McAfee Endpoint Encryption for Files and Folders. Self Extractor White Paper

Size: px
Start display at page:

Download "McAfee Endpoint Encryption for Files and Folders. Self Extractor White Paper"

Transcription

1 McAfee Endpoint Encryption for Files and Folders Self Extractor White Paper

2

3 About Endpoint Encryption for Files and Folders Self-Extractors Introduction Endpoint Encryption for Files and Folders is a solution for transparent and policy controlled file and folder encryption, i.e. protecting sensitive information from unauthorized access. In order to read files encrypted with Endpoint Encryption for Files and Folders, the user must have the product installed and also have access to the encryption key used to encrypt the file(s). Access to encryption keys is granted through the Endpoint Encryption Manager, where the keys also are created. For a further description of the large number of competitive advantages with Endpoint Encryption for Files and Folders, please contact a McAfee representative. Along with the need to encrypt files and folders on local disks, network shares, removable devices etc., there is a growing need to share encrypted data with users that do not have Endpoint Encryption for Files and Folders installed, e.g. submitting a confidential document to your organization s attorney firm. For this purpose, the Self- Extractor functionality in Endpoint Encryption for Files and Folders has been created. Purpose The purpose of the Self-Extractor function is to be able to share encrypted data with users that do not have Endpoint Encryption for Files and Folders installed on their computers, e.g. you want to hand over the input material for your financial statements to your accounting firm on a USB flash memory stick, but you obviously want the data to be protected when on the stick. Still, you cannot force the accountants to install the full Endpoint Encryption for Files and Folders client, nor can you have them come to your office working off your guest laptops. In situations like this, the Self-Extractor functionality of Endpoint Encryption for Files and Folders is ideal. How it works Creating the Self-Extractor The way the Self-Extractor functionality of Endpoint Encryption for Files and Folders works is very straightforward. The user with the Endpoint Encryption for Files and Folders client installed simply right-clicks the file or folder the user wants to transform into a Self-Extractor file. From the Endpoint Encryption for Files and Folders > context menu entry, the user opens the sub-menu containing two entries that pertain to Self-Extractors: 1

4 Create Self-Extractor ({filename}.exe), and Attach as Self-Extractor to If the user selects Create Self-Extractor ({filename}.exe), then the Self-Extractor is saved to whatever location the user selects, e.g. a USB flash memory drive. The user is prompted to select the password to be used to encrypt the Self-Extractor. Based on the PKCS#5( standard, an encryption key is derived from the password and then that key is used to encrypt the Self-Extractor. The password for the Self-Extractor must conform to the user s standard Endpoint Encryption password rules. For example, if the user s Endpoint Encryption password must be at least 6 characters long and contain at least one number, then the Self- Extractor password must also be at least 6 characters long and contain at least one number. It is possible to create Self-Extractors from both entire folders and individual files. The Self-Extractor is in essence a password encrypted copy of the source folder/source file, i.e. not the source folder/file itself. The source folder/file remains unaffected when the Self-Extractor is created. The Self-Extractor file will be an executable (*.exe). If the user selects Attach as Self-Extractor to , then the Self-Extractor executable file is automatically packaged into a compressed file (*.cab). The Endpoint Encryption for Files and Folders client calls whatever default application is used to create a new , to which the Self-Extractor cab file is automatically attached. Before the attachment is made, the Self-Extractor file itself is created by prompting the user for a password, i.e. the same procedure as when selecting Create Self-Extractor described above. Reading the Self-Extractor On the reading side, the way to open a Self-Extractor is even easier than creating the file. The recipient simply double clicks the Self-Extractor file, whereby a dialog will appear. In this dialog, the recipient must enter the very same password that was used when the Self-Extractor was created the creator of the Self-Extractor must in an appropriate manner tell the recipient what password has been used. Sending the password in the same as the Self-Extractor attachment is not a proper way. Preferably SMS messages or a telephone call should be used to transfer passwords for Self-Extractors. Without the correct password, Self-Extractors cannot be opened; there is no super-password. 2

