Encrypt a file, a group of files, or Folders and sub-folders, with PC-Encrypt using any of the following three methods:

Size: px
Start display at page:

Download "Encrypt a file, a group of files, or Folders and sub-folders, with PC-Encrypt using any of the following three methods:"

Transcription

1 PC-ENCRYPT USER GUIDE 1/13 Register Now for Key-Exchange A free service for secure password exchange - HERE QUESTIONS? info@pc-encrypt.com Overview Encrypt Files or Folders Decrypt File The Password Book Key Exchange View/Edit Program Options Frequently Asked Questions How to Register Appendix A (Multi-register Internet) OVERVIEW: Note: PC-ENCRYPT V10.2 is compatible with all lower versions. However, versions 9.x and below will not decrypt files encrypted by V10.2 Users can upgrade to V10.2 for free by downloading and installing V10.2, which will automatically overwrite earlier versions, and will leave any previous registration information intact. Download V10.2 HERE PC-Encrypt Overview Click HERE for an online demo, or HERE for the online Feature Guide PC-Encrypt provides simple, strong, file and folder security for Windows Vista/XP/2000/NT /ME/98/95, without the need for any adapters, plug-ins, or accessory software. The free version of PC-Encrypt never expires, and will decrypt all strengths, but restricts the encrypt strength to passwords of 7 characters (56 bits). Purchase in North America enables exceptionally strong passwords up to 56 characters (448 bits), and 16 characters (128 bits) Internationally. Installation of PC-Encrypt results in the desktop icon appearing, plus an entry in the "Start" menu as well as the "Start/Programs" menu. You and the intended recipient(s) must share a secret password, which can be exchanged via telephone etc, or can be generated and securely exchanged via our free Key-Exchange service. To secure files or folders, start the PC-Encrypt application or employ other methods described below. Select the password either from the associated Password Book by clicking "Password Book", or manually type in your chosen password. The recipient does not require PC-Encrypt if you employ the "Create one-way file" option in step 2. Alternatively, it is usually more convenient for the recipient to download the PC-Encrypt software - free download at Various convenience features are included as described below, including the Password Book, which can be shared with the companion message "A-Lock" security software - free download HERE ENCRYPT FILES OR FOLDERS Encrypt a file, a group of files, or Folders and sub-folders, with PC-Encrypt using any of the following three methods:

2 PC-ENCRYPT USER GUIDE 2/13 Start PC-Encrypt by Double-clicking the desktop icon, or go to the Start button in your Windows desktop screen and select PC-Encrypt or Drag the files to the PC-Encrypt Desktop icon using Windows Explorer or My Computer or Highlight a file, or a group of files, using Windows Explorer or My Computer, then right click on the highlighted filename(s) and select Encrypt/Decrypt with PC-Encrypt from menu. This will open PC-Encrypt with the selected file(s) listed in the Select Items to Encrypt wizard in the Select Files area. NOTE: this method will encrypt each file -- as a single file -- if you wish to encrypt ALL files into a SINGLE encrypted file, please do the following: highlight each original file that you wish to include by holding down the keys "Ctrl" + "left-mouse" -- then, while holding down the left-mouse button, drag all files to the Windows task bar, typically at the bottom of your sreen - hold this momentarily until Windows then automatically displays the desktop, showing the PC-ENCRYPT desktop icon - then drag the files onto the PC-ENCRYPT desktop icon -- and then observe that PC-ENCRYPT starts, and shows all the selected files showing in the first screen. Alternatively, you can drag the PC-ENCRYPT desktop icon to the "Quick Launch" section of the Windows task bar, where it will be always visible - then drag the files to be encrypted onto this icon. Erase Options: Place a checkmark beside the items for erasure Note that there are 3 types of default erase methods possible by going to the main menu "Options" selection and setting the default type. Additionally, when the specific "Erase" function is selected in the main menu, you are further prompted to select the specific erase method for that specific erase task. Erase can also be automatically invoked during the Encrypt process, and in this instance the default method set using the "Options" feature is employed. The box to the left of each filename selected is unchecked by default. If you check the box, the original file will be deleted automatically during the encrypt cycle, if you confirm when the additional prompt is presented to you. This option is useful if others have access to your computer and the file is sensitive. The additional checkbox for "All Items" further simplifies this step if you wish all original files selected for encryption to be deleted after encryption is completed. Encrypting Folders You can encrypt the entire contents of a Folder, including sub-folders and files, by clicking the Select Folder button, and if desired, also checking Include sub-folders. This will create a single encrypted file containing all the files in the selected Folder(s). The default location for the encrypted folder file is the folder it is derived from. The default name is the name of the file for a single file, and the folder name, if

3 PC-ENCRYPT USER GUIDE 3/13 multiple files are being encrypted. Choose another name and location if the default choice is not suitable. Create a One Way file To send an encrypted file to a person who does not have PC-Encrypt, use this option to create a self-extracting or one way file. This makes the encrypted file into an executable file that can be opened by just double-clicking on the filename. All the recipient needs is the password to decrypt the contents. This option adds an additional 70KB to the encrypted file size due to the overhead of including the decryption and decompression code in the package. Select Location of Encrypted File Normally the encrypted file is saved in the same Folder as the original. If you want the encrypted file to be saved in a different Folder then click Change and select a Folder. Password Definition Enter a password of up to 7 characters (for the unregistered version), and up to 56 characters for the registered version in North America, or 16 characters Internationally. Select a password from the password book Users can select a password from the Password Book by clicking the Password Book button, then selecting a password by its associated name or Click Select Default Password and the message will automatically be encrypted with the "Default Password". This feature allows you to designate one password in the Password Book as the "Default Password". You can give this password to friends and associates for them to enter into their Password Books. You can then encrypt messages to these people by clicking Select Default Password in the Password Definition screen. Creating a Default Password To create a Default Password click "View/Edit Password Book," then select an entry from the list password list and click "Make Default On/Off." Clicking again will turn the default off. Some Files Cannot be Encrypted Some files types such as Windows "dat" files cannot be encrypted, since Windows will not allow them to be opened. Additionally, some files may have names that do not comply with Windows naming conventions, such as having foreign language charaters, etc. In these instances PC-ENCRYPT will identify these and will indicate that these specific files were skipped, as recorded in the file named "PC-Encrypt.log", stored by default in C:\Program Files\PC-Encrypt Security.

