Encrypting Files Using AxCrypt

Size: px
Start display at page:

Download "Encrypting Files Using AxCrypt"

Transcription

1 Encrypting Files Using AxCrypt Documents, spreadsheets, databases, and other files that contain personal information or other sensitive information MUST BE encrypted when being transmitted to someone else (via , CD, etc.) and should be encrypted when saved on local hard drives, CDs, Floppies, USB drives, and other non-central media. While WinZip works well for many users, some people have experienced problems when transmitting WinZip encrypted files to off-campus users. An alternative free software encryption program, that is compatible with most computer systems, is AxCrypt. NOTE: Axcrypt software is NOT supported by the IT Help Desk. Help files for the Axcrypt software are found at Follow the instructions below to use AxCrypt to encrypt files. I. Downloading and Installing AxCrypt 1. Download AxCrypt from: Choose either the 32 bit or 64 bit, depending on which version of Windows you have 1

2 Click on Save and then choose an area on your PC's hard drive to save the installation file Double-click on the saved file's name 2

3 2. You will see a dialogue box similar to the one shown at the right. Click the Run button. 3. The installation wizard will start. Click on Next 3

4 You must agree to the license agreement before the install process will continue. 4. Then click on Next 4

5 5. Click on Install The program should begin to install. This may take some time Then click on Finish 5

6 6. You can choose to provide your address for update notifications and application data reporting Providing your address is not required 7. You can also register by going to Start, then All Programs, select AxCrypt, then select My Registration Account You can then create an account for the software II. Encrypting a file for transmittal. 6

7 1. Find and select the file or files you want to encrypt using Windows Explorer, then Right-Click the selected file(s) to bring up the menu. Mouse-over AxCrypt, to show the AxCrypt options. AxCrypt offers a number of options for encrypting files. Selecting Encrypt will encrypt the original file, deleting the unencrypted version. The recommended option for transmitting a file to someone else is to Encrypt copy to.exe as this allows the receiver to decrypt the file without installing AxCrypt on his/her system. Click Encrypt copy to.exe Encrypt a copy to.exe leaves the original unencrypted file intact. 7

8 2. Next assign a passphrase The encryption provided is only effective if the password is effective. Minimum recommendations are 8 characters with a mix of letters, numbers, and special characters. NOTE: This is a password you are going to have to share with the file recipient, so be careful NOT to use the same password you use for your personal information or accounts. Click OK to encrypt the file(s). 3. You should now see an encrypted file You can transfer this file via CD, USB, or other physical media. However, before you can send via , follow steps 4-6 below. 8

9 4. To send the file as an attachment, you must rename the file extension to something that is not executable (.EXE) as nearly all software blocks executable attachments. To rename the file, right-click on the encrypted file and select (left-click) Rename. 5. Select the extension and change to a non-executable such as.txt You will likely see this warning. Click Yes. You should now be able to the renamed file as an attachment. Be sure to contact (phone recommended) the intended recipient and tell them they will need to rename the extension to.exe upon receipt. Also ensure the individual 9

10 knows the passphrase Do NOT send the passphrase via ! is not a secure way to send passwords. III. Decrypting an AxCrypt.EXE file 1. The first step to decrypting a file received as an attachment is to save the file to a folder on your PC. Do not try to decrypt the attachment from within the message or program 2. To decrypt the AxCrypt file, you need to rename the file so it has an executable (.EXE) extension. Right-click on the file and select (left-click) the Rename option from the menu. 10

11 3. Erase the current extension and change it to.exe (it is not case sensitive). You may or may not see a banner warning you about changing file extensions, click Yes to change it. 4. Open the renamed file by doubleclicking, or by right-clicking and selecting Open 5. You should receive a passphrase prompt like the one shown at the right. Enter the passphrase you received from the individual who encrypted/transmitted the file and then click on OK 11

12 6. If the encrypted file contains only one item, you will be asked to select an area to save the decrypted file to. After you save the file, you can now access and use it If the encrypted file contains multiple items, you may be prompted to specify a location to decrypt the files. You can click the Browse button for options Click Decrypt You should see the decrypted file(s) in the location you specified Click on OK 12

