Commentary Logo
Japan Island disputes in Southeast Asia    World War III Alarm Anti-Islam video and anti-US sentiment    Skull Say no to brainwashing

       peace and anti-war Israel Iran strike imminent    sanctions as a result of nuclear tests Sanctions on Iran and workarounds    black lightning bolt India's massive blackout

Snapshots of news
Gearheads and mastheads
SHORTCUT TO MAIN SECTIONS & ARTICLES
Home  •  About this site  •  How did we once fight corruption in colonial Hong Kong?
 •  Historical US administrative thoughts  •  USA versus colonial Hong Kong
 •  Anti-corruption review of Nigeria  •  Procurement monitoring in Nigeria
 •  Syndicated news  •  Usman's blog  •  Anti-graft news  •  Socialist news

 Thursday, August 17 2017 1:19am Hongkong Time

Posted May 1, 2012

Back to Blog Index   


3 Free Tools To Password Protect PDF Files

Portable Document Format (PDF) is the most widely used standard to share documents across the web and different platforms. The greatest feature of PDF file is that it looks the same across any platform and in any environment. PDF format is the perfect format to share documents across multiple platforms. There are several features of PDF files including password protection.

A PDF document can easily be password protected. Let’s see how we can password protect a PDF document. There are two ways to password a PDF document for free. One is using a software and the other is using an online service to password protect a PDF document. We will be discussing three tools which are a mix of both ways of password protection.

PrimoPDF

PrimoPDF by Nitro PDF Software is the best free PDF creator software. You can easily convert a Word or Excel document into a PDF document. PrimoPDF only requires drag and drop operations in order to convert a document. After installation, PrimoPDF will create a shortcut on the desktop. You can drag and drop any file to that shortcut to automatically convert the document into PDF.

PrimoPDF options for password protecting a document

If you double click the shortcut, you will be taken to PrimoPDF options. You can create a password under PDF security. If you want to use the same password for every converted document, then you can check the checkbox “Always use these settings” otherwise uncheck it so that these settings can only be used on the next document to be converted.

PrimoPDF password security

Download PrimoPDF free

PDFProtect

The second solution is an online solution. The online solution is the best when you want to password protect a document without installing anything on your computer. But one must take care that they should have a good Internet connection in order to use the online PDF password protecting service. This is because the PDF files need to be uploaded and downloaded again in order to complete the password protection operation.

PDFProtect, password pdf files online

To password protect a document online, go to pdfprotect.net, browse the file and then enter your required password. You can choose the encryption strength to be high or low. If you are using modern PDF readers, then you can leave the encryption level to high or otherwise make it low for maximum compatibility. Pressing the “Protect” button will upload the file to the service and after sometime, you will be prompted to download the password protected file.

Visit PDFProtect.net now

Weeny Free PDF Cutter

Weeny Free PDF Cutter

Although the main purpose of Weeny Free PDF Cutter is to cut and split PDF documents into multiple files but it has also got an option to password protect the PDF files. You can set Weeny Free PDF Cutter such that it does not split the resulting PDF file but password protects the document. You will need to enable password protection under Security settings.

Download Weeny Free PDF Cutter

I hope these tools will be beneficial for you and will help you password protect your sensitive PDF documents. If I have missed anything or you have a suggestion, please share it in the comments below.


Back to Blog Index   

© Usman Khurshid. Reproduced with permission of the copyright owner.



RELATED ARTICLES

  15/05   System Level Spell Checkers For Windows
  04/05   Four Ways To Insert/Eject CD-ROM Tray In Windows
  06/03   Control Windows Volume Automatically with These 3 Tools
  18/01   5 Ways to Access Files, Folders and Programs Quickly In Windows
  28/05   3 Ways To Combine/Merge Two Cells Into One In Excel 2010
  01/05   3 Free Tools To Password Protect PDF Files
  29/04   3 Free Portable Tools To Change Creation/Modification Date Of Files And Folders


OTHER CATEGORIES



GAMES


INTERNET


MICROSOFT


SECURITY


SOFTWARE


TIPS

ABOUT THE CONTRIBUTOR

Usman Khurshid is a network consultant who works in a mixed environment of Windows and Linux platforms. He studies about the latest advancements in computer technology and shares his views on this technology blog.

Email Usman at usman {at} technize {dot} com



Commentary and reflection pages by Raymond Cheng, PhD DPA FRSA

  Main • Commentary   Special Foci • Syndicated News | Corruption | Socialism | GuanXi

  Health Related • Traditional Chinese Medicine   Others • OXLL


© 1997-2014 The Commentary, Office of Dr Raymond Cheng. All rights reserved. Copyright of selected news articles, the headlines and logos belongs to the respective entities. Read disclaimer

Digital platform powered by Wyith Limited, Wyith Institute. Wyith Limited and Wyith Institute are associated businesses operated by the Office of Dr Raymond Cheng • Dr Raymond Cheng & Partners Ltd and The Commentary Ltd.

