Protect Your Online Footprint. HINTS & TIPS provided by MWR InfoSecurity and the Data Baby project

Size: px
Start display at page:

Download "Protect Your Online Footprint. HINTS & TIPS provided by MWR InfoSecurity and the Data Baby project"

Transcription

1 HINTS & TIPS provided by MWR InfoSecurity and the Data Baby project

2 Logging on is now one of the first things we do every day. And every time we do, we leave a trace, often without giving a thought to the information left in our trail. In most cases, we are unaware that someone, somewhere is taking our information, processing it, and using it. For example, you browse online for a product. Two days later, you visit a completely different website, and an advert pops up for the product you were searching for two days ago. How is this possible? Websites have developed new ways to identify their users, and behavioural marketing firms are coming up with new ways to use that data. In order to track the online footprint of the typical online user, MWR InfoSecurity and the Data Baby project are looking at the digital activity of Rebecca Taylor, a 27 year old Londoner who likes travelling, photography, music, fashion and uses all popular social networks. However, Rebecca does not exist. In reality, she is a laptop controlled by a team of journalists and guided by the personality type they have mapped out. She is the Data Baby project - a virtual identity of which every trace can be tracked and forensically analysed. Periodically, the Rebecca laptop is sent to MWR InfoSecurity, who analyse the information it has sent and received. A picture is building up of where the Data Baby s information is going, who is processing it, and how that is affecting Rebecca s online experience. Any data posted or sent online can in theory be accessed forever, and when MWR InfoSecurity and the Data Baby team analysed Rebecca s online activities after just a few months of virtual life, they found out that it was possible to determine what she likes, where she is, who her friends are and who she s. mwrinfosecurity.com 2/5

3 After the Prism / NSA scandal put online privacy back in the headlines, MWR InfoSecurity and the Data Baby project has compiled a series of hints and tips to help you browse privately and protect your identity. Protect your location Dongles/Mobile Devices Social Networks Wireless Networks Photos Protect your preferences Protect your personal information in Social Media Protect your identity Protect your friends Protect your personal documents Disable Location Services Turn off the where I am functionality Disable the GeoTagging functionality Make browser history private Do not use third party apps Turn off facial recognition software Hide your list of friends Encrypt your data stored in the cloud Protect your location - A proxy server requests information from another server on behalf of the users; it basically acts as the middleman. For example, we would send the data to the proxy, the proxy would connect to Facebook and send us the information back. In this way, Facebook will think that our IP* address is the IP belonging to the proxy. There are different third party options that can be used to connect through a proxy server: Virtual Private Network: You can use a third party such as to anonymously encrypt your internet activity from snooping eyes. However, you would still need to trust the third party not to track your connections. Website based proxies: Sites such as can provide you with software or web-based functionalities that use proxies around the world to provide you with anonymous access to web sites. Stand alone proxy servers: Configure your browser to route traffic through a proxy in the Internet, using one of the following types: Anonymous proxy: It will hide your IP address Distorting Proxy: It hides your IP by placing an incorrect IP address in the HTTP headers. High Anonymity Proxy: It will hide your IP address and it will not identify itself as a proxy making even more difficult to track. If you use any of the options above you will have to trust that the third party providing the service will not collect any tracking information. * An IP address is the numerical label assigned to each device (e.g., computer, printer) that is connected to a computer network that uses the Internet Protocol for communication. mwrinfosecurity.com 3/5

4 A solution for this is to use networks such as Tor ( which will prevent websites from tracking your physical location or what websites you have visited. Tor uses several proxy servers and works in a way that every proxy in the path will know just the addresses of the previous and the next proxy, therefore protecting and hiding what you send to where. Dongles/Mobile Devices Disable Location Services Using a dongle or a mobile device could expose your exact location if you allow the device to share location information. For example, when accessing Facebook with GPS turned on, the device will know your whereabouts. Social Networks Turn off the where I am functionality Social networks often offer a where I am functionality that will show your location when posting something. The best way of avoiding this is to go to your profile settings and remove this feature if possible. The best option to avoid this kind of data to be included in your photos is to turn off the GeoTagging functionality or, alternatively, when using social media sites you can remove the metadata before uploading a photo. Sites such as Facebook, Instagram, Flickr and Twitter remove it automatically but, for example, Google+ does not. However, software such as BatchPurifier can be used for this. Protect your preferences Make browser history private You can turn on the private or incognito mode available in most browsers which will delete cookies sent by websites and all other tracking info when closing the browser. Even though pages will still be able to analyse your behaviour while browsing, the information from previous sessions will be removed from your browser. Protect your personal information in Social Media Do not use third party apps and set your profile to private Each application will ask for certain permissions when you install them such as accessing your profile, your friend list or your posts and pictures. Some apps can even access your information when you are not using them once you have installed them in your profile. Make sure to restrict access to your personal information, your profile and if possible, avoid using third party applications. Wireless Networks Wireless networks will not help in avoiding tracking. In fact, on some occasions the position of wireless access will be known, including street address. To avoid being tracked in a Wi-Fi network you can use Tor or any of the options proxy server options available. Photos Disable the GeoTagging functionality Some advanced cameras and smartphones, including the iphone, will include metadata in the digital photo file, which is information such as copyright, contact information or details of the camera used. The metadata in the pictures may include as well the GPS position where the photo was taken, which is a feature called GeoTagging. mwrinfosecurity.com 4/5