4 PC-ENCRYPT USER GUIDE 4/13 AN EASY WAY TO ENCRYPT ATTACHMENTS From within your application, click the file attachment option Select the file you want to encrypt and right click on the filename Select "Encrypt/Decrypt with PC-Encrypt" in the pop-up menu When you have encrypted the file click "OK" to return to "Attach File" window Highlight the newly-created encrypted file (look for the.pce extension) Double-click the encrypted file name and it will be 'attached' to your message DECRYPT FILE You can decrypt files in three ways. Drag the encrypted file ( pce extension) over the desktop icon. Open PC-Encrypt then click the "Decrypt a File button. Using Windows Explorer or My Computer, find the encrypted file, select the file then right-click and choose Encrypt/Decrypt with PC-Encrypt. Click Next and follow the wizards. If you are not sure what Folder the encrypted file is in then click Find Encrypted Files for Me. PC-Encrypt will then search your entire hard drive(s) for any files with the.pce extension and display them so you may select the one you wish to decrypt. Click on the filename then click Select to place the filename in the File to be Encrypted area. Then click Next The Extract Decrypted File to this Folder message appears with the Windows default folder name displayed. If you want the file extracted to a different Folder click Change and select the Folder. Click Next PC-Encrypt will automatically find the Password if it is in the active Password Book. Otherwise you will be requested to type in the correct password. Then click Next The next wizard shows the file(s) that have been decrypted. If you wish to see the file immediately then click on the filename then click on View File. Otherwise click Finish. Note: For decryption, only one encrypted file can be acted upon at a time. Even though the password is limited to 56 bits for encryption in the free version you can decrypt files with passwords up to 448 bits, if the correct password has been entered into the Password Book. THE PASSWORD BOOK Store names and associated passwords in the "Password Book", then you don't have to remember passwords -- you just click on the person's name. To prevent snooping all Password Book entries are stored in encrypted format. You can prevent unauthorized access to the Password Book by locking it with a password. To

5 PC-ENCRYPT USER GUIDE 5/13 do this, click the PC-Encrypt icon, select "view/edit Program Options", select "set/change Password for PC-Encrypt". If this is the first time you have used this feature leave the "Current Password" field blank since there isn't a current password. The password you choose should be a short word or character sequences that cannot be easily guessed by others. Access to the "Password Book" will then only be allowed with the correct password. You can remove password protection by simply specifying the current password and leaving all other fields blank. You can create any number of Password Books (see Advanced Options") and the instructions that follow apply to each one. Multiple Password Books are very useful where more than one person uses the same computer. A group can employ a common Password Book located on a common network. Users can choose this common Password Book by selecting "View/Edit Program Options", then the Password Book tab, then "Change" in the "Location" section, and choose the appropriate Password Book location/name. This enables a central administrator to manage the Password Book for all appropriate users. Adding Entries to the Password Book From PC-Encrypt's main menu, select View/Edit Password Book. To add a new entry, click the "New" button and fill in the fields. Note that you can also include one or more recipient addresses, which will be automatically invoked if you select the option, "Mail File", on the final PC-Encrypt screen when encrypting files/folders. If you regularly send encrypted data to a fixed mailing list, this is a convenient feature - just enter the addresses of recipients, each separated by a 'comma'. If you then encrypt with the associated password, and invoke the "Mail File" feature, all addresses associated with this password will automatically be included to receive the message with the encrypted file. {Alternatively, the encrypted file can be attached to an message composed using your standard package.} When you click OK, the new entry will be saved and will appear in the list. Editing Entries in the Password Book You can edit an entry by selecting it and clicking the "Edit/View..." button. Deleting Entries in the Password Book To delete an entry, simply select it and click the "Delete" button. You'll be asked to confirm your decision. Specifying a Default Password To make an entry the default password, simply highlight it in the list and click the "Make Default On/Off" button. You should see a happy face beside the item in the list. To remove the default property, just click the button again. Please note that there can only be one default password/entry at any one time. You must have an entry specified as the default before you can use the "Encrypt with Default Password" feature. See the topic Easy Encryption with Encrypt with Default Password for more information. A NOTE ABOUT PASSWORDS The unregistered version limits the password length to 7 characters (56 bits) for

6 PC-ENCRYPT USER GUIDE 6/13 encryption but will accept up to 56 characters (448 bits) for decryption. Registered versions of PC-Encrypt can encrypt with a password/passphrase up to 56 characters (448 bits) for USA or Canadian users, and 16 characters (128 bits) for International. The password that you use to encrypt the message must also be used to decrypt the message. It should be easy to remember but hard to guess. A good password is not your birthday, the year you were born or the year anyone close to you was born, your maiden name, your middle name, or any word in the dictionary. Avoid passwords with repeating characters. It is best to use a combination of letters and numbers with upper and lower case (for example 2W7uQ). To be secure a password should be made up of random characters. Assuming we use alpha (upper and lower cases) and numeric characters there are 62 available characters. Key-Exchange is a system that creates random passwords on demand and delivers them securely to other A-Lock or PC-Encrypt users anywhere in the world. Alternatively, you can provide the chosen password, and it will be securely delivered to other users. It is remarkably easy to use and contains several very important features. Key-Exchange service is provided free of charge to all A-Lock and PC-Encrypt users. Some of Key-Exchange's special features are: No need for you to try and think up hard to guess passwords, it generates them for you The passwords it generates are random, the most secure kind of password Generated passwords are a super strong 448 bits long (56 characters) Passwords are delivered in an encrypted for maximum security Passwords are automatically entered into your Password Book You can specify if a password is to be shared with one person or a group You control exactly who you share a password with so you know that only that person can send or receive a message encrypted with that password Registering with Key-Exchange You must obtain an Transfer Key before you can use Key-Exchange. The Transfer Key is used by the Key-Exchange system to encrypt passwords delivered by . Click HERE to register. The first time you use Key-Exchange you will be asked for your name, country of residence, address, the product you are using (A-Lock or PC-Encrypt) and a 4 character "Personal Code". The "Personal code" is required to positively identify you if you need to replace your Exchange Key in the future. Your private "Transfer Key" will be displayed on a secure web page. You don t have to copy it down or type it anywhere, just select Copy Key-Exchange Key in the PC-Encrypt menu and it will be copied into your Password Book automatically. Once the Exchange Key is in your Password Book you use Key-Exchange to deliver secure passwords with other PC-Encrypt users. Conducting a Key-Exchange

7 PC-ENCRYPT USER GUIDE 7/13 Click on the "Go to Key Exchange Site" link on the PC-Encrypt menu. This will take you to the web page where you list the name(s) and address(s) of the people you want to exchange secure messages with. A unique, password will be generated by Key-Exchange and delivered to each person listed (including yourself). Alternatively, you can provide a chosen password, and Key-Exchange will deliver it securely to the addresses that you enter in the distribution list. Click HERE to visit the "Conduct A Key-Exchange" page If you request a Key Exchange but have not yet picked up your Transfer Key you will be linked to the Registration page where you can register and pick up the Transfer Key as described in Registering for Key-Exchange. Any names on your list that are not registered with Key-Exchange will be ed a form letter asking them to register with Key-Exchange to receive a password that is waiting to be delivered to them. Defining a Group If you enter more than one address for recipients it is defined by Key-Exchange as a group exchange and you will be prompted for a "group name" for the new password. VIEW/EDIT PROGRAM OPTIONS Set/Change Password for PC-Encrypt You can password protect access to PC-Encrypt. The default setting is for no password. If you are using this option for the first time leave Current Password blank and enter a password or phrase up to 56 characters long in the New Password box. Repeat the password for verification in the Retype New Password box. To change the password, enter the current password in the Current Password box then enter a new password as described above. To delete remove password protection enter the current password in the Current Password box and leave the other entries blank. If you turn on the "Require password before exposing passwords" option, the same password you specify here is required before any passwords are exposed. Require a Password before exposing passwords By default, passwords in PC-Encrypt are hidden. That is, instead of seeing the actual characters that make up the password, you instead only see a special character, such as an asterisk (*) in place of each character of the password. In the File Encryption and Password Book Entry Properties screens, you have the ability to "un-hide" the passwords by simply unchecking the appropriate box. To prevent others from "un-hiding" your passwords, check this box. You'll be asked to specify a password before the password is exposed or "un-hidden." The password you must specify is the same password you use to gain access to the PC-Encrypt program. What to do with Temporary Files during Encryption This option sets the default "erase" level to one of the following 3 modes:

