INSTALLING NOVA DATA ENCRYPTION SOFTWARE
|
|
- Susanna Edwards
- 8 years ago
- Views:
Transcription
1 INSTALLING NOVA DATA ENCRYPTION SOFTWARE Introduction 1. Here is what you will need to do to install the college s data encryption software on your computer, laptop, or USB storage device. The encryption software lets you create a secure folder where you can store documents safely. 2. Download the folder with the encryption software to your computer or USB device. 3. Run the software to create the secure folder on your computer or USB device. 4. When you want to use the secure folder: Click on the shortcut Select the name of the secure file Tell the computer to MOUNT the secure file Enter your password Use the secure file just like any other drive or USB device to save your documents 5. Even though it looks complicated, the process is actually easy if you follow the steps. Background Northern Virginia Community College (NOVA) processes and stores many types of sensitive and private information that if lost or stolen could result in significant financial damage to students and the college. All faculty and staff should only handle or store sensitive information if absolutely necessary for their jobs. All sensitive information must be stored and disposed of in a secure manner. PERSONAL INFORMATION (especially social security numbers or other private information) SHOULD NEVER BE STORED ON A PORTABLE DEVICE. Scope These guidelines apply to all mobile data storage media; laptops, flash or thumb drives, and CD or DVDs. PDAs and cell phones should never be used to store sensitive information because they are harder to protect and easily lost or stolen. Requirement Virginia Community College System (VCCS) requires that all critical and sensitive information stored on mobile data storage media, including laptops, must be encrypted in accordance with ISO/IEC 27002:2005(E). Responsibilities
2 Data owners and data handlers are responsible for storing and transmitting the sensitive data to maintain the confidentiality, integrity and availability of the data. The software outlined in this document will be Truecrypt. An open source software used by many colleges throughout the country. The recommended method will be to create a virtual disk that will automatically encrypt files as they are added to the disk. The virtual disk is automatically unmounted when the laptop is logged off or put into power saver mode. An encrypted disk, which is really an encrypted file, can be copied to DVD or CD and later remounted for access. The same process is used to load the software and create a secure folder (called a virtual disk) on both computers and USB devices. Install Directions for Windows Go to to download Truecrypt. Double click on the downloaded file to start the installation procedure. You can copy the folder to a new USB device or computer to create a secure folder (virtual disk). Open the folder and click on TrueCrypt.exe (be sure to pick the correct file). Click the check box to accept the license terms and click Next.
3 Leave the default option of Install and click Next. Leave the default install path and click Install.
4 Click OK to finish the installation. Click Exit to close the setup screen. On the desktop you will see an icon like the one above. Double click this icon to open the TrueCrypt console.
5 This is the main console window for TrueCrypt. From here you can create virtual drives, encrypt whole drives or partitions (not recommended) and mount and dismount virtual drives. To create a new secure file (virtual drive), click on Create Volume. The following screen will appear. On this screen you select the type of volume you wish to create. We will be creating a standard volume, so you can leave the defaults and click on Next.
6 Here you select what you are going to encrypt. For creating a standard volume, click on Select File. Navigate to the place you want to store the secure file(volume) and type in a name for the file. Use a name that makes sense to you. It is recommended you don't use spaces to make sure there are no compatibility problems if the file is moved to a CD or DVD. Once you have typed in a file name, click on Save to continue.
7 Leave the checkbox next to Never save history checked and click Next to continue. On this screen you choose the type of encryption algorithms you want to use. It is suggested you use the default options that are shown above. Once you have selected the encryption options, click on Next to continue.
8 Next you must choose how big you want your volume to be. If you plan on moving the files to CD later, make the file size 700 MB. You can create more than one volume if you need more space. After you have entered the volume size, click Next. Here you need to choose the password you will use to mount the volume. We recommend you use one of the password strategies listed at the end of this document so we can help you remember it if it is forgotten even though it is not as rigorous as TrueCrypt recommends. Remember the encryption is only as good as the password used to mount the volume. Do not use words or simple names. Choose passwords with Upper and Lower case, numbers and special characters. TrueCrypt recommends passwords greater than 20 characters, but there is no minimum. If you choose something shorter than 20 characters, there will be a warning that pops up. If you are satisfied with your password, Click Next to continue.
