PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1
|
|
- Caroline Jones
- 8 years ago
- Views:
Transcription
1 PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1
2
3 Table of Contents 1 Self Decrypting Archives (SDA) Setting Windows to Display File Extensions Creating PGP Zip SDA Create a passphrase Creating a Strong Passphrase Send the Encrypted SDA via Opening a PGP ZIP SDA Tables
4 1 Self Decrypting Archives (SDA) If sensitive Xerox or client data is going to be sent in an (via the internet) or copied onto some other media such as a CD; it must be encrypted to protect it. PGP Desktop disk encryption software allows employees to create Self Decrypting Archives (SDAs) which do not require the recipient to have PGP Desktop to decrypt and read the file. Follow the steps herein to create encrypted files that you can then attach in an or transfer to another media such as a CD or DVD. You must have PGP Desktop disk encryption software installed on your computer to create SDAs. Note: PGP encrypts and compresses the file size of the SDA. Do not Win Zip or otherwise attempt to compress the SDA with another program. Requires that your recipients are using Windows computers. Requires that you reveal the passphrase to your recipients. Does not require that your recipients have PGP Desktop software installed on their computers. Does not require you to have any of your recipients public keys. A PGP Self-Decrypting Archive (SDA) is a PGP Zip Archive that can be opened on any Windows computer, even those that do not have PGP Desktop installed. SDA files are standard Windows executable (.exe) files that you can open simply by double-clicking them. SDA files are slightly larger than regular PGP Zip Archives because the SDA self decrypting mechanism requires a certain amount of extra space (usually about 100 K). Once you have created your PGP Zip SDA, you can send it to your recipients however you choose. Anyone who has the file and the passphrase can open the resulting PGP Zip Archive file, and everyone sees the same items. If you need to have different recipients see different items, you must create separate PGP Zip Archive files for each Caution: Take every possible precaution to ensure that the passphrase to your PGP Zip SDA is revealed to no one but the file recipients. If the passphrase is revealed to unauthorized persons, you can create a new PGP Zip SDA with a different passphrase, but you can do nothing to resecure the original archive file and whatever it contains.
5 2 Setting Windows to Display File Extensions Windows needs to be set to show file extensions. Note: This only needs to be done once. To show file extensions: 1. Double click on your My Computer icon. 2. Go to the Tools menu and select Folder Options. 3. Click on the View tab. 4. Uncheck the box for Hide extensions for known file types (Figure 1); then click OK.
6 3 Creating PGP Zip SDA Note: Advanced Users can visit the Encryptions Services site for the Using PGP SDA Quick Guide. Go to Start / All Programs / PGP / PGPDesktop. Select File, New PGP Zip from the Menu Bar
7 Click the Add files icon to select files Navigate to the files you want to add, Click the file(s) you want to encrypt Click Open
8 The file(s) you selected will appear in the New PGP Zip window, Click Next Click PGP Self-Decrypting Archive in the Encrypt window, Click Next
9 4 Create a passphrase The Create a passphrase window appears Type a passphrase in the Passphrase field. It must be at least eight characters. Type the passphrase again in the Confirm field. Click Next If you would like your password to be visible to you as you type it, click the Show Keystrokes checkbox.
10 5 Creating a Strong Passphrase The stronger your passphrase is, the more secure your files are. You can fill the Passphrase Quality bar by: Typing a longer rather than a shorter passphrase Avoiding words found in the dictionary Using mixed-case in a non-standard way ( dkmpgp instead of dkmpgp ) Including numerals in your passphrase Including symbols in your passphrase Including spaces in your passphrase
11 Confirm that the PGP Zip SDA is being saved in the desired location and with the filename you prefer. Click Next. Encrypting a single file - you will not see the file name here. By default, the SDA will be named the same as the original file and the file will be saved to the folder where it resides. Encrypting multiple files and folders - PGP will automatically name the archive by the first file in the list and display it in the Save Location path name and, by default, save it to the folder where the files reside.
12 Click Finish A file in the format of Filename.exe will be created Locate the newly created SDA file Right click on the file name and select Rename. Change the.exe extension on the end of the filename to exz. The new file name is now Filename.exz. Note: For security reasons, the transmission.exe files are not permitted. When sending SDA files, be sure to change the extension file name to exz.