SHORTCUT TO MAIN SECTIONS & ARTICLES
Home  •  About this site  •  How did we once fight corruption in colonial Hong Kong?
 •  Historical US administrative thoughts  •  USA versus colonial Hong Kong
 •  Anti-corruption review of Nigeria  •  Procurement monitoring in Nigeria
 •  Syndicated news  •  Usman's blog  •  Anti-graft news  •  Socialist news

Contact the editor at raymond {dot} cheng {at} kellogg {dot} oxon {dot} org

RESERVED SECTION FOR MEMBERS
The RendezvousBuildersCommentatorsContributorsReadersResearchers
Reflection Pages • Miscellaneous Stuff
The difference between instant evaluation and improving recognition – November 20
Freddy Krueger revisited: Politically correct education? – October 23
From the evaluator's perspective: Justified conclusions and decisions – October 8
Online and distance-learning degrees from the evaluator's perspective – September 25
The moment fake degrees turned recognized and appraised – September 9

Photo credits for top title bar, from left to right: Iza H (Work), Lukasz Gumowski (Blue balls), Marcin Bania (Smiling and naked), Lautaro Gonda (Milan station), Jan Abt (Girl taking a picture), Daniel Tang (Hot switch), Barbara Henry (Moriah reading), Ralf Herrmann (Checkmate II), Marko Roeper (Led #4), Ian Russell (Girl in downtown LA).
Note: Animated GIF graphics and clipart obtained from amazing-animations.com, gifs.net, findicons.com, clker.com and sevenoaksart.co.uk. Sketches, cartoons and other handdrawings courtesy of Alice-the-Artist.

Special Alert! This is *NOT* the American Jewish Committee's Commentary Magazine! Special notice! This is not the American Jewish Committee's Commentary Magazine nor are we in any way affiliated with them. To visit AJC's magazine, please go to commentarymagazine.com instead, thank you for your attention.
Memo with pin Technical memos for members
Receiving using Gmail | Sending using Gmail
0x800ccc0e | 0x800ccc19 | 0x800ccc79

This site is best viewed with Microsoft® Internet Explorer 6.0 or above, minimum 1024x768 16M color-depth resolution. The Commentary Group and its personnel do not endorse external sites and are not responsible for the content of these websites. All external sites will open in a new browser window.




 
COUNT ON THE STATISTICS  100% Towels (c) Daniel Chittka
Photo © Daniel Chittka

This new section contains some interesting statistics in bribe and corruption, please check back for more as we pile up our numbers!

It's statistics time!  Using n-gram: kickback, graft, bribe and corruption - Comparison of their historical occurrences from 1810 to 2009 A.D.

  The word guanxi (collocation) and meanings of bribe: Deeply rooted, disgusting, sad endings

ADVERTISEMENT
Search for a domain name - no obligation!
www.  
 enter a name, word or phrase
 choose an extension
 click go!
LATEST STUFF TO PONDER UPON
Looking for a good book (c) Doug Logan
Photo © Doug Logan
tagged by area of interestBY AREA OF INTEREST
Trends
Pragmatics: Politeness trends from the historical perspective of global trade
Computer mediated communications: Social network – Came riding the waves of amazing coincidences
Analysis
Language acquisition:
A critique on "A corpus driven study of the potential for vocabulary learning through watching movies"

Grammatical analysis: "When a linguist stumbled upon a Buttonwood"
Lexicon and the corpus: "John Sinclair's lexical items – an introduction"
tagged by regionBY REGION • Anything AsiaUS Presence in Asia
Communist ChinaNationalist TaiwanHong Kong and MacauJapanKoreaSingaporeMalaysiaPhilippinesPakistanIndiaAfghanistan0 • Vietnam, Laos, Cambodia, Thailand and MyanmarTimor-Leste and IndonesiaMongoliaNew Zealand and Australia
tagged by topicsBY TOPIC • BiofuelRhino and elephant poachingAmerican movies hit China marketChina Internet censorshipChina's outward FDI opportunitiesGlobal rice yield
GLUCK ON SOCIALISM AND CHINA Asia (c) Robert Churchill
Photo © Robert Churchill

Professor Sidney Gluck (c) Sandi BachomI am honored to have obtained Professor Sidney Gluck's (right) permission to allow me to repost here some of his work and interview related to China and socialism. Professor Gluck is professor emertius at the New School University in New York. A classical Marxist, Gluck has been studying China for 60 years in history and modern development. He has lectured all over the U.S. and still welcomes engagement at the age of 94 – photo © Sandi Bachom

FEATURED ARTICLES

COMING 2014 – COMPUTING CORPUS Active Network Hub (c) Phil Sigin-Lavdanski
Photo © Phil Sigin-Lavdanski

Oh, please do not get me wrong. This new section is not about computers, electronics or any engineering stuff, but rather I am currently constructing a new corpus based on Spectrum, the monthly publication from the Institute of Electrical and Electronics Engineers USA, from July 2007 to date. Having been a member for over 20 years since 1992, I am always fascinated by some of the terms scientists use when they talk about or envision their new inventions or methodologies. How many of them eventually come into practice? Could there be some insights we could possibly derive, from the linguistics perspective?

IMPORTANT NOTICE AND DISCLAIMER

This website is published and designed by
Raymond Cheng, PhD DPA and reflects only his personal views and opinions in his individual capacity. It does not represent the views and opinions of his firm, employer(s), students, etc., and is not in any way sponsored or endorsed by any other thrid parties. Click here to read my full disclaimer
SHARE THIS WEBSITE WITH SOCIAL MEDIA

Share on Twitter  Add to Facebook  Share on LinkedIn  +1 on Google