9 Click Yes to continue. Once the volume is created, it must be formatted. For Filesystem, you can choose FAT or NTFS. The only limitation is that if you choose NTFS and move the file to DVD, it cannot be mounted as a Read Only drive. So it is suggested you choose FAT as the Filesystem type. Click Format to format the new volume.
10 Once the volume is formatted, click OK. The new volume is created and ready for use. To create another volume, click Next and follow the same procedures as above. If you don't want to create another volume, click Exit (you can create additional volumes at any time).
11 To actually use the secure folder (volume) you need to mount the volume to make it available to store files. Under Volume, select the drive letter you wish to use for you new volume. Then click on Select File and navigate to and select your secure folder (volume). Finally, click Mount. You will now be prompted for the password you selected earlier. Enter the password and click OK.
12 You will now see your secure folder s name next to the drive letter when it is mounted. Once you have mounted all you volumes you want to use, click Exit to close the console window. You can reopen this window from the Start Menu or by clicking on the little icon on the lower right hand of your screen. If you click My Computer, you will see the mounted drive appear just as any local drive. In the example above it is drive S. You can double click on the drive to open it. Files that are saved or moved to that drive are automatically encrypted and secrure. Files moved from this drive are automatically unencrypted. It works just like any USB storage device or folder.
13 Tips The TrueCrypt program must be available to mount the encrypted volumes. You do not have to copy the TrueCrypt folder to a USB device, disk, CD or DVD to protect the files in your secure folder. However, to open that folder on a machine, you must have TrueCrypt installed so you can click on the icon to open the TrueCrypt console. If the folder is on a USB device, you can open the console from there. When encrypting a flash/thumb drive use caution. You can either create a secure folder (volume) as described above or you may select the entire device. To select the entire device, instead of selecting a file, you would select the flash drive device. HOWEVER, If you choose to encrypt the device, everything that is currently on the flash drive will be lost, because the drive must be formatted. It is recommended you do not use device encryption AND JUST CREATE A SECURE FOLDER INSTEAD. DO NOT LOOSE PASSWORDS, they cannot be recovered. Password Strategies If you use one of the following rubrics to create your password, it will be hard for someone to guess or to hack if the portable device gets lost. At the same time, we could remind you of this rubrics so you could figure out your password if you forget it. These are all items you should know by heart but would be hard for someone else to know or to even find easily on the Internet. They also would be hard for the hacking programs to figure out easily. FOR ALL PASSWORDS: Start them with the capital letter A. Every few months when it is time to change passwords, you can update it by going to the next letter in the alphabet 1. Mother s middle name spelled backwards, 2-digit month and 2 digit year of her birthday. (Example only -- remember to start it with the letter A to make changing it later easier: Martha born Nov. 16 would become as a password AahtraM1116). If the middle name is less than 5 letters, duplicate the first letter of her name to make it at least 5 letters long, including the capital A used to start the password. (Example only: Mae born Dec. 4 would become as a password AeaMM If you want this to be even more secure, add one of the following punctuation marks to the end of your password:! or $ or & 2. Father s middle name spelled backwards, 2-digit month and 2 digit year of his birthday. (Example only -- remember to start it with the letter A to make changing it later easier: Charles born Feb. 8 would become as a password AselrahC0208). If the middle name is less than 5 letters, duplicate the first letter of her name to make it at least 5 letters long,
14 including the capital A used to start the password. (Example only: Sam born Oct. 14 would become as a password AmaSS Make of your first car (spelled backwards), 2-digit year of the car plus one of the punctuation marks! or $ or &. 4. The initials (first, middle, last) of the children in your family from youngest to oldest from when you were growing up), 2-digit month and 2-digit day of your mother s birthday (Example only: Emily Ann Smith, George Randall Smith, and Paul Alexander Smith, Jr. (you) with a mother whose birthdate was April 25 would become the password that starts with an A as above AEASGRSPAS0425). If you want this to be even more secure, add the punctuation mark (! or $ or &) at the end of your password. 5. The initials (first, middle, last) of the children in your family from youngest to oldest from when you were growing up), 2-digit month and 2-digit day of your mother s birthday (Example only: Emily Ann Smith, George Randall Smith, and Paul Alexander Smith, Jr. (you) with a father whose birthdate was Sept. 14 would become the password that starts with an A as above AEASGRSPAS0914). If you want this to be even more secure, add the punctuation mark (! or $ or &) at the end of your password. How to create a shortcut Once you have created your encrypted volume, you can create a shortcut on your desktop to automatically mount and open your encrypted volume. To create a shortcut on your desktop, right click an open area of the desktop and choose New then Shortcut.