5 Protect your identity Turn off facial recognition software Facebook s facial recognition software automatically identifies the faces of friends in uploaded photos, which would mean that the company is able to identify what you look like. It has been banned under EU law, but Facebook said it hopes to reintroduce it in the future. To turn it off simply do the following: 1. Click at the top right of any Facebook page and choose Account Settings 2. Click Timeline and Tagging from the left-hand column 3. Under the How can I manage tags people add and tagging suggestions? section, click Who sees tag suggestions when photos that look like you are uploaded? 4. Select your preference from the dropdown menu You can also add to this by turning on the feature in which you have to accept a tag before it is posted in your timeline. Protect your friends Hide your list of friends In your Facebook profile anyone can have access to your list of friends and see who you are connected with. To hide this simply go to your timeline profile, look where your list of friends is, put the mouse over it and a pencil like icon will appear, click on it and select edit privacy. There you can select there who is allowed see your friend list. Protect your personal documents Encrypt your data stored in the cloud If you are going to save your documents somewhere out of your control, for example icloud or Dropbox, then you should consider protecting them with encryption. There are different ways to do this, with each offering a different level of protection. A simple way would be to use software such as Microsoft Office to add a password to your most sensitive documents or to zip your files and protect them with a password. There are other options available for more technically aware users, including software such as Pretty Good Privacy (PGP) or GNU Privacy Guard (GnuPG). This software can offer an extra level of privacy for your files but always consider that if you lose the password or the key to your files, you may not be able to get them back. mwrinfosecurity.com 5/5

User Guide FOR TOSHIBA STORAGE PLACE

User Guide FOR TOSHIBA STORAGE PLACE User Guide FOR TOSHIBA STORAGE PLACE (This page left blank for 2-sided "book" printing.) Table of Contents Overview... 5 System Requirements... 5 Storage Place Interfaces... 5 Getting Started... 6 Using

More information

Facebook Smart Card FB 121211_1800

Facebook Smart Card FB 121211_1800 Facebook Smart Card FB 121211_1800 Social Networks - Do s and Don ts Only establish and maintain connections with people you know and trust. Review your connections often. Assume that ANYONE can see any

More information

Neat Cloud Service + Mobile App

Neat Cloud Service + Mobile App Getting Started with Neat Cloud Service + Mobile App Neat transforms paper and electronic documents into organized digital files that are easy to find, use, and share. Neat Cloud Service and Mobile App

More information

Foxit MobilePDF for ios Quick Guide

Foxit MobilePDF for ios Quick Guide for ios 1 Contents Chapter 1 Description... 3 Chapter 2 Main Menu... 5 Chapter 3 File Management... 7 Chapter 4 Viewing PDF Files... 8 Chapter 5 Annotation... 13 Chapter 6 Signatures... 18 Chapter 7 Text

More information

cbox YOUR FILES GO MOBILE! FOR ANDROID SMARTPHONES AND TABLETS USER MANUAL

cbox YOUR FILES GO MOBILE! FOR ANDROID SMARTPHONES AND TABLETS USER MANUAL cbox YOUR FILES GO MOBILE! FOR ANDROID SMARTPHONES AND TABLETS USER MANUAL Introduction cbox is a software that you can easily install on your computer. Once done, an online storage drive cbox appears

More information

Practical Demonstration of Using the Internet Cloud for Backup USING SKY DRIVE, DROP BOX, SUGARSYNC OR

Practical Demonstration of Using the Internet Cloud for Backup USING SKY DRIVE, DROP BOX, SUGARSYNC OR Practical Demonstration of Using the Internet Cloud for Backup USING SKY DRIVE, DROP BOX, SUGARSYNC OR GLADINET Internet Traffic Beware if your ISP has a cap on the maximum downloads in your monthly agreement