5 By default, once the correct password is given the content of the Self-Extractor will open up automatically with the associated application. When the recipient then closes this application, the unpacked content of the Self-Extractor is also wiped from disk the actual Self-Extractor per se remains intact, however, so it may be opened again with the correct password. If the recipient wants to permanently save the unpacked content to disk, then the recipient needs to select this option in the dialog where the Self-Extractor password is entered. There, the recipient may browse where to save the unpacked content of the Self-Extractor. It is important to notice that the reader of the Self-Extractor does not need to have local Administrator rights on the PC where the Self-Extractor is read. Any regular user can open the Self-Extractor, provided the password is known. If the recipient received the Self-Extractor as an attachment, the procedure is the same as when clicking the Self-Extractor directly. As the *.cab format is recognized as a standard format, any PC machine will automatically start the default decompressing utility to unpack the content of the *.cab file, and the user may directly double click the Self-Extractor file once the unpackaged content is presented. Automatically created Self-Extractors on Removable Media Other than the two ways outlined above to create Self-Extractors, the Administrator may decide that any file users place on removable media, e.g. a USB memory stick, via Windows drag-and-drop operations is converted into a Self-Extractor. The purpose of this feature is to: secure the removable media such that the files are protected, should the user loose the USB memory, while at the same time: allowing the user to open and read the protected files on the removable media on any Windows computer without a need to first install Endpoint Encryption for Files and Folders. This auto-conversion may happen fully automated, without the user interference, or there may be an intermediate question presented to the user, asking if the file(s) shall be converted into a Self-Extractor when drag-dropped. If this feature is enabled and user answers No to the question to convert the file into a Self-Extractor, the file won t be put on the removable media; the drag-drop operation will fail. This feature only supports the Windows Explorer initiated file transfers to removable media, i.e.: Drag-and-drop operations 3

6 Copy-Paste Cut-Paste It is not supported when files are being created directly on the removable media, nor are the Command Prompt file transfer commands supported ( move and copy ). Limitation It s important to remember that the Self-Extractor doesn t contain functionality for the recipient to edit the content of the Self-Extractor and then sending the altered content back to the originator, unless of course the reader/recipient also has Endpoint Encryption for Files and Folders installed with the Self-Extractor option enabled. Further information For further information about Endpoint Encryption for Files and Folders, or any of the other award-winning Endpoint Encryption products, please contact your McAfee representative or visit 4

McAfee Endpoint Encryption for Files and Folders (EEFF) User Documentation

McAfee Endpoint Encryption for Files and Folders (EEFF) User Documentation McAfee Endpoint Encryption for Files and Folders (EEFF) User Documentation 2013.06 McAfee Endpoint Encryption for Files and Folders (EEFF) uses powerful encryption technology to allow you to protect information

More information

Royal Mail Group. getting started. with Symantec Endpoint Encryption. A user guide from Royal Mail Technology

Royal Mail Group. getting started. with Symantec Endpoint Encryption. A user guide from Royal Mail Technology getting started with Symantec Endpoint Encryption A user guide from Royal Mail Technology For further help, contact the IT Helpdesk on 5415 2555 (01246 282555) March 2010 Contents 1 Introduction to Symantec

More information

Using Bitlocker to Encrypt your Flash Drive Information Technology Services July 27, 2012

Using Bitlocker to Encrypt your Flash Drive Information Technology Services July 27, 2012 Using Bitlocker to Encrypt your Flash Drive Information Technology Services July 27, 2012 Contact the ITS Helpdesk at 402-559-7700 or helpdesk@unmc.edu with questions. How it works Basically, BitLocker

More information

PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1

PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1 PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1 Table of Contents 1 Self Decrypting Archives (SDA)... 1-2 2 Setting Windows to Display File Extensions... 2-3 3 Creating PGP Zip SDA... 3-4

More information

Using Websense Data Endpoint Client Software

Using Websense Data Endpoint Client Software 1 Using Websense Data Endpoint Client Software Related topics: Disabling the endpoint client, page 3 Viewing contained files, page 5 Viewing logs, page 6 Updating the endpoint client, page 7 Your organization

More information

Step by step guide how to password protect your USB flash drive

Step by step guide how to password protect your USB flash drive Step by step guide how to password protect your USB flash drive 1 Content 1. How to create encrypted partition on USB flash drive 2. How to work with encrypted partition on the USB flash drive - Rohos

More information

Encryption. Introduction to using 7-Zip

Encryption. Introduction to using 7-Zip IT Services Training Guide Encryption Introduction to using 7-Zip It Services Training Team The University of Manchester email: its.training@manchester.ac.uk www.itservices.manchester.ac.uk/trainingcourses/coursesforstaff

More information

Encrypting Files Using AxCrypt

Encrypting Files Using AxCrypt Encrypting Files Using AxCrypt Documents, spreadsheets, databases, and other files that contain personal information or other sensitive information MUST BE encrypted when being transmitted to someone else

More information

USING STUFFIT DELUXE THE STUFFIT START PAGE CREATING ARCHIVES (COMPRESSED FILES)

USING STUFFIT DELUXE THE STUFFIT START PAGE CREATING ARCHIVES (COMPRESSED FILES) USING STUFFIT DELUXE StuffIt Deluxe provides many ways for you to create zipped file or archives. The benefit of using the New Archive Wizard is that it provides a way to access some of the more powerful

More information

BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8)

BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8) BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8) Encryption is an effective method of protecting data stored on portable devices such as USB flash drives and external hard drives.

