Category Archives: Gilisoft Private Disk

How to Password-Protect a USB Flash Drive

USB flash drives are widely used for storing and transferring personal photos, work documents, and even sensitive financial records due to their portability. However, this very feature makes them prone to loss or theft, posing a risk of data leakage. Setting password protection for USB drives through encryption is a core method to ensure data security. This article focuses on the Gilisoft software suite, detailing targeted encryption solutions for four tools (Gilisoft File Lock Pro, Gilisoft USB Encryption, Gilisoft Full Disk Encryption, and Gilisoft Private Disk) to meet USB security needs in different scenarios.

I. Using Gilisoft Software Suite to Password-Protect a USB Flash Drive

The Gilisoft encryption software suite is designed to address different USB security requirements, covering file-level, partition-level, full-disk, and virtual disk encryption. Whether you need to protect only specific files or encrypt the entire drive with high intensity, it provides suitable solutions.

1. Gilisoft File Lock Pro: Precise File-Level Encryption for USB Drives

Use Case: Ideal for encrypting specific files or folders on a USB drive (e.g., “2024 Contract Documents,” “Personal Photo Album”) without encrypting the entire drive. This avoids wasting encryption resources on non-sensitive data and saves operation time and storage space. The tool primarily achieves precise protection through the “Lock File” and “Hide File” functions under the “External Disk” module, with an operation path that fully aligns with the actual software interface design.

Operation Steps:

  1. Preparation: Install and launch Gilisoft File Lock Pro on a Windows computer. Insert the USB drive to be encrypted and wait for system recognition (ensure the USB drive is displayed as a removable disk in “This PC,” such as Drive G or Drive H).
  2. Access the External Disk Module: In the left menu bar of the software, find and click the “External Disk” option (this is the actual functional category of the software, covering encryption management for all removable storage devices like USB drives and external hard drives, not the “USB Disk” option).
  3. Select the Target USB Drive: After entering the “External Disk” page, the software will automatically list all currently connected external storage devices. Identify the target USB drive using its name, capacity, and file system, then click to select it— the drive name will be highlighted to prevent selecting the wrong device.
  4. Choose Encryption Function (Lock/Hide):
    1. For “Lock File” (encrypt and restrict access): Click the “Lock File” tab at the top of the page to enter the USB drive file directory interface. Browse to find the files/folders to be encrypted, hold the Ctrl key to select multiple files in batches, or hold the Shift key to select consecutive files. After selection, click the “OK” button in the lower right corner.
    1. For “Hide File” (encrypt and hide to prevent discovery): Switch to the “Hide File” tab. The operation logic is the same as “Lock File” — check the target files/folders and click “OK.” Once hidden, the files will no longer be displayed in Windows Explorer.
  5. Set Encryption Password: A password setup window will pop up. Enter a strong master password (it is recommended to include uppercase letters, lowercase letters, numbers, and special symbols, with a length of at least 8 characters; avoid using easily crackable information like birthdays or phone numbers). You can optionally check “Password Hint” and enter a hint related to the password without directly revealing it (e.g., “My first computer model”). Re-enter the password for confirmation and click “Next.”
  6. Complete Encryption and Unlocking: After clicking “Apply,” the software will automatically perform encryption/hiding on the selected files. The completion of the progress bar indicates successful setup.
    1. Unlocking “Locked Files”: Re-enter the “External Disk” → “Lock File” tab, select the target from the list of encrypted files, click the “Unlock” button on the right side of the interface, and enter the password to restore normal access and operation permissions.
    1. Showing “Hidden Files”: In the “External Disk” → “Hide File” tab, select the hidden files/folders, click “Unhide” and verify the password. The files will be displayed again in Windows Explorer.

Core Features:

  • Two-Mode Protection: “Lock” focuses on restricting access (requiring a password to open and modify), while “Hide” focuses on physical invisibility (requiring a password to display). You can flexibly choose based on the sensitivity of the data to meet different protection needs.
  • Precise Filtering: Supports filtering targets by file type (documents, images, videos, etc.), file size, and modification time, eliminating the need to manually search through massive files and improving operation efficiency.
  • Cross-Device Compatibility: Encrypted files can be normally unlocked on other Windows computers with Gilisoft File Lock Pro installed, without being bound to a specific device, adapting to multi-device office scenarios.

2. Gilisoft USB Encryption: Dedicated Partition/Full-Disk Encryption for USB Drives

Use Case: Optimized specifically for USB drives, it is suitable for users who need “partition encryption” (storing sensitive data in some areas and ordinary files in others) or “full-disk encryption” (protecting all data on the drive) for USB drives. It is especially ideal for scenarios where USB drives are frequently plugged and unplugged across different computers, as no additional software is required for unlocking.