15 The Create Shortcut dialog box will appear. In the box labeled Type the location of the item: you will be entering the location of the TrueCrypt executable along with the options for automatically mounting and opening your encrypted volume. In this example, you first point to the location of the TrueCrypt executable (use quotes as in the example below). Next the /v switch tells it where the volume is to be mounted, in this case c:\myvolume, where my volume is the actual name of the volume, replace myvolume with whatever name you gave your volume. The next switch, /l t: tells it which drive letter to use to mount the drive, use any free drive letter you want. The next switch /q tells TrueCrypt to work in quiet mode (the TrueCrypt window will not open). Next the /e switch opens the mounted drive in an explorer window. Enter this entire line, replacing your volume name and drive letter. "C:\Program Files\TrueCrypt\TrueCrypt.exe" /v c:\myvolume /l t: /q /e Next you will give your shortcut a name. Use any name that makes sense to you, then click Finish. Now you will have a shortcut on your desktop similar to the picture below.
16 Double click on the shortcut and you will be prompted to enter your password. After entering your password and clicking OK, the box will close and an explorer window will open.
Encrypting a USB Drive Using TrueCrypt
Encrypting a USB Drive Using TrueCrypt This document details the steps to encrypt a USB Pen drive using TrueCrypt. TrueCrypt is free and open-source security software allowing encryption of documents and
More informationUsing TrueCrypt to protect data
Using TrueCrypt to protect data Password protecting and encrypting files one by one is a certainly an effective way to securely store and share data. However, what if you have a lot of files? Creating
More informationComodo Disk Encryption
Comodo Disk Encryption Version 2.0 User Guide Version 2.0.122010 Versi Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Comodo Disk Encryption Introduction... 3
More informationHow to create a portable encrypted USB Key using TrueCrypt
How to create a portable encrypted USB Key using TrueCrypt INTRODUCTION TrueCrypt Traveler Mode provides secure encryption for programs/files on portable devices such as USB Memory keys. It uses strong
More informationBitLocker To Go USB Flash Drive encryption User Guide
BitLocker To Go USB Flash Drive encryption User Guide Introduction BitLocker To Go is a new feature of Windows 7 which allows encryption of easily misplaced portable storage devices such as USB Flash Drives
More informationHow To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro
Online Backup by Mozy Restore Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 How do I restore my data? There are five ways of restoring your data: 1) Performing
More informationHEALTH INFORMATION SYSTEM (HIS) HOW TO COMMUNICATE WITH THE HIS PROJECT TEAM. How To Communicate with the HIS Project Team
How To Communicate with the HIS Project Team This guide is intended to provide you with support for communicating with the HIS Project Team. There may be instances where the HIS Project Team will require
More informationWARNING!!: Before installing Truecrypt encryption software on your
Truecrypt installation and usage guide for Windows XP, 7, Vista and 8 WARNING!!: Before installing Truecrypt encryption software on your computer, you should create an Acronis image back up of your computer
More informationPGP Portable Quick Start Guide Version 10.2
PGP Portable Quick Start Guide Version 10.2 Introduction to PGP Portable Use PGP Portable to distribute encrypted files to users who do not have PGP Desktop software. Use PGP Portable to transport files
More informationStep by step guide how to password protect your USB flash drive
Step by step guide how to password protect your USB flash drive 1 Content 1. How to create encrypted partition on USB flash drive 2. How to work with encrypted partition on the USB flash drive - Rohos
More informationHow to enable Disk Encryption on a laptop
How to enable Disk Encryption on a laptop Skills and pre-requisites Intermediate IT skills required. You need to: have access to, and know how to change settings in the BIOS be confident that your data
More informationTutorial How to upgrade firmware on Phison S5 controller MyDigitalSSD
Tutorial How to upgrade firmware on Phison S5 controller MyDigitalSSD Version 1.3 This tutorial will walk you through how to create a bootable USB drive and how to apply the newest firmware S5FAM030 to
More informationYou can find the installer for the +Cloud Application on your SanDisk flash drive.
