Protect Your Online Footprint. HINTS & TIPS provided by MWR InfoSecurity and the Data Baby project

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Protect Your Online Footprint. HINTS & TIPS provided by MWR InfoSecurity and the Data Baby project"

Transcription

1 HINTS & TIPS provided by MWR InfoSecurity and the Data Baby project

2 Logging on is now one of the first things we do every day. And every time we do, we leave a trace, often without giving a thought to the information left in our trail. In most cases, we are unaware that someone, somewhere is taking our information, processing it, and using it. For example, you browse online for a product. Two days later, you visit a completely different website, and an advert pops up for the product you were searching for two days ago. How is this possible? Websites have developed new ways to identify their users, and behavioural marketing firms are coming up with new ways to use that data. In order to track the online footprint of the typical online user, MWR InfoSecurity and the Data Baby project are looking at the digital activity of Rebecca Taylor, a 27 year old Londoner who likes travelling, photography, music, fashion and uses all popular social networks. However, Rebecca does not exist. In reality, she is a laptop controlled by a team of journalists and guided by the personality type they have mapped out. She is the Data Baby project - a virtual identity of which every trace can be tracked and forensically analysed. Periodically, the Rebecca laptop is sent to MWR InfoSecurity, who analyse the information it has sent and received. A picture is building up of where the Data Baby s information is going, who is processing it, and how that is affecting Rebecca s online experience. Any data posted or sent online can in theory be accessed forever, and when MWR InfoSecurity and the Data Baby team analysed Rebecca s online activities after just a few months of virtual life, they found out that it was possible to determine what she likes, where she is, who her friends are and who she s. mwrinfosecurity.com 2/5

3 After the Prism / NSA scandal put online privacy back in the headlines, MWR InfoSecurity and the Data Baby project has compiled a series of hints and tips to help you browse privately and protect your identity. Protect your location Dongles/Mobile Devices Social Networks Wireless Networks Photos Protect your preferences Protect your personal information in Social Media Protect your identity Protect your friends Protect your personal documents Disable Location Services Turn off the where I am functionality Disable the GeoTagging functionality Make browser history private Do not use third party apps Turn off facial recognition software Hide your list of friends Encrypt your data stored in the cloud Protect your location - A proxy server requests information from another server on behalf of the users; it basically acts as the middleman. For example, we would send the data to the proxy, the proxy would connect to Facebook and send us the information back. In this way, Facebook will think that our IP* address is the IP belonging to the proxy. There are different third party options that can be used to connect through a proxy server: Virtual Private Network: You can use a third party such as to anonymously encrypt your internet activity from snooping eyes. However, you would still need to trust the third party not to track your connections. Website based proxies: Sites such as can provide you with software or web-based functionalities that use proxies around the world to provide you with anonymous access to web sites. Stand alone proxy servers: Configure your browser to route traffic through a proxy in the Internet, using one of the following types: Anonymous proxy: It will hide your IP address Distorting Proxy: It hides your IP by placing an incorrect IP address in the HTTP headers. High Anonymity Proxy: It will hide your IP address and it will not identify itself as a proxy making even more difficult to track. If you use any of the options above you will have to trust that the third party providing the service will not collect any tracking information. * An IP address is the numerical label assigned to each device (e.g., computer, printer) that is connected to a computer network that uses the Internet Protocol for communication. mwrinfosecurity.com 3/5

4 A solution for this is to use networks such as Tor (www.torproject.org), which will prevent websites from tracking your physical location or what websites you have visited. Tor uses several proxy servers and works in a way that every proxy in the path will know just the addresses of the previous and the next proxy, therefore protecting and hiding what you send to where. Dongles/Mobile Devices Disable Location Services Using a dongle or a mobile device could expose your exact location if you allow the device to share location information. For example, when accessing Facebook with GPS turned on, the device will know your whereabouts. Social Networks Turn off the where I am functionality Social networks often offer a where I am functionality that will show your location when posting something. The best way of avoiding this is to go to your profile settings and remove this feature if possible. The best option to avoid this kind of data to be included in your photos is to turn off the GeoTagging functionality or, alternatively, when using social media sites you can remove the metadata before uploading a photo. Sites such as Facebook, Instagram, Flickr and Twitter remove it automatically but, for example, Google+ does not. However, software such as BatchPurifier can be used for this. Protect your preferences Make browser history private You can turn on the private or incognito mode available in most browsers which will delete cookies sent by websites and all other tracking info when closing the browser. Even though pages will still be able to analyse your behaviour while browsing, the information from previous sessions will be removed from your browser. Protect your personal information in Social Media Do not use third party apps and set your profile to private Each application will ask for certain permissions when you install them such as accessing your profile, your friend list or your posts and pictures. Some apps can even access your information when you are not using them once you have installed them in your profile. Make sure to restrict access to your personal information, your profile and if possible, avoid using third party applications. Wireless Networks Wireless networks will not help in avoiding tracking. In fact, on some occasions the position of wireless access will be known, including street address. To avoid being tracked in a Wi-Fi network you can use Tor or any of the options proxy server options available. Photos Disable the GeoTagging functionality Some advanced cameras and smartphones, including the iphone, will include metadata in the digital photo file, which is information such as copyright, contact information or details of the camera used. The metadata in the pictures may include as well the GPS position where the photo was taken, which is a feature called GeoTagging. mwrinfosecurity.com 4/5