8 PC-ENCRYPT USER GUIDE 8/13 Delete - Fast, but insecure - same as standard Windows delete - no overwrite. Deleted information can possibly be recovered by using specialized software. Overwrite and Delete - Good speed, and a reasonable level of erase, but erased information can possibly be recovered by using very specialized software, with significant time involved in trying to recover. Secure Erase - Slow, but very thorough overwrite and erase. Extremely difficult, if not impossible, to recover erased information using very specialized software, with extreme time and effort. Compression Level This allows you to specify how PC-Encrypt compresses files. Selecting "Min." will result in no compression, while selecting "Max." will provide the maximum degree of compression available (the Max. setting will provide slightly greater compression than Default and will require more time to compress and decompress files). Request password each time it's accessed Clicking this option will cause PC-Encrypt to ask for your Password Book password (if one is defined) each time the Password Book is accessed. This is the recommended setting. Request password only when first accessed Clicking this option caused PC-Encrypt to ask for your Password Book password ONLY THE FIRST TIME IT'S ACCESSED. This option is not recommended, since if you leave your desk, anyone can go in and view your Password Book, provided you have opened it at least once. Set/Change Password Click this button to define a password that will be used to protect access to the Password Book. To remove password protection, simply leave the "New" and "Retype New" password fields blank. For optimum security, it is strongly recommended that you specify a password for the Password Book. If you do not, anyone with a copy of A-Lock or PC-Encrypt will be able to read the contents of your Password Book. Location This specifies the present location of the active Password Book. By default it is located in the same folder as the rest of the PC-Encrypt files. However, you can move the Password Book to another location on your hard drive or to a floppy disk if you wish (that way you can keep it with you for total security or for use on another computer that has PC-Encrypt). If you change you must tell PC-Encrypt where to find the Password Book. Click the Change button and select the new location and click Select. Creating a new Password Book Click the "Change..." button and type a name for the new Password Book in the File Name field then click Select. A new Password Book will be created for you. Backup/Restore PC-Encrypt provides an easy way for you to backup your Password Book(s). You must first select the Password Book you want to Backup. If you want to backup the Password Book displayed in the "Location" field then move on to the next step. If you want to backup another Password book then follow the instructions above for "Change Password Book"

9 PC-ENCRYPT USER GUIDE 9/13 Click "Backup" and you presented with a listing of the disk drives on your computer. Select a drive and folder (you can select folders by clicking the + in front of each Drive name), click on it then click "OK". Many people chose to backup to their floppy drive so they can take their Password Book with them and use it on another computer (as long as the other computer has a registered PC-Encrypt installed). The selected Password Book will be copied to the specified location. To Restore the backup files click "Select Password Book to be Restored". All the Password Books in the last drive and folder specified for "Backup" will be displayed. Click on the Password Book name you want to restore Then click "Select". The specified Password Book will be copied into the folder it was backed up from. If the Password Book you wish to restore is not in the folder displayed chose the drive and folder containing the backup copy you want to restore. tab PC-Encrypt has a built-in send function. When you have encrypted a file you can send it immediately with this feature. It must be configured before it can be used and the simple instructions for this are outlined below. Alternatively you may use your standard package and attach encrypted files as described above. The name typed in this field will be seen in the "From" field by the recipient of any you send out. For example, if you type John Q. Public in this field, the recipient of any mail you send with PC-Encrypt will see that the mail is from John Q. Public. Type the internet address you'd like to be used as the return address on any you send out with PC-Encrypt. Normally you'd just type your own address in this field. SMTP Mail Server This field is required before PC-Encrypt will be able send any . Your internet service provider (ISP) can provide you with this information. Ask for the address of their SMTP mail server (it is usually mail.[server name] Message Log File This area controls whether or not a record is kept of all mail you send out with PC-Encrypt. Don't add mail to log file Check this box to prevent the recording of any mail you send out with PC-Encrypt. Checking this box will save disk space. View Log File click this button to view the contents of the log file. Clear Log File Click this button to empty the log file. FREQUENTLY ASKED QUESTIONS (FAQ's)

10 PC-ENCRYPT USER GUIDE 10/13 How secure is PC-Encrypt? PC-Encrypt uses the tested and proven Blowfish encryption algorithm developed by the world famous cryptographer, Bruce Schneier. Blowfish has been challenged by many cryptographers but has yet to be cracked. What is the maximum size of the encryption key used by PC-Encrypt? The maximum key size for residents of The USA and Canada is 448 bits. The maximum key size for users outside the USA and Canada is 128 bits. If my computer crashes or if I get a new computer do I have to register again? Yes, the replacement PC-Encrypt program must be re-registered before all its features are activated. There is no charge for re-registration, you simply go to /_site/pce/reregister.mhtml and fill in the Client Number your received with your ed receipt of purchase, plus the Product code of the new PC-Encrypt. You will receive a new registration package be . You are allowed up to 4 re-registrations. How does the one-way option work? There may be times when you wish to send an encrypted message to someone who does not have PC-Encrypt. The one-way allows you to do just that. You encrypt a file, select the one-way option and the encrypted file is made into a self-extracting file. The recipient just clicks on the encrypted filename, enters the password (you must provide this to the recipient separately)) and the file is decrypted. The only downside is the file size is increased by about 70kb, although this may be partially or completely offset by PC-Encrypt s built-in compression feature. Can an entire Folder, and sub-folders, by encrypted with PC-Encrypt? Yes, an entire folder, and sub-folders, can be encrypted with PC-Encrypt to create one file bearing the Folder name and the.pce extension. This can be very handy for 2 reasons, it compresses all the files in the Folder(s) so they can be archived in less space and it protects all the files in the Folder(s) from prying eyes. Version 10.2 encrypts the files individually when I right-click on the file names With Version 10.2, to encrypt several files altogether into one single encrypted file, place all the files of interest into a file folder. Then right-click on the folder and proceed to encrypt it. To encrypt the files of interest individually, right-click on the file of interest and proceed to encrypt. How does Erase Files differ from the normal delete function? When you delete a file in Windows you are not actually deleting the file you are simply modifying the files entry in the directory so it can no longer be accessed by normal means. The file remains intact on your hard drive. There are a number of undelete programs that can recover the file, even though you thought it was gone forever. The Erase Files function overwrites the entire file with null values and it repeats this process a number of times to ensure that all copies of the file possibly located in Windows temp files etc. are similarly erased. Files erased with the Erase File function cannot be recovered. How do I encrypt/decrypt files and folders located at a remote location?