Installation You can find the installer for the +Cloud Application on your SanDisk flash drive. Make sure that your computer is connected to the internet. Next plug in the flash drive and double click
More informationMAC/OSX - How to Encrypt Data using TrueCrypt. v.05201011
MAC/OSX - How to Encrypt Data using TrueCrypt v.05201011 This chapter contains step-by-step instructions on how to create, mount, and use a TrueCrypt volume. We strongly recommend that you read the entire
More informationPGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1
PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1 Table of Contents 1 Self Decrypting Archives (SDA)... 1-2 2 Setting Windows to Display File Extensions... 2-3 3 Creating PGP Zip SDA... 3-4
More informationINTRODUCTION TO WINDOWS AND FILE MANAGEMENT. Windows 7
INTRODUCTION TO WINDOWS AND FILE MANAGEMENT Windows 7 The Work Environment Your computer monitor is designed to resemble a desktop and is often referred to as such. Just as you might put on a regular desktop,
More informationBitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8)
BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8) Encryption is an effective method of protecting data stored on portable devices such as USB flash drives and external hard drives.
More information1. Scope of Service. 1.1 About Boxcryptor Classic
Manual for Mac OS X Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 4 2. Installation... 5 2.1 Installing Boxcryptor Classic... 5 2.2 Licensing Boxcryptor Classic
More informationHi-Speed USB Flash Disk User s Manual Guide
Hi-Speed USB Flash Disk User s Manual Guide System Requirements Windows 98, ME, 2000, XP, Mac OS 10.1, Linux 2.4 or above AMD or Intel Pentium 133MHz or better based computer USB 1.1, USB 2.0 or higher
More informationThese instructions were tested on OS X 10.9.4. Earlier or later versions may have slight or major differences in how things work and appear.
These instructions were tested on OS X 10.9.4. Earlier or later versions may have slight or major differences in how things work and appear. PART ONE VBOX INSTALL AND FILE STAGING You will be given a location
More informationImation LOCK User Manual
Page: - 0 - Imation LOCK User Manual Security Application Program V2.0 - D Page: - 1 - Table of Contents A. Introduction... 2 B. General Description... 2 C. Features... 2 D. Before Using the Security Application
More informationIf you have problems or questions, please call the helpdesk at 4444. Before beginning, CLOSE ALL DOCUMENTS AND PROGRAMS.
Page 1 of 17 Instructions for using Genie-Soft Backup Manager Pro 7 Task 1: Burning a backup of My Documents to a CD Task 2: Restoring and/or verifying backups. Note: You must have a CD-RW or DVD-RW drive
More informationUsing Websense Data Endpoint Client Software
1 Using Websense Data Endpoint Client Software Related topics: Disabling the endpoint client, page 3 Viewing contained files, page 5 Viewing logs, page 6 Updating the endpoint client, page 7 Your organization
More informationBitLocker To Go User Guide
BitLocker To Go User Guide 1. Introduction BitLocker To Go a new feature of Windows 7 is a full-disk encryption protection technology for removable storage devices that are connected to one of the USB
More informationSonicWALL CDP Local Archiving
This document describes how to configure, implement, and manage a local archive for your SonicWALL CDP appliance. It contains the following sections: Feature Overview section on page 1 Using Local Archiving
More informationScanShell.Net Install Guide
ScanShell.Net Install Guide Please install the software first - DO NOT PLUG IN THE SCANNER The scanner has been carefully packaged to avoid damage during transportation. Before operating the scanner, please
More informationBounceBack User Guide
Table Of Contents 1. Table of Contents... 2 2. 1-0 Introduction... 3 2.1 1-0: Introduction... 4 2.2 1-1: BounceBack Software Overview... 6 3. 2-0 Navigating the BounceBack Control Center... 9 3.1 2-0:
More informationHP ProtectTools for Small Business Security Software, Version 5.10. User Guide
HP ProtectTools for Small Business Security Software, Version 5.10 User Guide Copyright 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
More informationDisabling Microsoft SharePoint in order to install the OneDrive for Business Client
Disabling Microsoft SharePoint in order to install the OneDrive for Business Client If you try to setup and sync your OneDrive online documents with the client software and Microsoft SharePoint opens,
More informationOnline Backup and Recovery Manager Setup for Microsoft Windows.