5 Protect your identity Turn off facial recognition software Facebook s facial recognition software automatically identifies the faces of friends in uploaded photos, which would mean that the company is able to identify what you look like. It has been banned under EU law, but Facebook said it hopes to reintroduce it in the future. To turn it off simply do the following: 1. Click at the top right of any Facebook page and choose Account Settings 2. Click Timeline and Tagging from the left-hand column 3. Under the How can I manage tags people add and tagging suggestions? section, click Who sees tag suggestions when photos that look like you are uploaded? 4. Select your preference from the dropdown menu You can also add to this by turning on the feature in which you have to accept a tag before it is posted in your timeline. Protect your friends Hide your list of friends In your Facebook profile anyone can have access to your list of friends and see who you are connected with. To hide this simply go to your timeline profile, look where your list of friends is, put the mouse over it and a pencil like icon will appear, click on it and select edit privacy. There you can select there who is allowed see your friend list. Protect your personal documents Encrypt your data stored in the cloud If you are going to save your documents somewhere out of your control, for example icloud or Dropbox, then you should consider protecting them with encryption. There are different ways to do this, with each offering a different level of protection. A simple way would be to use software such as Microsoft Office to add a password to your most sensitive documents or to zip your files and protect them with a password. There are other options available for more technically aware users, including software such as Pretty Good Privacy (PGP) or GNU Privacy Guard (GnuPG). This software can offer an extra level of privacy for your files but always consider that if you lose the password or the key to your files, you may not be able to get them back. mwrinfosecurity.com 5/5

Facebook Smart Card FB 121211_1800

Facebook Smart Card FB 121211_1800 Facebook Smart Card FB 121211_1800 Social Networks - Do s and Don ts Only establish and maintain connections with people you know and trust. Review your connections often. Assume that ANYONE can see any

More information

User Guide FOR TOSHIBA STORAGE PLACE

User Guide FOR TOSHIBA STORAGE PLACE User Guide FOR TOSHIBA STORAGE PLACE (This page left blank for 2-sided "book" printing.) Table of Contents Overview... 5 System Requirements... 5 Storage Place Interfaces... 5 Getting Started... 6 Using

More information

ReadyNAS Remote. User Manual. June 2013 202-11078-03. 350 East Plumeria Drive San Jose, CA 95134 USA

ReadyNAS Remote. User Manual. June 2013 202-11078-03. 350 East Plumeria Drive San Jose, CA 95134 USA User Manual June 2013 202-11078-03 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting this NETGEAR product. After installing your device, locate the serial number on the label

More information

Foxit MobilePDF for ios Quick Guide

Foxit MobilePDF for ios Quick Guide for ios 1 Contents Chapter 1 Description... 3 Chapter 2 Main Menu... 5 Chapter 3 File Management... 7 Chapter 4 Viewing PDF Files... 8 Chapter 5 Annotation... 13 Chapter 6 Signatures... 18 Chapter 7 Text

More information

Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216

Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216 Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216 2013 TeamDrive Systems GmbH Page 1 Table of Contents 1 Starting TeamDrive for Android for the First

More information

Eucalyptus 3.4.2 User Console Guide

Eucalyptus 3.4.2 User Console Guide Eucalyptus 3.4.2 User Console Guide 2014-02-23 Eucalyptus Systems Eucalyptus Contents 2 Contents User Console Overview...4 Install the Eucalyptus User Console...5 Install on Centos / RHEL 6.3...5 Configure

More information

Practical Demonstration of Using the Internet Cloud for Backup USING SKY DRIVE, DROP BOX, SUGARSYNC OR

