Information: Folder Guard is a powerful security tool that controls access to your files and folders. It can make them read-only, hidden, or appear empty to unauthorized users and programs. It is highly effective in protecting browser data from info stealers—malicious software that targets personal details like usernames, passwords, and credit card information. Folder Guard allows exclusive access to sensitive browser data, preventing external access attempts. It also offers ransomware protection, keeping your files safe from encryption, modification, or deletion.
Information: In this guide, we will be creating a secure, controlled environment for the most widely used browser, Chrome. Since most browsers operate in a similar way, you can follow the steps outlined here to apply them to your own browser.
Information: "Trusted" encompasses all the programs exempt from Folder Guard's policies and regulations. Because we aim to exclusively grant the browser access to sensitive data, it's vital to classify it as trusted. This entails the removal of all other applications from the trusted list.
Important: Ensure to append the asterisk (*) after the path to the browser folder.
Information: As the browser is now trusted, we can proceed to block access to its data. Folder Guard will prevent external entry to the browser's data while still enabling the browser itself to access it.
Information: Your browser is now the sole application with access to its own data. External software and malicious programs won't have the capability to pilfer any sensitive information.
Important: It's not advisable to skip part 1, as part 2 may lack coherence without the foundation provided by part 1.
Information: In the effort to block ransomware, our aim is to block any alterations to our files. Yet, it's important to maintain our ability to make changes to our own files. File Explorer stands out as the widely used tool for file navigation and manipulation. This necessitates designating File Explorer as a trusted.
Information: Having established explorer.exe as trusted, the next step involves restricting write access to the files.
Information: By establishing File Explorer as a trusted application and configuring each user folder as read-only, ransomware will be prevented from altering your folders or files. Simultaneously, you'll retain the capability to enact changes using File Explorer.
Information: Command Prompt is not marked as trusted, so it can't access or change browser data or your files. Only the applications you've marked as trusted, like your browser or File Explorer, can work with protected folders and files. This way, harmful software can't change your files or steal information from your browser. If needed, you can pause Folder Guard or add more applications to your trusted list. For keeping your login and card information safe, consider using a password manager like Bitwarden or 1Password. Once you have a password manager, remember to remove any saved login and card details from your web browser.