USING "ENCRYPTING FILE SYSTEM" TO PROTECT FILES AND FOLDERS IN "WINDOWS.."

Size: px
Start display at page:

Download "USING "ENCRYPTING FILE SYSTEM" TO PROTECT FILES AND FOLDERS IN "WINDOWS..""

Transcription

1 USING "ENCRYPTING FILE SYSTEM" TO PROTECT FILES AND FOLDERS IN "WINDOWS.." 1

2 Web location for this presentation: Click on Meeting Notes 2

3 SUMMARY Many of the "editions" of "Windows 2000", "Windows XP", "Windows Vista", "Windows 7", and "Windows 8" have the "Encrypting File System" (EFS) for securing files and/or folders inside NTFS hard drive partitions. 3

4 TOPICS Basics of Encrypting File System "EFS" versus "BitLocker" "Encrypting File System" Service Using the "Certificate Manager" to Check for Existing Personal "Public Key Certificates" Encrypting A File or Folder with EFS Using the "Certificate Manager" to Export a Newly-Created Public Key and Private Key 4

5 TOPICS (continued).pfx "Personal Information Exchange" files Decrypting an EFS-encrypted file/folder Deleted Certificates Stay in RAM And Are Active Until You Reboot 5

6 BASICS OF EFS The "Encrypting File System" (EFS) is a feature of "NTFS" hard drives (and partitions) for many editions of "Windows 2000" through "Windows 8". 6

7 BASICS OF EFS (continued) When view in "Windows Explorer" ("File Explorer"), a folder that contains only "Encrypting File System"- encrypted files will have it's name in green text: 7

8 8

9 BASICS OF EFS (continued) When viewed in "Windows Explorer" ("File Explorer"), a file that is encrypted by "Encrypting File System" will have it's name in green text: 9

10 10

11 BASICS OF EFS (continued) Another user on the same computer will be unable to open/view the EFSprotected file. If someone takes your hard drive, and puts it into an external hard drive enclosure and attaches the enclosure to their own computer, they will be unable to open/view the EFS-protected file. 11

12 12

13 13

14 BASICS OF EFS (continued) "ESF" is a feature of "NTFS" hard drives (and partitions) for many editions of "Windows 2000" through "Windows 8". 14

15 BASICS OF EFS (continued) In EFS, "public key certificates", "private keys", and passwords to controll the various keys all work together to give you "two factor authentication". 15

16 BASICS OF EFS (continued) The advantages of having certificates are detailed in chpaper_10_best_practices_securi ng_your_enterprise.pdf#page=6 and 980/how-is-using-client-certificates- more-secure-than-tls-plus-basic- authentication 16 `

17 BASICS OF EFS (continued) According to ypting_file_system, Ecrypting File System (EFS) is available for the following editions of "Windows..": 17

18 BASICS OF EFS (continued) 18

19 BASICS OF EFS (continued) "Windows Vista Starter", "..Home Basic", and "..Home Premium" allow only decryption--so you can read encrypted files but you cannot encrypt them according to ption1/the-simple-way-to-keep- Your-Pr.htm 19

20 BASICS OF EFS (continued) For "Windows Vista Starter", "..Home Basic", and "..Home Premium" you can decrypt EFSencrypted files using the cipher command line command. See IS/windows-vista/What-is- Encrypting-File-System-EFS 20

21 BASICS OF EFS (continued) "Windows 7 Starter", "..Home Basic", and "..Home Premium" allow only decryption--so you can read encrypted files but you not encrypt them 21

22 BASICS OF EFS (continued) For "Windows 7 Starter", "..Home Basic", and "..Home Premium" you can decrypt EFS-encrypted files using the cipher command line command. 22

23 BASICS OF EFS (continued) See us/windows/forum/windows_7- windows_programs/cipherexereturns-error-the-request-isnot/9d5cb3fc-d bc9ff62dbd46f37c?msgid=5ad136cadedf f1c-81627b

24 BASICS OF EFS (continued) 24

25 BASICS OF EFS (continued) "Encrypting File System" is also available for NTFS drives/partitions for the "..Pro" and "..Enterprise" editions of "Windows 8". "Encrypting File System" will not be available for the "..RT" or "Windows 8" editions of "Windows 8". Reference: s#comparison_chart 25

26 "EFS" VERSUS "BITLOCKER" "Bitlocker" is used to encrypt entire hard drives or hard drive partitions whiile "Encrypting File System" is used to encrypt individual data files and/or folders "EFS" causes less of a performance reduction on your Windows computer 26

27 "EFS" VERSUS "BITLOCKER" (continued) See ws/2012/04/25/bitlocker-vs-efs/ 27

28 "ENCRYPTING FILE SYSTEM" SERVICE MUST BE SET TO "MANUAL" OR "AUTOMATIC" In order to encrypt or decrypt a file or folder, the "Encrypting File System" services has to be set to "Manual" or "Automatic": You can run services.msc from any search box or "Run" box in "Windows.." to turn it on: 28

29 "ENCRYPTING FILE SYSTEM" SERVICE SET TO "MANUAL" OR "AUTOMATIC" (continued) Step 1: Click on the "Start" button in versions of "Windows" prior to "..8" or, for "Windows 8..", hover over the lower-left "Hot Corner" and use the RIGHT mouse" to click on "Run" in the pop-up "Power User Context Menu": 29

30 "ENCRYPTING FILE SYSTEM" SERVICE SET TO "MANUAL" OR "AUTOMATIC" (continued) Step 2: Type in services.msc Step 3: Press once on the Enter key. 30

31 31

32 "ENCRYPTING FILE SYSTEM" SERVICE SET TO "MANUAL" OR "AUTOMATIC" (continued) Step 4: A "Services" Microsoft Management Console window will be displayed: 32

33 33

34 "ENCRYPTING FILE SYSTEM" SERVICE SET TO "MANUAL" OR "AUTOMATIC" (continued) Step 5: Use the vertical scroll bar on the right to scroll downward until you locate the "Encrypting File System" service. Step 6: Use your RIGHT mouse button to click on it. Step 7: A pop-up context menu will be displayed: 34

