File and encryption with GPG4win & Enigmail
|
|
- Nelson McCarthy
- 8 years ago
- Views:
Transcription
1 Protektor Services Windows Manual 11.5 File and encryption with GPG4win & Enigmail
2 Introduction, Contact, Legals, License Introduction Protektor Services Manual version 11.5 A new edition of the Protektor Services manual series. Protektor Services wants to assist by providing the right tools to help the people that need them without keeping them in the dark on how things actually work. Protektor Services manual series aims to do this by: Creating user friendly manuals Providing manuals for all major operating systems, it doesn't matter if you use Windows, Apple or Linux. Using only open source or open standards based software and solutions. Releasing the manuals under the Creative Commons Attribution 3.0 Unported License. Intermittent updates to the manuals to keep them current with real life computer systems. Making the source-file of the manuals available on request. In case you have any questions about the manuals do not hesitate to contact me. If you or your organization would like customized manuals or want to receive a full training for your people, do not hesitate to contact me Tom Contact Skype: Website: GPG Key: protektor.services@gmail.com or tom.keunen@gmail.com tomkeunen Acknowledgements I want to thank Nikki for the patience while I am thinking about computer stuff during social time. Legals All trademarks belong to their respected owners. No ownership is claimed by the author. License This work is licensed under the Creative Commons Attribution 3.0 Unported License. To view a copy of this license, visit or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA.
3 Good things to remember Keep your system up to date. Keep your programs up to date. Choose a strong password. Create a user account for daily use. Use anti-virus software Do not forget to make regular backups.
4 Product Information Website: Version: System: License: , Released on March 15, 2011 Windows 2000/XP/Vista/7 Open Source Website: Version: System: License: , Released on June 29, 2010 Windows, Requires Thunderbird Open Source, MPL/GPLv2 What is GPG4win, Enigmail? The makers of GPG4win aim to maintain an up-to-date collection of tools to give the user all the right software for managing keys and encrypting/decrypting text and files. Enigmail is an extension for the Thunderbird client that provides the encryption, decryption and signing functionality. Why use GPG4win, Enigmail? GPG4win is a Windows collection of software and manuals that replaces the commercial PGP suite. Enigmail will give you access to all the cryptographic features you require for . How GPG4win, Enigmail work? GPG4win is an installer package that automates the installation of other programs, it makes installations much more user friendly. GPG4win contains more packages but in this manual you will use: GnuPG The core of the suite, GnuPG is the program that deals with the actual cryptographic features for files but also for Enigmail. Kleopatra Kleopatra is the front-end for GnuPG. It acts as the main key manager. Via an icon in the task bar the user gets access to different functions like encrypting and decrypting of text. GPGEx GPGEx is used for encrypting/decrypting files, you access it by right clicking on a file. The enigmail will be installed from within Thunderbird after we have set up GPG4win.
5 Keys? Symmetric Key Symmetric keys (also known as single-key algorithms) are encryption schemes where one key is being used for encrypting and decrypting. Asymmetric Key Asymmetric cryptography or Public Key cryptography is a design based on the use of a private key and a public key. Both keys are necessary to complete the process of encrypting and decrypting. An easy way to think about it is comparing it to your phone. In order to receive calls you have to give out your telephone number (your public key) but to receive a call you need your phone (your private key). How to use GPG4win? Download the installation package from the website and when finished double click on the icon to install. The installation process is straight forward, the default settings are the correct ones most of the time, the only 2 times you have to interact are in the components page Deselect the checkbox next to GPGOL if you are not using the Outlook client. Click on Next to continue with the installation.
6 And when the Define trustable root certificates page comes up. Select the checkbox that you want to skip the configuration. This part of the installer deals with S/mime certificates which is outside the scope of this manual. Click next to continue. The installation process is finished.
7 Start Kleopatra from the programs list. The main window for key management will appear. If you already have a GPG key you can import it by clicking on the Import certificates icon. If you don't have a key yet please continue.
8 Click on the File menu and select New Certificate. The Certificate Creation Wizard will guide you through the process. Select Create a personal OpenPGP key pair. Click on Next to continue.
9 The next step is to provide your details. Enter your Name and your address. The address has to be the same as your program sends out or there might be verification issues with your key pair making it harder to use. Click on Next to continue. You are presented with the details for your certificate, check them carefully. If the details are correct, click on Create Key.
10 You will need to enter a passphrase. Make sure that you choose a strong passphrase. The wizard will provide some visual help in the form of a quality bar to measure the strength of your chosen passphrase. If you choose a passphrase too short, or not complicated enough, the wizard will kindly offer you a chance to create a stronger passphrase.