11 PC-ENCRYPT USER GUIDE 11/13 To encrypt/decrypt files and folders located remote from your computer, first use the Windows Explorer "Map Network Drive" function to set up the linkage. On your desktop, double-click the "My Computer" icon, then select "Tools", then "Map Network Drive". Find the remote "folder" of interest and set this as a Windows "drive". Somtimes I see a "Microsoft Visual C++ Runtime Error" message This error message is sometimes displayed if you are using a web-based package with Internet Explorer, and you select the "Open" option during the download process. It is related to Internet Explorer. Either select the "Save" option, then find the saved file and open it, or select another browser. During the registration process I received a 'Runtime Error" message If this error is displayed during the registration process, save the registration file that came with the registration , then double-click this saved registration file. My Win 2000 ( or XP ) skips zip files Microsoft sets a default value for handling zip files, which differs from traditional handling the zip files are shown as a folder in Windows Explorer. To revert back to traditional handling, copy the following text regsvr32 /u %windir%\system32\zipfldr.dll Then go to Start, select Run and paste the text just copied in the Run window. which should display as follows Then click OK on the Run screen Next you should see the following response message My Vista skips "zip" files By default, Windows Vista and Windows XP treats ZIP files like folders. You can revert back to standard handling so that the zip "file" is treated like a standard "file"; however this requires modifying the Vista registry, which always requires caution. One method that is simple to employ can be found at

12 PC-ENCRYPT USER GUIDE 12/13 How do I uninstall the PC-Encrypt software? Well, we wish you would not do this -- but if you feel that you must: Click the Windows "start" button, usually located bottom left-hand corner of your computer, then click "Programs", and find the folder "PC-Encrypt Security". Move your mouse over this folder, and the uninstaller will be displayed. Click the Uninstall menu item, which will remove the PC-Encrypt software. HOW TO REGISTER Select Register Program from the PC-Encrypt main menu. You will be presented with a message box with the "Product Code" displayed. Click "Copy Product Code" to save the Product Code in the Windows clipboard, then click the blue lettered Click Here to Go Register PC-Encrypt (if this is already grayed out then PC-Encrypt is already registered). This will open your web browser at the PC-Encrypt Register page. Single License Purchase If you are registering one copy of PC-Encrypt click the radio button (circle) next Single License Purchase. Place the cursor inside the Product Code input box, right click your mouse then select a "Paste" to enter the Product Code you saved in the Windows clipboard with Copy Product Code button. Now click "Purchase/Register" to go to the secure web page to complete your purchase. Multiple License Purchase If you wish to register more than one copy of PC-Encrypt then click the radio button (circle) next to Multiple License Purchase. Then enter the number of PC-Encrypt's you want to register in the Qty box. Each copy of PC-Encrypt you want to register under the Multiple License Purchase option must be individually registered and identified as pre-paid by the presence of a valid Access Code. An account name and Access Code number is assigned to each Multiple License Purchase Registration Via Web Browser If you choose this option you will receive an ed receipt for your purchase and two web addresses, one for registering each license you have purchased and one for the Access Codes required to register each copy. See Appendix A for a sample of this message. Credit information You can use AMEX, Discover, MasterCard or Visa for payment when you register. A secure dedicated server connected directly to the banking system handles all credit transactions. Once the transaction is completed you will get an online receipt that you should print for your records. More information is included for Web Registration in Appendix A APPENDIX A - Internet Option - Sample of multiple purchase message

13 PC-ENCRYPT USER GUIDE 13/13 Thank-you for purchasing 00 registrations for PC-Encrypt. Please keep this for reference. You have elected the Internet registration option. You will need the Product Code plus an Access Code for each copy of PC-Encrypt you register. You have been assigned one Access Code for each registration you purchased. Click on the following link for a list of the Access Codes assigned to this purchase NOTE: Each Access code can only be used once. We advise you to keep the above web address confidential to avoid unauthorized use of the Access Codes. HOW TO REGISTER (sample only) Click the Start button in Windows and click on PC-Encrypt in the pop-up menu. Select Register Program from the Menu selections Click the Copy Product Code button. Click on this link Place the cursor in the Product Code input box then right click and select 'paste' to enter the Product Code saved in Step 3. Enter an Access Code and your address then click Register Now You will receive an attachment by return that contains the registration code of the PC-Encrypt with the matching Product Code. Decrypt the attachment with that PC-Encrypt and it will be registered automatically. You should send these instructions and an Access Code to everyone who you authorize to register PC-Encrypt. We suggest you provide the Access Code by telephone or other secure means. We have no way of knowing if a request for registration is from an authorized person or not so the security of this code is important. RE-REGISTRATIONS Because the PC-Encrypt registration is computer specific, we have made provisions for a preset number of free re-registrations in case of computer replacement, reformats or crashes. You need a Client Number for all re-registrations plus the Product Code of the replacement product. Your Client Number is included in your initial purchase recipt sent to you by . Please keep the Client Number for future reference. The re-registration address is

Figure 1: Restore Tab

Figure 1: Restore Tab Apptix Online Backup by Mozy Restore How do I restore my data? There are five ways of restoring your data: 1) Performing a Restore Using the Restore Tab You can restore files from the Apptix Online Backup

More information

How To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro

How To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro Online Backup by Mozy Restore Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 How do I restore my data? There are five ways of restoring your data: 1) Performing

More information

Cloud Backup Express

Cloud Backup Express Cloud Backup Express Table of Contents Installation and Configuration Workflow for RFCBx... 3 Cloud Management Console Installation Guide for Windows... 4 1: Run the Installer... 4 2: Choose Your Language...

More information

Lenovo Online Data Backup User Guide Version 1.8.14

Lenovo Online Data Backup User Guide Version 1.8.14 Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data

More information

Gold Lock Desktop. User Manual. Follow these simple steps to install, configure, and use Gold Lock Desktop.