More information

Exporting emails from Outlook Version 1.00

Exporting emails from Outlook Version 1.00 Exporting emails from Outlook Version 1.00 The rapid growth in volume of emails means that there is a growing need to archive old emails to media such as external hard disks and DVD s. The document will

More information

McAfee Endpoint Encryption for Files and Folders. Best Practices. For EEFF product version 4.0.0

McAfee Endpoint Encryption for Files and Folders. Best Practices. For EEFF product version 4.0.0 McAfee Endpoint Encryption for Files and Folders Best Practices For EEFF product version 4.0.0 McAfee, Inc. McAfee, Inc., 2821 Mission College Blvd., Santa Clara, CA 95054, USA Tel: (+1) 888.847.8766 Internet:

More information

Vodafone Text Centre User Guide for Microsoft Outlook

Vodafone Text Centre User Guide for Microsoft Outlook Vodafone Text Centre User Guide for Microsoft Outlook 1 Contents Introduction 1 System requirements 2 Installation 3 The installation guide 3 First use 5 Send a message 8 Select recipient 8 Enter the message

More information

A. I do not have my own personal certificate I am a new client or want to download a new certificate

A. I do not have my own personal certificate I am a new client or want to download a new certificate This user guide will help you to create your personal certificate in file/browser or smart card certificate. If you already own a personal certificate in file that you have saved on your computer, you

More information

How to Encrypt your Windows 7 SDS Machine with Bitlocker

How to Encrypt your Windows 7 SDS Machine with Bitlocker How to Encrypt your Windows 7 SDS Machine with Bitlocker ************************************ IMPORTANT ******************************************* Before encrypting your SDS Windows 7 Machine it is highly

More information

Documentation for Configuration of BeCrypt Removable Media Encryption

Documentation for Configuration of BeCrypt Removable Media Encryption Documentation for Configuration of BeCrypt Removable Media Encryption Laptop Configuration Procedure and Details. Laptops were to be configured with BeCrypt encryption application in such a manner that

More information

INSTALLING NOVA DATA ENCRYPTION SOFTWARE

INSTALLING NOVA DATA ENCRYPTION SOFTWARE INSTALLING NOVA DATA ENCRYPTION SOFTWARE Introduction 1. Here is what you will need to do to install the college s data encryption software on your computer, laptop, or USB storage device. The encryption

More information

Copying Files to a Flash Drive or SD Card:

Copying Files to a Flash Drive or SD Card: Copying Files to a Flash Drive or SD Card: Teachers: 1. Open My Computer from the Start Menu and see which drives are shown. Most computers, for example, have a hard disk drive such as a C: Local Disk

More information

Upgrading from Windows XP to Windows 7

Upgrading from Windows XP to Windows 7 Upgrading your PC from Windows XP to Windows 7 requires a custom installation which doesn't preserve your programs, files, or settings. It s sometimes called a clean installation for that reason. A custom

More information

Installing Cobra 4.7

Installing Cobra 4.7 Installing Cobra 4.7 Stand-alone application using SQL Server Express A step by step guide to installing the world s foremost earned value management software on a single PC or laptop. 1 Installing Cobra

More information

How To Connect To the WIT Wi-Fi Using Eduroam CAT Tools

How To Connect To the WIT Wi-Fi Using Eduroam CAT Tools How To Connect To the WIT Wi-Fi Using Eduroam CAT Tools Introduction To connect to the Internet in WIT with your laptop or phone, you need to have a current student login or a current staff login with

More information

KeePass Getting Started on Windows

KeePass Getting Started on Windows KeePass Getting Started on Windows This guide includes the initial installation of KeePass 2.x on a Windows PC, creating your first password database, testing the software and entering your first accounts.

More information

Moving Rockwell Software Activation Keys to the VersaView 200R Industrial Computer

Moving Rockwell Software Activation Keys to the VersaView 200R Industrial Computer Page 1 of 1 01/16/03 K. Smidler Moving Rockwell Software Activation Keys to the VersaView 200R Industrial Computer Rockwell Software programs often have runtime components that require activations to utilize

More information

tips A quick and easy guide to securing your private information www.pkware.com

tips A quick and easy guide to securing your private information www.pkware.com tips A quick and easy guide to securing your private information tips A quick and easy guide to securing your private information Basic Information 1. How to install SecureZIP for Windows Desktop for individual

More information

Service & Support. How do you create a communication of RDP with an Industrial Thin Client SIMATIC ITC? Thin Client.