11 You will be asked to re-enter the passphrase. Click on Ok to continue. The key creation is now finished. After your key pair Is created you should make a back up of it. From this window you can also send it to a key server. When you are finished click on Finish to continue. Your key is now ready to be used.
12 Now that we have created a key pair, let's export your public key so people can communicate with you in a more secure way. Select your key, click on File and select Export Certificates. Give it a more human readable name and for compatibility issues the.asc extension. Click on Save to continue.
13 If you want to send encrypted files to anybody else you will need their public key. To import this key go to the Kleopatra main window. You can now drag and drop the key file into the main window or select Import Certificates. Browse to where the key you want to import is located. Select it and click on Open.
14 Kleopatra will present you with a window to let you know you know the import process was successful. Click on Ok to close the window. The key has been imported but is not quite ready to be used. Select the key in the Imported Certificates tab from the Kleopatra main window, click on the Certificates menu and then select Change Owner Trust. The web of trust is important when you use GPG. Read the different trust levels and select accordingly. When you have selected the right level of trust, click on OK. Kleopatra will let you know that the Trust level has changed.
15 Next we will certify the key. Go back to the main window of Kleopatra. Select the key you wish to certify and click on the certificates menu and select Certify certificate. Select the checkbox for the key you want to certify. Verify the fingerprint with the user and click on Next.
16 The next window will let you choose the certificate you want to use to certify. Click on Certify to continue. You will be asked to enter your passphrase. After you entered your passphrase click on OK. Kleopatra will let you know that the certification was successful. Click on Finish to continue.
17 If you know go to the main Kleopatra and select Trusted Certificates tab you will see that the key you just imported is now trusted and ready to be used. Next you will encrypt a file to share with the person you just imported the key from. Go to document you wish to encrypt, right click with your mouse on the file and in the menu you will see the option to Sign and encrypt.
18 This process only takes a few mouse clicks. Select Sign and Encrypt and click on Next. The signing part of this process is part of what makes up the web of trust.
19 Next you will have to select the keys you want to use to encrypt this file. Select the key(s), and click on Add. They will be added to the bottom box and when finished selecting the keys, click on Next.
20 Select the identity you want to sign the file with. Click on Sign & Encrypt to continue. You will need to enter your passphrase. After entering your passphrase click on OK.
21 GPG will now perform the signing and encrypting. You will be presented with a window to inform you of the operations. Click on Finish to continue. Your encrypted document is now ready to be shared with your contact. As you can see the filename is not encrypted, be aware of this when choosing a filename so you don't divulge any information that might be sensitive.
22 When you receive an encrypted file and you need to decrypt it the process is even easier. Select the file you want to decrypt, right click and select decrypt and verify from the menu. Kleopatra will give you some options what you can do with the file. Click on Decrypt/Verify to continue. You will need to enter your passphrase. When finished, click on OK.
23 You will get the status report from Kleopatra. Click OK to continue. Your file is now decrypted. That is all it takes to import keys, to encrypt and decrypt files with GPG4win. This method is suitable for when you want to share files via removable media such as a USB stick. You can also send this encrypted document via . Next we will be looking at encrypting and decrypting . For this manual we will work with the Thunderbird client. If you use another client, chances are that there is a GPG extension available for it that will make it also easy to use. This manual will not go into depth on how to install and configure thunderbird but will focus on using the GPG cryptographic features in a user friendly way. There are many great tutorials available in the internet for general Thunderbird use.
24 First we will need to install the Enigmail extension. Start Thunderbird and select the Tools menu and click on Add-ons. The Add on menu will appear and search for Enigmail. When found, click on Add to Thunderbird.
25 Thunderbird will warn you about potential malicious practices. Click on Install Now to continue. Thunderbird will do the installation and when finished ask you to restart Thunderbird. Click on Restart Thunderbird to continue.
26 Once restarted you will see you now have an OpenPGP menu in Thunderbird. But first we will enable your account to make use of the new features. Select the Tools menu and click on Account settings.
27 Select the OpenPGP security tab. Select the checkbox to Enable OpenPGP support for this identity. Tick the Use specific OpenPGP key and click on Select Key.
28 A window will appear that will allow you to select the key you want to use. Select the key and click on OK. You will now return to your Account settings window. Click Ok to close. Your account is now ready to be used. Return to the main window of Thunderbird. Click on Write to start composing a new message that you will encrypt.