Gold Lock Desktop. User Manual. Follow these simple steps to install, configure, and use Gold Lock Desktop. User Manual Follow these simple steps to install, configure, and use. Content 1 Installation...02 2 Configuration...03-06 3 Use...07 4 Verification & Security...08 5 Backup & Restore...09 6 File Encryption...10

More information

Backups User Guide. for Webroot SecureAnywhere Essentials Webroot SecureAnywhere Complete

Backups User Guide. for Webroot SecureAnywhere Essentials Webroot SecureAnywhere Complete Backups User Guide for Webroot SecureAnywhere Essentials Webroot SecureAnywhere Complete Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com Version 8.0.1 Webroot

More information

Installing Remote Desktop Connection

Installing Remote Desktop Connection SETTING UP YOUR REMOTE DESKTOP This section will assist you in setting you Remote Desktop Connection. This will allow you to create an icon for easy access to your virtual desktop. DISCLAIMER: All images

More information

COX BUSINESS ONLINE BACKUP

COX BUSINESS ONLINE BACKUP COX BUSINESS ONLINE BACKUP Quick start Guide www.cox.com Services and features not available in all areas and package options vary by market. Rates and speeds vary by market. Number of users and network

More information

User Guide. Active Online Backup - Secure, automatic protection

User Guide. Active Online Backup - Secure, automatic protection Active Online Backup - Secure, automatic protection 1. Quick Setup... 1 2. Backup Selecting Folders and Files... 2 3. Backup - Changing Selected Folders and Files... 3 4. Checking on Your Backups... 4

More information

Xythos on Demand Quick Start Guide For Xythos Drive

Xythos on Demand Quick Start Guide For Xythos Drive Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document

More information

Solution domain. Cloud PC Backup Startingkit for users. Date 26/05/2015 Sensitivity Unrestricted Our reference V1.0 Contact E-mail

Solution domain. Cloud PC Backup Startingkit for users. Date 26/05/2015 Sensitivity Unrestricted Our reference V1.0 Contact E-mail Solution domain Cloud PC Backup Startingkit for users Date 26/05/2015 Sensitivity Unrestricted Our reference V1.0 Contact E-mail Table of contents Table of contents... 2 1. What is Cloud PC Backup?...

More information

Understanding Files and Folders

Understanding Files and Folders Windows Files and Folders Overview Before I get into Windows XP's method of file management, let's spend a little space on a files and folder refresher course. (Just in case you forgot, of course.) The

More information

Vodafone PC Backup User Guide Version 1.16

Vodafone PC Backup User Guide Version 1.16 Vodafone PC Backup User Guide Version 1.16 Contents Preface: Preface...v Chapter 1: Overview...7 Chapter 2: Installing Vodafone PC Backup...9 Downloading the Vodafone PC Backup Client...9 Installing the

More information

NTFS Undelete User Manual

NTFS Undelete User Manual NTFS Undelete User Manual What is NTFS Undelete? NTFS Undelete is a small utility that scans your hard drive for all files that can be undeleted and attempts to recover them for you. Sounds like magic?

More information

BSDI Advanced Fitness & Wellness Software

BSDI Advanced Fitness & Wellness Software BSDI Advanced Fitness & Wellness Software 6 Kellie Ct. Califon, NJ 07830 http://www.bsdi.cc SOFTWARE BACKUP/RESTORE INSTRUCTION SHEET This document will outline the steps necessary to take configure the

More information

Getting Started Guide

Getting Started Guide Getting Started Guide Mulberry IMAP Internet Mail Client Versions 3.0 & 3.1 Cyrusoft International, Inc. Suite 780 The Design Center 5001 Baum Blvd. Pittsburgh PA 15213 USA Tel: +1 412 605 0499 Fax: +1

More information

Release 2.0. Cox Business Online Backup Quick Start Guide

Release 2.0. Cox Business Online Backup Quick Start Guide Cox Business Online Backup Quick Start Guide Release 2.0 Cox Business Online Backup Quick Start Guide i IMPORTANT: You must notify Cox in advance if you would like to move or relocate your telephone Service.

More information

QuickBooks Online Backup User Guide

QuickBooks Online Backup User Guide QuickBooks Online Backup User Guide Introduction Today, information is our most important asset. It is also the easiest possession to lose and the most difficult to replace. Likewise, computers have become

More information

User s Guide For Department of Facility Services

User s Guide For Department of Facility Services Doc s File Server User s Guide For Department of Facility Services For Ver : 7.2.88.1020 Rev : 1_05-27-2011 Created by : Elliott Jeyaseelan 2 Table of Contents SERVER LOGIN & AUTHENTICATION REQUIREMENTS

More information

PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1

PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1 PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1 Table of Contents 1 Self Decrypting Archives (SDA)... 1-2 2 Setting Windows to Display File Extensions... 2-3 3 Creating PGP Zip SDA... 3-4

More information

Contents. Getting Started...1. Managing Your Drives...14. Backing Up & Restoring Folders...28. Synchronizing Folders...48. Managing Security...

Contents. Getting Started...1. Managing Your Drives...14. Backing Up & Restoring Folders...28. Synchronizing Folders...48. Managing Security... Contents Getting Started.....................................................1 Using the Formatting Tool........................................1 Preparing the Software Manually..................................4

More information

AxCrypt File Encryption Software for Windows. Quick Installation Guide. Version 1.6.3. January 2008

AxCrypt File Encryption Software for Windows. Quick Installation Guide. Version 1.6.3. January 2008 AxCrypt File Encryption Software for Windows Quick Installation Guide Version 1.6.3 January 2008 Copyright 2005-2008 Svante Seleborg, Axantum Software AB 2(19) This guide describes how to install and quickly

More information

PGP Desktop Email Quick Start Guide version 9.6

PGP Desktop Email Quick Start Guide version 9.6 What is PGP Desktop Email? PGP Desktop Email is part of the PGP Desktop family of products. You can use PGP Desktop Email to: Automatically and transparently encrypt, sign, decrypt, and verify email messages

More information

4. Click Next and then fill in your Name and E-mail address. Click Next again.

4. Click Next and then fill in your Name and E-mail address. Click Next again. NOTE: Before installing PGP, Word needs to be disabled as your editor in Outlook. In Outlook, go to Tools: Options: Mail Format and uncheck Use Microsoft Office Word to edit e-mail messages. Failure to

More information

NAS 253 Introduction to Backup Plan

NAS 253 Introduction to Backup Plan NAS 253 Introduction to Backup Plan Create backup jobs using Backup Plan in Windows A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Create backup

More information

Using Microsoft Office 2013: Outlook. Gerry Kruyer

Using Microsoft Office 2013: Outlook. Gerry Kruyer Using Microsoft Office 2013: Outlook Table of Contents Outlook 2013 Ribbon... 4 Viewing Inbox... 4 Folders... 4 Home Tab... 5 Background Colour and Themes... 5 Inbox... 6 Reading Pane... 6 Turn off/on

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions Share Drive Frequently Asked Questions Table of Contents How do I change my password?... How do I reset my password if I forgot it?... How do I share files/folders with Groups

More information

Vodafone PC SMS 2010. (Software version 4.7.1) User Manual

Vodafone PC SMS 2010. (Software version 4.7.1) User Manual Vodafone PC SMS 2010 (Software version 4.7.1) User Manual July 19, 2010 Table of contents 1. Introduction...4 1.1 System Requirements... 4 1.2 Reply-to-Inbox... 4 1.3 What s new?... 4 2. Installation...6