13 6 Send the Encrypted SDA via You can send the secure Self Decrypting Archive (SDA) as you would any other file. You can attach it in an or you can copy it to a CD or other media. The recipient with the passphrase will be the only one that can open and read the file contents. Note: Do not include the passphrase you set up for the SDA in the same communication as the SDA. It must be sent in a separate communication. To send a SDA via 1. Launch your program and open a new message. 2. Locate and attach the archive you want to send. 3. Type the following instructions for the recipient in a message: Please follow the instructions below to save and decrypt the attached SDA file. 1. Save the file to your Desktop. 2. Right click on the file name and select Rename. 3. Change the.exz file extension to.exe. The new file name is now Filename.exe. 4. Double click on the filename to open the file. Click Send, to send the . Remember to send the passphrase in a separate . Note: Do not Win Zip or otherwise attempt to compress the SDA with another program.
14 7 Opening a PGP ZIP SDA Locate the and Double click. (It should have an extension of.exe.) The PGP Self Decrypting Archive - Enter Passphrase screen displays Confirm that the output is going into the desired location. If not, select the Save in: drop down menu to select correct the location. Click Save.
15 Note: If you direct the decrypted files from the PGP Zip SDA into the same location from which they originally came, the original files are overwritten. To prevent this, for each file, you are prompted to select a different location. You can also type a different filename. If you if you click Save without doing this, a warning dialog box displays. If you bypass it, the file from the PGP Zip SDA overwrites the original The file will be decrypted and placed in the location you selected
16 8 Tables
PGP Desktop Email Quick Start Guide version 9.6
What is PGP Desktop Email? PGP Desktop Email is part of the PGP Desktop family of products. You can use PGP Desktop Email to: Automatically and transparently encrypt, sign, decrypt, and verify email messages
More informationEncryption. Introduction to using 7-Zip
IT Services Training Guide Encryption Introduction to using 7-Zip It Services Training Team The University of Manchester email: its.training@manchester.ac.uk www.itservices.manchester.ac.uk/trainingcourses/coursesforstaff
More informationSecureZIP User Guide
SecureZIP User Guide SecureZIP is an application for zipping files to save storage space as well as encrypting files with password control to protect information. SecureZIP not only works alone to perform
More informationHow To Encrypt A Traveltrax Report On Gpg On A Pc Or Mac Or Mac (For A Free Download) On A Thumbdrive Or Ipad Or Ipa (For Free) On Pc Or Ipo (For An Ipo)
EMAIL ENCRYPTION Guide June 3, 2013 TABLE OF CONTENTS Steps to Create Encryption Public Key... 3 Installing GPG... 3 Key Generation Process... 4 Update User Settings... 6 Decrypting an encrypted file...
More informationMcAfee Endpoint Encryption for Files and Folders (EEFF) User Documentation
McAfee Endpoint Encryption for Files and Folders (EEFF) User Documentation 2013.06 McAfee Endpoint Encryption for Files and Folders (EEFF) uses powerful encryption technology to allow you to protect information
More informationHow To Encrypt a File using Windows Explorer and WinZip. For Use With All PII Data
How To Encrypt a File using Windows Explorer and WinZip For Use With All PII Data As an employee or a contractor, you share in the responsibility for protecting the privacy of individuals whose information
More informationHow To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro
Online Backup by Mozy Restore Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 How do I restore my data? There are five ways of restoring your data: 1) Performing
More informationRoyal Mail Group. getting started. with Symantec Endpoint Encryption. A user guide from Royal Mail Technology
getting started with Symantec Endpoint Encryption A user guide from Royal Mail Technology For further help, contact the IT Helpdesk on 5415 2555 (01246 282555) March 2010 Contents 1 Introduction to Symantec
More information4. Click Next and then fill in your Name and E-mail address. Click Next again.
NOTE: Before installing PGP, Word needs to be disabled as your editor in Outlook. In Outlook, go to Tools: Options: Mail Format and uncheck Use Microsoft Office Word to edit e-mail messages. Failure to
More informationEncrypting Files Using AxCrypt
Encrypting Files Using AxCrypt Documents, spreadsheets, databases, and other files that contain personal information or other sensitive information MUST BE encrypted when being transmitted to someone else
More informationYale Software Library. PGP 9.6 for Windows
PGP 9.6 for Windows How to Add keys to the All Keys key ring: 1. Run the PGP application from Start->All Programs->PGP. 2. In the PGP main application window, click on Search for keys. 3. In the Search
More informationPGP Desktop Encrypting Removable Media. May 1 2012 Version 1.3
PGP Desktop Encrypting Removable Media May 1 2012 Version 1.3 Table of Contents Introduction... 3 Installation Notes... 3 Encrypting Removable Media... 5 Adding and Deleting Users... 10 Changing a Passphrase...