CBH Provider EDI Browser Manual

CBH Provider EDI Browser Manual CBH Provider EDI Browser Manual Table of Contents PGP Software Installation Windows XP 2 PGP Software Installation Windows 7 9 Main Screen 16 Log In Screen 19 Report: Authorizations 21 Decryption Instructions

More information

Novo Nordisk Secure File Transfer User Guide

Novo Nordisk Secure File Transfer User Guide hehe Novo Nordisk Secure File Transfer User Guide Table of Contents 1. Purpose of this document... 2 2. Getting Access... 2 3. Installing the Upload/Download Wizard (first time only)... 2 4. Uploading

More information

ScanShell.Net Install Guide

ScanShell.Net Install Guide ScanShell.Net Install Guide Please install the software first - DO NOT PLUG IN THE SCANNER The scanner has been carefully packaged to avoid damage during transportation. Before operating the scanner, please

More information

Step by step guide how to password protect your USB flash drive

Step by step guide how to password protect your USB flash drive Step by step guide how to password protect your USB flash drive 1 Content 1. How to create encrypted partition on USB flash drive 2. How to work with encrypted partition on the USB flash drive - Rohos

More information

Moving Rockwell Software Activation Keys to the VersaView 200R Industrial Computer

Moving Rockwell Software Activation Keys to the VersaView 200R Industrial Computer Page 1 of 1 01/16/03 K. Smidler Moving Rockwell Software Activation Keys to the VersaView 200R Industrial Computer Rockwell Software programs often have runtime components that require activations to utilize

More information

Encryption. Introduction to using 7-Zip

Encryption. Introduction to using 7-Zip IT Services Training Guide Encryption Introduction to using 7-Zip It Services Training Team The University of Manchester email: its.training@manchester.ac.uk www.itservices.manchester.ac.uk/trainingcourses/coursesforstaff

More information

Encrypting a USB Drive Using TrueCrypt

Encrypting a USB Drive Using TrueCrypt Encrypting a USB Drive Using TrueCrypt This document details the steps to encrypt a USB Pen drive using TrueCrypt. TrueCrypt is free and open-source security software allowing encryption of documents and

More information

BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8)

BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8) BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8) Encryption is an effective method of protecting data stored on portable devices such as USB flash drives and external hard drives.

More information

Installation Instructions for 9555 USB Driver

Installation Instructions for 9555 USB Driver Prior to using the data modem features of your 9555 handset; you must first install the VCOMPORT 9555 USB Driver. This driver is compatible with: Windows XP Service Pack 2, Windows 2000 Service Pack 4,

More information

EMAIL ENCRYPTION Guide June 3, 2013

EMAIL ENCRYPTION Guide June 3, 2013 EMAIL ENCRYPTION Guide June 3, 2013 TABLE OF CONTENTS Steps to Create Encryption Public Key... 3 Installing GPG... 3 Key Generation Process... 4 Update User Settings... 6 Decrypting an encrypted file...

More information

Remote Storage Area (RSA) Basics

Remote Storage Area (RSA) Basics Remote Storage Area (RSA) Basics Table of Contents Remote Storage Area Overview... 3 What is Remote Storage Area?... 3 Who has access to RSA?... 3 How much space is available?... 3 Basic RSA Use... 4 How

More information

eadvantage Certificate Enrollment Procedures

eadvantage Certificate Enrollment Procedures eadvantage Certificate Enrollment Procedures Purpose: Instructions for members to obtain a digital certificate which is a requirement to conduct financial transactions with the Federal Home Loan Bank of

More information

Royal Mail Group. getting started. with Symantec Endpoint Encryption. A user guide from Royal Mail Technology

Royal Mail Group. getting started. with Symantec Endpoint Encryption. A user guide from Royal Mail Technology getting started with Symantec Endpoint Encryption A user guide from Royal Mail Technology For further help, contact the IT Helpdesk on 5415 2555 (01246 282555) March 2010 Contents 1 Introduction to Symantec

More information

Print Server Application Guide. This guide applies to the following models.

Print Server Application Guide. This guide applies to the following models. Print Server Application Guide This guide applies to the following models. TL-WR842ND TL-WR1042ND TL-WR1043ND TL-WR2543ND TL-WDR4300 CONTENTS Chapter 1. Overview... 1 Chapter 2. Before Installation...