Online Backup and Recovery Manager Setup for Microsoft Windows. Backup Wizard Default Interface Recovery Wizard Online Backup and Recovery Manager Setup Backup Wizard After installing and launching the
More informationVirtual Office Remote Installation Guide
Virtual Office Remote Installation Guide Table of Contents VIRTUAL OFFICE REMOTE INSTALLATION GUIDE... 3 UNIVERSAL PRINTER CONFIGURATION INSTRUCTIONS... 12 CHANGING DEFAULT PRINTERS ON LOCAL SYSTEM...
More informationChapter Title. Time Warner Cable Business Class Online Backup. Windows User Guide. Version 2.6
Chapter Title Time Warner Cable Business Class Online Backup Windows User Guide Version 2.6 Table of Contents Table of Contents... 2 Chapter 1: About This Guide... 3 Chapter 2: Getting Started...4 Installing
More informationWA2262 Applied Data Science and Big Data Analytics Boot Camp for Business Analysts. Classroom Setup Guide. Web Age Solutions Inc.
WA2262 Applied Data Science and Big Data Analytics Boot Camp for Business Analysts Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Software
More informationCenturion PLUS CPC4 Download Guide
Centurion PLUS CPC4 Download Guide using C4 File Transfer Utility. 1010537 03 01 10 Section 50 1.0 Background: 1.1 The Centurion PLUS Control system consists of a Centurion PLUS Core (CPC4 1) and Color
More informationSecureDoc for Mac v6.1. User Manual
SecureDoc for Mac v6.1 User Manual Copyright 1997-2012 by WinMagic Inc. All rights reserved. Printed in Canada Many products, software and technologies are subject to export control for both Canada and
More informationKeePass Getting Started on Windows
KeePass Getting Started on Windows This guide includes the initial installation of KeePass 2.x on a Windows PC, creating your first password database, testing the software and entering your first accounts.
More informationAcronis Backup & Recovery 11
Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation
More informationGetting Started User s Guide
Getting Started This short guide can help you to quickly start using Acronis True Image Home 2011. It describes just a few of the key features of Acronis True Image Home 2011. For detailed program information,
More information16.4.3 Lab: Data Backup and Recovery in Windows XP
16.4.3 Lab: Data Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment The
More informationHow To Set Up Dataprotect
How To Set Up Dataprotect This document will show you how to install and configure your computer for a Typical installation. If you have questions about configuring a Custom installation please contact
More informationFirst Time On-Campus VLab Setup Windows XP Edition
First Time On-Campus VLab Setup Windows XP Edition General: This guide is a step-by-step walkthrough of downloading, installing and configuring VMware View Client for the University of Cincinnati s VLab
More informationLaw School Computing Services User Memo
Law School Computing Services User Memo Accessing and Using Shared No. 37 7/28/2015 Email Accounts in Outlook Overview: Many Law School departments and organizations use shared email accounts. Shared email
More informationPassword Depot for Android
Password Depot for Android Table Of Contents Table Of Contents... 2 User interface... 3 Action Bar... 3 Overflow Menu... 4 Entry menu... 5 Context Bar... 6 Settings... 7 Creating a password file... 8 Opening
More informationHosting Users Guide 2011
Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure
More informationInstalling LearningBay Enterprise Part 2
Installing LearningBay Enterprise Part 2 Support Document Copyright 2012 Axiom. All Rights Reserved. Page 1 Please note that this document is one of three that details the process for installing LearningBay
More informationSSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems
SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems What is SSH?: SSH is an application that protects the TCP/IP connections between two computers. The software
More informationTxEIS on Internet Explorer 7
TxEIS on Internet Explorer 7 General Set Up Recommendations: Several modifications will need to be made to the computer settings in Internet Explorer to ensure TxEIS runs smoothly, reports pop up as desired,
More informationSeagate Manager. User Guide. For Use With Your FreeAgent TM Drive. Seagate Manager User Guide for Use With Your FreeAgent Drive 1
Seagate Manager User Guide For Use With Your FreeAgent TM Drive Seagate Manager User Guide for Use With Your FreeAgent Drive 1 Seagate Manager User Guide for Use With Your FreeAgent Drive Revision 1 2008
More informationTeam Foundation Server 2012 Installation Guide
Team Foundation Server 2012 Installation Guide Page 1 of 143 Team Foundation Server 2012 Installation Guide Benjamin Day benday@benday.com v1.0.0 November 15, 2012 Team Foundation Server 2012 Installation
More informationHow to register and use our Chat System
How to register and use our Chat System Why this document? We have a very good chat system and easy to use when you are set up, but getting registered and into the system can be a bit complicated. If you
More informationContents. Getting Started...1. Managing Your Drives...14. Backing Up & Restoring Folders...28. Synchronizing Folders...48. Managing Security...