35 "ENCRYPTING FILE SYSTEM" SERVICE SET TO "MANUAL" OR "AUTOMATIC" (continued) Step 8: Click on "Properties" in the pop-up context menu: 35

36 36

37 "ENCRYPTING FILE SYSTEM" SERVICE SET TO "MANUAL" OR "AUTOMATIC" (continued) Step 9: A "Properties" dialog box will be displayed. Step 10: Make sure that "Startup type" is set to "Manual" or "Automatic". "Manual" is preferable. Step 11: Click on the "Apply" button if it is not grayed out.` 37

38 "ENCRYPTING FILE SYSTEM" SERVICE SET TO "MANUAL" OR "AUTOMATIC" (continued) Step 12: Close the "Properties" dialog box. Step 13: Close the "Services" Microsoft Management Console window. 38

39 39

40 USING THE "CERTIFICATE MANAGER" TO CHECK FOR EXISTING PERSONAL "PUBLIC KEY CERTIFICATES" Step 1: Click on the "Start" button in versions of "Windows" prior to "..8" or, for "Windows 8..", hover over the lower-left "Hot Corner" and use the RIGHT mouse" to click on "Run" in the pop-up "Power User Context Menu": 40

41 41

42 USING THE "CERTIFICATE MANAGER" TO CHECK FOR EXISTING PERSONAL "PUBLIC KEY CERTIFICATES" (continued) Step 2: Use the right mouse button to click on "cmd.exe" in versions of "Windows" prior to "..8" or, for "Windows 8..", use the left mouse button to click on "Command Prompt (Admin) in the pop-up Power User Tasks menu: 42

43 43

44 USING THE "CERTIFICATE MANAGER" TO CHECK FOR EXISTING PERSONAL "PUBLIC KEY CERTIFICATES" (continued) Step 3: Use the left mouse button to click on "Run as administrator" in versions of "Windows" prior to "..8" or, for "Windows 8..", use the left mouse button to click on the "Yes" button of the "User Account Control" dialog box: 44

45 45

46 USING THE "CERTIFICATE MANAGER" TO CHECK FOR EXISTING PERSONAL "PUBLIC KEY CERTIFICATES" (continued) Step 4: A command prompt window, will be displayed: 46

47 47

48 USING THE "CERTIFICATE MANAGER" TO CHECK FOR EXISTING PERSONAL "PUBLIC KEY CERTIFICATES" (continued) Step 5: Inside the command prompt window, type in certmgr.msc Step 6: Press once on the Enter key. 48

49 49

50 USING THE "CERTIFICATE MANAGER" TO CHECK FOR EXISTING PERSONAL "PUBLIC KEY CERTIFICATES" (continued) Step 7: A "certmgr" Microsoft Management Console window will be displayed: 50

51 51

52 USING THE "CERTIFICATE MANAGER" TO CHECK FOR EXISTING PERSONAL "PUBLIC KEY CERTIFICATES" (continued) Step 8: Double-click on the Personal group in the right-most pane: 52

53 53

54 54

55 USING THE "CERTIFICATE MANAGER" TO CHECK FOR EXISTING PERSONAL "PUBLIC KEY CERTIFICATES" (continued) Step 9: Double-click on "Certificates" subgroup in the rightmost pane: 55

56 56

57 USING THE "CERTIFICATE MANAGER" TO CHECK FOR EXISTING PERSONAL "PUBLIC KEY CERTIFICATES" (continued) Step 10: Note that you presently have no "Public Key Certificates" or subgroups in the "Personal" group: 57

58 58

59 ENCRYPTING A FILE OR FOLDER WITH "ENCRYPTING FILE SYSTEM" Step 1: Start "Windows Explorer" ("File Explorer"). Step 2: Locate or create the folder or file that you want to encrypt. 59

60 60

61 ENCRYPTING A FILE OR FOLDER WITH "ENCRYPTING FILE SYSTEM" (continued) Step 3: Use the RIGHT mouse to click on it. Step 4: A pop-up context menu will be displayed. Step 5: Click on "Properties". 61

62 62

63 ENCRYPTING A FILE OR FOLDER WITH "ENCRYPTING FILE SYSTEM" (continued) Step 6: A "..Properties" dialog box will be displayed. Step 7: Click on the "Advanced" button. 63

64 64

65 ENCRYPTING A FILE OR FOLDER WITH "ENCRYPTING FILE SYSTEM" (continued) Step 8: An "Advanced Attributes" box will be displayed: 65

66 66

67 ENCRYPTING A FILE OR FOLDER WITH "ENCRYPTING FILE SYSTEM" (continued) Step 9: Put in a checkmark for "Encrypt contents to secure data". Step 10: Click on the "OK" button: Step 11: The "Advanced Attributes" box will disappear. 67

68 68

69 ENCRYPTING A FILE OR FOLDER WITH "ENCRYPTING FILE SYSTEM" (continued) Step 12: Click on the "Apply" button of the "..Properties" dialog box, if the "Apply" button is not grayed out. Step 11: The "Advanced Attributes" box will disappear. 69

70 70

71 ENCRYPTING A FILE OR FOLDER WITH "ENCRYPTING FILE SYSTEM" (continued) Step 13: Select the desired "option button": 71

72 72

73 ENCRYPTING A FILE OR FOLDER WITH "ENCRYPTING FILE SYSTEM" (continued) Step 14: Click on the "Continue" button of the "Access Denied" dialog box: 73

74 74

75 ENCRYPTING A FILE OR FOLDER WITH "ENCRYPTING FILE SYSTEM" (continued) Step 15: The "Access Denied" box will disappear. Step 16: The file name(s) of the newly-encrypted file(s) will now be displayed in a green font to indicate that the file(s) is/are encrypted by "Encrypting File System". 75

76 76

77 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" Step 1: Click on the "Start" button in versions of "Windows" prior to "..8" or, for "Windows 8..", hover over the lower-left "Hot Corner" and use the RIGHT mouse" to click on "Run" in the pop-up "Power User Context Menu": 77