More information

ReadyNAS Remote. User Manual. June 2013 202-11078-03. 350 East Plumeria Drive San Jose, CA 95134 USA

ReadyNAS Remote. User Manual. June 2013 202-11078-03. 350 East Plumeria Drive San Jose, CA 95134 USA User Manual June 2013 202-11078-03 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting this NETGEAR product. After installing your device, locate the serial number on the label

More information

Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216

Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216 Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216 2013 TeamDrive Systems GmbH Page 1 Table of Contents 1 Starting TeamDrive for Android for the First

More information

Leonardo Hotels Group Page 1

Leonardo Hotels Group Page 1 Privacy Policy The Leonardo Hotels Group, represented by Sunflower Management GmbH & Co.KG, respects the right to privacy of every individual who access and navigate our website. Leonardo Hotels takes

More information

91.527 - Human Computer Interaction Final Project Tutorial. Hardware Inventory Management System (HIMS) By M. Michael Nourai

91.527 - Human Computer Interaction Final Project Tutorial. Hardware Inventory Management System (HIMS) By M. Michael Nourai 91.527 - Human Computer Interaction Final Project Tutorial Hardware Inventory Management System (HIMS) By Table of Contents Introduction... 3 Running HIMS... 3 Successful Login to HIMS... 4 HIMS Main Screen...

More information

LEARNING RESOURCE CENTRE. Guide to Microsoft Office Online and One Drive

LEARNING RESOURCE CENTRE. Guide to Microsoft Office Online and One Drive LEARNING RESOURCE CENTRE Guide to Microsoft Office Online and One Drive LEARNING RESOURCE CENTRE JULY 2015 Table of Contents Microsoft Office Online... 3 How to create folders... 6 How to change the document

More information

Creating a User Profile for Outlook 2013

Creating a User Profile for Outlook 2013 Creating a User Profile for Outlook 2013 This document tells you how to create a user profile for Outlook 2013 on your computer (also known as the Outlook client). This is necessary, for example, when

More information

Eucalyptus 3.4.2 User Console Guide

Eucalyptus 3.4.2 User Console Guide Eucalyptus 3.4.2 User Console Guide 2014-02-23 Eucalyptus Systems Eucalyptus Contents 2 Contents User Console Overview...4 Install the Eucalyptus User Console...5 Install on Centos / RHEL 6.3...5 Configure

More information

Web Connect Guide HL-L9200CDW HL-L9200CDWT DCP-L8400CDN MFC-L8600CDW MFC-L8850CDW MFC-L9550CDW

Web Connect Guide HL-L9200CDW HL-L9200CDWT DCP-L8400CDN MFC-L8600CDW MFC-L8850CDW MFC-L9550CDW Web Connect Guide HL-L9200CDW HL-L9200CDWT DCP-L8400CDN MFC-L8600CDW MFC-L8850CDW MFC-L9550CDW Before You Use Your Brother Machine Applicable Models Definitions of Notes Trademarks Important Note Applicable

More information

Hiding Tracks on the Net

Hiding Tracks on the Net Hiding Tracks on the Net Ways one might hide their tracks Private Browsing Anonymizers & Proxy Servers SSL / TLS Passwords False Information Public Networks Email Services Encryption Firewalls Private

More information

ICONICS Using the Azure Cloud Connector

ICONICS Using the Azure Cloud Connector Description: Guide to use the Azure Cloud Connector General Requirement: Valid account for Azure, including Cloud Service, SQL Azure and Azure Storage. Introduction Cloud Connector is a FrameWorX Server

More information

App Operating Instructions Manual ES File Explorer

App Operating Instructions Manual ES File Explorer App Operating Instructions Manual ES File Explorer 2013/5 ES File Explorer (for Android only) In addition to managing local / shared / FTP / and Bluetooth file folders, you can also directly manage a variety

More information

CRESTRON-APP-ANDROID Control App for Android

CRESTRON-APP-ANDROID Control App for Android 1 Introduction The app from Crestron provides a Smart Graphics touch screen user interface on Android devices. Fully integrated with Crestron programming software including Crestron Studio, VT Pro-e, and

More information

alison@libraryfreedomproject.org

alison@libraryfreedomproject.org PRIVACY TOOLKIT FOR LIBRARIANS alison@libraryfreedomproject.org libraryfreedomproject.org/resources/privacy-toolkit-for-librarians/ THREAT MODELING assets adversaries capabilities consequences how much