More informationtips A quick and easy guide to securing your private information www.pkware.com
tips A quick and easy guide to securing your private information tips A quick and easy guide to securing your private information Basic Information 1. How to install SecureZIP for Windows Desktop for individual
More informationHow to Install a Network-Licensed Version of IBM SPSS Statistics 19
How to Install a Network-Licensed Version of IBM SPSS Statistics 19 Important: IBM SPSS Statistics 19 requires either Windows XP Professional or later. IBM SPSS Statistics 19 installs from a DVD and your
More informationFigure 1: Restore Tab
Apptix Online Backup by Mozy Restore How do I restore my data? There are five ways of restoring your data: 1) Performing a Restore Using the Restore Tab You can restore files from the Apptix Online Backup
More information1.5 MONITOR. Schools Accountancy Team INTRODUCTION
1.5 MONITOR Schools Accountancy Team INTRODUCTION The Monitor software allows an extract showing the current financial position taken from FMS at any time that the user requires. This extract can be saved
More informationUSING STUFFIT DELUXE THE STUFFIT START PAGE CREATING ARCHIVES (COMPRESSED FILES)
USING STUFFIT DELUXE StuffIt Deluxe provides many ways for you to create zipped file or archives. The benefit of using the New Archive Wizard is that it provides a way to access some of the more powerful
More informationCox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0
Cox Business Premium Online Backup USER'S GUIDE Cox Business VERSION 1.0 Table of Contents ABOUT THIS GUIDE... 4 DOWNLOADING COX BUSINESS PREMIUM ONLINE BACKUP... 5 INSTALLING COX BUSINESS PREMIUM ONLINE
More informationGlobal VPN Client Getting Started Guide
Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential
More informationSymantec File Share Encryption Quick Start Guide Version 10.3
Symantec File Share Encryption Quick Start Guide Version 10.3 What is Symantec File Share Encryption? Symantec File Share Encryption is a software tool that provides multiple ways to protect and share
More informationAspera Connect User Guide
Aspera Connect User Guide Mac OS X 10.4/10.5 Browser: Firefox 2+, Safari 2+ Version 2.2 Chapter 1 Chapter 2 Chapter 3 Appendix Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment
More informationStep-by-Step Archiving with pictures
Step-by-Step Archiving with pictures First, make sure that your status bar is visible in Outlook. - Click on View and make sure that Status Bar has a check by it. If it does not click on it. In Outlook,
More informationIdentity Finder: Managing Your Results
Identity Finder: Managing Your Results The most important part of running Identity Finder is determining the most effective and secure way of managing the search results. Be sure to carefully read and
More informationSonicWALL CDP Local Archiving
This document describes how to configure, implement, and manage a local archive for your SonicWALL CDP appliance. It contains the following sections: Feature Overview section on page 1 Using Local Archiving
More informationKeePass Getting Started on Windows
KeePass Getting Started on Windows This guide includes the initial installation of KeePass 2.x on a Windows PC, creating your first password database, testing the software and entering your first accounts.
More informationBacking Up and Deleting Files
CHAPTER 5 Backing Up and Deleting Files Video files can be copied from the hard disk to external storage media, such as CD-R, DVD, MO, or ZIP drives. Video files saved on the hard disk can be easily deleted
More informationHow to Password Protect Files & Folders in Mac OS X with Disk Images
The best way to secure sensitive information from malware is to encrypt it. Encryption works by using a complex formula to securely scramble (or encrypt) individual files and folders, entire disks and
More informationBacking up Microsoft Outlook Email For the PC Using MS Outlook 2000 Keith Roberts
WIN1020 November 2003 Backing up Microsoft Outlook Email For the PC Using MS Outlook 2000 Keith Roberts INTRODUCTION... 1 PREPARATION... 1 BACKING UP EMAIL... 2 RESTORING EMAIL FROM A PERSONAL FILE FOLDER...