Service & Support. How do you create a communication of RDP with an Industrial Thin Client SIMATIC ITC? Thin Client. Cover How do you create a communication of RDP with an Industrial Thin Client SIMATIC ITC? Thin Client FAQ August 2012 Service & Support Answers for industry. Question This entry is from the Siemens Industry

More information

How To Encrypt A Traveltrax Report On Gpg On A Pc Or Mac Or Mac (For A Free Download) On A Thumbdrive Or Ipad Or Ipa (For Free) On Pc Or Ipo (For An Ipo)

How To Encrypt A Traveltrax Report On Gpg On A Pc Or Mac Or Mac (For A Free Download) On A Thumbdrive Or Ipad Or Ipa (For Free) On Pc Or Ipo (For An Ipo) EMAIL ENCRYPTION Guide June 3, 2013 TABLE OF CONTENTS Steps to Create Encryption Public Key... 3 Installing GPG... 3 Key Generation Process... 4 Update User Settings... 6 Decrypting an encrypted file...

More information

SecureZIP User Guide

SecureZIP User Guide SecureZIP User Guide SecureZIP is an application for zipping files to save storage space as well as encrypting files with password control to protect information. SecureZIP not only works alone to perform

More information

DAZZLE INTEGRATED DATA BACKUP FEATURE.

DAZZLE INTEGRATED DATA BACKUP FEATURE. DAZZLE INTEGRATED DATA BACKUP FEATURE. To simplify the backup process and to make sure even the busiest (or laziest) shops have no excuse not to make data backups, we have created a simple on-screen backup

More information

WatchDox for Windows. User Guide. Version 3.9.5

WatchDox for Windows. User Guide. Version 3.9.5 WatchDox for Windows User Guide Version 3.9.5 Notice Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to

More information

BitLocker To Go User Guide

BitLocker To Go User Guide BitLocker To Go User Guide 1. Introduction BitLocker To Go a new feature of Windows 7 is a full-disk encryption protection technology for removable storage devices that are connected to one of the USB

More information

Xythos on Demand Quick Start Guide For Xythos Drive

Xythos on Demand Quick Start Guide For Xythos Drive Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document

More information

Creating Digital Signatures

Creating Digital Signatures About Security You can secure a PDF using any of the following security methods: Add passwords and set security options to restrict opening, editing, and printing PDFs. Encrypt a document so that only

More information

Creating client-server setup with multiple clients

Creating client-server setup with multiple clients Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application

More information

Service & Support. How do you create a communication of VNC with an Industrial Thin Client SIMATIC ITC? Thin Client.

Service & Support. How do you create a communication of VNC with an Industrial Thin Client SIMATIC ITC? Thin Client. Cover How do you create a communication of VNC with an Industrial Thin Client SIMATIC ITC? Thin Client FAQ August 2012 Service & Support Answers for industry. Question This entry is from the Siemens Industry

More information

Installation Guide for Crossroads Software s Traffic Collision Database

Installation Guide for Crossroads Software s Traffic Collision Database Installation Guide for Crossroads Software s Traffic Collision Database This guide will take you through the process of installing the Traffic Collision Database on a workstation and a network. Crossroads

More information

Electronic Filing System Setting Up Your Adobe Acrobat Digital ID November 2012

Electronic Filing System Setting Up Your Adobe Acrobat Digital ID November 2012 Electronic Filing System Setting Up Your Adobe Acrobat Digital ID November 2012 To apply your electronic signature to electronic forms, you must first set up a Digital ID in Adobe Acrobat using the digital

More information

Lesson 2. From computer to USB

Lesson 2. From computer to USB Lesson 2 From computer to USB How do I save my designs from my computer to a USB Flash drive to stitch out on my BERNINA? So now you have designs on your computer and want to put them onto your BERNINA

More information

Belkin USB Flash Drive

Belkin USB Flash Drive Belkin USB Flash Drive Model F5U025 User Guide Belkin USB Flash Drive Overview Storing and moving data has never been easier. Introducing the Belkin USB Flash Drive. Simply plug the Flash Drive into the

More information

The Information Security Tool Kit Think secure

The Information Security Tool Kit Think secure The Information Security Tool Kit Think secure Password Protecting Your Printing - Aficio MP C5000 To ensure your print job is not lying around the printer and to keep your information secure, you can

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012 SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk

More information

ShareSync Get Started Guide

ShareSync Get Started Guide ShareSync Get Started Guide WHAT IS SHARESYNC? ShareSync is a cloud file sync and share service. ShareSync allows you to easily sync files between multiple computers, the ShareSync web portal and mobile