More information

Secure File Exchange

Secure File Exchange Secure File Exchange Overview of the Secure File Exchange... 2 File exchange process... 2 Sending files to clients/portal users... 2 Receiving files from clients/portal users... 2 Setup... 3 How to request

More information

4. Click Next and then fill in your Name and E-mail address. Click Next again.

4. Click Next and then fill in your Name and E-mail address. Click Next again. NOTE: Before installing PGP, Word needs to be disabled as your editor in Outlook. In Outlook, go to Tools: Options: Mail Format and uncheck Use Microsoft Office Word to edit e-mail messages. Failure to

More information

Honeywell Secure Email External User Guide August 2013

Honeywell Secure Email External User Guide August 2013 Honeywell Secure Email External User Guide August 2013 PAGE: 1 of 14 Chapter No Table of Content Page No 1 Introduction 3 2 Using the Honeywell Secure Email Interface 3 3 Sending an Encrypted Email to

More information

Outlook 2013 ~ Advanced

Outlook 2013 ~ Advanced Mail Using Categories 1. Select the message that for the category. 2. Select the appropriate category. 3. The category color displays next to the message. Renaming Categories 1. Select a message. 2. Select

More information

Get Smart Card Ready. How to Recover Your Old (Expired) Certificates

Get Smart Card Ready. How to Recover Your Old (Expired) Certificates How to Recover Your Old (Expired) Certificates If you want to read signed or encrypted email messages that you sent or received using a nowexpired certificate, you first need to recover that certificate

More information

USC Marshall School of Business ShareFile_With_Outlook_Client_v2.docx 6/12/13 1 of 9

USC Marshall School of Business ShareFile_With_Outlook_Client_v2.docx 6/12/13 1 of 9 About ShareFile When you wish to send someone a file or need a file from someone else, your best option is to use ShareFile. It not only provides increased security by automatically encrypting files but

More information

tips A quick and easy guide to securing your private information www.pkware.com

tips A quick and easy guide to securing your private information www.pkware.com tips A quick and easy guide to securing your private information tips A quick and easy guide to securing your private information Basic Information 1. How to install SecureZIP for Windows Desktop for individual

More information

How to setup Backup Anywhere on your local PC

How to setup Backup Anywhere on your local PC This document provides the basic step-by-step process on how to setup Backup Anywhere on your local PC. Please note: This software will not back up your data if your computer is switched off, in hibernation

More information

PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1

PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1 PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1 Table of Contents 1 Self Decrypting Archives (SDA)... 1-2 2 Setting Windows to Display File Extensions... 2-3 3 Creating PGP Zip SDA... 3-4

More information

2. To encrypt the drive for future use, click Yes (Fig 1, 2). This will start the encryption process.

2. To encrypt the drive for future use, click Yes (Fig 1, 2). This will start the encryption process. Dell Data Protection USB Drive Encryption Introduction To further protect PC s that have access to sensitive data, the Dell Data Protection (DDP) client detects and encrypts USB/Flash drives when they

More information

Yale Software Library

Yale Software Library Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 203-432-9000, helpdesk@yale.edu Two-factor authentication: Installation and configuration instructions for

More information

Using the enclosed installation diagram, drill three holes in the wall with the lower hole 1150mm from the floor.

Using the enclosed installation diagram, drill three holes in the wall with the lower hole 1150mm from the floor. Terminal Installation When choosing the location of the terminal, care should be taken to select an area with consistent light levels throughout the day and avoid areas where the unit may be subjected

More information

How to install USB driver (MICRO/I)

How to install USB driver (MICRO/I) How to install USB driver (MICRO/I) Install on Windows XP 1. Connect the USB port on HG3G series and the USB port on PC. 2. Windows displays Found new Hardware Wizard. Select No, not this time and press

More information

E-mail Encryption Recipient Guidelines

E-mail Encryption Recipient Guidelines E-mail Encryption Recipient Guidelines Canadian Western Bank Group Human Resources Department November 1, 2013 This reference guide was developed for training and reference use only. Any discrepancies

More information

USB Flash Security Free Edition Quick Start

USB Flash Security Free Edition Quick Start Quick Start [For USB Flash Security Free Edition] 1 / 18 USB Flash Security Free Edition Quick Start Before use USB Flash Security 1. Free edition can only be installed on the USB Flash Drive up to 4GB