More informationeadvantage Certificate Enrollment Procedures
eadvantage Certificate Enrollment Procedures Purpose: Instructions for members to obtain a digital certificate which is a requirement to conduct financial transactions with the Federal Home Loan Bank of
More informationPGP Desktop Email Quick Start Guide Version 10.2
PGP Desktop Email Quick Start Guide Version 10.2 What is PGP Desktop Email? PGP Desktop Email is part of the PGP Desktop family of products. Use PGP Desktop Email to: Automatically and transparently encrypt,
More informationIf you have problems or questions, please call the helpdesk at 4444. Before beginning, CLOSE ALL DOCUMENTS AND PROGRAMS.
Page 1 of 17 Instructions for using Genie-Soft Backup Manager Pro 7 Task 1: Burning a backup of My Documents to a CD Task 2: Restoring and/or verifying backups. Note: You must have a CD-RW or DVD-RW drive
More informationYale Software Library
Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 203-432-9000, helpdesk@yale.edu Two-factor authentication: Installation and configuration instructions for
More informationHow to install and use the File Sharing Outlook Plugin
How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.
More informationInstalling & Setting Up EMFACT
Installing & Setting Up EMFACT EMFACT installation is two-part process: () installing the EMFACT and Oracle Express software and () initializing the EMFACT software (one time only). The purpose of this
More informationDocument Management Quick Reference Guide
Documents Area The Citadon CW folders have the look and feel of Windows Explorer. The name of the selected folder appears above, and the folder's contents are displayed in the right frame. Corresponding
More informationHow to Back Up and Restore an ACT! Database Answer ID 19211
How to Back Up and Restore an ACT! Database Answer ID 19211 Please note: Answer ID documents referenced in this article can be located at: http://www.act.com/support/index.cfm (Knowledge base link). The
More information2. To encrypt the drive for future use, click Yes (Fig 1, 2). This will start the encryption process.
Dell Data Protection USB Drive Encryption Introduction To further protect PC s that have access to sensitive data, the Dell Data Protection (DDP) client detects and encrypts USB/Flash drives when they
More informationUsing Websense Data Endpoint Client Software
1 Using Websense Data Endpoint Client Software Related topics: Disabling the endpoint client, page 3 Viewing contained files, page 5 Viewing logs, page 6 Updating the endpoint client, page 7 Your organization
More informationCall Recorder Quick CD Access System
Call Recorder Quick CD Access System V4.0 VC2010 Contents 1 Call Recorder Quick CD Access System... 3 1.1 Install the software...4 1.2 Start...4 1.3 View recordings on CD...5 1.4 Create an archive on Hard
More informationUSER MANUAL. v. 11.4.1 ---------------------- December 2015 ----------------------
USER MANUAL v. 11.4.1 ---------------------- December 2015 ---------------------- Contents At a Glance Miscellaneous 3 About EncryptDisc 14 Product info 4 About this manual 15 Copyright & trademark 15
More informationCBH Provider EDI Browser Manual
CBH Provider EDI Browser Manual Table of Contents PGP Software Installation Windows XP 2 PGP Software Installation Windows 7 9 Main Screen 16 Log In Screen 19 Report: Authorizations 21 Decryption Instructions
More informationBounceBack User Guide
Table Of Contents 1. Table of Contents... 2 2. 1-0 Introduction... 3 2.1 1-0: Introduction... 4 2.2 1-1: BounceBack Software Overview... 6 3. 2-0 Navigating the BounceBack Control Center... 9 3.1 2-0:
More informationNDSR Utilities. Creating Backup Files. Chapter 9
Chapter 9 NDSR Utilities NDSR utilities include various backup and restore features, ways to generate output files, and methods of importing and exporting Header tab information. This chapter describes:
More informationSteganos Secure E-Mail Step by Step Instructions. Introduction STEP 1: INSTALLATION
Steganos Secure E-Mail Step by Step Instructions Introduction Although more and more PC users learn that an e-mail can be read by a third party as easily as a postcard, e-mail encryption is still quite
More informationDiamante WiFi Wireless Communication User Guide. Linksys E1200
Diamante WiFi Wireless Communication User Guide Linksys E1200 Release: February 2012; August 2011; February 2011 Patent Pending. Copyright 2012, Stenograph, L.L.C. All Rights Reserved. Printed in U.S.A.