78 78

79 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 2: Use the right mouse button to click on "cmd.exe" in versions of "Windows" prior to "..8" or, for "Windows 8..", use the left mouse button to click on "Command Prompt (Admin) in the pop-up Power User Tasks menu: 79

80 80

81 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 3: Use the left mouse button to click on "Run as administrator" in versions of "Windows" prior to "..8" or, for "Windows 8..", use the left mouse button to click on the "Yes" button of the "User Account Control" dialog box: 81

82 82

83 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 4: A command prompt window, will be displayed: 83

84 84

85 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 5: Inside the command prompt window, type in certmgr.msc Step 6: Press once on the Enter key. 85

86 86

87 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 7: A "certmgr" Microsoft Management Console window will be displayed: 87

88 88

89 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 8: Double-click on the Personal group in the right-most pane: 89

90 90

91 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 9: Double-click on "Certificates" subgroup in the rightmost pane: 91

92 92

93 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 10: Note that you now have a newly-created "Public Key Certificate" in the "Certificates" subgroup of the "Personal" group: 93

94 94

95 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 11: Note that you now have a newly-created "Public Key Certificate" in the "Certificates" subgroup of the "Personal" group: 95

96 96

97 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 12: Use the RIGHT mouse button to click on the newly-created "Public Key Certificate": 97

98 98

99 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 13: Click on "All Tasks" in the pop-up context menu: 99

100 100

101 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 14: Click on "Advanced Operations" in the secondary context menu: 101

102 102

103 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 15: A "Certificate Export Wizard" dialog box will be displayed. Step 16: Click on the "Next" button: 103

104 104

105 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 17: Select the "Yes, export the private key" option. Step 18: Click on the "Next" button: 105

106 106

107 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 19: Click on the "Next" button: 107

108 108

109 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 20: Click on the "Next" button: 109

110 110

111 111

112 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 21: Type in a password and record it somewhere in a secure manner (such as with "Roboform" or "LastPass"): 112

113 113

114 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY"(continued) Step 22: Type in the same password again. Step 23: Click on the "Next" button: 114

115 115

116 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 24: Click on the "Browse" button: 116

117 117

118 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 25: Use the "Save As" box to work your way to the hard drive or flash drive location where you wish to place the.pfx file: 118

119 119

120 120

121 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 26: When you arrive at the desired location for the.pfx file, type in a name for the.pfx file. Step 27: Click on the "Save" button: 121

122 122

123 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 28: Click on the "Next" button: 123

124 124

125 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 29: Click on the "Finish" button: 125

126 126

127 127

128 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 30: Click on "OK" button: 128

129 129

130 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 31: Click on "x" button to close the "certmgr" window: 130

131 131

132 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 32: Click on "x" button to close the Command Prompt window: 132

133 133

134 134

135 .PFX FILE(S) (continued).pfx file(s) = "Personal Information Exchange" files.pfx file(s) an be moved, copied, renamed, and ed without restrictions. 135

136 .PFX FILE(S) (continued) Double-click on it to "Import" the certificate and the private key into any computer or Windows user account. Then you can open/view the associated the EFS-encrypted data file 136

137 DECRYPTING AN EFS- ENCRYPTED FILE/FOLDER If your Windows user account or your Windows computer cannot open an EFS-encrypted file, do the following: Step 1: Obtain the.pfx file (from the creator/owner of the EFSencrypted file) and double-click on the.pfx file: 137

138 138

139 139

140 DECRYPTING AN EFS-ENCRYPTED FILE/FOLDER (continued) Step 2: Click on the "Next" button of the "Certificate Import Wizard": 140

141 141

142 DECRYPTING AN EFS-ENCRYPTED FILE/FOLDER (continued) Step 3: Click on the "Next" button: 142

143 143

144 144

145 DECRYPTING AN EFS-ENCRYPTED FILE/FOLDER (continued) Step 4: Type in the password for the.pfx file (which you should have obtained from the creator/owner of the EFS-encrypted data file): 145

146 146

147 DECRYPTING AN EFS-ENCRYPTED FILE/FOLDER (continued) Step 5: Select the "Mark this key as exportable" option. Step 6: Click on the "Next" button: 147

148 148

149 DECRYPTING AN EFS-ENCRYPTED FILE/FOLDER (continued) Step 7: Click on the "Next" button: 149

150 150

151 DECRYPTING AN EFS-ENCRYPTED FILE/FOLDER (continued) Step 8: Click on the "Finish" button: 151

152 152

153 DECRYPTING AN EFS-ENCRYPTED FILE/FOLDER (continued) Step 9: Click on the "OK" button: 153

154 154

155 DECRYPTING AN EFS-ENCRYPTED FILE/FOLDER (continued) Step 10: If you EFS-encrypted files are inside an EFS-encrypted folder, double-click on the folder to open it: 155

156 156

157 DECRYPTING AN EFS-ENCRYPTED FILE/FOLDER (continued) Step 11: Double-click on the EFSencrypted data file to open it: 157

158 158

159 DECRYPTING AN EFS-ENCRYPTED FILE/FOLDER (continued) Step 12: The EFS-encrypted data file will open with its default associated software application program ("app"): 159

160 160

161 DELETED CERTIFICATES STAY IN RAM UNTIL YOU RE-BOOT If you run certmgr.msc to delete a certificate from your computer's hard drive, the certificate will stay active in RAM, so you have to re-boot to flush out the active certificate. 161

162 OPTIONS IN "ACRONIS TRUE IMAGE.." FOR BACKING UP HARD DRIVES THAT CONTAIN EFS-ENCRYPTED FILES According to documentation/atih2012/index. html#267.html: 162

163 163

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable

More information

BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8)

BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8) BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8) Encryption is an effective method of protecting data stored on portable devices such as USB flash drives and external hard drives.

