answersLogoWhite

0


Best Answer

Encrypted files can only be accessed by authorized computer users who have the decryption key. Encryption is a popular technique in Information Security.

User Avatar

Wiki User

9y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Access denied encrypted files
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

How do you encrypt data?

You can use the Free and powerfull program ' Encrypt4all ' , you can encrypt any type of files ,save your encrypted data from viruses , you can save many files as one encrypted archive , visit its home page and download latest version: (Link Below)


What specialized computers manage network resources and allow computers access to the network?

File servers do those things. There are specialized servers as well, for example web servers, database servers, remote access servers, fax servers--the list goes on and on. But file servers are the backbone of providing access and managing files and who has access to what resources at which times.BTW. Access to the network is usually referred to as Authentication. And Rights or Security Management is usually what controls access to files, printers, and other resources.


If a server stores data files for users to access it is commonly called a?

If a server stores data files for users to access, it is commonly called a file server. File servers are used to centralize and manage files and data for a group of users within an organization or network. Users can access the files stored on the file server using a variety of methods, such as a shared folder, FTP, or a web-based interface. File servers can be configured with different levels of security and access control, depending on the needs of the organization. Additionally, file servers may also provide features such as file versioning and backup to help ensure the integrity and availability of the stored data.


What allows you to access programs folders and files on the computer and contains commands that allow you to start programs?

Start Menu


File accessing techniques in data management system?

Information is kept in files. Files reside on secondary storage. When this information is to be used, it has to be accessed and brought into primary main memory. Information in files could be accessed in many ways. It is usually dependent on an application.Sequential Access: A simple access method, information in a file is accessed sequentially one record after another. To process the with record all the 1-1 records previous to 1 must be accessed. Sequential access is based on the tape model that is inherently a sequential access device. Sequential access is best suited where most of the records in a file are to be processed. For example, transaction files.Direct Access: Sometimes it is not necessary to process every record in a file. It may not be necessary to process records in the order in which they are present. Information present in a record of a file is to be accessed only if some key value in that record is known. In all such cases, direct access is used. Direct access is based on the disk that is a direct access device and allows random access of any file block. Since a file is a collection of physical blocks, any block and hence the records in that block are accessed. For example, master files. Databases are often of this type since they allow query processing that involves immediate access to large amounts of information. All reservation systems fall into this category. Not all operating systems support direct access files. Usually files are to be defined as sequential or direct at the time of creation and accessed accordingly later. Sequential access of a direct access file is possible but direct access of a sequential file is not.Indexed Sequential Access: This access method is a slight modification of the direct access method. It is in fact a combination of both the sequential access as well as direct access. The main concept is to access a file direct first and then sequentially from that point onwards. This access method involves maintaining an index. The index is a pointer to a block. To access a record in a file, a direct access of the index is made. The information obtained from this access is used to access the file. For example, the direct access to a file will give the block address and within the block the record is accessed sequentially. Sometimes indexes may be big. So hierarchies of indexes are built in which one direct access of an index leads to info to access another index directly and so on till the actual file is accessed sequentially for the particular record. The main advantage in this type of access is that both direct and sequential access of files is possible.

Related questions

What is the first thing you do If you upgrade from Windows XP to Windows Vista Ultimate and cannot access your encrypted files?

If you cannot access and encrypted file after you have installed a new version of Windows and you have a backup copy of your certificate, install (import) the certificate in Windows. Then add it to the encrypted file.


You can share both encrypted folders and encrypted files?

false


If you make your Documents folder private and reinstall new windows with new name can you give you permissions to access it?

If you have encrypted this folder than the answer is no. To make it possible to open encrypted files after Windows reinstall you have to uncheck "Encrypt files" checkbox in the file properties dialog.


You can share both encrypted folders and encrypted files true or false?

false


What is the password for encrypted files on nfs2se?

manish


How does technology affect maintaining confidentiality of medical records?

Though medical records are usually encrypted, there is a chance that hackers can access them. Certain technologies allow savvy computer users to access hidden files.


What do encrypted files do?

http://en.wikipedia.org/wiki/Encrypting_File_System


Why is it recommended to rename a user account in Active Directory rather than deleting it?

Because deleting it removes all security associations and limits access to encrypted files and folders.


A user has encrypted important data files and now is no longer working for your company How do you decrypt these files so they can be read?

From the file's Properties dialog box ,click the Advanced button. In the Advanced Attributes dialog box, uncheck Encrypt contents to secure data


How do you get a batch file to delete a directory when it says Acess is Denied?

If it says access is denied that means that access is deined, you can't delete it. I think you are probably trying to make a batch file virus to delete system files and is trying to make the batch file delete everything, but came into the access is deined problem.


What happens to files added to a BitLocker enabled drive?

They are automatically encrypted


Is compression a form of encryption?

No, it's not but some compressed files can be encrypted.