Contents Getting Started.....................................................1 Using the Formatting Tool........................................1 Preparing the Software Manually..................................4
More informationVerbatim Secure Data USB Drive. User Guide. User Guide Version 2.0 All rights reserved
Verbatim Secure Data USB Drive User Guide User Guide Version 2.0 All rights reserved Table of Contents Table of Contents... 2 1. Introduction to Verbatim Secure Data USB Drive... 3 2. System Requirements...
More informationHow to Encrypt Files Containing Sensitive Data (using 7zip software or Microsoft password protection) How to Create Strong Passwords
How to Encrypt Files Containing Sensitive Data (using 7zip software or Microsoft password protection) How to Create Strong Passwords School IT Systems Support Herts for Learning Ltd SROB220, Robertson
More informationHow to Encrypt your Windows 7 SDS Machine with Bitlocker
How to Encrypt your Windows 7 SDS Machine with Bitlocker ************************************ IMPORTANT ******************************************* Before encrypting your SDS Windows 7 Machine it is highly
More informationEncrypting Files Using AxCrypt
Encrypting Files Using AxCrypt Documents, spreadsheets, databases, and other files that contain personal information or other sensitive information MUST BE encrypted when being transmitted to someone else
More informationInstalling Windows XP Professional
CHAPTER 3 Installing Windows XP Professional After completing this chapter, you will be able to: Plan for an installation of Windows XP Professional. Use a CD to perform an attended installation of Windows
More informationApple Mac VPN Service Setting up Remote Desktop
Apple Mac VPN Service Setting up Remote Desktop After you have successfully connected via the VPN client to the University network you will then need to make the connection to your machine. To do this
More informationSky Broadband upgrading your router software
Sky Broadband upgrading your router software Why upgrade to the new software? As with all aspects of the services we provide, we have been working to enhance the performance of the software in your wireless
More information( ://.. / ) ( ://. / )
How to encrypt (almost) anything PCWorld 1 of 5 ( ://.. / ) ( ://. / ) @atcastle Jan 18, 2013 3:30 AM SINGLE PAGE (?PAGE=0) Your email messages can contain some very sensitive information, which makes
More information4cast Client Specification and Installation
4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights
More informationMedia Device Encryption
Media Device Encryption The age of portable media has brought us a plethora of mobile media devices that allow information to be easily transported from place to place. Though portable media devices like
More informationGlobal VPN Client Getting Started Guide
Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential
More informationHow To Use Senior Systems Cloud Services
Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To
More informationProtecting GoldMine CRM database with DbDefence
Protecting GoldMine CRM database with DbDefence Version 1.1, 26 July 2013 Introduction As the backbone of any digital venture, databases are essential to the running of organizations, whether they be enormous
More informationInstalling Sun's VirtualBox on Windows XP and setting up an Ubuntu VM
Installing Sun's VirtualBox on Windows XP and setting up an Ubuntu VM laptop will need to have 10GB of free space to install download the latest VirtualBox software from www.sun.com make sure you pick
More informationOutlook 2007: Managing your mailbox
Outlook 2007: Managing your mailbox Find its size and trim it down Use Mailbox Cleanup On the Tools menu, click Mailbox Cleanup. You can do any of the following from this one location: View the size of
