you need
  • - user credentials in the Windows or Linux;
  • - perhaps administrative rights to install the software drivers, kernel modules.
Restrict access to data stored in certain directories and files by setting access rights to them by the operating system.For Windows, log on with user credentials, access to the data that you want to restrict.To do this, restart your computer or use the fast user switching functionality.
Start Windows Explorer.Click on the button "Start".From the menu, select "Run".In the text input box "Run" enter the string explorer.Click OK.
In Windows Explorer, locate and then click one of the user directory.Click the right mouse button.In the context menu, select "Properties".In the
dialog box, switch to the tab "Access."Uncheck "Share this folder" if it is installed.Check "Do not share this folder" if it is active.Click "Apply".
When working in the Linux-like systems run a shell as the user access to the data that you want to restrict, or on behalf of user root.Switch to free the console by pressing the key combination Alt + F1 - Alt + F12 or run a graphical terminal emulator.Log in with credentials selected user or start a new session with the command su.
Change the access rights to files and folders.Use the chown command to change ownership and group ownership of files and folders.Use the chmod command to change permissions.Specify key -R, to implement a recursive directory traversal when changing rights.
Restrict access to data by placing it in a file and then encrypt them.Collect files with the information to which access must be restricted in any temporary directory.Encrypt directory or archive it with a password.To encrypt using proven and reliable tools, for example, PGP or GPG.Archiving can be done packers such as zip or rar.This method is inconvenient.It will be necessary to decrypt the information to work and re-encrypt it after making changes.
Restrict access to information through its placement on virtual encrypted disks whose contents are stored in a container file.To create these disks use has become the de facto standard, free cross-platform software with open-source TrueCrypt.Less popular, but an acceptable solution can be BestCrypt.This approach is one of the most convenient and flexible - container files can be installed on different machines running different operating systems.Encryption of data is carried out "on the fly", while recording on the disc.
Place information encrypted on the hard disk for restricting access to it.To create encrypted partitions can use the same means that were described in the third step.The advantage of this approach is to encrypt all the information of the physical partition (even the file system), the disadvantage - the possibility of transporting the information only on the encrypted storage device.