More information

How to create a portable encrypted USB Key using TrueCrypt

How to create a portable encrypted USB Key using TrueCrypt How to create a portable encrypted USB Key using TrueCrypt INTRODUCTION TrueCrypt Traveler Mode provides secure encryption for programs/files on portable devices such as USB Memory keys. It uses strong

More information

BitLocker To Go USB Flash Drive encryption User Guide

BitLocker To Go USB Flash Drive encryption User Guide BitLocker To Go USB Flash Drive encryption User Guide Introduction BitLocker To Go is a new feature of Windows 7 which allows encryption of easily misplaced portable storage devices such as USB Flash Drives

More information

Backing up Microsoft Outlook Email For the PC Using MS Outlook 2000 Keith Roberts

Backing up Microsoft Outlook Email For the PC Using MS Outlook 2000 Keith Roberts WIN1020 November 2003 Backing up Microsoft Outlook Email For the PC Using MS Outlook 2000 Keith Roberts INTRODUCTION... 1 PREPARATION... 1 BACKING UP EMAIL... 2 RESTORING EMAIL FROM A PERSONAL FILE FOLDER...

More information

To add files to your email, first create the email. When you have opened a new email:

To add files to your email, first create the email. When you have opened a new email: Email attachments You can send files, folders and other items within an email along with the mail message itself. Items which have been added to emails are called attachments. Adding an attachment to an

More information

Working with USB Sticks

Working with USB Sticks Addo Stuur Working with USB Sticks in Windows XP Working with USB Sticks in Windows XP 1 Working with USB Sticks in Windows XP The old-fashioned floppy disk is slowly falling out of fashion. More and more

More information

Accessing your Staff (N and O drive) files from off campus

Accessing your Staff (N and O drive) files from off campus Accessing your Staff (N and O drive) files from off campus It is possible to access your N and O drive files while you are off campus, for example whilst working from home or travelling. This document

More information

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients

Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Test Note Phone Manager Deployment Windows Group Policy Sever 2003 and XP SPII Clients Note: I have only tested these procedures on Server 2003 SP1 (DC) and XP SPII client, in a controlled lab environment,

More information

Here is a guide on how to encrypt a part of your USB flash drive and access it on any computer:

Here is a guide on how to encrypt a part of your USB flash drive and access it on any computer: How to password protect your USB flash drive. According to the XXX agency reports 80% of all lost and stolen USB flash drives contained a very important information: business or government data. The following

More information

Identity Finder: Managing Your Results

Identity Finder: Managing Your Results Identity Finder: Managing Your Results The most important part of running Identity Finder is determining the most effective and secure way of managing the search results. Be sure to carefully read and

More information

Copies of QuickBooks aren t cheap, so the people who do your bookkeeping

Copies of QuickBooks aren t cheap, so the people who do your bookkeeping appendix d Tracking with the Standalone r Copies of QuickBooks aren t cheap, so the people who do your bookkeeping are probably the only ones who have access to the program. Meanwhile, you may have dozens

More information

BankLink Books Clients

BankLink Books Clients BankLink Books Clients This document is for those practices installing BankLink Books. The BankLink Service Agreement permits licensed BankLink practices to install the software in as many locations as

More information

ATBONLINE BUSINESS. Customer User Guide Exporting Account Information to.ofx Format Software (Simply Accounting).

ATBONLINE BUSINESS. Customer User Guide Exporting Account Information to.ofx Format Software (Simply Accounting). ATBONLINE BUSINESS Customer User Guide Exporting Account Information to.ofx Format Software (Simply Accounting). CONTENTS What You Need to Know about Simply Accounting and ATBOnline... 1 Procedures...

More information

DaRIS portal visual user guide

DaRIS portal visual user guide DaRIS portal visual user guide In this guide, we show some basic operations that you can do with DaRIS portal. Login / logout To access to the portal, click on this link https://mf-erc.its.monash.edu.au:8443/daris

More information

A. USB Portable Storage Device (PSD) Encryption Procedure

A. USB Portable Storage Device (PSD) Encryption Procedure A. USB Portable Storage Device (PSD) Encryption Procedure After installing McAfee Endpoint Encryption software to your Windows PC, you can perform encryption to the USB PSD. I) When the USB PSD is inserted

More information

User Guide. Version 3.0 April 2006

User Guide. Version 3.0 April 2006 User Guide Version 3.0 April 2006 2006 Obvious Solutions Inc. All rights reserved. Dabra and Dabra Network are trademarks of Obvious Solutions Inc. All other trademarks owned by their respective trademark