More information

MAC/OSX - How to Encrypt Data using TrueCrypt. v.05201011

MAC/OSX - How to Encrypt Data using TrueCrypt. v.05201011 MAC/OSX - How to Encrypt Data using TrueCrypt v.05201011 This chapter contains step-by-step instructions on how to create, mount, and use a TrueCrypt volume. We strongly recommend that you read the entire

More information

How to Copy Photos to a CD Using Microsoft Windows XP or Microsoft Windows Vista

How to Copy Photos to a CD Using Microsoft Windows XP or Microsoft Windows Vista How to Copy Photos to a CD Using Microsoft Windows XP or Microsoft Windows Vista There are many occasions, where you will want to copy (sometimes called burn ) photo files to a CD. You may be creating

More information

Managing Applications, Services, Folders, and Libraries

Managing Applications, Services, Folders, and Libraries Lesson 4 Managing Applications, Services, Folders, and Libraries Learning Objectives Students will learn to: Understand Local versus Network Applications Remove or Uninstall an Application Understand Group

More information

Organizing and Managing Email

Organizing and Managing Email Organizing and Managing Email Outlook provides several tools for managing email, including folders, rules, and categories. You can use these tools to help organize your email. Using folders Folders can

More information

Remote Storage Area (RSA) Basics

Remote Storage Area (RSA) Basics Remote Storage Area (RSA) Basics Table of Contents Remote Storage Area Overview... 3 What is Remote Storage Area?... 3 Who has access to RSA?... 3 How much space is available?... 3 Basic RSA Use... 4 How

More information

Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials

Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials Installing Windows Server Update Services (WSUS) on Windows Server 2012 R2 Essentials With Windows Server 2012 R2 Essentials in your business, it is important to centrally manage your workstations to ensure

More information

Install the Production Treasury Root Certificate (Vista / Win 7)

Install the Production Treasury Root Certificate (Vista / Win 7) Install the Production Treasury Root Certificate (Vista / Win 7) The Production Treasury Root Certificate should be maintained on your local workstations to use OTCnet Check Capture and Deposit Reporting.

More information

BitLocker To Go User Guide

BitLocker To Go User Guide BitLocker To Go User Guide 1. Introduction BitLocker To Go a new feature of Windows 7 is a full-disk encryption protection technology for removable storage devices that are connected to one of the USB

More information

Installation Instruction STATISTICA Enterprise Small Business

Installation Instruction STATISTICA Enterprise Small Business Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations

More information

Acronis Backup & Recovery 11

Acronis Backup & Recovery 11 Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation

More information

etoken Enterprise For: SSL SSL with etoken

etoken Enterprise For: SSL SSL with etoken etoken Enterprise For: SSL SSL with etoken System Requirements Windows 2000 Internet Explorer 5.0 and above Netscape 4.6 and above etoken R2 or Pro key Install etoken RTE Certificates from: (click on the

More information

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS Notes 1. The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b)

More information

Office of Information Technologies (OIT)

Office of Information Technologies (OIT) Office of Information Technologies (OIT) Encrypting File System (EFS) November 14th, 2007 Contents Introduction... 1 Benefits... 1 How it works... 1 Enabling EFS... 2 Step 1: Obtain an EFS key pair...

More information

CLONING A VIRTUAL MACHINE IN "VMWARE PLAYER" IN A "WINDOWS" HOST COMPUTER

CLONING A VIRTUAL MACHINE IN VMWARE PLAYER IN A WINDOWS HOST COMPUTER CLONING A VIRTUAL MACHINE IN "VMWARE PLAYER" IN A "WINDOWS" HOST COMPUTER HIGH-LEVEL EXECUTIVE SUMMARY: In "VMware Player", you can copy a virtual machine directly, using "Windows Explorer" or "My Computer"

More information

CONNECT-TO-CHOP USER GUIDE

CONNECT-TO-CHOP USER GUIDE CONNECT-TO-CHOP USER GUIDE VERSION V8 Table of Contents 1 Overview... 3 2 Requirements... 3 2.1 Security... 3 2.2 Computer... 3 2.3 Application... 3 2.3.1 Web Browser... 3 2.3.2 Prerequisites... 3 3 Logon...

More information

Getting Started with WebEx Access Anywhere

Getting Started with WebEx Access Anywhere Getting Started with WebEx Access Anywhere This guide provides basic instructions to help you start using WebEx Access Anywhere quickly. This guide assumes that you have a user account on your meeting

More information

Email Account Create for Outlook Express

Email Account Create for Outlook Express Email Account Create for Outlook Express Click Start Menu Choose Outlook Express Click Tools menu from Menu Bar and then click Accounts In Internet Account Wizard, Click Add Button and Click Mail. 1 In

More information

ReadyNAS Remote. User Manual. June 2013 202-11078-03. 350 East Plumeria Drive San Jose, CA 95134 USA

ReadyNAS Remote. User Manual. June 2013 202-11078-03. 350 East Plumeria Drive San Jose, CA 95134 USA User Manual June 2013 202-11078-03 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting this NETGEAR product. After installing your device, locate the serial number on the label

More information

STATISTICA VERSION 11 CONCURRENT NETWORK LICENSE WITH BORROWING INSTALLATION INSTRUCTIONS

STATISTICA VERSION 11 CONCURRENT NETWORK LICENSE WITH BORROWING INSTALLATION INSTRUCTIONS data analysis data mining quality improvement web-based analytics Notes STATISTICA VERSION 11 CONCURRENT NETWORK LICENSE WITH BORROWING INSTALLATION INSTRUCTIONS 1. The installation of the Concurrent network

More information

Microsoft Outlook Web App (OWA)

Microsoft Outlook Web App (OWA) im Microsoft Outlook Web App (OWA) CSULB 1 Information Technology Services CSULB 2 Information Technology Services Table of Contents Introduction... 4 Logging In... 4 The OWA Interface... 5 Feature Differences...