More information

Privacy Policy Version 1.0, 1 st of May 2016

Privacy Policy Version 1.0, 1 st of May 2016 Privacy Policy Version 1.0, 1 st of May 2016 THIS PRIVACY POLICY APPLIES TO PERSONAL INFORMATION COLLECTED BY GOCIETY SOLUTIONS FROM USERS OF THE GOCIETY SOLUTIONS APPLICATIONS (GoLivePhone and GoLiveAssist)

More information

1- Using Bonafeyed as a guest

1- Using Bonafeyed as a guest User Manual 1- Using Bonafeyed as a guest 2- Registering 3- Signing in 4- Browsing Facebook through Bonafeyed 5- Encrypting posts, comments and messages while browsing Facebook 6- Sending/receiving encrypted

More information

Introduction to Cloud Storage GOOGLE DRIVE

Introduction to Cloud Storage GOOGLE DRIVE Introduction to Cloud Storage What is Cloud Storage? Cloud computing is one method to store and access data over the internet instead of using a physical hard drive (e.g. computer s hard drive, flash drive,

More information

PaperStream Connect. Setup Guide. Version 1.0.0.0. Copyright Fujitsu

PaperStream Connect. Setup Guide. Version 1.0.0.0. Copyright Fujitsu PaperStream Connect Setup Guide Version 1.0.0.0 Copyright Fujitsu 2014 Contents Introduction to PaperStream Connect... 2 Setting up PaperStream Capture to Release to Cloud Services... 3 Selecting a Cloud

More information

ASUS WebStorage Client-based for Windows [Advanced] User Manual

ASUS WebStorage Client-based for Windows [Advanced] User Manual ASUS WebStorage Client-based for Windows [Advanced] User Manual 1 Welcome to ASUS WebStorage, your personal cloud space Our function panel will help you better understand ASUS WebStorage services. The

More information

Foxit MobilePDF Business for ios Quick Guide

Foxit MobilePDF Business for ios Quick Guide for ios 1 Contents Foxit MobilePDF Business Chapter 1 Description... 3 Chapter 2 Main Menu... 5 Chapter 3 File Management... 6 Chapter 4 Viewing PDF Files... 7 Chapter 5 Annotation... 11 Chapter 6 Signatures...

More information

Xerox Mobile Link 2.0 Frequently Asked Questions (FAQ) - Android

Xerox Mobile Link 2.0 Frequently Asked Questions (FAQ) - Android Xerox Mobile Link 2.0 Frequently Asked Questions (FAQ) - Android Xerox Mobile Link is a personal productivity app that connects your mobile phone and tablet to a Xerox Multifunction Printer (MFP). You

More information

Frequently Asked Questions for logging in to Online Banking

Frequently Asked Questions for logging in to Online Banking Frequently Asked Questions for logging in to Online Banking Why don t I recognize any of the phone numbers on the Secure Code page? I can t remember my password; can I reset it myself? I know I have the

More information

Canvio Home FAQ. is designed to be very easy to install and use to back up, share, and remotely access the files from your computers.

Canvio Home FAQ. is designed to be very easy to install and use to back up, share, and remotely access the files from your computers. What is a Canvio Home device? Canvio Home is a Network-Attached Storage device that is designed to be very easy to install and use to back up, share, and remotely access the files from your computers.

More information

Egnyte for Power and Standard Users. User Guide

Egnyte for Power and Standard Users. User Guide Egnyte for Power and Standard Users User Guide Egnyte Inc. 1350 West Middlefield Road. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) Revised June 2015 Table of Contents Chapter 1: Getting

More information

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES CONTENTS About Tools4ever... 3 About Deloitte Risk Services... 3 HelloID... 4 Microsoft Azure... 5 HelloID Security Architecture... 6 Scenarios... 8 SAML Identity Provider (IDP)... 8 Service Provider SAML

More information

INTRODUCTION TO CLOUD STORAGE

INTRODUCTION TO CLOUD STORAGE University of North Carolina at Chapel Hill Libraries Carrboro Cybrary Chapel Hill Public Library Durham County Public Library INTRODUCTION TO CLOUD STORAGE GETTING STARTED PAGE 02 Class Overview What

More information

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual Overview GadgetTrak Mobile Security is an advanced software application designed to assist in the recovery of your mobile

More information

NAVY COMMAND PRINCIPAL SECURITY ADVISOR RECOMMENDED FACEBOOK SECURITY SETTINGS

NAVY COMMAND PRINCIPAL SECURITY ADVISOR RECOMMENDED FACEBOOK SECURITY SETTINGS NAVY COMMAND PRINCIPAL SECURITY ADVISOR RECOMMENDED FACEBOOK SECURITY SETTINGS NC PSyA Recommended Facebook Settings - October 2014 1 Introduction 3 Privacy Shortcuts 3 Privacy Settings and Tools 6 General