More information

FrontDesk Installation And Configuration

FrontDesk Installation And Configuration Chapter 2 FrontDesk Installation And Configuration FrontDesk v4.1.25 FrontDesk Software Install Online Software Activation Installing State Related Databases Setting up a Workstation Internet Transfer

More information

Setting up your new Live Server Account

Setting up your new Live Server Account Setting up your new Live Server Account Welcome to Remote Data Backups LiveVault Service. This document will help you set up the agent service on your server as well as giving you some guidance on accessing

More information

REDUCING YOUR MICROSOFT OUTLOOK MAILBOX SIZE

REDUCING YOUR MICROSOFT OUTLOOK MAILBOX SIZE There are several ways to eliminate having too much email on the Exchange mail server. To reduce your mailbox size it is recommended that you practice the following tasks: Delete items from your Mailbox:

More information

Hosting Users Guide 2011

Hosting Users Guide 2011 Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure

More information

Using MioNet. 2006 Senvid Inc. User Manual Version 1.07

Using MioNet. 2006 Senvid Inc. User Manual Version 1.07 Using MioNet Copyright 2006 by Senvid, Inc. All rights reserved. 2445 Faber Place, Suite 200, Palo Alto, CA 94303 Voice: (650) 354-3613 Fax: (650) 354-8890 1 COPYRIGHT NOTICE No part of this publication

More information

AxCrypt File Encryption Software for Windows. Quick Installation and Users Guide. Version 1.7 or later. July 2012

AxCrypt File Encryption Software for Windows. Quick Installation and Users Guide. Version 1.7 or later. July 2012 AxCrypt File Encryption Software for Windows Quick Installation and Users Guide Version 1.7 or later July 2012 Copyright 2005-2012 Svante Seleborg, Axantum Software AB 2(18) This guide describes how to

More information

TABLE OF CONTENTS. Copyright Pro Softnet Corporation. All rights reserved. 2

TABLE OF CONTENTS. Copyright Pro Softnet Corporation. All rights reserved. 2 Last modified on 08.11.2011 TABLE OF CONTENTS Introduction... 4 Features... 5 General Features... 5 Backup Features... 5 Restore Features... 6 Link for Application Download... 6 Install IBackup for Mac...

More information

Installation instructions for MERLIN Dashboard

Installation instructions for MERLIN Dashboard Installation instructions for MERLIN Dashboard Contents Installation Prerequisites:... 2 Procedure to manually backup and restore Views and Settings in AxOEE Manager... 3 For XP users go to:... 3 For Vista

More information

CAS CLOUD WEB USER GUIDE. UAB College of Arts and Science Cloud Storage Service

CAS CLOUD WEB USER GUIDE. UAB College of Arts and Science Cloud Storage Service CAS CLOUD WEB USER GUIDE UAB College of Arts and Science Cloud Storage Service Windows Version, April 2014 Table of Contents Introduction... 1 UAB Software Policies... 1 System Requirements... 2 Supported

More information

New Online Banking Guide for FIRST time Login

New Online Banking Guide for FIRST time Login New Online Banking Guide for FIRST time Login Step 1: Login Enter your existing Online Banking User ID and Password. Click Log-In. Step 2: Accepting terms and Conditions to Proceed Click on See the terms

More information

NovaBACKUP. Storage Server. NovaStor / May 2011

NovaBACKUP. Storage Server. NovaStor / May 2011 NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.

More information

Welcome to Bridgit @ CSU The Software Used To Data Conference.

Welcome to Bridgit @ CSU The Software Used To Data Conference. Welcome to Bridgit @ CSU The Software Used To Data Conference. Overview SMART Bridgit software is a client/server application that lets you share programs and information with anyone, anywhere in the world.

More information

USING MICROSOFT OUTLOOK 2013

USING MICROSOFT OUTLOOK 2013 USING MICROSOFT OUTLOOK 2013 Staff Development Technology 0 P a g e TABLE OF CONTENTS Outlook 2013 Ribbon... 1 Viewing Inbox... 1 Background Color and Themes... 2 INBOX... 3 Reading Pane... 3 Turn off/on

More information

Kaspersky Password Manager USER GUIDE

Kaspersky Password Manager USER GUIDE Kaspersky Password Manager USER GUIDE Dear User! Thank you for choosing our product. We hope that this documentation helps you in your work and provides answers you may need. Any type of reproduction or

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Lotus Notes Client Version 8.5 Reference Guide

Lotus Notes Client Version 8.5 Reference Guide Lotus Notes Client Version 8.5 Reference Guide rev. 11/19/2009 1 Lotus Notes Client Version 8.5 Reference Guide Accessing the Lotus Notes Client From your desktop, double click the Lotus Notes icon. Logging

More information

Concentsus Online Backup User Manual

Concentsus Online Backup User Manual Concentsus Online Backup User Manual Concentsus Small Business 5252 Edgewood Drive, Suite 250 Provo, UT 84604 888-889-9949 www.concentsus.com 2008 Concentsus, a service of efilecabinet, LC All Rights Reserved.

More information

Dr.Backup Remote Backup Service. Quick Start User Guide

Dr.Backup Remote Backup Service. Quick Start User Guide Dr.Backup Remote Backup Service Quick Start User Guide Version 8.5.0-1 Copyright 2003-2004 Doctor Backup, LLC. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Online Backup Client User Manual

Online Backup Client User Manual For Mac OS X Software version 4.1.7 Version 2.2 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by other means.

More information

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation User Guide for OpenDrive Application v1.6.0.4 for MS Windows Platform 20150430 April 2015 Table of Contents Installation 4 Standard Installation Unattended Installation Installation (cont.) 5 Unattended

More information

6 USING WINDOWS XP 6.1 INTRODUCTION

6 USING WINDOWS XP 6.1 INTRODUCTION 6 USING WINDOWS XP 6.1 INTRODUCTION The windows operating system started with the introduction of Windows OS and Windows for work group for networking. Since then it has come a long way and Windows 95,

More information

Global VPN Client Getting Started Guide

Global VPN Client Getting Started Guide Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

MozyPro User Guide Version 1.8.14

MozyPro User Guide Version 1.8.14 MozyPro User Guide Version 1.8.14 Contents Preface: Preface...v Chapter 1: Overview...7 Chapter 2: Installing MozyPro...9 Downloading the MozyPro Client...9 Installing the MozyPro Client...9 Configuring

More information

Titan Apps. Drive (Documents)

Titan Apps. Drive (Documents) Titan Apps Drive (Documents) University of Wisconsin Oshkosh 7/11/2012 0 Contents What is Titan Apps?... 1 Need Help with Titan Apps?... 1 What other resources can I use to help me with Titan Apps?...

More information

Zen Internet. Online Data Backup. Zen Vault Express for Windows. Issue: 2.0.08

Zen Internet. Online Data Backup. Zen Vault Express for Windows. Issue: 2.0.08 Zen Internet Online Data Backup Zen Vault Express for Windows Issue: 2.0.08 Contents 1 Introduction... 3 1.1 System Requirements... 3 2 Installation... 5 2.1 The Setup WIzard... 5 3 The Backup Service...