29 Create your message as usual. Before sending your message click on the OpenPGP button in the menu. Select Sign Message and Encrypt Message. For more options such as attaching your public key you can also select the OpenPGP menu.
30 Nothing seems to have happened. But at the bottom you will see the sign and encrypt buttons are now active. You will be asked to enter your passphrase. When finished, click on OK. When you created your key, the importance of using the right address was pointed out. Here you can see why this is. Enigmail will check the recipients' address against the addresses it has associated with the keys and use the corresponding keys.
31 Let's write another message but with an address for the recipient different then the one he or she created their public key with. As before select the sign and encrypt. Since Enigmail doesn't know one of the recipients it will ask you to select the keys you want to use for the signing and encryption of the . You can now select the key you want to use to encrypt the message. Press OK when finished.
32 Decrypting a received encrypted message. Select the message. You will see a lot of djibberish on the screen but Enigmail will pick up that this is actually an encrypted message and ask for your passphrase for decryption. Enter your passphrase and click on OK. Your message will now be decrypted.
33 The decrypted message. That is all there is to do to send and receive encrypted messages. If you want to send attachments to your contacts you can either send previously encrypted files or you can let Enigmail take care of this.
34 Write your and attach the files you want to send as usual, select the encrypt option from the OpenPGP button in the menu and when you select send Enigmail will present you with the following options. Select the appropriate action and press Ok to send your message with the attachments encrypted.
GPG4win / Kleopatra Documentation. Secure file and e-mail encryption by using GnuPG for Windows
GPG4win / Kleopatra Documentation Secure file and e-mail encryption by using GnuPG for Windows GPG4win Detailed How To: Installing Gpg4win: 1. Go to the following website http://www.gpg4win.org/download.html,
More informationGPG installation and configuration
Contents Introduction... 3 Windows... 5 Install GPG4WIN... 5 Configure the certificate manager... 7 Configure GPG... 7 Create your own set of keys... 9 Upload your public key to the keyserver... 11 Importing
More informationEncrypting your Email Communications using PGP
Encrypting your Email Communications using PGP If you are watching this tutorial as part of the conference materials, the software is on a separate CD. Alternately, you can obtain the software at the following
More informationGPG - GNU Privacy Guard
GPG - GNU Privacy Guard How to use Károly Erdei October 15, 2014 Károly Erdei GPG - GNU Privacy Guard 1/60 1 Why 2 Cryptography 3 PGP 4 KGPG-Assistant 5 -Key-Manager 6 -Editor 7 GPG4Win 8 Enigmail Károly
More informationTutorial: Encrypted Email with Thunderbird and Enigmail. Author: Shashank Areguli. Published: Ed (August 9, 2014)
Tutorial: Encrypted Email with Thunderbird and Enigmail Author: Shashank Areguli Published: Ed (August 9, 2014) There are three issues of security that needs to dealt with on the internet, concerning information.
More informationI. Configuring Digital signature certificate in Microsoft Outlook 2003:
I. Configuring Digital signature certificate in Microsoft Outlook 2003: In order to configure Outlook 2003 to use the new message security settings please follow these steps: 1. Open Outlook. 2. Go to
More informationSECURE EMAIL USER GUIDE OUTLOOK 2000
WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP
More informationSecure E-Mail Part II Due Date: Sept 27 Points: 25 Points
Secure E-Mail Part II Due Date: Sept 27 Points: 25 Points Objective 1. To explore a practical application of cryptography secure e-mail 2. To use public key encryption 3. To gain experience with the various
More informationHow To Encrypt A Traveltrax Report On Gpg On A Pc Or Mac Or Mac (For A Free Download) On A Thumbdrive Or Ipad Or Ipa (For Free) On Pc Or Ipo (For An Ipo)
EMAIL ENCRYPTION Guide June 3, 2013 TABLE OF CONTENTS Steps to Create Encryption Public Key... 3 Installing GPG... 3 Key Generation Process... 4 Update User Settings... 6 Decrypting an encrypted file...
More information4. Click Next and then fill in your Name and E-mail address. Click Next again.