More information

Colorfly Tablet Upgrade Guide

Colorfly Tablet Upgrade Guide Colorfly Tablet Upgrade Guide (PhoenixSuit) 1. Downloading the Firmware and Upgrade Tool 1. Visit the official website http://www.colorful.cn/, choose 产 品 > 数 码 类 > 平 板 电 脑, and click the product to be

More information

CCH Axcess Portal Client User Guide

CCH Axcess Portal Client User Guide CCH Axcess Portal Client User Guide Keys Quick reference to the key aspects of a particular function Icon Legend Tip Notes Best practice tips and shortcuts Informational notes about functions Warning Important

More information

Backing up Microsoft Outlook Email For the PC Using MS Outlook 2000 Keith Roberts

Backing up Microsoft Outlook Email For the PC Using MS Outlook 2000 Keith Roberts WIN1020 November 2003 Backing up Microsoft Outlook Email For the PC Using MS Outlook 2000 Keith Roberts INTRODUCTION... 1 PREPARATION... 1 BACKING UP EMAIL... 2 RESTORING EMAIL FROM A PERSONAL FILE FOLDER...

More information

Personal Vault. User Guide

Personal Vault. User Guide Personal Vault User Guide i Contents McAfee Personal Vault 3 Personal Vault features... 4 Getting started... 5 Using McAfee Personal Vault... 6 The First-Use wizard: Step 1... 8 The First-Use wizard:

More information

Junk E-mail Settings. Options

Junk E-mail Settings. Options Outlook 2003 includes a new Junk E-mail Filter. It is active, by default, and the protection level is set to low. The most obvious junk e-mail messages are caught and moved to the Junk E-Mail folder. Use

More information

How to install USB driver (MICRO/I)

How to install USB driver (MICRO/I) How to install USB driver (MICRO/I) HG2G-5S 1. The HG2G-5S USB driver installation wizard will start when Automation Organizer installation is complete. Click the Next button. 2. Read the license agreement

More information

Getting TechWizard Version 4 Started Using Excel 2007 or Higher

Getting TechWizard Version 4 Started Using Excel 2007 or Higher Getting TechWizard Version 4 Started Using Excel 2007 or Higher This document covers installing, registering, and starting TechWizard in Excel 2007 or higher. Please note that TechWizard is registered

More information

Managing Contacts in Outlook

Managing Contacts in Outlook Managing Contacts in Outlook This document provides instructions for creating contacts and distribution lists in Microsoft Outlook 2007. In addition, instructions for using contacts in a Microsoft Word

More information

how to synchronise your contacts

how to synchronise your contacts how to synchronise your contacts The mobile satellite company installing the contact synchronisation tool The contact synchronisation tool enables you to transfer contact information between your PC and

More information

When you have decided what to include in your signature, you will need to open the signatures and stationery dialogue box:

When you have decided what to include in your signature, you will need to open the signatures and stationery dialogue box: Signatures An email signature is a block of information which is added to the bottom of an email to give the recipient information about the sender. It functions in a similar way to using headed paper

More information

WorkSite Web Instructions for Lane Powell PC Employees. How to access your documents in WorkSite Web

WorkSite Web Instructions for Lane Powell PC Employees. How to access your documents in WorkSite Web WorkSite Web Instructions for Lane Powell PC Employees Interwoven s WorkSite Web gives users of the WorkSite Document Management System access to their work via Internet Explorer. (At this time, only Microsoft

More information

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable

More information

2. In the Search programs and files field, enter mmc and hit the enter key

2. In the Search programs and files field, enter mmc and hit the enter key The Enrollment Key Pair is created when you make an on-line request for a certificate. There will be one Enrollment Key Pair for each certificate request that you have made. Your computer will look for

More information

Yale Software Library. PGP 9.6 for Windows

Yale Software Library. PGP 9.6 for Windows PGP 9.6 for Windows How to Add keys to the All Keys key ring: 1. Run the PGP application from Start->All Programs->PGP. 2. In the PGP main application window, click on Search for keys. 3. In the Search

More information

Verbatim Secure Data USB Drive. User Guide. User Guide Version 2.0 All rights reserved

Verbatim Secure Data USB Drive. User Guide. User Guide Version 2.0 All rights reserved Verbatim Secure Data USB Drive User Guide User Guide Version 2.0 All rights reserved Table of Contents Table of Contents... 2 1. Introduction to Verbatim Secure Data USB Drive... 3 2. System Requirements...