More information

Backing up your QuickBooks data file

Backing up your QuickBooks data file Backing up your QuickBooks data file A regular backup regime is essential to minimise disruption to the business should there be an unexpected computer or network failure. A well prepared back up regime

More information

How to Encrypt Files Containing Sensitive Data (using 7zip software or Microsoft password protection) How to Create Strong Passwords

How to Encrypt Files Containing Sensitive Data (using 7zip software or Microsoft password protection) How to Create Strong Passwords How to Encrypt Files Containing Sensitive Data (using 7zip software or Microsoft password protection) How to Create Strong Passwords School IT Systems Support Herts for Learning Ltd SROB220, Robertson

More information

Most of your tasks in Windows XP will involve working with information

Most of your tasks in Windows XP will involve working with information OFFICE 1 File Management Files and Folders Most of your tasks in Windows XP will involve working with information stored on your computer. This material briefly explains how information is stored in Windows

More information

Virtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer

Virtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer Virtual Appliance for VMware Server Getting Started Guide Revision 2.0.2 Warning and Disclaimer This document is designed to provide information about the configuration and installation of the CensorNet

More information

Encrypting a USB Drive Using TrueCrypt

Encrypting a USB Drive Using TrueCrypt Encrypting a USB Drive Using TrueCrypt This document details the steps to encrypt a USB Pen drive using TrueCrypt. TrueCrypt is free and open-source security software allowing encryption of documents and

More information

Encrypt USB Drive to Protect Data

Encrypt USB Drive to Protect Data Encrypt USB Drive to Protect Data Enable BitLocker on USB Flash Drives to Protect Data Encryption is an effective method of protecting data stored on portable devices such as USB flash drives and external

More information

SAS 9.3 Foundation for Microsoft Windows

SAS 9.3 Foundation for Microsoft Windows Software License Renewal Instructions SAS 9.3 Foundation for Microsoft Windows Note: In this document, references to Microsoft Windows or Windows include Microsoft Windows for x64. SAS software is licensed

More information

Understanding Backup and Recovery Methods. Lesson 8

Understanding Backup and Recovery Methods. Lesson 8 Understanding Backup and Recovery Methods Lesson 8 Objectives Objective Domain Matrix Technology Skill Objective Domain Description Objective Domain Number Understanding Local, Online, and Automated Understanding

More information

How To Encrypt a File using Windows Explorer and WinZip. For Use With All PII Data

How To Encrypt a File using Windows Explorer and WinZip. For Use With All PII Data How To Encrypt a File using Windows Explorer and WinZip For Use With All PII Data As an employee or a contractor, you share in the responsibility for protecting the privacy of individuals whose information

More information

You can find the installer for the +Cloud Application on your SanDisk flash drive.

You can find the installer for the +Cloud Application on your SanDisk flash drive. Installation You can find the installer for the +Cloud Application on your SanDisk flash drive. Make sure that your computer is connected to the internet. Next plug in the flash drive and double click

More information

DPMS2 McAfee Endpoint Encryption New Installation

DPMS2 McAfee Endpoint Encryption New Installation DPMS2 McAfee Endpoint Encryption New Installation Contents DPMS2 McAfee Endpoint Encryption New Installation... 1 1. Registering for the Application... 2 2. Downloading the Application... 6 3. Important

More information

Guest PC. for Mac OS X. User Guide. Version 1.6. Copyright 1996-2005 Lismore Software Systems, Ltd. All rights reserved.

Guest PC. for Mac OS X. User Guide. Version 1.6. Copyright 1996-2005 Lismore Software Systems, Ltd. All rights reserved. Guest PC for Mac OS X Version 1.6 User Guide Copyright 1996-2005 Lismore Software Systems, Ltd. All rights reserved. Table of Contents About Guest PC... 1 About your Virtual Computer... 1 Creating a Virtual

More information

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts...

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts... Table of Contents Welcome... 2 Login... 3 Password Assistance... 4 Self Registration... 5 Secure Mail... 7 Compose... 8 Drafts... 10 Outbox... 11 Sent Items... 12 View Package Details... 12 File Manager...