NOTE: Before installing PGP, Word needs to be disabled as your editor in Outlook. In Outlook, go to Tools: Options: Mail Format and uncheck Use Microsoft Office Word to edit e-mail messages. Failure to
More informationFRCC Secure Transfer & Storage Infrastructure. Training for new data transfer process
FRCC Secure Transfer & Storage Infrastructure Training for new data transfer process Training Objects Understand the changes in regards to the data transfer process using PKI Installation Key management
More informationUsing Your PGP Tool to Update Your Email Address Settings for Encrypted Messaging
Technology Help Desk 412 624-HELP [4357] http://technology.pitt.edu Using Your PGP Tool to Update Your Email Address Settings for Encrypted Messaging Overview The University of Pittsburgh is removing the
More informationThe Handbook V 1.8 Adaptations by Ludwig Hügelschäfer Based on Version 1 by Daniele Raffo with Patrick Brunschwig and Robert J. Hansen.
openpgp email security for mozilla applications The Handbook V 1.8 Adaptations by Ludwig Hügelschäfer Based on Version 1 by Daniele Raffo with Patrick Brunschwig and Robert J. Hansen. Enigmail Handbook
More informationInternet E-Mail Encryption S/Mime Standard
Internet E-Mail Encryption S/Mime Standard Disclaimer: Successfully setting up encryption functions in most e-mail clients is usually not a problematic task. However, it should be noted that, when configuring
More informationHow to Setup Privacy Guard Encryption.
How to Setup Privacy Guard Encryption. Contents Setting up for the first time.... 1 Installing the Software (free)... 1 Generating your own key... 2 Share your key with your friends so they can send you
More informationUsing Entrust certificates with Microsoft Office and Windows
Entrust Managed Services PKI Using Entrust certificates with Microsoft Office and Windows Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark
More informationAdobe Digital Signatures in Adobe Acrobat X Pro
Adobe Digital Signatures in Adobe Acrobat X Pro Setting up a digital signature with Adobe Acrobat X Pro: 1. Open the PDF file you wish to sign digitally. 2. Click on the Tools menu in the upper right corner.
More informationEmail Account Create for Outlook Express
Email Account Create for Outlook Express Click Start Menu Choose Outlook Express Click Tools menu from Menu Bar and then click Accounts In Internet Account Wizard, Click Add Button and Click Mail. 1 In
More informationDjigzo S/MIME setup guide
Author: Martijn Brinkers Table of Contents...1 Introduction...3 Quick setup...4 Create a CA...4 Fill in the form:...5 Add certificates for internal users...5 Add certificates for external recipients...7
More informationTHUNDERBIRD WORKBOOK
THUNDERBIRD WORKBOOK 1 2 Published : 2012-05-25 License : None INTRODUCTION 1. ABOUT THIS WORKBOOK 2. INTRODUCTION TO THUNDERBIRD 3 1. ABOUT THIS WORKBOOK T his workbook is designed to complete specific
More informationThe KGpg Handbook. Jean-Baptiste Mardelle Rolf Eike Beer
Jean-Baptiste Mardelle Rolf Eike Beer 2 Contents 1 Introduction 5 2 Getting Started 6 3 Using KGpg 8 3.1 Generating a key...................................... 8 3.2 Revoking a key.......................................
More informationBiography of Trainer. Education. Experience. Summary. TLS/SSL : Securing your website PGP : Secure your email communication. Topic
Topic Name of the Trainer/Speaker Professional Position and Name of Organization Email TLS/SSL : Securing your website PGP : Secure your email communication Mohammad Fakrul Alam CTO bdhub Limited fakrul@bdhub.com
More informationExostar LDAP Proxy / SecureEmail Setup Guide. This document provides information on the following topics:
This document provides information on the following topics: Email Encryption set-up Outlook 2003 Email Encryption set-up Outlook 2007 Email Encryption set-up Outlook 2010 Email Encryption set-up Outlook
More information1. Open Thunderbird. If the Import Wizard window opens, select Don t import anything and click Next and go to step 3.
Thunderbird The changes that need to be made in the email programs will be the following: Incoming mail server: newmail.one-eleven.net Outgoing mail server (SMTP): newmail.one-eleven.net You will also
More informationEncrypting Email with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY BY FRAUKE OSTER
COVER STORY Encrypting Email Encrypting Email with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY The leading email applications include new features for helping users secure and authenticate their
More informationLiteCommerce Advanced Security Module. Version 2.8
LiteCommerce Advanced Security Module Version 2.8 Reference Manual Revision date: Jul/03/2007 LiteCommerce Advanced Security Module Reference Manual I Table of Contents Introduction...1 Administrator...2
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationPDG Software. PDG Key Manager User Guide
PDG Key Manager User Guide , Inc. 1751 Montreal Circle, Suite B Tucker, Georgia 30084-6802 Copyright 1998-2000 PDG Software, Inc.; All rights reserved. PDG Software, Inc. ("PDG Software") retains all
More informationSecure e-mail transaction guidelines for external users with Commission personnel.