More information

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts...

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts... Table of Contents Welcome... 2 Login... 3 Password Assistance... 4 Self Registration... 5 Secure Mail... 7 Compose... 8 Drafts... 10 Outbox... 11 Sent Items... 12 View Package Details... 12 File Manager...

More information

SecureZIP User Guide

SecureZIP User Guide SecureZIP User Guide SecureZIP is an application for zipping files to save storage space as well as encrypting files with password control to protect information. SecureZIP not only works alone to perform

More information

Graves IT Solutions Online Backup System FAQ s

Graves IT Solutions Online Backup System FAQ s Graves IT Solutions Online Backup System FAQ s How do I receive my username? The account username is proposed by the registrant at the time of registration. Once registration is completed, an email is

More information

Fundraising 50. Installation Guide

Fundraising 50. Installation Guide This is a publication of Abila, Inc. Version 2014 2013 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service names mentioned herein are

More information

FileCruiser. User Portal Guide

FileCruiser. User Portal Guide FileCruiser User Portal Guide FileCruiser Product Manual Contents Contents Getting Started with FileCruiser 1 Using the FileCruiser Agent 2 Desktop Shortcut 2 Log in to FileCruiser Agent 3 Using the FileCruiser

More information

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0 Cox Business Premium Online Backup USER'S GUIDE Cox Business VERSION 1.0 Table of Contents ABOUT THIS GUIDE... 4 DOWNLOADING COX BUSINESS PREMIUM ONLINE BACKUP... 5 INSTALLING COX BUSINESS PREMIUM ONLINE

More information

SECURE EMAIL USER GUIDE OUTLOOK 2000

SECURE EMAIL USER GUIDE OUTLOOK 2000 WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP

More information

BULLGUARD BAckUp GUIDE

BULLGUARD BAckUp GUIDE BULLGUARD backup GUIDE CONTENTS BullGuard Backup introduction page 3 Installing BullGuard Backup page 6 Uninstalling BullGuard Backup page 11 Registering BullGuard Backup: creating an account page 12 Running

More information

WINDOWS LIVE MAIL FEATURES

WINDOWS LIVE MAIL FEATURES WINDOWS LIVE MAIL Windows Live Mail brings a free, full-featured email program to Windows XP, Windows Vista and Windows 7 users. It combines in one package the best that both Outlook Express and Windows

More information

Smart TPM. User's Manual. Rev. 1001 12MD-STPM-1001R

Smart TPM. User's Manual. Rev. 1001 12MD-STPM-1001R Smart TPM User's Manual Rev. 1001 12MD-STPM-1001R We recommend that you download the latest version of the Smart TPM utility from GIGABYTE's website. If you have installed Ultra TPM earlier, you can install

More information

Migrating From Bobcat Mail To Google Apps (Using Microsoft Outlook and Google Apps Sync)

Migrating From Bobcat Mail To Google Apps (Using Microsoft Outlook and Google Apps Sync) Migrating From Bobcat Mail To Google Apps (Using Microsoft Outlook and Google Apps Sync) This document is intended for those users moving from WVWC s Bobcat Mail system to the new Google Apps mail system

More information

PUBLIC Password Manager for SAP Single Sign-On Implementation Guide

PUBLIC Password Manager for SAP Single Sign-On Implementation Guide SAP Single Sign-On 2.0 SP1 Document Version: 1.0 2015-10-02 PUBLIC Password Manager for SAP Single Sign-On Implementation Guide Content 1 Password Manager....4 2 Password Manager Installation Guide....5

More information

How To Install Database Oasis On A Computer Or Computer (For Free)

How To Install Database Oasis On A Computer Or Computer (For Free) INSTALLATION INSTRUCTIONS Table of Contents Installation Instructions 1 Table of Contents 1 System Requirements 2 Installation 3 Selecting where to Install the Professional Server 3 Installing Prerequisites

More information

User Guide. Version 3.0 April 2006

User Guide. Version 3.0 April 2006 User Guide Version 3.0 April 2006 2006 Obvious Solutions Inc. All rights reserved. Dabra and Dabra Network are trademarks of Obvious Solutions Inc. All other trademarks owned by their respective trademark

More information

Password Memory 6 User s Guide

Password Memory 6 User s Guide C O D E : A E R O T E C H N O L O G I E S Password Memory 6 User s Guide 2007-2015 by code:aero technologies Phone: +1 (321) 285.7447 E-mail: info@codeaero.com Table of Contents Password Memory 6... 1

More information

Download Full Install Version 3.4.6 EXE (Auto Install)

Download Full Install Version 3.4.6 EXE (Auto Install) GETTING STARTED GUIDE FOR THE CAMPAIGN FINANCE ELECTRONIC FILING SOFTWARE (TX-CFS version 3.4.6) for Windows XP (with Service Pack 3), Windows Vista, Windows 7, Windows 8 UPGRADING THE SOFTWARE ON YOUR

More information

Exchange Mailbox Protection Whitepaper

Exchange Mailbox Protection Whitepaper Exchange Mailbox Protection Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Exchange add-on comparison... 2 Advantages and disadvantages of the different PST formats... 3 2. How Exchange

More information

Overview Keys. Overview

Overview Keys. Overview Overview Keys Overview The PGPmail program performs fast, high-security, public-key encrypting (with optional compression), decrypting, and authenticating of electronic messages and files. The program

More information

ODBC Driver Version 4 Manual

ODBC Driver Version 4 Manual ODBC Driver Version 4 Manual Revision Date 12/05/2007 HanDBase is a Registered Trademark of DDH Software, Inc. All information contained in this manual and all software applications mentioned in this manual

More information

1 of 10 1/31/2014 4:08 PM

1 of 10 1/31/2014 4:08 PM 1 of 10 1/31/2014 4:08 PM copyright 2014 How to backup Microsoft SQL Server with Nordic Backup Pro Before creating a SQL backup set within Nordic Backup Pro it is first necessary to verify that the settings

More information

WatchDox for Mac User Guide

WatchDox for Mac User Guide WatchDox for Mac User Guide Version 2.3.0 Confidentiality This document contains confidential material that is proprietary to WatchDox. The information and ideas herein may not be disclosed to any unauthorized

More information

Chapter 3 ADDRESS BOOK, CONTACTS, AND DISTRIBUTION LISTS

Chapter 3 ADDRESS BOOK, CONTACTS, AND DISTRIBUTION LISTS Chapter 3 ADDRESS BOOK, CONTACTS, AND DISTRIBUTION LISTS 03Archer.indd 71 8/4/05 9:13:59 AM Address Book 3.1 What Is the Address Book The Address Book in Outlook is actually a collection of address books

More information

BackupAssist v6 quickstart guide

BackupAssist v6 quickstart guide New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet

