
  5. Enterprise Data Protection – Scenario where File Lock Pro secures corporate files (designs, plans) with strict access control.
  6. Video Anti-Distribution – Scenario where LockVid prevents unauthorized sharing of videos (training materials, creative content) via password protection.
  7. Universal vs. Video Encryption – Differentiated solutions: File Lock Pro for editable files, LockVid for smooth video playback.