Practical Demonstration of Using the Internet Cloud for Backup USING SKY DRIVE, DROP BOX, SUGARSYNC OR Practical Demonstration of Using the Internet Cloud for Backup USING SKY DRIVE, DROP BOX, SUGARSYNC OR GLADINET Internet Traffic Beware if your ISP has a cap on the maximum downloads in your monthly agreement

More information

Printing to Windows Shares from xprintserver using IPP/HTTP

Printing to Windows Shares from xprintserver using IPP/HTTP Scenario: User has a printer connected directly to a Windows Server 2003 or 2008 server and wants to print to it from an ios device using the xprintserver. Solution: Use Internet Printing support in Windows

More information

cbox YOUR FILES GO MOBILE! FOR ANDROID SMARTPHONES AND TABLETS USER MANUAL

cbox YOUR FILES GO MOBILE! FOR ANDROID SMARTPHONES AND TABLETS USER MANUAL cbox YOUR FILES GO MOBILE! FOR ANDROID SMARTPHONES AND TABLETS USER MANUAL Introduction cbox is a software that you can easily install on your computer. Once done, an online storage drive cbox appears

More information

Neat Cloud Service + Mobile App

Neat Cloud Service + Mobile App Getting Started with Neat Cloud Service + Mobile App Neat transforms paper and electronic documents into organized digital files that are easy to find, use, and share. Neat Cloud Service and Mobile App

More information

1- Using Bonafeyed as a guest

1- Using Bonafeyed as a guest User Manual 1- Using Bonafeyed as a guest 2- Registering 3- Signing in 4- Browsing Facebook through Bonafeyed 5- Encrypting posts, comments and messages while browsing Facebook 6- Sending/receiving encrypted

More information

Hiding Tracks on the Net

Hiding Tracks on the Net Hiding Tracks on the Net Ways one might hide their tracks Private Browsing Anonymizers & Proxy Servers SSL / TLS Passwords False Information Public Networks Email Services Encryption Firewalls Private

More information

INTRODUCTION TO CLOUD STORAGE

INTRODUCTION TO CLOUD STORAGE University of North Carolina at Chapel Hill Libraries Carrboro Cybrary Chapel Hill Public Library Durham County Public Library INTRODUCTION TO CLOUD STORAGE GETTING STARTED PAGE 02 Class Overview What

More information

Mobile Print/Scan Guide for Brother iprint&scan (ios)

Mobile Print/Scan Guide for Brother iprint&scan (ios) Mobile Print/Scan Guide for Brother iprint&scan (ios) Before You Use Your Brother Machine Definitions of Notes We use the following symbol and convention throughout this User's Guide: Tips icons indicate

More information

Wireless Network Best Practices for General User

Wireless Network Best Practices for General User Wireless Network Best Practices for General User I n Hong Kong, the number of Wi-Fi access points (hotspots) has reached 31,000 in 2015 1. Unfortunately, not all of them are well-protected. In fact, wireless

More information

CRESTRON-APP-ANDROID Control App for Android

CRESTRON-APP-ANDROID Control App for Android 1 Introduction The app from Crestron provides a Smart Graphics touch screen user interface on Android devices. Fully integrated with Crestron programming software including Crestron Studio, VT Pro-e, and

More information

PaperStream Connect. Setup Guide. Version 1.0.0.0. Copyright Fujitsu

PaperStream Connect. Setup Guide. Version 1.0.0.0. Copyright Fujitsu PaperStream Connect Setup Guide Version 1.0.0.0 Copyright Fujitsu 2014 Contents Introduction to PaperStream Connect... 2 Setting up PaperStream Capture to Release to Cloud Services... 3 Selecting a Cloud

More information

LEARNING RESOURCE CENTRE. Guide to Microsoft Office Online and One Drive

LEARNING RESOURCE CENTRE. Guide to Microsoft Office Online and One Drive LEARNING RESOURCE CENTRE Guide to Microsoft Office Online and One Drive LEARNING RESOURCE CENTRE JULY 2015 Table of Contents Microsoft Office Online... 3 How to create folders... 6 How to change the document

More information

Introduction to Cloud Storage GOOGLE DRIVE

Introduction to Cloud Storage GOOGLE DRIVE Introduction to Cloud Storage What is Cloud Storage? Cloud computing is one method to store and access data over the internet instead of using a physical hard drive (e.g. computer s hard drive, flash drive,

More information

91.527 - Human Computer Interaction Final Project Tutorial. Hardware Inventory Management System (HIMS) By M. Michael Nourai

91.527 - Human Computer Interaction Final Project Tutorial. Hardware Inventory Management System (HIMS) By M. Michael Nourai 91.527 - Human Computer Interaction Final Project Tutorial Hardware Inventory Management System (HIMS) By Table of Contents Introduction... 3 Running HIMS... 3 Successful Login to HIMS... 4 HIMS Main Screen...