More information

Last modified on 03-01-2010 for application version 4.4.4

Last modified on 03-01-2010 for application version 4.4.4 Last modified on 03-01-2010 for application version 4.4.4 RemotePC User Manual Table of Contents Introduction... 3 Features... 3 Install the Remote Access Host application... 4 Install the Remote Access

More information

Outlook 2007: Managing your mailbox

Outlook 2007: Managing your mailbox Outlook 2007: Managing your mailbox Find its size and trim it down Use Mailbox Cleanup On the Tools menu, click Mailbox Cleanup. You can do any of the following from this one location: View the size of

More information

Using. Microsoft Virtual PC. Page 1

Using. Microsoft Virtual PC. Page 1 Using Microsoft Virtual PC T4 Page 1 Microsoft Virtual PC Microsoft Virtual PC allows multiple Guest Operating Systems (Virtual Machines) to run using the resources of the Host Operating System (The PC

More information

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS Notes: STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation

More information

PC Agent Quick Start. Open the Agent. Autonomy Connected Backup. Version 8.8. Revision 0

PC Agent Quick Start. Open the Agent. Autonomy Connected Backup. Version 8.8. Revision 0 T E C H N I C A L N O T E Autonomy Connected Backup Version 8.8 PC Agent Quick Start Revision 0 Use this document as a quick reference for common Connected Backup PC Agent tasks. If the Agent is not on

More information

Error: "Object reference not set to an instance of an object" When Opening Any Database

Error: Object reference not set to an instance of an object When Opening Any Database Answer ID: 13609 Date Created: 07/03/2005 12:08 AM Last Updated: 10/07/2005 02:22 PM Access Level: ACT!-Basic Error: "Object reference not set to an instance of an object" When Opening Any Database Question

More information

Windows XP File Management

Windows XP File Management Windows XP File Management As you work with a computer creating more and more documents, you need to find a way to keep this information organized. Without a good organizational method, all your files

More information

DA-70702 BIOMETRIC FINGERPRINT READER 2,5" HDD ENCLOSURE User Manual

DA-70702 BIOMETRIC FINGERPRINT READER 2,5 HDD ENCLOSURE User Manual DA-70702 BIOMETRIC FINGERPRINT READER 2,5" HDD ENCLOSURE User Manual System Requirements System Requirements Recommended Pentium II or higher or other compatible machines. Recommended RAM of at least 128

More information

Live@edu User Guide. Please visit the Helpdesk website for more information: http://www.smu.edu.sg/iits/helpdesk_support/index.asp

Live@edu User Guide. Please visit the Helpdesk website for more information: http://www.smu.edu.sg/iits/helpdesk_support/index.asp IITS Main Office SINGAPORE MANAGEMENT UNIVERSITY Administration Building, Level 11 81, Victoria Street Singapore 188065 Phone: 65-6828 1930 Email: iits@smu.edu.sg Please visit the Helpdesk website for

More information

AKO Email Shutdown Quick Reference Guide

AKO Email Shutdown Quick Reference Guide AKO Email Shutdown Quick Reference Guide NETWORK ENTERPRISE CENTER This guide explains how the Army is shutting down AKO Email and outlines steps you must take to ensure a smooth transition to full DoD

More information

PGP Desktop Email Quick Start Guide version 9.6

PGP Desktop Email Quick Start Guide version 9.6 What is PGP Desktop Email? PGP Desktop Email is part of the PGP Desktop family of products. You can use PGP Desktop Email to: Automatically and transparently encrypt, sign, decrypt, and verify email messages

More information

Copyright Pro Softnet Corporation. All rights reserved. 2 of 24

Copyright Pro Softnet Corporation. All rights reserved. 2 of 24 Copyright Pro Softnet Corporation. All rights reserved. 2 of 24 Remote Access Helpdesk User Manual TABLE OF CONTENTS Introduction...4 Features...4 Administrator: Manage Technicians...5 Technician: Initiate

More information

MICROSOFT OUTLOOK 2010 GETTING STARTED

MICROSOFT OUTLOOK 2010 GETTING STARTED MICROSOFT OUTLOOK 2010 GETTING STARTED Last Edited: 2012-07-09 1 Introduction... 3 Getting Started... 3 Tour of the Outlook 2010 Interface... 3 Start Outlook 2010... 4 Configure Email Account s... 4 Set

More information

Importing your personal certificate(s) to Microsoft Internet Explorer from a Back-up (or export) file

Importing your personal certificate(s) to Microsoft Internet Explorer from a Back-up (or export) file Importing your personal certificate(s) to Microsoft Internet Explorer from a Back-up (or export) file You may use your Medium Assurance Certificate(s) on any computer that you wish to by importing them

More information

Using an Automatic Back Up for Outlook 2003 and Outlook 2007 Personal Folders

Using an Automatic Back Up for Outlook 2003 and Outlook 2007 Personal Folders Using an Automatic Back Up for Outlook 2003 and Outlook 2007 Personal Folders Part 1 Install the Personal Folder Backup Utility Note: You should close Outlook and any other applications before installing

More information

Introduction to the use of the environment of Microsoft Visual Studio 2008

Introduction to the use of the environment of Microsoft Visual Studio 2008 Steps to work with Visual Studio 2008 1) Start Visual Studio 2008. To do this you need to: a) Activate the Start menu by clicking the Start button at the lower-left corner of your screen. b) Set the mouse

More information

Lab 20: Cryptography

Lab 20: Cryptography CompTIA Security+ Lab Series Lab 20: Cryptography CompTIA Security+ Domain 6 - Cryptography Objective 6.1: Summarize General Cryptography Concepts Document Version: 2013-08-02 Organization: Moraine Valley

More information

How to install and use the File Sharing Outlook Plugin

How to install and use the File Sharing Outlook Plugin How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.

More information

Installing the Software... 1 Using the System Tray Icon... 5 Restoring the System Tray Icon... 6

Installing the Software... 1 Using the System Tray Icon... 5 Restoring the System Tray Icon... 6 Contents Getting Started... 1 Installing the Software... 1 Using the System Tray Icon... 5 Restoring the System Tray Icon... 6 Managing Your Drives... 8 Adjusting the Power Setting... 8 Testing Your Drive...11

More information

Installing your certificate on your Windows PC

Installing your certificate on your Windows PC Installing your certificate on your PC Choose your email software below to learn how to obtain and install a digital certificate. Microsoft Outlook Mail Using Outlook or Mail Step one Visit Comodo for

More information

FILE SHARING OVER A LOCAL AREA NETWORK IN "WINDOWS.."