Secure e-mail transaction guidelines for external users with Commission personnel. This document describes in general the basic requirements to set up secure (encrypted) e- mail communication between external
More informationPDG Software. Keyman Encryption Guide
Keyman Encryption Guide , Inc. 1751 Montreal Circle, Suite B Tucker, Georgia 30084-6802 Copyright 1998-2004 PDG Software, Inc.; All rights reserved. PDG Software, Inc. ("PDG Software") retains all ownership
More informationPersonal Secure Email Certificate
Entrust Certificate Services Personal Secure Email Certificate Enrollment Guide Date of Issue: October 2010 Copyright 2010 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
More informationHW/Lab 1: Email Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am)
HW/Lab 1: Email Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am) This HW/Lab assignment covers Lectures 2 to 4. Please review these thoroughly before starting to
More informationCBH Provider EDI Browser Manual
CBH Provider EDI Browser Manual Table of Contents PGP Software Installation Windows XP 2 PGP Software Installation Windows 7 9 Main Screen 16 Log In Screen 19 Report: Authorizations 21 Decryption Instructions
More informationINTRODUCTION TO CRYPTOGRAPHY
INTRODUCTION TO CRYPTOGRAPHY AUTHOR: ANAS TAWILEH anas@tawileh.net Available online at: http://www.tawileh.net/courses/ia This work is released under a Creative Commons Attribution-ShareAlike 2.5 License
More informationInstruction Manual for BicDroid QDocument
Instruction Manual for BicDroid QDocument (Basic, Premium, and Professional Editions) Version 1.1 BicDroid.com TABLE OF CONTENTS Installation... 1 Registration. 2 Verification Code 5 Using BicDroid QDocument
More informationGetting a Free Comodo Email Certificate
Getting a Free Comodo Email Certificate Go here and click on Get It Free Now button. http://www.instantssl.com/ssl certificate products/free email certificate.html It will take you to this form which you
More informationDocument Management Getting Started Guide
Document Management Getting Started Guide Version: 6.6.x Written by: Product Documentation, R&D Date: February 2011 ImageNow and CaptureNow are registered trademarks of Perceptive Software, Inc. All other
More informationExtracting an S/MIME certificate from a digital signature
Extracting an S/MIME certificate from a digital signature Instructions for Microsoft Outlook 2007 and 2010 Document User_Instruction_Outlook_Certificate_Handling Status Final Date: 03.06.2012 Version:
More informationInstructions for Microsoft Outlook 2003
ElkhartNet, Inc. is dedicated to providing our email customers with excellent service and support. In a targeted effort to reduce SPAM and to provide more secure and faster email, we are changing our outgoing
More informationSteganos Secure E-Mail Step by Step Instructions. Introduction STEP 1: INSTALLATION
Steganos Secure E-Mail Step by Step Instructions Introduction Although more and more PC users learn that an e-mail can be read by a third party as easily as a postcard, e-mail encryption is still quite
More informationEncrypting Your Email Using the free COMODO Secure Email Certificate
Encrypting Your Email Using the free COMODO Secure Email Certificate These instructions will guide you through the process of getting a free Secure Email Certificate Issued by COMODO. This document will
More informationCreating Digital Signatures
About Security You can secure a PDF using any of the following security methods: Add passwords and set security options to restrict opening, editing, and printing PDFs. Encrypt a document so that only
More informationAn Introduction to Secure Email. Presented by: Addam Schroll IT Security & Privacy Analyst
An Introduction to Secure Email Presented by: Addam Schroll IT Security & Privacy Analyst Topics Secure Email Basics Types of Secure Email Walkthroughs 2 Secure Email Services Confidentiality Message Integrity
More informationMicrosoft Access Rollup Procedure for Microsoft Office 2007. 2. Click on Blank Database and name it something appropriate.
Microsoft Access Rollup Procedure for Microsoft Office 2007 Note: You will need tax form information in an existing Excel spreadsheet prior to beginning this tutorial. 1. Start Microsoft access 2007. 2.
More informationX.509 Certificate Generator User Manual
X.509 Certificate Generator User Manual Introduction X.509 Certificate Generator is a tool that allows you to generate digital certificates in PFX format, on Microsoft Certificate Store or directly on
More informationYou may have been given a download link on your trial software email. Use this link to download the software.