More information

SECURE EMAIL USER GUIDE OUTLOOK 2000

SECURE EMAIL USER GUIDE OUTLOOK 2000 WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP

More information

ProjectWise Explorer V8i User Manual for Subconsultants & Team Members

ProjectWise Explorer V8i User Manual for Subconsultants & Team Members ProjectWise Explorer V8i User Manual for Subconsultants & Team Members submitted to Michael Baker International Subconsultants & Team Members submitted by Michael Baker International ProjectWise Support

More information

For example, you might want to create a folder to collect together all emails relating to a particular project or subject.

For example, you might want to create a folder to collect together all emails relating to a particular project or subject. Email folders Outlook uses a series of folders such as the inbox, outbox, drafts and sent items to sort your email into collections according to the status of the message. If the folders which are already

More information

Using Entrust certificates with Microsoft Office and Windows

Using Entrust certificates with Microsoft Office and Windows Entrust Managed Services PKI Using Entrust certificates with Microsoft Office and Windows Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark

More information

Outlook Web App User Guide

Outlook Web App User Guide Outlook Web App Table of Contents QUICK REFERENCE... 2 OUTLOOK WEB APP URL... 2 Imagine! Help Desk...... 2 OUTLOOK WEB APP MAIN WINDOW... 2 KEY NEW FEATURES... 3 GETTING STARTED WITH OUTLOOK... 4 LOGGING

More information

FILEVAULT USER GUIDE

FILEVAULT USER GUIDE FILEVAULT USER GUIDE Click on http://filevault.ttuhsc.edu/ or copy the URL into your browser to access the FileVault site. Below is the initial login screen for the FileVault site. Login Credentials will

More information

Rev. 06 JAN. 2008. Document Control User Guide: Using Outlook within Skandocs

Rev. 06 JAN. 2008. Document Control User Guide: Using Outlook within Skandocs Rev. 06 JAN. 2008 Document Control User Guide: Using Outlook within Skandocs Introduction By referring to this user guide, it is assumed that the user has an advanced working knowledge of Skandocs (i.e.

More information

How to Use JCWHosting Reseller Cloud Storage Solution

How to Use JCWHosting Reseller Cloud Storage Solution How to Use JCWHosting Reseller Cloud Storage Solution Go to https://www.internetspace.co.za and log in with your Cloud Reseller account username and password. How to Use create a cloud account for your

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions What is Xythos? Xythos is a secure web-based file storage system that allows you to place files in a central location so they can be accessed via the internet. You can upload,

More information

To add files to your email, first create the email. When you have opened a new email:

To add files to your email, first create the email. When you have opened a new email: Email attachments You can send files, folders and other items within an email along with the mail message itself. Items which have been added to emails are called attachments. Adding an attachment to an

More information

Sending Files to a Social Security Laptop

Sending Files to a Social Security Laptop Sending Files to a Social Security Laptop Introduction There are multiple options to send files to your Social Security laptop. A couple of options are to encrypt files and then send them by email or transfer

More information

https://weboffice.edu.pe.ca/

https://weboffice.edu.pe.ca/ NETSTORAGE MANUAL INTRODUCTION Virtual Office will provide you with access to NetStorage, a simple and convenient way to access your network drives through a Web browser. You can access the files on your

More information

MAC/OSX - How to Encrypt Data using TrueCrypt. v.05201011

MAC/OSX - How to Encrypt Data using TrueCrypt. v.05201011 MAC/OSX - How to Encrypt Data using TrueCrypt v.05201011 This chapter contains step-by-step instructions on how to create, mount, and use a TrueCrypt volume. We strongly recommend that you read the entire

More information

CISCO VPN CLIENT INSTALL AND UPDATE INSTRUCTIONS

CISCO VPN CLIENT INSTALL AND UPDATE INSTRUCTIONS CISCO VPN CLIENT INSTALL AND UPDATE INSTRUCTIONS * If you are installing the VPN client for the first time skip the Uninstall section and start with the Install procedure on page 3. Uninstall: Prior to