More informationRoyal Mail Group. getting started. with Symantec Endpoint Encryption. A user guide from Royal Mail Technology
getting started with Symantec Endpoint Encryption A user guide from Royal Mail Technology For further help, contact the IT Helpdesk on 5415 2555 (01246 282555) March 2010 Contents 1 Introduction to Symantec
More informationSetting Up Monthly Reporter
Setting Up Monthly Reporter April 11, 2014 I. HOW IT WORKS A QUICK OVERVIEW A. AuditWare Development Company maintains a powerful, sophisticated server on which a portion of memory is assigned to each
More informationODBC Driver Version 4 Manual
ODBC Driver Version 4 Manual Revision Date 12/05/2007 HanDBase is a Registered Trademark of DDH Software, Inc. All information contained in this manual and all software applications mentioned in this manual
More informationTable of Contents. Rebit 5 Help
Rebit 5 Help i Rebit 5 Help Table of Contents Getting Started... 1 Making the First Recovery Point... 1 Don't Forget to Create a Recovery Media... 1 Changing Backup Settings... 1 What Does Rebit 5 Do?...
More information10.3.1.6 Lab - Data Backup and Recovery in Windows XP
5.0 10.3.1.6 Lab - Data Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment
More informationPersonal Folders Backup
Personal Folders Backup The Personal Folders Backup tool is designed for use in Outlook 2000 and later and the operating systems that support each respective Outlook version. The tool provides a quick
More informationLinux Development Environment Description Based on VirtualBox Structure
Linux Development Environment Description Based on VirtualBox Structure V1.0 1 VirtualBox is open source virtual machine software. It mainly has three advantages: (1) Free (2) compact (3) powerful. At
More informationManaging Files. On a PC, after you find your file, right click it and selet Rename from the pop-up menu.
Managing Files File Types, Renaming Files The software you are using will automatically save your file as the type that applies to your current application. For Microsoft Word documents, for example, will
More informationUpgrading from Windows XP to Windows 7
Upgrading your PC from Windows XP to Windows 7 requires a custom installation which doesn't preserve your programs, files, or settings. It s sometimes called a clean installation for that reason. A custom
More informationCrystal Practice Management Encrypting the Database
Crystal Practice Management Encrypting the Database www.crystalpm.com 2013 Contents Overview... 1 Level of Encryption... 1 Why encrypt your Crystal Practice Management data?... 1 How to encrypt the database...
More informationKeystone 600N5 SERVER and STAND-ALONE INSTALLATION INSTRUCTIONS
The following instructions are required for installation of Best Access System s Keystone 600N5 (KS600N) network key control software for the server side. Please see the system requirements on the Keystone
More informationSymantec Backup Exec Desktop Laptop Option ( DLO )
The following is a short description of our backup software: BACKUP-EXEC-DLO. We have set many of the parameters for you but, if necessary, these parameters can be changed. Symantec Backup Exec Desktop
More informationUser guide. Business Email
User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook
More informationAcceptable Encryption Usage for UTHSC
This document explains the acceptable use of encryption for the UTHSC system. It includes: acceptable encryption software, techniques, algorithms and instructions. Encryption methods and software are arranged
More informationWebDisk Essentials How to Post & Retrieve Files From Your Own Online Storage Area
WebDisk Essentials How to Post & Retrieve Files From Your Own Online Storage Area OTS PUBLICATION: WD2 REVISED 1-20-2012 TRAINING@TOWSON.EDU OFFICE OF TECHNOLOGY SERVICES =Shortcut =Advice =Caution What
More informationXConsole GUI setup communication manual September 2010.