BackupVault / Attix5 Server Quickstart Guide This document takes about 5 minutes to read and will show you how to: Download the software Install the Attix5 Professional Backup software Backup your files
More informationCiphermail for Android Quick Start Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail for Android Quick Start Guide June 19, 2014, Rev: 5460 Copyright 2011-2014, ciphermail.com 3 CONFIGURATION WIZARD 1 Introduction This quick start guide helps you
More informationHow To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro
Online Backup by Mozy Restore Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 How do I restore my data? There are five ways of restoring your data: 1) Performing
More informationDigital Signatures. To learn more about digital signatures view this White Paper by Adobe.
Digital Signatures This tutorial was designed to help you learn to use digital signatures for signing PDF forms with Adobe Acrobat. This tutorial covers: how to create a digital signature, how to customize
More informationTCS-CA. Outlook Express Configuration [VERSION 1.0] U S E R G U I D E
U S E R G U I D E TCS-CA Outlook Express Configuration [VERSION 1.0] C O N T E N T S 1 DESCRIPTION... 3 2 OUTLOOK EXPRESS AND CERTIFICATES... 4 3 ENABLING SECURITY SETTINGS FOR MAIL ACCOUNT... 5 3.1 Settings
More information1. Open the preferences screen by opening the Mail menu and selecting Preferences...
Using TLS encryption with OS X Mail This guide assumes that you have already created an account in Mail. If you have not, you can use the new account wizard. The new account wizard is in the Accounts window
More informationFRCC Secure Data Transfer. Users Guide V1.0
FRCC Secure Data Transfer Users Guide V1.0 Table of Contents I. Introduction... 2 II. Part 1 - Software Installation... 3 III. Part 2 - Creating Your PKI Certificate... 7 IV. Part 3 - Importing FRCC Public
More informationMessageGuard 3.0 User Guide
MessageGuard 3.0 User Guide Table of Contents Introduction... 3 Installing the MessageGuard Desktop Client... 3 Sending Secure E-mail Messages with the Desktop Client... 11 Reading Secure E-mail Messages
More informationPublished : 2013-12-02 License : None
K9 1 2 Published : 2013-12-02 License : None INTRODUCTION K-9 Mail is an email application (app) for Android phones or tablets. K-9 supports multiple mailboxes, each independently configurable. T his ability
More informationPKI Contacts PKI for Fraunhofer Contacts
Fraunhofer Competence Center PKI PKI Contacts PKI for Fraunhofer Contacts User manual for communication partners of the Fraunhofer-Gesellschaft Author[s]: Uwe Bendisch, Maximilian Gottwald As at: 15.10.2013
More informationwww.nexuswebsites.co.uk Professional Mailbox Email Software Setup Guide
Professional Mailbox Email Software Setup Guide Table of contents Before you start... 2 Setting up Outlook 2010... 2 Using Autodiscover to configure Outlook 2010... 2 The Autodiscover wizard has not worked...
More informationInstalling your Digital Certificate & Using on MS Out Look 2007.
Installing your Digital Certificate & Using on MS Out Look 2007. Note: This technical paper is only to guide you the steps to follow on how to configure and use digital signatures. Therefore Certificate
More informationTrustKey Tool User Manual
TrustKey Tool User Manual 1 Table of Contents 1 Introduction... 5 2 TrustKey Product...6 2.1 TrustKey Tool... 6 2.2 TrustKey function modules...7 2.3 TrustKey using environment...7 3 TrustKey Tool Installation...
More informationOutlook Express. Make Changes in Red: Open up Outlook Express. From the Menu Bar. Tools to Accounts - Click on. User Information
Outlook Express Open up Outlook Express From the Menu Bar Tools to Accounts - Click on Mail Tab Click on mail.btconline.net mail (default) Click on Properties button Click on the General tab User Information
More informationExchange Granular Restore. User Guide
User Guide Contents 1. overview... 2 2. Backup considerations... 3 Backup user identity... 3 Exchange VM Detection... 3 Restore vs. Recovery... 3 3. Creating an Exchange backup... 4 4.... 7 Step 1 - Locate
More informationeadvantage Certificate Enrollment Procedures
eadvantage Certificate Enrollment Procedures Purpose: Instructions for members to obtain a digital certificate which is a requirement to conduct financial transactions with the Federal Home Loan Bank of
More informationOutlook Express. Make Changes in Red: Open up Outlook Express. From the Menu Bar. Tools to Accounts - Click on Mail Tab.