More information

Guide to Installing BBL Crystal MIND on Windows 7

Guide to Installing BBL Crystal MIND on Windows 7 Guide to Installing BBL Crystal MIND on Windows 7 Introduction The BBL Crystal MIND software can not be directly installed on the Microsoft Windows 7 platform, however it can be installed and run via XP

More information

Symantec Endpoint Encryption (SEE Client) Installation Instructions. Version 8.2

Symantec Endpoint Encryption (SEE Client) Installation Instructions. Version 8.2 Symantec Endpoint Encryption (SEE Client) Installation Instructions Version 8.2 Warning: This software is labor intensive, therefore it is important to validate that the hard drive is healthy by first

More information

5.6.3 Lab: Registry Backup and Recovery in Windows XP

5.6.3 Lab: Registry Backup and Recovery in Windows XP 5.6.3 Lab: Registry Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up a computer registry. You will also perform a recovery of a computer registry.

More information

How To Encrypt a File using Windows Explorer and WinZip. For Use With All PII Data

How To Encrypt a File using Windows Explorer and WinZip. For Use With All PII Data How To Encrypt a File using Windows Explorer and WinZip For Use With All PII Data As an employee or a contractor, you share in the responsibility for protecting the privacy of individuals whose information

More information

Contents Minimum Requirements... 2 Instructions... 2 Troubleshooting... 7

Contents Minimum Requirements... 2 Instructions... 2 Troubleshooting... 7 Emdeon Remote Desktop Services Contents Minimum Requirements... 2 Instructions... 2 Troubleshooting... 7 Minimum Requirements 1. A high-speed Internet connection. DSL or Cable Internet are recommended.

More information

Disabling Microsoft SharePoint in order to install the OneDrive for Business Client

Disabling Microsoft SharePoint in order to install the OneDrive for Business Client Disabling Microsoft SharePoint in order to install the OneDrive for Business Client If you try to setup and sync your OneDrive online documents with the client software and Microsoft SharePoint opens,

More information

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/

More information

Encrypting IRD RWT/NRWT certificate files with Gpg4win

Encrypting IRD RWT/NRWT certificate files with Gpg4win Encrypting IRD RWT/NRWT certificate files with Gpg4win This document outlines the details for installing Gpg4win, importing the IRD public key for encrypting files, and encrypting your RWT/NRWT certificates.

More information

INTRODUCTION TO WINDOWS AND FILE MANAGEMENT. Windows 7

INTRODUCTION TO WINDOWS AND FILE MANAGEMENT. Windows 7 INTRODUCTION TO WINDOWS AND FILE MANAGEMENT Windows 7 The Work Environment Your computer monitor is designed to resemble a desktop and is often referred to as such. Just as you might put on a regular desktop,

More information

User Guide. Nero BackItUp. Ahead Software AG

User Guide. Nero BackItUp. Ahead Software AG User Guide Nero BackItUp Ahead Software AG Information on copyright and trade marks The Nero BackItUp user manual and all its contents are protected by copyright and are the property of Ahead Software.

More information

Tech Tips Helpful Tips for Pelco Products

Tech Tips Helpful Tips for Pelco Products DX4104 UPDATING FROM THE NETWORK SERVER October 29, 2009 DX4104 UPDATING FROM THE NETWORK SERVER The Operation/Configuration manual provides users an option for updating the server through the network

More information

MessageGuard 3.0 User Guide

MessageGuard 3.0 User Guide MessageGuard 3.0 User Guide Table of Contents Introduction... 3 Installing the MessageGuard Desktop Client... 3 Sending Secure E-mail Messages with the Desktop Client... 11 Reading Secure E-mail Messages

More information

Print Server Application Guide

Print Server Application Guide Print Server Application Guide TD W8968 TD W8970 / TD W8970B TD W8980 / TD W8980B Rev: 1.0.0 1910010772 Contents Overview...1 Installation for Windows OS...2 Application for Windows OS...7 How to launch/exit

More information

Installation of the CryptoKit application and adding of certificates

Installation of the CryptoKit application and adding of certificates Installation of the CryptoKit application and adding of certificates Version 2.0 December 2013 Sberbank d.d. Stranica 1 CONTENT 1 INSTALLATION PROCEDURE AND ADDING CERTIFICATES (WINDOWS 7 32BIT,WINDOWS