More information

End User Manual. SharePoint. Please send feedback or suggestions for updates to the following email address IT.Training@lse.ac.uk

End User Manual. SharePoint. Please send feedback or suggestions for updates to the following email address IT.Training@lse.ac.uk SharePoint End User Manual Please send feedback or suggestions for updates to the following email address IT.Training@lse.ac.uk London School of Economics & Political Science 1 02/12/2014/lse.ac.uk/IMT/training

More information

How to use the Cloud

How to use the Cloud How to use the Cloud Intro You may have heard advertisements, articles, or tech savvy people talk about the cloud and didn t know what that meant. Have no fear, we re here to teach you. Sometimes the cloud

More information

Cisco Events Mobile Application

Cisco Events Mobile Application Welcome to the new free Cisco Events mobile application! Using this tool, participants can: Connect with peers and Cisco representatives attending an event virtually or onsite Earn points towards exclusive

More information

A Guide to Mobile Security For Citizen Journalists

A Guide to Mobile Security For Citizen Journalists A Guide to Mobile Security For Citizen Journalists Your Citizen journalism, and with it the rise of alternative media voices, is one of the most exciting possibilities for mobile phones in activism. Mobile

More information

Blogging. Wordpress.com Weebly.com Penzu.com Blog.com Wix.com Blogger

Blogging. Wordpress.com Weebly.com Penzu.com Blog.com Wix.com Blogger Blogging What is Blogging? A Blog is a website containing a writer's or group of writers' own experiences, observations, opinions, etc., and often having images and links to other websites. Blog is short

More information

CRESTRON-APP/CRESTRON-APP-PAD

CRESTRON-APP/CRESTRON-APP-PAD 1 3 Introduction The free version of the app has limitations on the size and complexity of the project. For complete functionality, upgrade to the Pro version via an in-app purchase. The CRESTRON-APP and

More information

PDF Expert for ipad User guide

PDF Expert for ipad User guide PDF Expert for ipad User guide 2011 Readdle Inc. 2 Contents Introduction Chapter 1: Copying documents to PDF Expert USB file transfer using itunes File Sharing Saving attachments from Mail and other ipad

More information

Mobile Print/Scan Guide for Brother iprint&scan

Mobile Print/Scan Guide for Brother iprint&scan Mobile Print/Scan Guide for Brother iprint&scan Version K ENG Definitions of notes We use the following note style throughout this user s guide: specifies the operating environment, conditions for installation,

More information

IST 195 Laboratory Session 8 - Privacy

IST 195 Laboratory Session 8 - Privacy IST 195 Laboratory Session 8 - Privacy In this lab, students will be asked to access a web-based content management cloud storage system. As learned in class, cloud computing is that allows files to be

More information

How Much Space? New SkyDrive accounts offer 7GB of cloud storage. Older users of the service were able to reclaim more free space (25 GB).

How Much Space? New SkyDrive accounts offer 7GB of cloud storage. Older users of the service were able to reclaim more free space (25 GB). What is SkyDrive? The short answer is that SkyDrive is a free service offered by Microsoft to host files in the cloud. SkyDrive also allows you to store, sync, and share files with other people and devices

More information

Creating a Client-To-Site VPN. BT Cloud Compute. The power to build your own cloud solutions to serve your specific business needs.

Creating a Client-To-Site VPN. BT Cloud Compute. The power to build your own cloud solutions to serve your specific business needs. Creating a Client-To-Site VPN BT Cloud Compute The power to build your own cloud solutions to serve your specific business needs Issue 2 Introduction This guide is intended to demonstrate how easy it is

More information

IIT MOBILEPRINT. Mobileprint Workflow

IIT MOBILEPRINT. Mobileprint Workflow IIT MOBILEPRINT Mobileprint integrates with existing OTS printing system to enable user to print documents, images and email messages using email client or a web capable devices. This include smartphones,

More information

Password Depot for Android

Password Depot for Android Password Depot for Android Table Of Contents Table Of Contents... 2 User interface... 3 Action Bar... 3 Overflow Menu... 4 Entry menu... 5 Context Bar... 6 Settings... 7 Creating a password file... 8 Opening

More information

WELCOME TO CITUS CLOUD LOAD TEST

WELCOME TO CITUS CLOUD LOAD TEST USER S GUIDE CONTENTS Contents... 2 Chapter 1: Welcome to Citus Cloud Load Test... 3 1. What is Citus Cloud Load Test?... 3 2. Why Citus Cloud Load Test?... 3 3. Before using this guide... 3 Chapter 2:

More information

Windows 8 Hacks O'REILLY* Preston Gralla. Beijing. Cambridge Famham. Koln Sebastopol Tokyo

Windows 8 Hacks O'REILLY* Preston Gralla. Beijing. Cambridge Famham. Koln Sebastopol Tokyo Windows 8 Hacks Preston Gralla Beijing Cambridge Famham O'REILLY* Koln Sebastopol Tokyo Table of Contents Preface vii 1. Setup and Startup Hacks 1 Hack 01. Disable Windows 8's Lock Screen 1 Hack 02. Hack

More information

Shentel (Shentel.net)

Shentel (Shentel.net) Shentel (Shentel.net) Email Quick Start Guide Your new webmail is now powered by Contents If you are forwarding your Shentel.net email to a third party address...2 If you use an email program other than

More information

Sophos Mobile Control as a Service Startup guide. Product version: 3.5

Sophos Mobile Control as a Service Startup guide. Product version: 3.5 Sophos Mobile Control as a Service Startup guide Product version: 3.5 Document date: August 2013 Contents 1 About this guide...3 2 What are the key steps?...4 3 First login...5 4 Change your administrator

More information

Safe internet for business use: Getting Started Guide

Safe internet for business use: Getting Started Guide Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial

More information

Egnyte App for Android Quick Start Guide

Egnyte App for Android Quick Start Guide Egnyte App for Android Quick Start Guide Introduction Welcome to the Quick Start Guide for the Egnyte App for Android. This guide will explain how to: Access files. Download content for offline access.

More information

Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app

Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app Instructions for Configuring Your Browser Settings and Online Security FAQ s ios8 Settings for iphone and ipad app General Settings The following browser settings and plug-ins are required to properly

More information

Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve.

Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve. Quick Start Guide DocuSign Retrieve 3.2.2 Published April 2015 Overview DocuSign Retrieve is a windows-based tool that "retrieves" envelopes, documents, and data from DocuSign for use in external systems.

More information

Get In, Get Unpacked, Get Connected.

Get In, Get Unpacked, Get Connected. Corporate Information & Computing Services. Get In, Get Unpacked, Get Connected. WELCOME to your New Home and to Unlimited Free Internet Welcome to your new university accommodation and to unlimited free

More information

Using the owncloud Android App

Using the owncloud Android App Using the owncloud Android App Accessing your files on your owncloud server via the Web interface is easy and convenient, as you can use any Web browser on any operating system without installing special

More information

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0 Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...

More information

Student BYOD - Olathe Public Schools

Student BYOD - Olathe Public Schools Student BYOD - Olathe Public Schools Connecting a Personally-Owned Device to the District s Wireless Network Students may attach ONE personal electronic device to the Olathe Public Schools wireless network

More information

Adding Receipts to your Certify Wallet

Adding Receipts to your Certify Wallet Adding Receipts to your Certify Wallet Log into Certify using your full Bowdoin College email address and your password. If you have forgotten your password click on the "Lost Password Wizard" from the

More information

Safe internet: Getting Started Guide

Safe internet: Getting Started Guide Safe internet: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial Configuration

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

Internet and Email Help. Table of Contents:

Internet and Email Help. Table of Contents: Internet and Email Help The following tips are provided to assist you in troubleshooting and managing your Plex Internet and email services. For additional issues or concerns, you may also call our Product

More information

DroboAccess User Manual

DroboAccess User Manual DroboAccess User Manual Release 8.2 The DroboAccess developers June 02, 2016 CONTENTS 1 DroboAccess 8.2 User Manual Introduction 1 2 Configuration of DroboAccess 8.2 3 2.1 Users, passwords and share management................................

More information

Store & Share Quick Start

Store & Share Quick Start Store & Share Quick Start What is Store & Share? Store & Share is a service that allows you to upload all of your content (documents, music, video, executable files) into a centralized cloud storage. You

More information

Education Solutions Development, Inc. APECS Navigation: Business Systems Getting Started Reference Guide

Education Solutions Development, Inc. APECS Navigation: Business Systems Getting Started Reference Guide Education Solutions Development, Inc. APECS Navigation: Business Systems Getting Started Reference Guide March 2013 Education Solutions Development, Inc. What s Inside The information in this reference

More information

Throughout this document, you will be instructed to log in as user Ann, or as user Julia. Log in using the user name assigned to you.