FILE SHARING OVER A LOCAL AREA NETWORK IN WINDOWS.. FILE SHARING OVER A LOCAL AREA NETWORK IN "WINDOWS.." HIGH-LEVEL EXECUTIVE SUMMARY Each version of "Windows.." has slightly-different file sharing capabilities. For "Windows 7" and (future) "Windows 8",

More information

Encrypt USB Drive to Protect Data

Encrypt USB Drive to Protect Data Encrypt USB Drive to Protect Data Enable BitLocker on USB Flash Drives to Protect Data Encryption is an effective method of protecting data stored on portable devices such as USB flash drives and external

More information

Installation Instruction STATISTICA. Concurrent Network License with Borrowing Domain Based Registration

Installation Instruction STATISTICA. Concurrent Network License with Borrowing Domain Based Registration Installation Instruction STATISTICA Concurrent Network License with Borrowing Domain Based Registration Notes: ❶ The installation of the Concurrent network version entails two parts: a) a server installation,

More information

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4

1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4 1. Set Daylight Savings Time... 3 a. Have client log into Novell/Local Machine with Administrator Account...3 b. Access Adjust Date/Time...3 c. Make sure the time zone is set to Central Time...3 2. Create

More information

The cloud server setup program installs the cloud server application, Apache Tomcat, Java Runtime Environment, and PostgreSQL.

The cloud server setup program installs the cloud server application, Apache Tomcat, Java Runtime Environment, and PostgreSQL. GO-Global Cloud 4.1 QUICK START SETTING UP A WINDOWS CLOUD SERVER AND HOST This guide provides instructions for setting up a cloud server and configuring a host so it can be accessed from the cloud server.

More information

MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM)

MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) Microsoft BitLocker Administration and Monitoring (MBAM) provides a simplified administrative

More information

Trusting the ECA Certificate Authority in Microsoft Internet Explorer

Trusting the ECA Certificate Authority in Microsoft Internet Explorer Trusting the ECA Certificate Authority in Microsoft Internet Explorer In order for an application (like Internet Explorer or Outlook) to make use of a certificate without sending up a host or warning messages,

More information

Importing Contacts to Outlook

Importing Contacts to Outlook Importing Contacts to Outlook 1. The first step is to create a file of your contacts from the National Chapter Database. 2. You create this file under Reporting, Multiple. You will follow steps 1 and 2

More information

Lenovo Online Data Backup User Guide Version 1.8.14

Lenovo Online Data Backup User Guide Version 1.8.14 Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data

More information

Outlook Managing Your Items

Outlook Managing Your Items Course Description Managing your items is essential if you want Outlook to run as efficiently and effectively as possible. As with any filing system the longer you put off doing anything the larger the

More information

NETWORK PRINT MONITOR User Guide

NETWORK PRINT MONITOR User Guide NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Web File Management with SSH Secure Shell 3.2.3

Web File Management with SSH Secure Shell 3.2.3 Web File Management with SSH Secure Shell 3.2.3 June 2003 Information Technologies Copyright 2003 University of Delaware. Permission to copy without fee all or part of this material is granted provided

More information

Migrate from Outlook Express to Windows Live Mail

Migrate from Outlook Express to Windows Live Mail Migrate from Outlook Express to Windows Live Mail Windows Live Mail is the successor to Microsoft's Outlook Express mail client. Windows Live Mail is not preinstalled with Windows 7. It can be downloaded

More information

Wavecrest Certificate

Wavecrest Certificate Wavecrest InstallationGuide Wavecrest Certificate www.wavecrest.net Copyright Copyright 1996-2015, Wavecrest Computing, Inc. All rights reserved. Use of this product and this manual is subject to license.

More information

Online Backup and Recovery Manager Setup for Microsoft Windows.

Online Backup and Recovery Manager Setup for Microsoft Windows. Online Backup and Recovery Manager Setup for Microsoft Windows. Backup Wizard Default Interface Recovery Wizard Online Backup and Recovery Manager Setup Backup Wizard After installing and launching the

More information

UCO_SECURE Wireless Connection Guide: Windows 8

UCO_SECURE Wireless Connection Guide: Windows 8 1 The UCO_SECURE wireless network uses 802.1x encryption to ensure that your data is secure when it is transmitted wirelessly. This security is not enabled by default on Windows computers. In order to

More information

Using Group Policies to Install AutoCAD. CMMU 5405 Nate Bartley 9/22/2005

Using Group Policies to Install AutoCAD. CMMU 5405 Nate Bartley 9/22/2005 Using Group Policies to Install AutoCAD CMMU 5405 Nate Bartley 9/22/2005 Before we get started This manual provides a step-by-step process for creating a Group Policy that will install AutoCAD to a Windows

More information

SWP-0014 Moving an Organization Between AFHCAN tconsult Servers. Revision: 1. Effective Date: 8/19/2010

SWP-0014 Moving an Organization Between AFHCAN tconsult Servers. Revision: 1. Effective Date: 8/19/2010 Software Procedure SWP-0014 Moving an Organization Between AFHCAN tconsult Servers Revision: 1 Effective Date: 8/19/2010 Alaska Native Tribal Health Consortium Division of Health Information & Technology

More information

Hiva-network.com. Microsoft_70-680_v2011-06-22_Kat. Exam A

Hiva-network.com. Microsoft_70-680_v2011-06-22_Kat. Exam A Exam A Microsoft_70-680_v2011-06-22_Kat QUESTION 1 You have a computer that runs Windows 7. The computer has a single volume. You install 15 applications and customize the environment. You complete the

More information

owncloud Configuration and Usage Guide

owncloud Configuration and Usage Guide owncloud Configuration and Usage Guide This guide will assist you with configuring and using YSUʼs Cloud Data storage solution (owncloud). The setup instructions will include how to navigate the web interface,

More information

Installing Oracle 12c Enterprise on Windows 7 64-Bit

Installing Oracle 12c Enterprise on Windows 7 64-Bit JTHOMAS ENTERPRISES LLC Installing Oracle 12c Enterprise on Windows 7 64-Bit DOLOR SET AMET Overview This guide will step you through the process on installing a desktop-class Oracle Database Enterprises

More information

SECURE EMAIL USER GUIDE OUTLOOK 2000

SECURE EMAIL USER GUIDE OUTLOOK 2000 WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP

More information

Module One: Getting Started... 6. Opening Outlook... 6. Setting Up Outlook for the First Time... 7. Understanding the Interface...