More informationMost of your tasks in Windows XP will involve working with information
OFFICE 1 File Management Files and Folders Most of your tasks in Windows XP will involve working with information stored on your computer. This material briefly explains how information is stored in Windows
More informationSymantec Backup Exec Desktop Laptop Option ( DLO )
The following is a short description of our backup software: BACKUP-EXEC-DLO. We have set many of the parameters for you but, if necessary, these parameters can be changed. Symantec Backup Exec Desktop
More informationUser Guide. Digital Signature
User Guide Digital Signature ENTRUST ESP 9..2 Document version: 2.2 Publication date: January 2014 This guide is the exclusive property of Notarius Inc. All reproduction, printing or distribution of this
More informationStep by step guide how to password protect your USB flash drive
Step by step guide how to password protect your USB flash drive 1 Content 1. How to create encrypted partition on USB flash drive 2. How to work with encrypted partition on the USB flash drive - Rohos
More informationPGP Portable Quick Start Guide Version 10.2
PGP Portable Quick Start Guide Version 10.2 Introduction to PGP Portable Use PGP Portable to distribute encrypted files to users who do not have PGP Desktop software. Use PGP Portable to transport files
More informationBitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8)
BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8) Encryption is an effective method of protecting data stored on portable devices such as USB flash drives and external hard drives.
More informationWA2262 Applied Data Science and Big Data Analytics Boot Camp for Business Analysts. Classroom Setup Guide. Web Age Solutions Inc.
WA2262 Applied Data Science and Big Data Analytics Boot Camp for Business Analysts Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Software
More informationMcAfee Endpoint Encryption for Files and Folders. Self Extractor White Paper
McAfee Endpoint Encryption for Files and Folders Self Extractor White Paper About Endpoint Encryption for Files and Folders Self-Extractors Introduction Endpoint Encryption for Files and Folders is a
More informationDEPLOYING A VISUAL BASIC.NET APPLICATION
C6109_AppendixD_CTP.qxd 18/7/06 02:34 PM Page 1 A P P E N D I X D D DEPLOYING A VISUAL BASIC.NET APPLICATION After completing this appendix, you will be able to: Understand how Visual Studio performs deployment
More informationHP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
More informationOutlook 2013 ~ e Mail Quick Tips
The Ribbon: Home tab New Email to send a new mail New Items to send a new mail, a new appointment, a new meeting, a new contact, a new task, a new Lync Meeting Ignore to ignore a request Clean Up to clean
More informationLenovo Online Data Backup User Guide Version 1.8.14
Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data
More informationContents. Getting Started...1. Managing Your Drives...14. Backing Up & Restoring Folders...28. Synchronizing Folders...48. Managing Security...
Contents Getting Started.....................................................1 Using the Formatting Tool........................................1 Preparing the Software Manually..................................4
More informationHMRC Secure Electronic Transfer (SET)
HMRC Secure Electronic Transfer (SET) How to use HMRC SET using PGP Desktop Version 2.0 Contents Welcome to HMRC SET 1 HMRC SET overview 2 Encrypt a file to send to HMRC 3 Upload files to the Government
More informationManaging Files. On a PC, after you find your file, right click it and selet Rename from the pop-up menu.
Managing Files File Types, Renaming Files The software you are using will automatically save your file as the type that applies to your current application. For Microsoft Word documents, for example, will
More informationINTRODUCTION TO WINDOWS AND FILE MANAGEMENT. Windows 7
INTRODUCTION TO WINDOWS AND FILE MANAGEMENT Windows 7 The Work Environment Your computer monitor is designed to resemble a desktop and is often referred to as such. Just as you might put on a regular desktop,
More informationProjectWise Explorer V8i User Manual for Subconsultants & Team Members
ProjectWise Explorer V8i User Manual for Subconsultants & Team Members submitted to Michael Baker International Subconsultants & Team Members submitted by Michael Baker International ProjectWise Support
More informationOutlook 2010 Archiving Email CPAC Workshop Summer 2014
Outlook 2010 Archiving Email CPAC Workshop Summer 2014 Presenters: Kaleo Kelikani and Linda Holdzkom, ITS Technical Services Contents Tips and Tools for the Desktop Version of Outlook Page 2-4 What is
More informationwww.thedatalocker.com Customer Service: 1-877-264-3715 Email Us: marketing@thedatalocker.com
TheDataLocker online backup allows you to store, backup and retrieve any computer data over the internet to a secured remote system. Its main function is to generate a duplicate of your important files
More informationInstalling your certificate on your Windows PC
Installing your certificate on your PC Choose your email software below to learn how to obtain and install a digital certificate. Microsoft Outlook Mail Using Outlook or Mail Step one Visit Comodo for
More informationOverview Keys. Overview
Overview Keys Overview The PGPmail program performs fast, high-security, public-key encrypting (with optional compression), decrypting, and authenticating of electronic messages and files. The program
More informationFile Management Utility User Guide
File Management Utility User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held
More informationHow to Setup Privacy Guard Encryption.