More information

E-Pollbook Flash Drive Guide for BitLocker

E-Pollbook Flash Drive Guide for BitLocker E-Pollbook Flash Drive Guide for BitLocker Michigan Department of State Bureau of Elections May 2016 1 E-Pollbook Flash Drive Guide for BitLocker - Table of Contents Introduction... 3 BitLocker... 3 Putting

More information

ShareSync Get Started Guide

ShareSync Get Started Guide ShareSync Get Started Guide WHAT IS SHARESYNC? ShareSync is a cloud file sync and share service. ShareSync allows you to easily sync files between multiple computers, the ShareSync web portal and mobile

More information

Technology Business Solutions. Online Backup Manager INSTALLATION

Technology Business Solutions. Online Backup Manager INSTALLATION Technology Business Solutions Online Backup Manager 1. Go to the TBS OBM Software Registration Page Click the TBS Logo Under the select an account type choose the PRO version. Page1 of7 2.) Create a new

More information

In the same spirit, our QuickBooks 2008 Software Installation Guide has been completely revised as well.

In the same spirit, our QuickBooks 2008 Software Installation Guide has been completely revised as well. QuickBooks 2008 Software Installation Guide Welcome 3/25/09; Ver. IMD-2.1 This guide is designed to support users installing QuickBooks: Pro or Premier 2008 financial accounting software, especially in

More information

Overview... 2. Using the Secure Desktop Agent... 4. Troubleshooting... 10

Overview... 2. Using the Secure Desktop Agent... 4. Troubleshooting... 10 Overview... 2 Installing... 2 Step 1: Download... 2 Step 2: Install... 2 Step 3: Sign In... 3 Step 4: That's It!... 3 Minimum System Requirements:... 3 Using the Secure Desktop Agent... 4 Accessing & Login

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6.1

SafeGuard Enterprise Web Helpdesk. Product version: 6.1 SafeGuard Enterprise Web Helpdesk Product version: 6.1 Document date: February 2014 Contents 1 SafeGuard web-based Challenge/Response...3 2 Scope of Web Helpdesk...4 3 Installation...5 4 Allow Web Helpdesk

More information

Installing FileMaker Pro 11 in Windows

Installing FileMaker Pro 11 in Windows Installing FileMaker Pro 11 in Windows Before you begin the installation process, please exit other open programs and save your work. Installation notes Before you install FileMaker Pro, review the following

More information

Information to configure your Windows 7 office computer is described below.

Information to configure your Windows 7 office computer is described below. The Remote Desktop feature in Windows allows you to control your computer from another office or from home. Remote Desktop allows you to use the applications on your office computer, and access your data

More information

Personal Vault. User Guide

Personal Vault. User Guide Personal Vault User Guide i Contents McAfee Personal Vault 3 Personal Vault features... 4 Getting started... 5 Using McAfee Personal Vault... 6 The First-Use wizard: Step 1... 8 The First-Use wizard:

More information

CCH Axcess Portal Client User Guide

CCH Axcess Portal Client User Guide CCH Axcess Portal Client User Guide Keys Quick reference to the key aspects of a particular function Icon Legend Tip Notes Best practice tips and shortcuts Informational notes about functions Warning Important

More information

USB Flash Security Free Edition Quick Start

USB Flash Security Free Edition Quick Start Quick Start [For USB Flash Security Free Edition] 1 / 18 USB Flash Security Free Edition Quick Start Before use USB Flash Security 1. Free edition can only be installed on the USB Flash Drive up to 4GB

More information

etoken Enterprise For: SSL SSL with etoken

etoken Enterprise For: SSL SSL with etoken etoken Enterprise For: SSL SSL with etoken System Requirements Windows 2000 Internet Explorer 5.0 and above Netscape 4.6 and above etoken R2 or Pro key Install etoken RTE Certificates from: (click on the

More information

Operating Instructions

Operating Instructions Operating Instructions (For Setting up the Printer Driver and the Panasonic Document Management System) Digital Imaging Systems Model No. DP-800P / 800E / 806P Installation Table of Contents Installation

More information

Using an Automatic Back Up for Outlook 2003 and Outlook 2007 Personal Folders

Using an Automatic Back Up for Outlook 2003 and Outlook 2007 Personal Folders Using an Automatic Back Up for Outlook 2003 and Outlook 2007 Personal Folders Part 1 Install the Personal Folder Backup Utility Note: You should close Outlook and any other applications before installing

More information

Notepad++ The COMPSCI 101 Text Editor for Windows. What is a text editor? Install Python 3

Notepad++ The COMPSCI 101 Text Editor for Windows. What is a text editor? Install Python 3 Notepad++ The COMPSCI 101 Text Editor for Windows The text editor that we will be using in the Computer Science labs for creating our Python programs is called Notepad++ and http://notepad-plus-plus.org

More information

BSDI Advanced Fitness & Wellness Software

BSDI Advanced Fitness & Wellness Software BSDI Advanced Fitness & Wellness Software 6 Kellie Ct. Califon, NJ 07830 http://www.bsdi.cc INSTRUCTION SHEET FOR MOVING YOUR DATABASE FROM ONE COMPUTER TO ANOTHER This document will outline the steps