Module One: Getting Started... 6. Opening Outlook... 6. Setting Up Outlook for the First Time... 7. Understanding the Interface... 2 CONTENTS Module One: Getting Started... 6 Opening Outlook... 6 Setting Up Outlook for the First Time... 7 Understanding the Interface...12 Using Backstage View...14 Viewing Your Inbox...15 Closing Outlook...17

More information

Using Bitlocker to Encrypt your Flash Drive Information Technology Services July 27, 2012

Using Bitlocker to Encrypt your Flash Drive Information Technology Services July 27, 2012 Using Bitlocker to Encrypt your Flash Drive Information Technology Services July 27, 2012 Contact the ITS Helpdesk at 402-559-7700 or helpdesk@unmc.edu with questions. How it works Basically, BitLocker

More information

Automatic Setup... 1 Manual Setup... 2 Installing the Wireless Certificates... 18

Automatic Setup... 1 Manual Setup... 2 Installing the Wireless Certificates... 18 Contents Automatic Setup... 1 Manual Setup... 2 Installing the Wireless Certificates... 18 Automatic Setup 1. Click on the Wireless icon in your system tray that looks like. 2. You will see a list of available

More information

Installation Instruction STATISTICA Enterprise Server

Installation Instruction STATISTICA Enterprise Server Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of

More information

LEARNING RESOURCE CENTRE GUIDE TO OFFICE 365

LEARNING RESOURCE CENTRE GUIDE TO OFFICE 365 LEARNING RESOURCE CENTRE GUIDE TO OFFICE 365 LEARNING RESOURCE CENTRE OCTOBER 2014/2015 Table of Contents Explanation of One Drive and Microsoft Office Online... 3 How to create a document and folder...

More information

SmartSync Monitor Help

SmartSync Monitor Help 1.0 (Build 15) 2 Table of Contents Foreword 0 Part I Welcome to SmartSync Monitor 3 Part II Getting Started 4 1 Copyright... 4 2 System... requirements and installation 4 3 Uninstalling... 5 6 Part III

More information

IceWarp Notifier User Guide

IceWarp Notifier User Guide IceWarp Unified Communications IceWarp Notifier User Guide Version 10.4 Printed on 16 April, 2012 Contents IceWarp Notifier User Guide 1 Installation... 2 Settings... 6 Notifications... 8 Pop-up Menu...

More information

WebEx Remote Access User s Guide

WebEx Remote Access User s Guide About This Guide This guide introduces you to WebEx Remote Access and its features. This guide assumes that you have a user account for your Remote Access service. Note To obtain a user account, contact

More information

English. Network Sharing. Ver.3.0. * Firmware

English. Network Sharing. Ver.3.0. * Firmware Network Sharing Ver.3.0. * Firmware How to set-up Folder Sharing in Windows 7 This instruction is for Window 7 Ultimate. 1. [Start] [Control Panel] - [View network status and tasks in Network and Internet].

More information

HTTP Server Setup for McAfee Endpoint Encryption (Formerly SafeBoot) Table of Contents

HTTP Server Setup for McAfee Endpoint Encryption (Formerly SafeBoot) Table of Contents Table of Contents Introduction... 1 Setting Up Endpoint Encryption s HTTP Server...2 How to trust Control Break as an CA... 20 Start Endpoint Encryption s HTTP Server service... 23 Verify Endpoint Encryption

More information

ProjectWise Explorer V8i User Manual for Subconsultants & Team Members

ProjectWise Explorer V8i User Manual for Subconsultants & Team Members ProjectWise Explorer V8i User Manual for Subconsultants & Team Members submitted to Michael Baker International Subconsultants & Team Members submitted by Michael Baker International ProjectWise Support

More information

E-Notebook SQL 12.0 Desktop Database Installation Guide. E-Notebook SQL 12.0 Desktop Database Installation Guide

E-Notebook SQL 12.0 Desktop Database Installation Guide. E-Notebook SQL 12.0 Desktop Database Installation Guide E-Notebook SQL 12.0 Desktop Database Installation Guide 1. Introduction... 3 2. Database System... 3 2.1. Software requirements... 3 2.2. Database Creation and Configuration... 4 2.2.1. Create and share

More information

Moving your GroupWise archive to Outlook 2010 Key step to take the day after your e-mail upgrade

Moving your GroupWise archive to Outlook 2010 Key step to take the day after your e-mail upgrade Moving your GroupWise archive to Outlook 2010 Key step to take the day after your e-mail upgrade About this guide /transformation Who should use it This guide is intended for those DBHDD (Department of

More information

Create, Link, or Edit a GPO with Active Directory Users and Computers

Create, Link, or Edit a GPO with Active Directory Users and Computers How to Edit Local Computer Policy Settings To edit the local computer policy settings, you must be a local computer administrator or a member of the Domain Admins or Enterprise Admins groups. 1. Add the

More information

QUICK START GUIDE EDI Claims Link for Windows version 3.1

QUICK START GUIDE EDI Claims Link for Windows version 3.1 QUICK START GUIDE EDI Claims Link for Windows version 3.1 System Requirements - Operating system: Windows 98 or later - Computer/Processor: Pentium 2, 233 MHz or greater - Memory: 64MB Ram - Initial application

More information

User Guide. emoney for Outlook

User Guide. emoney for Outlook User Guide emoney for Outlook Table of Contents INTRODUCTION... 2 SYSTEM REQUIREMENTS... 2 Required Installations... 2 INSTALLATION PROCESS... 2 FIRST TIME SETUP... 8 EMONEY CLIENT PANE... 17 Client Contact

More information

Acronis Backup & Recovery 11.5 Quick Start Guide

Acronis Backup & Recovery 11.5 Quick Start Guide Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server

More information

Release 2.0. Cox Business Online Backup Quick Start Guide

Release 2.0. Cox Business Online Backup Quick Start Guide Cox Business Online Backup Quick Start Guide Release 2.0 Cox Business Online Backup Quick Start Guide i IMPORTANT: You must notify Cox in advance if you would like to move or relocate your telephone Service.