More information

BankLink Books Clients

BankLink Books Clients BankLink Books Clients This document is for those practices installing BankLink Books. The BankLink Service Agreement permits licensed BankLink practices to install the software in as many locations as

More information

Recommended Approach to Encrypting GNL Files

Recommended Approach to Encrypting GNL Files Recommended Approach to Encrypting GNL Files 1 2 The Needs Identify a method to securely transport and store personal and/or confidential government information, which is readily accessible to government

More information

Sage Peachtree Installation Instructions

Sage Peachtree Installation Instructions Sage Peachtree Installation Instructions Quick Tips for Network Install Use the following tips to help you install Sage Peachtree on a network: Always install Sage Peachtree FIRST on the computer that

More information

This document provides a brief, end-user overview of the Cisco Registered Envelop Service which has been implemented by Sterne Agee.

This document provides a brief, end-user overview of the Cisco Registered Envelop Service which has been implemented by Sterne Agee. Email Encryption User Guide Sterne Agee is committed to the security of your information. We have implemented Cisco Email Encryption to secure email communication so that only you can open it.* Questions?

More information

PC Angel. Recovery. Page 1

PC Angel. Recovery. Page 1 PC Angel Recovery Page 1 Table of Contents Introduction... 3 What is the purpose of PC Angel Recovery?... 3 What can you find in this manual?... 4 What should I do to get back my system?... 5 What should

More information

Hi-Speed USB Flash Disk User s Manual Guide

Hi-Speed USB Flash Disk User s Manual Guide Hi-Speed USB Flash Disk User s Manual Guide System Requirements Windows 98, ME, 2000, XP, Mac OS 10.1, Linux 2.4 or above AMD or Intel Pentium 133MHz or better based computer USB 1.1, USB 2.0 or higher

More information

support HP MFP Scan Setup Wizard 1.1

support HP MFP Scan Setup Wizard 1.1 support HP MFP Scan Setup Wizard 1.1 Security Level: Customer Verbal Use Date Written/Updated: October 11, 2007 Document Summary a The Scan Setup Wizard is a Windows utility that end users can download

More information

Instructions For Saving a Copy of Your CAISO Digital Certificate. For use with Microsoft Internet Explorer and Windows 7 Operating System

Instructions For Saving a Copy of Your CAISO Digital Certificate. For use with Microsoft Internet Explorer and Windows 7 Operating System Instructions For Saving a Copy of Your CAISO Digital Certificate For use with Microsoft Internet Explorer and Windows 7 Operating System After saving the certificate in your browser, you need to save a

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012 SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk

More information

Technology Business Solutions. Online Backup Manager INSTALLATION

Technology Business Solutions. Online Backup Manager INSTALLATION Technology Business Solutions Online Backup Manager 1. Go to the TBS OBM Software Registration Page Click the TBS Logo Under the select an account type choose the PRO version. Page1 of7 2.) Create a new

More information

Queen's Drive Web Access -

Queen's Drive Web Access - Page 1 Queen's Drive Web Access - To access your networked files (Q: Drive) off-campus Most staff members are still on the Novell system for central file storage and should use Netstorage for remote access

More information

Secure Email Client User Guide Receiving Secure Email from Mercantile Bank

Secure Email Client User Guide Receiving Secure Email from Mercantile Bank Receiving Secure Email from Contents This document provides a brief, end-user overview of the Secure Email system which has been implemented by. Why Secure Email? When someone sends you an email, the email

More information

www.thedatalocker.com Customer Service: 1-877-264-3715 Email Us: marketing@thedatalocker.com

www.thedatalocker.com Customer Service: 1-877-264-3715 Email Us: marketing@thedatalocker.com TheDataLocker online backup allows you to store, backup and retrieve any computer data over the internet to a secured remote system. Its main function is to generate a duplicate of your important files

More information

MS Excel Template Building and Mapping for Neat 5

MS Excel Template Building and Mapping for Neat 5 MS Excel Template Building and Mapping for Neat 5 Neat 5 provides the opportunity to export data directly from the Neat 5 program to an Excel template, entering in column information using receipts saved