More information

Layar Privacy Policy

Layar Privacy Policy Layar Privacy Policy Version 3.2 November 25, 2014 1. Information Collection and Use 2. Collection, Use and Transfer of Personal Data 3. User Account 4. Data Security 5. Cookies 6. Your Rights At Layar,

More information

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0 Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...

More information

alison@libraryfreedomproject.org

alison@libraryfreedomproject.org PRIVACY TOOLKIT FOR LIBRARIANS alison@libraryfreedomproject.org libraryfreedomproject.org/resources/privacy-toolkit-for-librarians/ THREAT MODELING assets adversaries capabilities consequences how much

More information

Creating a User Profile for Outlook 2013

Creating a User Profile for Outlook 2013 Creating a User Profile for Outlook 2013 This document tells you how to create a user profile for Outlook 2013 on your computer (also known as the Outlook client). This is necessary, for example, when

More information

Foxit MobilePDF Business for ios Quick Guide

Foxit MobilePDF Business for ios Quick Guide for ios 1 Contents Foxit MobilePDF Business Chapter 1 Description... 3 Chapter 2 Main Menu... 5 Chapter 3 File Management... 6 Chapter 4 Viewing PDF Files... 7 Chapter 5 Annotation... 11 Chapter 6 Signatures...

More information

NAVY COMMAND PRINCIPAL SECURITY ADVISOR RECOMMENDED FACEBOOK SECURITY SETTINGS

NAVY COMMAND PRINCIPAL SECURITY ADVISOR RECOMMENDED FACEBOOK SECURITY SETTINGS NAVY COMMAND PRINCIPAL SECURITY ADVISOR RECOMMENDED FACEBOOK SECURITY SETTINGS NC PSyA Recommended Facebook Settings - October 2014 1 Introduction 3 Privacy Shortcuts 3 Privacy Settings and Tools 6 General

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

PDF Expert for ipad User guide

PDF Expert for ipad User guide PDF Expert for ipad User guide 2011 Readdle Inc. 2 Contents Introduction Chapter 1: Copying documents to PDF Expert USB file transfer using itunes File Sharing Saving attachments from Mail and other ipad

More information

Reference Guide TEAM. Pogoplug Team. Reference Guide. 2012 Cloud Engines Inc., All Rights Reserved.

Reference Guide TEAM. Pogoplug Team. Reference Guide. 2012 Cloud Engines Inc., All Rights Reserved. Reference Guide Pogoplug Team Reference Guide Table of Contents Table of Contents 1. What s Included 2. Getting Started 3. Customizing the Pogoplug Interface a. Custom UI b. Custom Domain Name c. Custom

More information

Store & Share Quick Start

Store & Share Quick Start Store & Share Quick Start What is Store & Share? Store & Share is a service that allows you to upload all of your content (documents, music, video, executable files) into a centralized cloud storage. You

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

WELCOME TO CITUS CLOUD LOAD TEST

WELCOME TO CITUS CLOUD LOAD TEST USER S GUIDE CONTENTS Contents... 2 Chapter 1: Welcome to Citus Cloud Load Test... 3 1. What is Citus Cloud Load Test?... 3 2. Why Citus Cloud Load Test?... 3 3. Before using this guide... 3 Chapter 2:

More information

CRESTRON-APP/CRESTRON-APP-PAD

CRESTRON-APP/CRESTRON-APP-PAD 1 3 Introduction The free version of the app has limitations on the size and complexity of the project. For complete functionality, upgrade to the Pro version via an in-app purchase. The CRESTRON-APP and

More information

Datto Drive User Manual

Datto Drive User Manual Datto Drive User Manual NAVIGATING THE DATTO DRIVE INTERFACE By default, the Datto Drive Web interface opens to your Files page. You can add, remove, share files, and make changes based on the access privileges

More information

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0 Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...