XConsole GUI setup communication manual September 2010. XConsole is compatible with Microsoft XP, Vista and Windows 7. The software will also work if using Boot camp on a Mac. IMPORTANT NOTES: - Do NOT
More informationPGP Desktop Email Quick Start Guide version 9.6
What is PGP Desktop Email? PGP Desktop Email is part of the PGP Desktop family of products. You can use PGP Desktop Email to: Automatically and transparently encrypt, sign, decrypt, and verify email messages
More informationClickfree Software User Guide
Clickfree Software User Guide Last Revised: Nov 2, 2011 Clickfree_backup_software_user_guide_v1.0 Clickfree and the Clickfree logo are trademarks or registered trademarks of Storage Appliance Corporation.
More informationSymantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide
Symantec Backup Exec 12.5 for Windows Servers Quick Installation Guide 13897290 Installing Backup Exec This document includes the following topics: System requirements Before you install About the Backup
More informationUser s Manual. Transcend JetFlash SecureDrive. Contents
User s Manual Transcend JetFlash SecureDrive Thank you for purchasing Transcend s USB Flash drive with built-in 256-bit AES encryption security. JetFlash SecureDrive helps you safeguard data by creating
More informationSOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL
SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,
More informationGuide how to protect your private data with Rohos Disk Encryption
Guide how to protect your private data with Rohos Disk Encryption 1 Content 1. Encrypt USB drive - Portable Application 2. Encrypt HDD 3. Hide folder 4. Have USB Key for access control 5. Rohos disk options
More informationSimple Computer Backup
Title: Simple Computer Backup (Win 7 and 8) Author: Nancy DeMarte Date Created: 11/10/13 Date(s) Revised: 1/20/15 Simple Computer Backup This tutorial includes these methods of backing up your PC files:
More informationGIAC Introduction to Security Fundamentals. Laptop and External Drive Configuration Guide Version 1.2 SEC301
GIAC Introduction to Security Fundamentals Laptop and External Drive Configuration Guide Version 1.2 SEC301 SEC301 - Hands-on Exercises Addendum Page 1 Table of Contents Background... 3 Ensure that the
More informationSystem update procedure for Kurio 7 (For build number above 110)
System update procedure for Kurio 7 (For build number above 110) IMPORTANT NOTE: Before starting the procedure, please check your current Android build number, that can be found as follows: exit the Kurio
More informationFigure 1: Restore Tab
Apptix Online Backup by Mozy Restore How do I restore my data? There are five ways of restoring your data: 1) Performing a Restore Using the Restore Tab You can restore files from the Apptix Online Backup
More informationFor Mac User Directions, see page 5
Windows Vista, Windows 7, and Windows XP with Service Pack 3 Remote Desktop Access For Mac User Directions, see page 5 This instruction allows district staff and students to access the Commack UFSD network
More informationInstalling the Virtual Desktop Application (MAC)
Installing the Virtual Desktop Application (MAC) The folowing instructions will guide you through the process of installing the components necessary to connect in to the NEL B Virtual Desktop environment
More informationIsItUp Quick Start Manual
IsItUp - When you need to know the status of your network Taro Software Inc. Website: www.tarosoft.com Telephone: 703-405-4697 Postal address: 8829 110th Lane, Seminole Fl, 33772 Electronic mail: Contact1@tarosoft.com
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationManaging documents, files and folders
Managing documents, files and folders Your computer puts information at your fingertips. Over time, however, you might have so many files that it can be difficult to find the specific file you need. Without
More informationHome and Shared Folders on Windows Accessing Home and Shared Folders on Active Directory File Servers Using Windows
Overview Home and Shared Folders on Windows Accessing Home and Shared Folders on Active Directory File Servers Using Windows Ithaca College provides network file sharing for all faculty members, all staff
More informationQUICK START GUIDE EDI Claims Link for Windows version 3.1
QUICK START GUIDE EDI Claims Link for Windows version 3.1 System Requirements - Operating system: Windows 98 or later - Computer/Processor: Pentium 2, 233 MHz or greater - Memory: 64MB Ram - Initial application
More informationWorking with Online CBS Clients
ACCOUNTANT S ASSISTANT Working with Online CBS Clients version 2010.x.x TL 22280 (4/28/10) Copyright Information Text copyright 1998-2010 by Thomson Reuters/Tax & Accounting. All rights reserved. Video
More information