More information

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0 Cox Business Premium Online Backup USER'S GUIDE Cox Business VERSION 1.0 Table of Contents ABOUT THIS GUIDE... 4 DOWNLOADING COX BUSINESS PREMIUM ONLINE BACKUP... 5 INSTALLING COX BUSINESS PREMIUM ONLINE

More information

All Windows Installations Guide Contents

All Windows Installations Guide Contents Sage Line 100 Business Suite Version 7.20 All Windows Installations Guide Contents Installing/Upgrading to Sage Line 100 Windows Version 7.20 1 To Install Windows Version 7.20 from CD-ROM 1 Pearson Phoenix

More information

Remote Access End User Reference Guide for F5 Edge VPN Client Access

Remote Access End User Reference Guide for F5 Edge VPN Client Access Remote Access End User Reference Guide for F5 Edge VPN Client Access Version 2.1 3/2/2015 This remote access end user reference guide provides an overview of how to download and install the F5 Edge VPN

More information

SecureZIP User Guide

SecureZIP User Guide SecureZIP User Guide SecureZIP is an application for zipping files to save storage space as well as encrypting files with password control to protect information. SecureZIP not only works alone to perform

More information

Installing Novell Client Software (Windows 95/98)

Installing Novell Client Software (Windows 95/98) Installing Novell Client Software (Windows 95/98) Platform: Windows 95/98 Level of Difficulty: Intermediate The following procedure describes how to install the Novell Client software. This software allows

More information

Google Apps for Sharing Folders and Collecting Assignments

Google Apps for Sharing Folders and Collecting Assignments Google Apps for Sharing Folders and Collecting Assignments The Google Drive is cloud (online) storage space, and it is also where you create and work with Google Docs, Sheets, Slides, etc. Create a Folder

More information

Security Certificates User Guide

Security Certificates User Guide Security Certificates User Guide Contents Introduction... 3 What is a security certificate?... 3 Retrieving your certificate codes... 4 Installing a security certificate... 5 Ordering additional certificates...

More information

RU-VPN Installation Instructions (Windows Vista and Windows 7)

RU-VPN Installation Instructions (Windows Vista and Windows 7) RU-VPN Installation Instructions (Windows Vista and Windows 7) An RU-VPN id allows authorized users to access Ryerson s Administrative Systems via the internet. RU-VPN utilizes a digital certificate that

More information

Installing FileMaker Pro 11 in Windows

Installing FileMaker Pro 11 in Windows Installing FileMaker Pro 11 in Windows Before you begin the installation process, please exit other open programs and save your work. Installation notes Before you install FileMaker Pro, review the following

More information

Using MioNet. 2006 Senvid Inc. User Manual Version 1.07

Using MioNet. 2006 Senvid Inc. User Manual Version 1.07 Using MioNet Copyright 2006 by Senvid, Inc. All rights reserved. 2445 Faber Place, Suite 200, Palo Alto, CA 94303 Voice: (650) 354-3613 Fax: (650) 354-8890 1 COPYRIGHT NOTICE No part of this publication

More information

Important Note Regarding Your Blu ray Drives

Important Note Regarding Your Blu ray Drives Important Note Regarding Your Blu ray Drives Use these supplemental instructions to complete the setup of your unit Your Disc Publisher unit uses esata to connect the Blu-ray drive(s) to the computer.

More information

Last modified on 03-01-2010 for application version 4.4.4

Last modified on 03-01-2010 for application version 4.4.4 Last modified on 03-01-2010 for application version 4.4.4 RemotePC User Manual Table of Contents Introduction... 3 Features... 3 Install the Remote Access Host application... 4 Install the Remote Access

More information

Note that you need to install the driver once on each laptop or desktop PC you use with the LP130.

Note that you need to install the driver once on each laptop or desktop PC you use with the LP130. Windows XP USB Download and Installation When you plug the computer cable into the VESA connector on a computer, Windows XP automatically detects and installs USB drivers for the keyboard and composite

More information

Print Audit 6 - SQL Server 2005 Express Edition

Print Audit 6 - SQL Server 2005 Express Edition Print Audit 6 - SQL Server 2005 Express Edition Summary This is a step-by-step guide to install SQL Server 2005 Express Edition to use as a database for Print Audit 6. Pre-Requisites There are a few pre-requisites

More information