Throughout this document, you will be instructed to log in as user Ann, or as user Julia. Log in using the user name assigned to you. Introduction Oracle Documents Cloud Service (also referred to as "Oracle DOCS ) is a subscription-based file sync and share service available in the Oracle Cloud. It gives your employees a way to easily

More information

Regain Your Privacy on the Internet

Regain Your Privacy on the Internet Regain Your Privacy on the Internet by Boris Loza, PhD, CISSP from SafePatrol Solutions Inc. You'd probably be surprised if you knew what information about yourself is available on the Internet! Do you

More information

Wireless Network Best Practices for General User

Wireless Network Best Practices for General User Wireless Network Best Practices for General User I n Hong Kong, the number of Wi-Fi access points (hotspots) has reached 31,000 in 2015 1. Unfortunately, not all of them are well-protected. In fact, wireless

More information

CRESTRON-APP/CRESTRON-APP-PAD Control App for Apple ios

CRESTRON-APP/CRESTRON-APP-PAD Control App for Apple ios 1 Introduction The Crestron apps CRESTRON-APP and CRESTRON-APP-PAD provide a Smart Graphics touch screen user interface on Apple devices running the ios operating system. CRESTRON-APP can also provide

More information

Chrome OS USER GUIDE

Chrome OS USER GUIDE Chrome OS USER GUIDE Before Reading This Guide This guide describes the general functions of Chrome OS. Some functions may differ depending on the Chrome OS version or the Chromebook model. Copyright c

More information

Departmental (Service) Account Set Up

Departmental (Service) Account Set Up Departmental (Service) Account Set Up Exchange does not offer an exact equivalent to GroupWise proxy. Listed below are different methods of accessing your departmental or service account. All require that

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local

More information

genie app and genie mobile app

genie app and genie mobile app genie app and genie mobile app User Manual 350 East Plumeria Drive San Jose, CA 95134 USA June 2012 202-10933-02 v1.0 2012 NETGEAR, Inc. All rights reserved No part of this publication may be reproduced,

More information

What is the Cloud? Computer Basics Web Apps and the Cloud. Page 1

What is the Cloud? Computer Basics Web Apps and the Cloud. Page 1 Computer Basics Web Apps and the Cloud What is the Cloud? You may have heard people using terms like the cloud, cloud computing, or cloud storage. But what exactly is the cloud? Basically, the cloud is

More information

How to set up your Secure Email in Outlook 2010*

How to set up your Secure Email in Outlook 2010* How to set up your Secure Email in Outlook 2010* This guide is for hosting clients who are hosting their email with us. If you are using a third party email, you should not use these instructions. 1. Open

More information

Configuring Web services

Configuring Web services Configuring Web services (Week 13, Tuesday 11/14/2006) Abdou Illia, Fall 2006 1 Learning Objectives Install Internet Information Services programs Configure FTP sites Configure Web sites 70-216:8 @0-13:16/28:39

More information

Adaptive Business Management Systems Privacy Policy

Adaptive Business Management Systems Privacy Policy Adaptive Business Management Systems Privacy Policy Updated policy: Effective on July 01, 2013 This privacy statement describes how Adaptive Business Management Systems collects and uses the personal information

More information

HomeNet. Gateway User Guide

HomeNet. Gateway User Guide HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do

More information

10/16/2014 STRATEGIES FOR PROTECTING AND MONITORING ONLINE ACTIVITY INITIAL COMMENT SOME STATISTICS

10/16/2014 STRATEGIES FOR PROTECTING AND MONITORING ONLINE ACTIVITY INITIAL COMMENT SOME STATISTICS STRATEGIES FOR PROTECTING AND MONITORING ONLINE ACTIVITY INITIAL COMMENT The main focus tonight is on protecting and monitoring our children. But let s not fool ourselves the temptations are real for us

More information

OneDrive Using Office Documents

OneDrive Using Office Documents OneDrive Using Office Documents OneDrive is your personal cloud storage. It also provides you with Microsoft s Office Web Apps so you can create or edit documents in the cloud, all from your browser. Contents

More information

Builder 2.0 Guide and Walkthrough

Builder 2.0 Guide and Walkthrough Builder 2.0 Guide and Walkthrough Getting Started Get started with Builder 2.0 by logging in to the application via your Facebook. Once you have logged into the application, the main dashboard will appear.

More information

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0 Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...

More information

Mobile Configuration Profiles for ios Devices Technical Note

Mobile Configuration Profiles for ios Devices Technical Note Mobile Configuration Profiles for ios Devices Technical Note Mobile Configuration Profiles for ios Devices Technical Note December 10, 2013 04-502-197517-20131210 Copyright 2013 Fortinet, Inc. All rights

More information

Configuration Guide BES12. Version 12.1

Configuration Guide BES12. Version 12.1 Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...