More information

Cloud Web Portal User Guide Version 2.0

Cloud Web Portal User Guide Version 2.0 Cloud Web Portal User Guide Version 2.0 Welcome to ncrypted Cloud! ncrypted Cloud is a Privacy, Security, and Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption)

More information

Egnyte App for Android Quick Start Guide

Egnyte App for Android Quick Start Guide Egnyte App for Android Quick Start Guide Introduction Welcome to the Quick Start Guide for the Egnyte App for Android. This guide will explain how to: Access files. Download content for offline access.

More information

Windows 8 Hacks O'REILLY* Preston Gralla. Beijing. Cambridge Famham. Koln Sebastopol Tokyo

Windows 8 Hacks O'REILLY* Preston Gralla. Beijing. Cambridge Famham. Koln Sebastopol Tokyo Windows 8 Hacks Preston Gralla Beijing Cambridge Famham O'REILLY* Koln Sebastopol Tokyo Table of Contents Preface vii 1. Setup and Startup Hacks 1 Hack 01. Disable Windows 8's Lock Screen 1 Hack 02. Hack

More information

https://hoi-polloi.org VPN services for journalists

https://hoi-polloi.org VPN services for journalists https://hoi-polloi.org VPN services for journalists Table of Contents Introduction...1 What is a VPN?...2 JoDi VPN Client Installation...2 Disable IPv6...3 Windows 7 and Vista...3 Mac OS X...3 Linux (Ubuntu,

More information

Step-by-Step Setup Guide Wireless File Transmitter

Step-by-Step Setup Guide Wireless File Transmitter EOS Step-by-Step Setup Guide Wireless File Transmitter Server Mode Infrastructure & Ad Hoc Networks Macintosh OS X 10.5-10.6 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part

More information

Using the owncloud Android App

Using the owncloud Android App Using the owncloud Android App Accessing your files on your owncloud server via the Web interface is easy and convenient, as you can use any Web browser on any operating system without installing special

More information

App Operating Instructions Manual ES File Explorer

App Operating Instructions Manual ES File Explorer App Operating Instructions Manual ES File Explorer 2013/5 ES File Explorer (for Android only) In addition to managing local / shared / FTP / and Bluetooth file folders, you can also directly manage a variety

More information

How to Print Using the PrinterOn Hosted Service & FAQs

How to Print Using the PrinterOn Hosted Service & FAQs How to Print Using the PrinterOn Hosted Service & FAQs Version 1.0 February 2013 1. How to Print with PrinterOn... 3 1.1. Email Printing... 3 1.2. Web Portal Printing... 3 1.3. Mobile Apps... 3 1.4. PrintWhere

More information

http://www.trendmicro.com/download

http://www.trendmicro.com/download Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

NAS 137 Introduction to Photo Gallery. Manage and share the photos on your ASUSTOR NAS

NAS 137 Introduction to Photo Gallery. Manage and share the photos on your ASUSTOR NAS NAS 137 Introduction to Photo Gallery Manage and share the photos on your ASUSTOR NAS A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Use Photo Gallery

More information

Safe internet for business use: Getting Started Guide

Safe internet for business use: Getting Started Guide Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial

More information

Getting Started. Setting your Password. Application Locking and Unlocking

Getting Started. Setting your Password. Application Locking and Unlocking Getting Started The Folders application provides you with a way to store and protect files from your PC or Mac, from the Web, or from your camera. With Folders you can choose to have folders with files

More information

Web Connect Guide HL-L9200CDW HL-L9200CDWT DCP-L8400CDN MFC-L8600CDW MFC-L8850CDW MFC-L9550CDW

Web Connect Guide HL-L9200CDW HL-L9200CDWT DCP-L8400CDN MFC-L8600CDW MFC-L8850CDW MFC-L9550CDW Web Connect Guide HL-L9200CDW HL-L9200CDWT DCP-L8400CDN MFC-L8600CDW MFC-L8850CDW MFC-L9550CDW Before You Use Your Brother Machine Applicable Models Definitions of Notes Trademarks Important Note Applicable

More information

HomeNet. Gateway User Guide

HomeNet. Gateway User Guide HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do

More information

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Infrastructure Setup Windows XP 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited.

More information

Cloud Web-Based Operating System (Cloud Web Os)

Cloud Web-Based Operating System (Cloud Web Os) Cloud Web-Based Operating System (Cloud Web Os) Hesham Abusaimeh Department of Computer Science, Faculty of Information Technology, Applied Science University, Amman, 11931 Jordan. ABSTRACT The cloud computing

More information

Managing Identities and Admin Access

Managing Identities and Admin Access CHAPTER 4 This chapter describes how Cisco Identity Services Engine (ISE) manages its network identities and access to its resources using role-based access control policies, permissions, and settings.