Operation Steps:

  1. Insert the USB drive to be encrypted. There is no need to install software on the USB drive; directly run Gilisoft USB Encryption on the computer (supports portable version, which can be used after decompression without complex installation procedures).
  2. The software will automatically scan and list all removable disks connected to the current computer. Find the target USB drive in the list (distinguishable by disk capacity and drive letter), click to select it, then click the “Encrypt” button in the center of the interface.
  3. Select Encryption Mode:
    1. Full-Disk Encryption: Encrypts all data on the USB drive. After encryption, the entire USB drive requires a password to unlock and access, suitable for scenarios where all data on the USB drive is sensitive information.
    1. Partition Encryption: Customize the size of the encrypted partition and non-encrypted partition (e.g., in a 16GB USB drive, allocate 10GB to the encrypted partition for storing work files and 6GB to the non-encrypted partition for daily data). Adjust the ratio by dragging the partition slider and click “Next” to confirm.
  4. Select the encryption algorithm (AES-256 encryption is used by default, which complies with international security standards and has the same encryption strength as bank-level security, balancing security and compatibility). Enter and confirm the password (it is recommended to change the password regularly to enhance account security).
  5. Click “Start Encryption.” The software will display an encryption progress bar and remaining time (the encryption time depends on the USB drive capacity and data volume; a 16GB USB drive usually takes 5-10 minutes). Do not plug in or unplug the USB drive during this period to prevent data damage or encryption failure.
  6. After encryption is completed, insert the USB drive into any Windows computer. The system will automatically pop up a password input window. Enter the correct password to access the USB drive data normally — no additional software installation is required on other computers, enabling “plug-and-play + password protection.”

Core Features:

  • USB Optimization: Optimizes the encryption process based on the read-write speed characteristics of USB drives, reducing encryption waiting time without affecting the normal service life of the USB drive.
  • Format Compatibility: Supports mainstream USB file systems such as exFAT, FAT32, and NTFS. Direct encryption is possible without formatting the USB drive, avoiding the trouble of data migration.
  • Abnormal Protection: In case of unexpected power failure, computer crash, or accidental USB drive unplugging during encryption, the encryption progress can be restored after restarting the software, effectively preventing data loss.

3. Gilisoft Full Disk Encryption: High-Intensity Full-Disk Encryption for USB Drives

Use Case: Designed for USB drives storing highly confidential data (such as business secrets, legal documents, and medical records), it provides “military-grade” full-disk encryption. It not only encrypts user-visible data but also covers deep areas such as disk boot sectors and hidden partitions, preventing data access through technical means to bypass encryption.

Operation Steps:

  1. Install Gilisoft Full Disk Encryption on a Windows computer. After installation, launch the software, insert the USB drive to be encrypted, and switch to the “Removable Disk” tab in the software interface.
  2. Find the target USB drive in the “Removable Disk” list (the software will display detailed information such as disk hardware ID, capacity, and used space to avoid confusion with local disks). Click to select it, then click the “Encrypt Disk” button at the top of the interface.
  3. Select Encryption Algorithm: Three internationally recognized high-intensity encryption algorithms are supported: AES-256, Twofish, and Serpent. Among them, AES-256 has the widest compatibility and is suitable for most scenarios; if ultimate security is pursued, the Serpent algorithm can be selected (it has higher encryption intensity but slightly slower encryption speed).
  4. After setting the master password, it is recommended to click the “Generate Recovery Key” option. Save the generated recovery key file to a secure location (such as an encrypted computer hard drive or offline storage device; do not store it with the target USB drive) for restoring USB drive access rights if the password is forgotten.
  5. Before clicking “Confirm Encryption,” special attention is required: this operation will erase all existing data on the USB drive. Be sure to back up important files on the USB drive to another storage device in advance; after confirming the backup is complete, click “Next” to start encryption.
  6. During the encryption process, the software will display the progress bar and remaining time in real time. After encryption is completed, click “Finish” to close the window. When accessing the USB drive later, launch Gilisoft Full Disk Encryption, select the target USB drive in the “Removable Disk” list, enter the password, and click “Mount.” After successful mounting, the USB drive will be displayed as a normal drive letter in “This PC”; click “Unmount” after use to lock the USB drive again.

Core Features:

  • Deep Encryption: The encryption scope covers disk boot sectors and MBR (Master Boot Record), preventing data access by modifying boot files or using disk tools to bypass the password. Its security is far higher than that of ordinary file encryption.
  • Hardware Acceleration: Supports CPU hardware encryption acceleration technologies such as Intel AES-NI and AMD-V. For USB drives with a capacity of 128GB or more, the encryption speed can be increased by 30%-50%, reducing waiting time.
  • Multi-System Compatibility: In addition to Windows systems, it can also be normally unlocked and accessed on Linux systems with the Gilisoft client installed, adapting to cross-system office scenarios and meeting diverse usage needs.

