LE3.1.1.4
APPLICATION MAIN MENU

Functional panels
The main menu of the personal data
protection system is divided into eight functional areas as follows:
1. Control panel.
2. Current directory information.
3. Buttons for fast browsing of the directories under
review.
4. Current folder selection panel (current directory
selection).
5. Table in which the process information is recorded.
6. Information on the results obtained from the process.
7. Password input panel and ciphering and decryption
process management.
8. Folder to select a file or folder (directory) for
encryption or decryption.
MAIN COMPONENTS
Types of components according to purpose
The main
application menu consists of two types of components as follows:
- Components for process management;
- Components for information and control of the actions taken.
Process control components consist of panels with control buttons. Each of these buttons corresponds to a combination of keys and a system menu item that duplicates the action of the button.
Example:
If the user wants to encrypt a file or a folder it needs to go into encryption mode. This can be done in three ways:
At the first one, we click on
the switch to encryption mode located on the control panel.
As a result, the process indicator located on the right side of the
panel will light up in yellow. The label "No Process Activated" will change to
"Encryption Mode".
Similarly, you can switch to decryption mode, but in this case the process indicator will glow green and the letter before it will be "Decryption mode".

Another way to switch to different modes is by using the system menu.
To do this, select "Tools" from the main application menu, then set the operating mode as shown on the image.
The third way is when the
function is activated by pressing the so-called "quick keys".
As you can see, they are displayed in the right area of the system
menu. In our example, switching to encryption mode can be done by
pressing the [F9] key, and in
the decryption mode by pressing the [F10]
key.
Process information
The
information on each of the processes related to encryption or
decryption of digital data is recorded in a special table.
In case of need it can be printed or converted to PDF, RTF or HTML
format.Информацията
за всеки един от
процесите, свързани с шифроване или дешифриране на цифрови данни,
се
записва в специална таблица.
You can read more about creating control data and converting it to different formats in the reporting section.
Example:
We have a D: \ G-92_INFO folder containing information that needs to be
encrypted.
To do so, we go into encryption mode, enter a password, and start a
data encryption process.
Once the process is complete, a message is displayed and a transition
is made to the directory in which the results are recorded.
In the example under consideration, the results are saved in the
default system folder, namely:
If the process is correct, the number of fields in the spreadsheet
should have increased with the number of encrypted files.
As can be seen from the attached image, the number of encrypted files
is nine, which coincides with the number of fields in the spreadsheet.
This is a further check for the correctness of the actions taken.
IMPORTANT!
In cases where a selected folder is encrypted, all the files in the
folder are encrypted.
There are no changes to the folder name.
The folder may be open but its content will remain unavailable to the
end user.
The table contains information about the type of process, where the output file is saved, what name is saved, and so forth.
Note: You can learn more about the data encryption process in the appropriate section.
Contents