More information

How to connect? I can't connect to the Internet? Why are certain web pages blocked?

How to connect? I can't connect to the Internet? Why are certain web pages blocked? How to connect? I can't connect to the Internet? Why are certain web pages blocked? Connecting to Coach/Bus WIFI is easy. Turn on your device as usual. Click WIFI detector symbol. Click on Coach/Bus network.

More information

PDF Expert Enterprise User guide

PDF Expert Enterprise User guide PDF Expert Enterprise User guide 2012 Readdle Inc. 2 INTRODUCTION 3 CHAPTER 1: DOCUMENT VIEWING AND MANAGING IN PDF EXPERT ENTERPRISE 4 Reading and working with PDF documents 4 Managing files and folders

More information

Reference Guide TEAM. Pogoplug Team. Reference Guide. 2012 Cloud Engines Inc., All Rights Reserved.

Reference Guide TEAM. Pogoplug Team. Reference Guide. 2012 Cloud Engines Inc., All Rights Reserved. Reference Guide Pogoplug Team Reference Guide Table of Contents Table of Contents 1. What s Included 2. Getting Started 3. Customizing the Pogoplug Interface a. Custom UI b. Custom Domain Name c. Custom

More information

User Guide. You will be presented with a login screen which will ask you for your username and password.

User Guide. You will be presented with a login screen which will ask you for your username and password. User Guide Overview SurfProtect is a real-time web-site filtering system designed to adapt to your particular needs. The main advantage with SurfProtect over many rivals is its unique architecture that

More information

TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY

TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY What is Twitter? Twitter is one of the leading tools for connecting users with bite-sized pieces of information and status updates. Each message

More information

How to Access Coast Wi-Fi

How to Access Coast Wi-Fi How to Access Coast Wi-Fi Below is a summary of the information required to configure your device to connect to the coast-wifi network. For further assistance in configuring your specific device, continue

More information

Brainloop Secure Dataroom Version 8.30. QR Code Scanner Apps for ios Version 1.1 and for Android

Brainloop Secure Dataroom Version 8.30. QR Code Scanner Apps for ios Version 1.1 and for Android Brainloop Secure Dataroom Version 8.30 QR Code Scanner Apps for ios Version 1.1 and for Android Quick Guide Brainloop Secure Dataroom Version 8.30 Copyright Brainloop AG, 2004-2015. All rights reserved.

More information

HTTPS Inspection with Cisco CWS

HTTPS Inspection with Cisco CWS White Paper HTTPS Inspection with Cisco CWS What is HTTPS? Hyper Text Transfer Protocol Secure (HTTPS) is a secure version of the Hyper Text Transfer Protocol (HTTP). It is a combination of HTTP and a

More information

technical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port

technical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port technical brief in HP Overview HP is a powerful webbased software utility for installing, configuring, and managing networkconnected devices. Since it can install and configure devices, it must be able

More information

How To Set Up An Ipa Ez On A Pc Or Mac Or Macbook Or Ipa Or Ipamorade

How To Set Up An Ipa Ez On A Pc Or Mac Or Macbook Or Ipa Or Ipamorade Iomega EZ Media and Backup Center User Guide Table of Contents Setting up Your Device... 1 Setup Overview... 1 Set up My Iomega StorCenter If It's Not Discovered... 2 Discovering with Iomega Storage Manager...

More information

WatchDox for Windows User Guide. Version 3.9.0

WatchDox for Windows User Guide. Version 3.9.0 Version 3.9.0 Notice Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals or

More information

BROWSER TIPS FOR PEOPLESOFT

BROWSER TIPS FOR PEOPLESOFT BROWSER TIPS FOR PEOPLESOFT Please note: This document is designed to be used online and has a number of embedded links to processes and additional information. We discourage the printing of these documents

More information

e-safety for Parents

e-safety for Parents e-safety for Parents Helenswood Academy Published June 2014 1 Contents Introduction 4 The Web 5 Children online 6 Friends of your child 7 Information about your child 8 Ownership of your child s technology

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

Amazon WorkMail. User Guide Version 1.0

Amazon WorkMail. User Guide Version 1.0 Amazon WorkMail User Guide Amazon WorkMail: User Guide Copyright 2016 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection

More information

How to connect? I can't connect to the Internet? I can't send emails from the train? Why are certain web pages blocked?

How to connect? I can't connect to the Internet? I can't send emails from the train? Why are certain web pages blocked? How to connect? I can't connect to the Internet? I can't send emails from the train? Why are certain web pages blocked? Connecting to Irish Rail Wifi is easy. Turn on your device as usual. Click Wifi detector

More information