More information

IST 195 Laboratory Session 8 - Privacy

IST 195 Laboratory Session 8 - Privacy IST 195 Laboratory Session 8 - Privacy In this lab, students will be asked to access a web-based content management cloud storage system. As learned in class, cloud computing is that allows files to be

More information

Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app

Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app Instructions for Configuring Your Browser Settings and Online Security FAQ s ios8 Settings for iphone and ipad app General Settings The following browser settings and plug-ins are required to properly

More information

IIT MOBILEPRINT. Mobileprint Workflow

IIT MOBILEPRINT. Mobileprint Workflow IIT MOBILEPRINT Mobileprint integrates with existing OTS printing system to enable user to print documents, images and email messages using email client or a web capable devices. This include smartphones,

More information

Canvio Home FAQ. is designed to be very easy to install and use to back up, share, and remotely access the files from your computers.

Canvio Home FAQ. is designed to be very easy to install and use to back up, share, and remotely access the files from your computers. What is a Canvio Home device? Canvio Home is a Network-Attached Storage device that is designed to be very easy to install and use to back up, share, and remotely access the files from your computers.

More information

Canon WFT-E1 (A) Wireless File Transmitter. Network Support Guide

Canon WFT-E1 (A) Wireless File Transmitter. Network Support Guide 1 Canon WFT-E1 (A) Wireless File Transmitter Network Support Guide Windows XP - Infrastructure Wireless Mode Connection 2 Setting up the WFT-E1A on Windows XP Home or Professional Infrastructure Wireless

More information

How to use the Cloud

How to use the Cloud How to use the Cloud Intro You may have heard advertisements, articles, or tech savvy people talk about the cloud and didn t know what that meant. Have no fear, we re here to teach you. Sometimes the cloud

More information

Internet and Email Help. Table of Contents:

Internet and Email Help. Table of Contents: Internet and Email Help The following tips are provided to assist you in troubleshooting and managing your Plex Internet and email services. For additional issues or concerns, you may also call our Product

More information

DIRECT MESSAGING END USER GUIDE ALABAMA ONE HEALTH RECORD. Unify Data Management Platform 2012/2013 Software Build 5.15

DIRECT MESSAGING END USER GUIDE ALABAMA ONE HEALTH RECORD. Unify Data Management Platform 2012/2013 Software Build 5.15 DIRECT MESSAGING END USER GUIDE ALABAMA ONE HEALTH RECORD Unify Data Management Platform 2012/2013 Software Build 5.15 April 2015 Proprietary and Confidential Property of Truven Health Analytics Inc.

More information

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual Overview GadgetTrak Mobile Security is an advanced software application designed to assist in the recovery of your mobile

More information

Customer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background

Customer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background Xerox Multifunction Devices Customer Tips June 5, 2007 This document applies to these Xerox products: X WC Pro 232/238/245/ 255/265/275 for the user Xerox Network Scanning HTTP/HTTPS Configuration using

More information

Regain Your Privacy on the Internet

Regain Your Privacy on the Internet Regain Your Privacy on the Internet by Boris Loza, PhD, CISSP from SafePatrol Solutions Inc. You'd probably be surprised if you knew what information about yourself is available on the Internet! Do you

More information

A Guide to Mobile Security For Citizen Journalists

A Guide to Mobile Security For Citizen Journalists A Guide to Mobile Security For Citizen Journalists Your Citizen journalism, and with it the rise of alternative media voices, is one of the most exciting possibilities for mobile phones in activism. Mobile

More information

Ladibug TM ios Document Camera Image Software User Manual - English

Ladibug TM ios Document Camera Image Software User Manual - English Ladibug TM ios Document Camera Image Software User Manual - English Table of Contents 1. Introduction... 2 2. Device Requirements... 2 3. Install Ladibug... 2 4. Start to Use Ladibug... 3 4.1. Connect

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Infrastructure Setup Windows 7 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited.

More information

Creating a Client-To-Site VPN. BT Cloud Compute. The power to build your own cloud solutions to serve your specific business needs.