More information

Aspera Connect User Guide

Aspera Connect User Guide Aspera Connect User Guide Windows XP/2003/Vista/2008/7 Browser: Firefox 2+, IE 6+ Version 2.3.1 Chapter 1 Chapter 2 Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment 2.3 Connect

More information

Seagate Manager. User Guide. For Use With Your FreeAgent TM Drive. Seagate Manager User Guide for Use With Your FreeAgent Drive 1

Seagate Manager. User Guide. For Use With Your FreeAgent TM Drive. Seagate Manager User Guide for Use With Your FreeAgent Drive 1 Seagate Manager User Guide For Use With Your FreeAgent TM Drive Seagate Manager User Guide for Use With Your FreeAgent Drive 1 Seagate Manager User Guide for Use With Your FreeAgent Drive Revision 1 2008

More information

4 Backing Up and Restoring System Software

4 Backing Up and Restoring System Software 4 Backing Up and Restoring System Software In this Chapter... Planning a Backup Strategy, 4-3 Preparing for Disaster Recovery, 4-4 Creating Boot Recovery Diskettes, 4-5 Making a Full Backup Tape, 4-8 Restoring

More information

Email client configuration guide. Business Email

Email client configuration guide. Business Email Email client configuration guide Business Email August 2013 Contents 1. Mac Email Clients 1.1 Downloading Microsoft Outlook (Professional Plan Users) 1.2 Configuring Microsoft Outlook (Full Exchange Server

More information

Backing up Microsoft Outlook Email For the PC Using MS Outlook 2000 Keith Roberts

Backing up Microsoft Outlook Email For the PC Using MS Outlook 2000 Keith Roberts WIN1020 November 2003 Backing up Microsoft Outlook Email For the PC Using MS Outlook 2000 Keith Roberts INTRODUCTION... 1 PREPARATION... 1 BACKING UP EMAIL... 2 RESTORING EMAIL FROM A PERSONAL FILE FOLDER...

More information

OWA - Outlook Web App

OWA - Outlook Web App OWA - Outlook Web App Olathe Public Schools 0 Page MS Outlook Web App OPS Technology Department Last Revised: May 1, 2011 Table of Contents MS Outlook Web App... 1 How to Access the MS Outlook Web App...

More information

After going through this lesson you would be able to:

After going through this lesson you would be able to: 18 :: Data Entry Operations 2 Operating System 2.1 INTRODUCTION The operating system in these days uses a graphical user interface (GUI). Here you do not have to remember all the commands by heart. The

More information

AKO Email Shutdown Quick Reference Guide

AKO Email Shutdown Quick Reference Guide AKO Email Shutdown Quick Reference Guide NETWORK ENTERPRISE CENTER This guide explains how the Army is shutting down AKO Email and outlines steps you must take to ensure a smooth transition to full DoD

More information

HP ProtectTools for Small Business Security Software, Version 5.10. User Guide

HP ProtectTools for Small Business Security Software, Version 5.10. User Guide HP ProtectTools for Small Business Security Software, Version 5.10 User Guide Copyright 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

More information

BSDI Advanced Fitness & Wellness Software

BSDI Advanced Fitness & Wellness Software BSDI Advanced Fitness & Wellness Software 6 Kellie Ct. Califon, NJ 07830 http://www.bsdi.cc INSTRUCTION SHEET FOR MOVING YOUR DATABASE FROM ONE COMPUTER TO ANOTHER This document will outline the steps

More information

How to install and use the File Sharing Outlook Plugin

How to install and use the File Sharing Outlook Plugin How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.

More information

Help System. Table of Contents

Help System. Table of Contents Help System Table of Contents 1 INTRODUCTION...1 2 GETTING STARTED!... 2 2.1 Installation...2 2.2 Wizard...3 2.3 Browse Method:...7 2.4 Search Method:...7 2.5 Surface Scan Method:... 8 3 RECOVERING DELETED

More information

Simple Computer Backup

Simple Computer Backup Title: Simple Computer Backup (Win 7 and 8) Author: Nancy DeMarte Date Created: 11/10/13 Date(s) Revised: 1/20/15 Simple Computer Backup This tutorial includes these methods of backing up your PC files:

More information

2010 Ing. Punzenberger COPA-DATA GmbH. All rights reserved.

2010 Ing. Punzenberger COPA-DATA GmbH. All rights reserved. 2010 Ing. Punzenberger COPA-DATA GmbH All rights reserved. Distribution and/or reproduction of this document or parts thereof in any form are permitted solely with the written permission of the company

More information

Online Backup Client User Manual Mac OS

Online Backup Client User Manual Mac OS Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC

More information

Online Backup Client User Manual Mac OS

Online Backup Client User Manual Mac OS Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC

More information

Keep Yourself Safe from the Prying Eyes of Hackers and Snoopers!

Keep Yourself Safe from the Prying Eyes of Hackers and Snoopers! Protect Your Privacy Online P 7/1 Keep Yourself Safe from the Prying Eyes of Hackers and Snoopers! With the information in this article you can: Find out what secret information your PC is sharing with

More information

Online Backup Client 3.9 Manual

Online Backup Client 3.9 Manual HelpAndManual_unregistered_evaluation_copy by BackupAgent BV Index Online Backup Client 3.9 1 1. Benefits 2 2. Features 3 3. System Requirements 4 4. Setup 5 5. Client 8 5.1 Registration Wizard... 9 5.2

More information

USER GUIDE CLOUDME FOR WD SENTINEL

USER GUIDE CLOUDME FOR WD SENTINEL USER GUIDE CLOUDME FOR WD SENTINEL Document 2013-11-17 Page 2 of 13 TABLE OF CONTENTS INTRODUCTION 2 Safe European Storage 2 How does this really work? 2 GETTING STARTED 3 Setting up an account 3 Setting

More information

SonicWALL CDP Local Archiving

SonicWALL CDP Local Archiving This document describes how to configure, implement, and manage a local archive for your SonicWALL CDP appliance. It contains the following sections: Feature Overview section on page 1 Using Local Archiving

More information

Outlook: Storing Email

Outlook: Storing Email Outlook: Storing Email Academic Computing Services www.ku.edu/acs Abstract: Use AutoArchive to move items to an archive file (.pst). Archiving copies items to the archive file and then removes them from

More information

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Spector 360 Deployment Guide. Version 7.3 January 3, 2012 Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server

More information

Getting Started Guide

Getting Started Guide Getting Started Guide Mulberry Internet Email/Calendar Client Version 4.0 Cyrus Daboo Pittsburgh PA USA mailto:mulberry@mulberrymail.com http://www.mulberrymail.com/ Information in this document is subject

More information

1) Important browser information New 2) Why is my browser so slow? 3) How can I view more than one screen without the other disappearing?

1) Important browser information New 2) Why is my browser so slow? 3) How can I view more than one screen without the other disappearing? Known/Unresolved issues: Browser Scan to e-mail Creating Help Desk tickets for the scan-to-email issue is no longer necessary. A member of MIS will follow up with each office to determine scan-to-email

More information