How to Setup Privacy Guard Encryption. Contents Setting up for the first time.... 1 Installing the Software (free)... 1 Generating your own key... 2 Share your key with your friends so they can send you
More informationHow To Use The Syndicate Bank Rsa Security Token For Internet Banking On Pc Or Mac Or Mac (For A Web Browser) For A Long Time (For An Ipad) For Free (For Free) For An Unlimited Time) For Your
Syndicate Bank Supply and Commissioning of Two Factor Authentication for Internet with Two Factor Authentication for Bank s Internal Users for Various Applications Desktop based User Manual for using SyndProtect
More informationMINIMIZING DISK SPACE USAGE IN SAAS OR VIRTUAL OFFICE CS
MINIMIZING DISK SPACE USAGE IN SAAS OR VIRTUAL OFFICE CS In General... 1 Creative Solutions Accounting... 1 FileCabinet CS... 4 Fixed Assets CS... 6 Practice CS... 7 UltraTax CS... 8 Microsoft Outlook...
More informationPDG Software. PDG Key Manager User Guide
PDG Key Manager User Guide , Inc. 1751 Montreal Circle, Suite B Tucker, Georgia 30084-6802 Copyright 1998-2000 PDG Software, Inc.; All rights reserved. PDG Software, Inc. ("PDG Software") retains all
More informationHEALTH INFORMATION SYSTEM (HIS) HOW TO COMMUNICATE WITH THE HIS PROJECT TEAM. How To Communicate with the HIS Project Team
How To Communicate with the HIS Project Team This guide is intended to provide you with support for communicating with the HIS Project Team. There may be instances where the HIS Project Team will require
More informationMicrosoft Security Essentials Installation and Configuration Guide
Microsoft Security Essentials Installation and Configuration Guide This installation guide is for users who are intending to download the software from Microsoft s web site. If you are not intending on
More informationIdentity Finder Setup
Identity Finder Information Sheet for MAC This document will walk you through how to install, scan, and secure any SI found on your computer, or storage devices using the Identity Finder Software. This
More informationComodo Disk Encryption
Comodo Disk Encryption Version 2.0 User Guide Version 2.0.122010 Versi Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Comodo Disk Encryption Introduction... 3
More informationSSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems
SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems What is SSH?: SSH is an application that protects the TCP/IP connections between two computers. The software
More informationLotus Notes Email Archive Guide
Lotus Notes Email Archive Guide For Lotus Notes Client version 5.0.5 File : Lotus Notes Email Archive Guide.doc Page 1 / 10 Printed on : 23/08/05 1. Objective Email archiving is one of the housekeeping
More informationPDG Software. Keyman Encryption Guide
Keyman Encryption Guide , Inc. 1751 Montreal Circle, Suite B Tucker, Georgia 30084-6802 Copyright 1998-2004 PDG Software, Inc.; All rights reserved. PDG Software, Inc. ("PDG Software") retains all ownership
More informationXythos on Demand Quick Start Guide For Xythos Drive
Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document
More informationSetting up VMware ESXi for 2X VirtualDesktopServer Manual
Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples
More informationPGP Whole Disk Encryption Quick Start Guide Version 9.8
PGP Whole Disk Encryption Quick Start Guide Version 9.8 What is PGP Whole Disk Encryption? The PGP Whole Disk Encryption (WDE) product is a software tool that provides multiple ways to protect your data
More informationUsing the GroupWise Client
Spring 2006 (Our appreciation to Jennifer Sherouse for her assistance in editing and improving this document) Page 1 of 15 What is the GroupWise Client The GroupWise client is a program that installs on
More informationConfiguration for Professional Client Access
In a network environment, in order for the clients to access the data over the network, you will need to set up a network share to the data file. CREATING A NETWORK SHARE There may be slight differences
More informationOEMS PRE-HOSPITAL PATIENT DATA REPORT (PPDR) PROGRAM. Installation Instructions
OEMS PRE-HOSPITAL PATIENT DATA REPORT (PPDR) PROGRAM Installation Instructions This is the ninth release of the PPDR program (Version 3.0). This program is for use on Windows XP and Vista Systems. A CD
More informationBSDI Advanced Fitness & Wellness Software
BSDI Advanced Fitness & Wellness Software 6 Kellie Ct. Califon, NJ 07830 http://www.bsdi.cc SOFTWARE BACKUP/RESTORE INSTRUCTION SHEET This document will outline the steps necessary to take configure the
More informationGlobal VPN Client Getting Started Guide
Global VPN Client Getting Started Guide PROTECTION AT THE SPEED OF BUSINESS Introduction The SonicWALL Global VPN Client creates a Virtual Private Network (VPN) connection between your computer and the
More informationSetting Up Monthly Reporter
Setting Up Monthly Reporter April 11, 2014 I. HOW IT WORKS A QUICK OVERVIEW A. AuditWare Development Company maintains a powerful, sophisticated server on which a portion of memory is assigned to each
More informationHow to setup a VPN on Windows XP in Safari.