Outlook Express Open up Outlook Express From the Menu Bar Tools to Accounts - Click on Mail Tab Click on mail.nefcom.net (default) Click on Properties button Click on the General tab User Information E-mail
More informationStarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec
StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011. All rights reserved. No
More informationHow to use PGP Encryption with iscribe
How to use PGP Encryption with iscribe iscribe e-mail seamlessly supports e-mail encryption and digital signatures. This bulletin describes how to setup iscribe so that you can send and receive encrypted
More informationConfiguring Thunderbird for Flinders Mail at home.
Configuring Thunderbird for Flinders Mail at home. Downloading Thunderbird can be downloaded from the Mozilla web site located at http://www.mozilla.org/download.html This web site also contains links
More informationJumble for Microsoft Outlook
Jumble for Microsoft Outlook Jumble is a zero knowledge, end- to- end email encryption solution that integrates with existing email platforms. Jumble integrates at the email client level and removes the
More informationSigning and Encryption with GnuPG
Signing and Encryption with GnuPG Steve Revilak http://www.srevilak.net/wiki/talks Cryptoparty @ Somerville Public Library January 10, 2015 1 / 20 What is GnuPG? GnuPG is a free software implementation
More informationHMRC Secure Electronic Transfer (SET)
HMRC Secure Electronic Transfer (SET) How to use HMRC SET using PGP Desktop Version 2.0 Contents Welcome to HMRC SET 1 HMRC SET overview 2 Encrypt a file to send to HMRC 3 Upload files to the Government
More informationIceWarp SSL Certificate Process
IceWarp Unified Communications IceWarp SSL Certificate Process Version 10.4 Printed on 26 June, 2012 Contents IceWarp SSL Certificate Process 1 Choosing the Proper Certificate Type... 2 Creating your
More informationThe IceWarp SSL Certificate Process
IceWarp Unified Communications The IceWarp SSL Certificate Process Version 10.3 Printed on 26 November, 2010 Contents The IceWarp SSL Certificate Process 1 Choosing the Proper Certificate Type... 2 Creating
More informationSelect Correct USB Driver
Select Correct USB Driver Windows often installs updated drivers automatically, and defaults to this latest version. Not all of these drivers are compatible with our software. If you are experiencing communications
More informationYale Software Library. PGP 9.6 for Windows
PGP 9.6 for Windows How to Add keys to the All Keys key ring: 1. Run the PGP application from Start->All Programs->PGP. 2. In the PGP main application window, click on Search for keys. 3. In the Search
More informationADFS Integration Guidelines
ADFS Integration Guidelines Version 1.6 updated March 13 th 2014 Table of contents About This Guide 3 Requirements 3 Part 1 Configure Marcombox in the ADFS Environment 4 Part 2 Add Relying Party in ADFS
More informationHow to use Certificate in Microsoft Outlook
How to use Certificate in Microsoft Outlook Macau Post esigntrust Version. 2006-01.01p Agenda Configure Microsoft Outlook for using esigntrust Certificate Use certificate to sign e-mail Use Microsoft Outlook
More informationSetting up secure e-mail communication with Ericsson. Guideline for Ericsson partners
Setting up secure e-mail communication with Ericsson Guideline for Ericsson partners In this presentation Introduction Technical prerequisites Getting started Exchanging Public Keys Sending a signed e-mail
More informationExchange Granular Restore Instructional User Guide
Exchange Granular Restore Instructional User Guide www.backup-assist.ca Contents 1. Exchange Granular Restore overview... 2 2. Creating an Exchange backup... 3 3. Exchange Granular Restore... 6 Step 1
More informationBioWin Network Installation
BioWin Network Installation Introduction This document outlines the procedures for installing the network version of BioWin. There are three parts to the network version installation: 1. The installation
More informationGuide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid)
The World Internet Security Company Solutions for Security Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid) Wherever Security relies on Identity, WISeKey has
More informationPGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1
PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1 Table of Contents 1 Self Decrypting Archives (SDA)... 1-2 2 Setting Windows to Display File Extensions... 2-3 3 Creating PGP Zip SDA... 3-4
More informationEmail Update Instructions
1 Email Update Instructions Contents Email Client Settings The Basics... 3 Outlook 2013... 4 Outlook 2007... 6 Outlook Express... 7 Windows Mail... 8 Thunderbird 3... 9 Apple Mail... 10 2 Email Client
More informationApple Mac VPN Service Setting up Remote Desktop
Apple Mac VPN Service Setting up Remote Desktop After you have successfully connected via the VPN client to the University network you will then need to make the connection to your machine. To do this
More informationUser Guide Using Certificate in Microsoft Outlook Express
CERTIFYING AUTHORITY User Guide Using Certificate in Microsoft Outlook Express CONTACT TATA CONSULTANCY SERVICES - [E-SECURITY: PKI SERVICES] 6TH FLOOR, 5-9-62, KHAN LATEEF KHAN ESTATE FATEH MAIDAN ROAD,
More informationExchange 2003 Mailboxes
Exchange 2003 Mailboxes Microsoft will stop supporting Exchange 2003 mailboxes in 2014 as it comes to the end of it s life. To maintain our levels of support and performance of all our customers, we will
More informationGuide Installing Digital Certificates in Outlook 2000
Guide Installing Digital Certificates in Outlook 2000 Document SIGNE_PAPET. Ver. 1.0 Date of application 06/08/2012 Seguridad documental 2 Introduction This document describes the steps for configuring
More informationUsing TLS Encryption with Microsoft Outlook 2007
Using TLS Encryption with Microsoft Outlook 2007 This guide is meant to be used with Microsoft Outlook 2007. While the instructions are similar, the menu layouts and options have changed since the previous
More informationCHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account?