More information

support HP MFP Scan Setup Wizard 1.1

support HP MFP Scan Setup Wizard 1.1 support HP MFP Scan Setup Wizard 1.1 Security Level: Customer Verbal Use Date Written/Updated: October 11, 2007 Document Summary a The Scan Setup Wizard is a Windows utility that end users can download

More information

Comodo Disk Encryption

Comodo Disk Encryption Comodo Disk Encryption Version 2.0 User Guide Version 2.0.122010 Versi Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Comodo Disk Encryption Introduction... 3

More information

Encrypting Files Using AxCrypt

Encrypting Files Using AxCrypt Encrypting Files Using AxCrypt Documents, spreadsheets, databases, and other files that contain personal information or other sensitive information MUST BE encrypted when being transmitted to someone else

More information

GETTING STARTED GUIDE 4.5. FileAudit VERSION. www.isdecisions.com

GETTING STARTED GUIDE 4.5. FileAudit VERSION. www.isdecisions.com GETTING STARTED GUIDE FileAudit 4.5 VERSION www.isdecisions.com Introduction FileAudit monitors access or access attempts to sensitive files and folders on Microsoft Windows servers. FileAudit allows you

More information

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved. GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...

More information

How to enable Disk Encryption on a laptop

How to enable Disk Encryption on a laptop How to enable Disk Encryption on a laptop Skills and pre-requisites Intermediate IT skills required. You need to: have access to, and know how to change settings in the BIOS be confident that your data

More information

Using Your Online Help System

Using Your Online Help System Using Your Online Help System GS-2993A Universal Imaging Corporation 502 Brandywine Parkway, West Chester, PA 19380 USA Tel: (610) 344-9410 Fax: (610) 344-9515 Copyright, Notices, and Trademarks 1998,

More information

SMART Ink 1.5. Windows operating systems. Scan the following QR code to view the SMART Ink Help on your smart phone or other mobile device.

SMART Ink 1.5. Windows operating systems. Scan the following QR code to view the SMART Ink Help on your smart phone or other mobile device. SMART Ink 1.5 Windows operating systems User s guide Scan the following QR code to view the SMART Ink Help on your smart phone or other mobile device. Trademark notice SMART Ink, SMART Notebook, SMART

More information

Using Microsoft Office 2013: Outlook. Gerry Kruyer

Using Microsoft Office 2013: Outlook. Gerry Kruyer Using Microsoft Office 2013: Outlook Table of Contents Outlook 2013 Ribbon... 4 Viewing Inbox... 4 Folders... 4 Home Tab... 5 Background Colour and Themes... 5 Inbox... 6 Reading Pane... 6 Turn off/on

More information

SFTP Server User Login Instructions. Open Internet explorer and enter the following url: https://sftp.sae.org

SFTP Server User Login Instructions. Open Internet explorer and enter the following url: https://sftp.sae.org SFTP Server User Login Instructions Open Internet explorer and enter the following url: https://sftp.sae.org You will be prompted for a user id and password as such. Please enter your account id and password.

More information

LAB 1: Installing Active Directory Federation Services

LAB 1: Installing Active Directory Federation Services LAB 1: Installing Active Directory Federation Services Contents Lab: Installing and Configuring Active Directory Federation Services... 2 Exercise 1: installing and configuring Active Directory Federation

More information

Networking Lab - Vista Public Network Sharing

Networking Lab - Vista Public Network Sharing Networking Lab - Vista Public Network Sharing After completing the lab activity, you will be able to: Explain the differences between Windows XP and Windows Vista network sharing. Explain the purpose of

More information

Creating a New Excel Survey

Creating a New Excel Survey The purpose of this guide is to give you an overview of the Microsoft Office 365 Excel web application. Creating a New Excel Survey Log in to Office 365 using your student ID and password in the usual

More information

NTI CORPORATION. NTI Backup Now EZ v3. User's Guide

NTI CORPORATION. NTI Backup Now EZ v3. User's Guide NTI CORPORATION NTI Backup Now EZ v3 NTI Backup Now EZ v3 User's Guide Backup Now EZ v3 User's Guide 2013 NTI Corporation i Table of Contents INTRODUCTION... 3 WELCOME TO NTI BACKUP NOW EZ... 5 OVERVIEW

More information

Getting Started with MozyPro Online Backup Online Software from Time Warner Cable Business Class

Getting Started with MozyPro Online Backup Online Software from Time Warner Cable Business Class Getting Started with MozyPro Online Backup Online Software from Time Warner Cable Business Class A Guide for Users MozyPro is an online backup service with an easy to use interface so you can start backing

More information

Creating Interactive PDF Forms

Creating Interactive PDF Forms Creating Interactive PDF Forms Using Adobe Acrobat X Pro Information Technology Services Outreach and Distance Learning Technologies Copyright 2012 KSU Department of Information Technology Services This

More information

Creating client-server setup with multiple clients

Creating client-server setup with multiple clients Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application

More information

Windows Data Recovery Home 6.0

Windows Data Recovery Home 6.0 Installation Guide Stellar Phoenix Windows Data Recovery Home 6.0 Overview Stellar Phoenix Windows Data Recovery - Home edition is a complete solution to recover lost data from your hard disks and removable

More information