Creating a Client-To-Site VPN. BT Cloud Compute. The power to build your own cloud solutions to serve your specific business needs. Creating a Client-To-Site VPN BT Cloud Compute The power to build your own cloud solutions to serve your specific business needs Issue 2 Introduction This guide is intended to demonstrate how easy it is

More information

CRESTRON-APP/CRESTRON-APP-PAD Control App for Apple ios

CRESTRON-APP/CRESTRON-APP-PAD Control App for Apple ios 1 Introduction The Crestron apps CRESTRON-APP and CRESTRON-APP-PAD provide a Smart Graphics touch screen user interface on Apple devices running the ios operating system. CRESTRON-APP can also provide

More information

Privacy Policy Version 1.0, 1 st of May 2016

Privacy Policy Version 1.0, 1 st of May 2016 Privacy Policy Version 1.0, 1 st of May 2016 THIS PRIVACY POLICY APPLIES TO PERSONAL INFORMATION COLLECTED BY GOCIETY SOLUTIONS FROM USERS OF THE GOCIETY SOLUTIONS APPLICATIONS (GoLivePhone and GoLiveAssist)

More information

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Ad Hoc Setup Windows XP 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited. 1

More information

Adaptive Business Management Systems Privacy Policy

Adaptive Business Management Systems Privacy Policy Adaptive Business Management Systems Privacy Policy Updated policy: Effective on July 01, 2013 This privacy statement describes how Adaptive Business Management Systems collects and uses the personal information

More information

Quick Start Guide. Hosting Your Domain

Quick Start Guide. Hosting Your Domain Quick Start Guide Hosting Your Domain http://www.names.co.uk/support/ Table of Contents Web Hosting... 3 FTP (File Transfer Protocol)... 3 File Manager... 6 SiteMaker... 7 2 Please keep these documents

More information

AUT OneDrive for Business. Instructions for Using OneDrive on Windows Platform

AUT OneDrive for Business. Instructions for Using OneDrive on Windows Platform AUT OneDrive for Business Instructions for Using OneDrive on Windows Platform Contents 1 What s OneDrive for Business?... 3 2 Storing Files... 5 1.1 Saving and Opening files from your Office applications...

More information

PDF Expert Enterprise User guide

PDF Expert Enterprise User guide PDF Expert Enterprise User guide 2012 Readdle Inc. 2 INTRODUCTION 3 CHAPTER 1: DOCUMENT VIEWING AND MANAGING IN PDF EXPERT ENTERPRISE 4 Reading and working with PDF documents 4 Managing files and folders

More information

Cisco Events Mobile Application

Cisco Events Mobile Application Welcome to the new free Cisco Events mobile application! Using this tool, participants can: Connect with peers and Cisco representatives attending an event virtually or onsite Earn points towards exclusive

More information

10/16/2014 STRATEGIES FOR PROTECTING AND MONITORING ONLINE ACTIVITY INITIAL COMMENT SOME STATISTICS

10/16/2014 STRATEGIES FOR PROTECTING AND MONITORING ONLINE ACTIVITY INITIAL COMMENT SOME STATISTICS STRATEGIES FOR PROTECTING AND MONITORING ONLINE ACTIVITY INITIAL COMMENT The main focus tonight is on protecting and monitoring our children. But let s not fool ourselves the temptations are real for us

More information

FAMILY. Reference Guide. Pogoplug Family. Reference Guide. 2012 Cloud Engines, Inc. All Rights Reserved.

FAMILY. Reference Guide. Pogoplug Family. Reference Guide. 2012 Cloud Engines, Inc. All Rights Reserved. Reference Guide Pogoplug Family Reference Guide Table of Contents Table of Contents 1. What s Included 2. Setting Up Your Pogoplug Device 3. Back Up a. Backing Up Your Computers b. Backing Up Your Mobile

More information

GOOGLE SITES CREATION GUIDE

GOOGLE SITES CREATION GUIDE GOOGLE SITES CREATION GUIDE ABSTRACT This paper is short creation guide for Google Sites. It summarizes few steps which user has to take to successfully create and configure his/her own website with Google

More information

Mobile Configuration Profiles for ios Devices Technical Note

Mobile Configuration Profiles for ios Devices Technical Note Mobile Configuration Profiles for ios Devices Technical Note Mobile Configuration Profiles for ios Devices Technical Note December 10, 2013 04-502-197517-20131210 Copyright 2013 Fortinet, Inc. All rights

More information

How Much Space? New SkyDrive accounts offer 7GB of cloud storage. Older users of the service were able to reclaim more free space (25 GB).