Contents Page Q. How do I access my email? Q. How do I change or reset a password for an email account? Q. How do I forward or redirect my messages to a different email address? Q. How do I set up an auto-reply
More informationEncryption. Introduction to using 7-Zip
IT Services Training Guide Encryption Introduction to using 7-Zip It Services Training Team The University of Manchester email: its.training@manchester.ac.uk www.itservices.manchester.ac.uk/trainingcourses/coursesforstaff
More information1.2 Using the GPG Gen key Command
Creating Your Personal Key Pair GPG uses public key cryptography for encrypting and signing messages. Public key cryptography involves your public key which is distributed to the public and is used to
More informationSecureZIP User Guide
SecureZIP User Guide SecureZIP is an application for zipping files to save storage space as well as encrypting files with password control to protect information. SecureZIP not only works alone to perform
More informationAspera Connect User Guide
Aspera Connect User Guide Windows XP/2003/Vista/2008/7 Browser: Firefox 2+, IE 6+ Version 2.3.1 Chapter 1 Chapter 2 Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment 2.3 Connect
More informationMyNetFone Virtual Fax. Virtual Fax Installation
Table of Contents MyNetFone Virtual Fax MyNetFone Virtual Fax Installation... 1 Changing the SIP endpoint details for the fax driver... 11 Uninstalling Virtual Fax... 13 Virtual Fax Installation Follow
More informationExchange Granular Restore User Guide
User Guide Contents 1. overview... 2 2. Backup considerations... 3 Exchange VM Detection... 3 VSS Application backups... 3 Restore vs. Recovery... 3 Backup user identity... 3 3. Creating an Exchange backup...
More informationBacking up Microsoft Outlook Email For the PC Using MS Outlook 2000 Keith Roberts
WIN1020 November 2003 Backing up Microsoft Outlook Email For the PC Using MS Outlook 2000 Keith Roberts INTRODUCTION... 1 PREPARATION... 1 BACKING UP EMAIL... 2 RESTORING EMAIL FROM A PERSONAL FILE FOLDER...
More informationHP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
More informationUser Guide May 2013. Using Certificates in Outlook Express
User Guide May 2013 Using Certificates in Outlook Express FIGU RES... FIGURES.... T I TL E..............................................................................................................................
More informationHow To Set Up Your Email
How To Set Up Your Email Contents Page Microsoft Outlook 1 Outlook Express 6 7 Webmail (this is for those who do not use an email programme) 12 Windows Live Mail 22 Mozilla Thunderbird 26 Windows Mail
More informationUnifying Information Security. Implementing Encryption on the CLEARSWIFT SECURE Email Gateway
Unifying Information Security Implementing Encryption on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 4 2 Encryption Options... 5 3 Basics of Encryption... 7 3.1 Public Key... 7 3.2 Private
More informationInstructions For Opening UHA Encrypted Email
Receiving Encrypted Email You have received a secure, encrypted message from UHA. The message will contain the following notice and an attachment named SecureMessageAtt.hml. The attachment is shown circled
More informationKeep Yourself Safe from the Prying Eyes of Hackers and Snoopers!
Protect Your Privacy Online P 7/1 Keep Yourself Safe from the Prying Eyes of Hackers and Snoopers! With the information in this article you can: Find out what secret information your PC is sharing with
More informationSMS for Outlook. Installation, Configuration and Usage Guide
SMS for Outlook Installation, Configuration and Usage Guide INTRODUCTION Installing TxTStream s SMS for Outlook is easy and will only take a minute or two. We will be using screen shots from a Windows
More information