How to setup a VPN on Windows XP in Safari. If you want to configure a VPN connection from a Windows XP client computer you only need what comes with the Operating System itself, it's all built right in.
More informationHow To Use Senior Systems Cloud Services
Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To
More informationKI6501 Data Manager. Software User Manual
KI6501 Data Manager Software User Manual CONTENTS 1. Installation of USB Virtual COM Port driver software... 2 2. Installation of KI6501 Manager Software... 2 3. Connecting KI6501 to PC (Personal Computer)
More informationSecureDoc for Mac v6.1. User Manual
SecureDoc for Mac v6.1 User Manual Copyright 1997-2012 by WinMagic Inc. All rights reserved. Printed in Canada Many products, software and technologies are subject to export control for both Canada and
More informationINFORMATION SECURITY GUIDELINE How to Encrypt Files Using Common Applications Revision 1.1
INFORMATION SECURITY GUIDELINE How to Encrypt Files Using Common Applications Revision 1.1 Contents Introduction... 1 Safely Delivering the Encryption Password to the Recipient... 2 How to Encrypt Files
More informationVirtual Office Remote Installation Guide
Virtual Office Remote Installation Guide Table of Contents VIRTUAL OFFICE REMOTE INSTALLATION GUIDE... 3 UNIVERSAL PRINTER CONFIGURATION INSTRUCTIONS... 12 CHANGING DEFAULT PRINTERS ON LOCAL SYSTEM...
More informationINSTALLING NOVA DATA ENCRYPTION SOFTWARE
INSTALLING NOVA DATA ENCRYPTION SOFTWARE Introduction 1. Here is what you will need to do to install the college s data encryption software on your computer, laptop, or USB storage device. The encryption
More informationMAC/OSX - How to Encrypt Data using TrueCrypt. v.05201011
MAC/OSX - How to Encrypt Data using TrueCrypt v.05201011 This chapter contains step-by-step instructions on how to create, mount, and use a TrueCrypt volume. We strongly recommend that you read the entire
More informationQUICK START GUIDE EDI Claims Link for Windows version 3.1
QUICK START GUIDE EDI Claims Link for Windows version 3.1 System Requirements - Operating system: Windows 98 or later - Computer/Processor: Pentium 2, 233 MHz or greater - Memory: 64MB Ram - Initial application
More informationHADS 2.1.0e Installation and migration
Ageing, Disability and Home Care, Department of Family and Community Services MDS fact sheet - February 2012 HADS 2.1.0e Installation and migration Caution! If at any stage during this process you receive
More informationUSER MANUAL. v. 11.3 ------------------------ January 2014 ------------------------
USER MANUAL v. 11.3 ------------------------ January 2014 ------------------------ 1 Contents At a Glance Miscellaneous 3 About EncryptDisc 14 Product info 4 About this manual 15 Copyright & trademark
More informationHP ProtectTools for Small Business Security Software, Version 5.10. User Guide
HP ProtectTools for Small Business Security Software, Version 5.10 User Guide Copyright 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
More informationBackups User Guide. for Webroot SecureAnywhere Essentials Webroot SecureAnywhere Complete
Backups User Guide for Webroot SecureAnywhere Essentials Webroot SecureAnywhere Complete Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com Version 8.0.1 Webroot
More information