How Much Space? New SkyDrive accounts offer 7GB of cloud storage. Older users of the service were able to reclaim more free space (25 GB). What is SkyDrive? The short answer is that SkyDrive is a free service offered by Microsoft to host files in the cloud. SkyDrive also allows you to store, sync, and share files with other people and devices

More information

Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013

Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013 Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013 Todays Discussion Overview of Computer and Internet Security What is Computer and Internet Security Who Should

More information

WatchDox for Windows User Guide. Version 3.9.0

WatchDox for Windows User Guide. Version 3.9.0 Version 3.9.0 Notice Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals or

More information

Builder 2.0 Guide and Walkthrough

Builder 2.0 Guide and Walkthrough Builder 2.0 Guide and Walkthrough Getting Started Get started with Builder 2.0 by logging in to the application via your Facebook. Once you have logged into the application, the main dashboard will appear.

More information

CTERA Agent for Mac OS-X

CTERA Agent for Mac OS-X User Guide CTERA Agent for Mac OS-X September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve.

Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve. Quick Start Guide DocuSign Retrieve 3.2.2 Published April 2015 Overview DocuSign Retrieve is a windows-based tool that "retrieves" envelopes, documents, and data from DocuSign for use in external systems.

More information

OneDrive Using Office Documents

OneDrive Using Office Documents OneDrive Using Office Documents OneDrive is your personal cloud storage. It also provides you with Microsoft s Office Web Apps so you can create or edit documents in the cloud, all from your browser. Contents

More information

Skype for Business. User Guide. Contents

Skype for Business. User Guide. Contents Skype for Business User Guide Contents What is Skype for Business... 2 Accessing Skype for Business... 2 Starting Skype for Business for the first time... 2 Subsequent access to Skype for Business... 3

More information

Configuration Guide BES12. Version 12.1

Configuration Guide BES12. Version 12.1 Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...

More information

2 EVIDENCE MOBILE APPLICATION... 2

2 EVIDENCE MOBILE APPLICATION... 2 EVIDENCE MOBILE APPLICATION QUICKSTART GUIDE TABLE OF CONTENTS 1 OVERVIEW... 2 2 EVIDENCE MOBILE APPLICATION... 2 2.1 INSTALLATION... 2 2.2 EVIDENCE CAPTURE... 3 2.2.1 RECORD AUDIO... 4 2.2.2 CLICK PHOTOS...

More information

Cloud Administration Guide for Service Cloud. August 2015 E65820-01

Cloud Administration Guide for Service Cloud. August 2015 E65820-01 Cloud Administration Guide for Service Cloud August 2015 E65820-01 Table of Contents Introduction 4 How does Policy Automation work with Oracle Service Cloud? 4 For Customers 4 For Employees 4 Prerequisites

More information

Massey University Wireless Network Client Configuration Mac OS X 10.6 10.9

Massey University Wireless Network Client Configuration Mac OS X 10.6 10.9 Massey University Wireless Network Client Configuration Mac OS X 10.6 10.9 MAC wireless network Requirements Information Technology Services You must have an active Massey username and password (i.e. you

More information

Amazon WorkMail. User Guide Version 1.0

Amazon WorkMail. User Guide Version 1.0 Amazon WorkMail User Guide Amazon WorkMail: User Guide Copyright 2016 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection

More information

Iomega EZ Media and Backup Center User Guide

Iomega EZ Media and Backup Center User Guide Iomega EZ Media and Backup Center User Guide Table of Contents Setting up Your Device... 1 Setup Overview... 1 Set up My Iomega StorCenter If It's Not Discovered... 2 Discovering with Iomega Storage Manager...

More information

Getting started with OneDrive

Getting started with OneDrive Getting started with OneDrive What is OneDrive? OneDrive is an online storage area intended for business purposes. Your OneDrive library is managed by the University. You can use it to share documents

More information

Reducing Usage on a Service Plan

Reducing Usage on a Service Plan Reducing Usage on a Service Plan When purchasing a service plan you should carefully choose your data allowances based on the amount you estimate for business or personal use. However, people rarely account

More information

CTERA Agent for Linux

CTERA Agent for Linux User Guide CTERA Agent for Linux September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

ShareLink 200 Setup Guide

ShareLink 200 Setup Guide ShareLink 00 Setup Guide This guide provides instructions for installing and connecting the Extron ShareLink 00. The ShareLink USB 00 Wireless Collaboration Gateway allows anyone to present content from

More information

File Share Navigator Online 1

File Share Navigator Online 1 File Share Navigator Online 1 User Guide Service Pack 3 Issued November 2015 Table of Contents What s New in this Guide... 4 About File Share Navigator Online... 5 Components of File Share Navigator Online...

More information