4. Gilisoft Private Disk: Creating an Independent Virtual Encrypted Disk on a USB Drive

Use Case: Suitable for users who want to separate sensitive data from ordinary data on the same USB drive (e.g., storing “work files” and “daily downloads” separately). An independent encrypted area is created by establishing a “virtual encrypted disk,” which exists as a single file and does not affect the original data structure and usage of the USB drive.

Operation Steps:

  1. Run Gilisoft Private Disk, insert the target USB drive into the computer, and click the “Create Private Disk” button on the main interface of the software to enter the virtual disk creation wizard.
  2. In the “Storage Location” option, click “Browse” to find and select the root directory of the USB drive (it is recommended to store the virtual disk in the root directory of the USB drive for easy subsequent searching and mounting), and specify the save path of the virtual disk.
  3. Configure Virtual Disk Parameters:
    1. Capacity Setting: Customize the virtual disk capacity based on the available space of the USB drive (e.g., in an 8GB USB drive, set a 5GB virtual disk capacity for storing sensitive data and reserve 3GB of space for ordinary files). The maximum capacity shall not exceed the remaining available space of the USB drive.
    1. File System: Select FAT32 (compatible with Windows and macOS systems, suitable for cross-system use) or NTFS (supports single files larger than 4GB, suitable for exclusive use in Windows systems).
    1. Encryption Algorithm: AES-128 (fast encryption speed, suitable for general sensitive data) or AES-256 (high encryption intensity, suitable for highly confidential data) can be selected based on data security requirements.
  4. Enter and confirm the access password for the virtual disk, click the “Create” button. The software will generate a virtual disk file with the suffix “.gpd” in the USB drive (e.g., named “WorkData.gpd” for easy identification of its purpose).
  5. Using the Virtual Disk: Click the “Mount” button on the main interface of the software. In the pop-up window, find the “.gpd” virtual disk file in the USB drive, select it, enter the password, and click “OK” to mount it. The virtual disk will be displayed as an independent drive letter (such as Drive F) in Windows Explorer. You can copy, edit, and save files like a normal disk, and all operations will be encrypted in real time without additional steps.
  6. Locking the Virtual Disk: After use, select the mounted virtual disk in the software and click the “Unmount” button. The virtual disk will be locked immediately, and the drive letter will disappear from the explorer; if you need to hide the virtual disk file, you can enable the “Stealth Mode” of the software to hide the “.gpd” file in Windows Explorer, further enhancing security.

Core Features:

  • Portability: The virtual disk exists as a single file and can be copied and backed up to computer hard drives, other USB drives, and other devices. When restoring, you only need to remount it in Gilisoft Private Disk, enabling flexible and convenient data migration.
  • Isolation: The virtual disk is completely isolated from other areas of the USB drive. Even if the data in the ordinary area of the USB drive is deleted, formatted, or infected with a virus, the virtual disk file remains unaffected, ensuring the security of sensitive data.
  • Multi-Account Support: Multiple access passwords can be set for the same virtual disk, and different permissions (such as “Read-Only” and “Full Control”) can be assigned. It is suitable for permission management when USB drives are shared in teams, preventing data from being modified or deleted by mistake.

II. Conclusion

When choosing a password protection solution for a USB drive, the core is to match your data sensitivity level and usage scenario:

  • If you only need to protect specific files (such as personal photos and scattered documents) and want to flexibly choose between “encrypt to restrict access” or “hide to prevent discovery,” the “External Disk” module of Gilisoft File Lock Pro best meets your needs, with precise operations and simple steps.
  • If you frequently use USB drives across different computers and pursue “plug-and-play” without additional software installation, the partition/full-disk encryption of Gilisoft USB Encryption is the optimal solution, balancing convenience and security.
  • If you store highly confidential data such as business documents and legal files and need to resist technical cracking, the deep full-disk encryption of Gilisoft Full Disk Encryption can provide the highest security level.
  • If you need to separate sensitive data from ordinary data on the same USB drive to achieve “one drive for two purposes,” the virtual disk function of Gilisoft Private Disk can meet your needs, balancing data isolation and usage convenience.

Regardless of which tool you choose, you must note: set a strong password of 12 characters or more (avoid weak passwords such as “123456” and “password”), regularly back up the recovery key or password hint, and do not store the key with the USB drive. Through “tool adaptation to scenarios + good usage habits,” you can maximize the security of USB drive data. Even if the USB drive is lost or stolen, you don’t have to worry about data leakage.