More information

BSDI Advanced Fitness & Wellness Software

BSDI Advanced Fitness & Wellness Software BSDI Advanced Fitness & Wellness Software 6 Kellie Ct. Califon, NJ 07830 http://www.bsdi.cc SOFTWARE BACKUP/RESTORE INSTRUCTION SHEET This document will outline the steps necessary to take configure the

More information

Archiving and Managing Your Mailbox

Archiving and Managing Your Mailbox Archiving and Managing Your Mailbox We Need You to Do Your Part We ask everyone to participate in routinely cleaning out their mailbox. Large mailboxes with thousands of messages impact backups and may

More information

Application Note CTAN #374

Application Note CTAN #374 Application Note CTAN #374 The Application Note is specific to the CT software packages MentorSoft, UniSoft and SeSoft Windows 7 64-bit and the Older CT Software Scope Windows 7 64-bit Professional 64-bit

More information

MapInfo Professional 12.0 Licensing and Activation

MapInfo Professional 12.0 Licensing and Activation MapInfo Professional 12.0 Asia Pacific/Australia: Phone: +61 2 9437 6255 pbsoftware.australia@pb.com pbsoftware.singapore@pb.com www.pitneybowes.com.au/software Canada: Phone: 1 800 268 3282 pbsoftware.canada.sales@pb.com

More information

The File Command Window

The File Command Window ADVANCED PROJECTWISE FILE COMMANDS 201 ABOUT THIS TRAINING This training is intended to give a user the ability to use advanced file commands. The student should first have a basic knowledge of ProjectWise

More information

PC Agent Quick Start. Open the Agent. Autonomy Connected Backup. Version 8.8. Revision 0

PC Agent Quick Start. Open the Agent. Autonomy Connected Backup. Version 8.8. Revision 0 T E C H N I C A L N O T E Autonomy Connected Backup Version 8.8 PC Agent Quick Start Revision 0 Use this document as a quick reference for common Connected Backup PC Agent tasks. If the Agent is not on

More information

Secure File Transfer Guest User Guide Updated: 5/8/14

Secure File Transfer Guest User Guide Updated: 5/8/14 Secure File Transfer Guest User Guide Updated: 5/8/14 TABLE OF CONTENTS INTRODUCTION... 3 ACCESS SECURE FILE TRANSFER TOOL... 3 REGISTRATION... 4 SELF REGISTERING... 4 REGISTER VIA AN INVITATION SENT BY

More information

GE Intelligent Platforms. Activating Licenses Online Using a Local License Server

GE Intelligent Platforms. Activating Licenses Online Using a Local License Server GE Intelligent Platforms Activating Licenses Online Using a Local License Server January 2016 Introduction: This document is an introduction to activating licenses online using a GE-IP Local License Server.

More information

AT&T Conferencing Add-in for Microsoft Outlook v10.5

AT&T Conferencing Add-in for Microsoft Outlook v10.5 AT&T Conferencing Add-in for Microsoft Outlook v10.5 July 2014 2014 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T

More information

Acceptable Encryption Usage for UTHSC

Acceptable Encryption Usage for UTHSC This document explains the acceptable use of encryption for the UTHSC system. It includes: acceptable encryption software, techniques, algorithms and instructions. Encryption methods and software are arranged

More information

E-mail Encryption Recipient Guidelines

E-mail Encryption Recipient Guidelines E-mail Encryption Recipient Guidelines Canadian Western Bank Group Human Resources Department November 1, 2013 This reference guide was developed for training and reference use only. Any discrepancies

More information

SafeGuard Enterprise Web Helpdesk

SafeGuard Enterprise Web Helpdesk SafeGuard Enterprise Web Helpdesk Product version: 5.60 Document date: April 2011 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Help Desk

More information

USB HSPA Modem. User Manual

USB HSPA Modem. User Manual USB HSPA Modem User Manual Congratulations on your purchase of this USB HSPA Modem. The readme file helps you surf the Internet, send and receive SMS, manage contacts and use many other functions with

More information

MyUSBOnly User Guide Menu

MyUSBOnly User Guide Menu MyUSBOnly User Guide Menu Welcome - Lock the Bad Guys out of your USB ports!... 2 System Requirement... 4 Important Notes... 4 FAQ How to install a trial version MyUSBOnly?... 5 FAQ How to buy and install

More information

Managing documents, files and folders

Managing documents, files and folders Managing documents, files and folders Your computer puts information at your fingertips. Over time, however, you might have so many files that it can be difficult to find the specific file you need. Without

More information