RWC4YD3S723QRVHHHIZWJXPTQMO6GKEQR

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "RWC4YD3S723QRVHHHIZWJXPTQMO6GKEQR"

Transcription

1 Try it now: We have setup a Sync folder in the BitTorrent office that contains 1.1GB of BitTorrent Featured Content. You are welcome to sync with it by using the following secret key: RWC4YD3S723QRVHHHIZWJXPTQMO6GKEQR Getting started 1. Install BitTorrent Sync on the devices you want to sync 2. Choose a folder that you want to synchronize and generate a secret for that folder on one of the devices. The secret is random and unique, and functions like a key that connects multiple devices into one sync network. 3. On the other devices, choose a folder to sync and enter the same secret. 4. Leave BitTorrent Sync running on all devices you want to keep in sync 5. Manage your sync folders at any time via the application interface on Windows and Mac, or via the WebUI and config file on Linux. Choosing folders BitTorrent Sync allows you to synchronize any number of folders and files of any size. To add a new folder to Sync, at the bottom of the Folders tab, click on the + button (Mac) or Add button (Windows). Choose any folder on your computer or external drive (note that you need to have proper permissions to modify the folder). If the folder doesn t exist, you can create a new folder anywhere on your computer.

2 Generating/Using a Secret Folders that sync are connected by a common secret--a private key that is unique for every sync folder. If you initiate a sync network, click Generate to create a new secret. This secret must be then entered on all the devices you want to sync. If you are joining a sync network, enter an existing secret that someone has shared with you.

3 If you need to find the secret later on, it can be found by right-clicking on the folder in the Folders tab, and copying it to the clipboard, or looking on the advanced tab in folder preferences..

4 One-way synchronization If you want to sync information from your computer only (and not the other way round), you can do it using a read-only secret. Use case? The read-only secret can be found by right-clicking on the folder in the Folders tab, opening folder preferences, and clicking on the Advanced tab. Any device setup using the read-only key will be fully synced, but no changes will ever be copied back to the original device. You can use read-only secret in combination with the master secret depending on what type of access you are willing to grant to other devices. Devices with read-only secrets cannot generate their own secrets for a folder. One-Time Key (secret) For security reasons, you may not want to publish a master secret. In this case you can create a one-time key that can be used only once and expires after 24 hours. This can either be a full access or a read-only

5 key that is created on the base of the master secret. After the one-time key is entered, the device will receive a permanent full access or read-only secret for the sync network. Application Preferences You can set your preferences for the application in the Preferences tab in the main window. Here you can change the name of your computer as it is shown on other devices, configure updates and notifications, change the listening port and map it using UPnP, as well as set limits for total upload and download speeds.

6 Folder preferences Apart from changing settings for the whole app, BitTorrent Sync lets you fine-tune preferences for each folder. They can be accessed by double or right click on a folder in the Folders tab. General Tab BitTorrent Sync is preconfigured to ensure best performance, but feel free to change settings according to your needs: The relay server is used only when it is impossible to connect to other devices directly due to NAT issues. The tracker server facilitates communication and discovery between devices. Delete Files to Sync trash saves all the files deleted on other clients to a hidden.synctrash folder. If you uncheck this option, deleted files will be moved to system Trash\Recycle Bin (depending on your OS). Use predefined hosts is an option to specify ip:port or host:port of known clients. This way, if one of your devices has a static and accessible IP, peers can connect to it directly.

7 Advanced Tab Advanced folder preferences is the place where you can copy, change or generate new secrets for your sync folder. Secret is a 32-character master key for connecting folders. All the folders added with this secret will be granted a full set of permissions for two-way synchronization. The master secret can be changed at any time or replaced with a custom Base64 string more than 40 symbols long (any change to the folder secret needs to be re-entered on all the devices in the sync network). Read only secret is generated on the basis of the master secret and is used for one-way synchronization. Any folder with the read-only secret will be fully synced, but changes made in the folder will never be synced back to the original device. It is also not possible to manage secrets for the folder if access to the folder is granted by a read-only secret. One-time secret/key is a security option available for the folders operated by a master secret. You can generate either a full access or read only short key (16 characters) which can be used only once and should be activated within a limited period of 24 hours. When connected, a folder added with a one-time secret will receive a permanent master or read-only secret from the device where the one-time secret was generated. Linux and NAS WebUI WebUI is the default way of accessing BitTorrent Sync. It can be reached at YourLocalIP:8888/gui You can manage both general and folder preferences via WebUI the same way as from a desktop application. –°onfig File Config file offers a slightly wider variety of options to configure. It is a JSON format file.

8 1. Get a sample config by running --dump-sample-config. You ll see a list of options and commentary. 2. Save config file to any desired location. For example, to save it to the current directory, run:./bittorrent Sync --dump-sample-config > sync.conf 3. Customize the settings and run BitTorrent Sync with the modified config. For example, if your config file is in the same directory with BitTorrent Sync, run:./bittorrent Sync --config sync.conf Before running BitTorrent Sync with config file, make sure it is a valid JSON. Otherwise, you ll get an error message. Frequently Asked Questions (FAQ) Can other BitTorrent users see my shared files? No. BitTorrent Sync is based on BitTorrent protocol, but all the traffic is encrypted using a private key derived from the shared secret. Your files can be viewed and received only by the people with whom you share your private secret. What is a Secret and how does it work? A secret is a key that connects different devices and joins them together. We automatically generate secrets to ensure their uniqueness. Since each secret is 32 characters long, it is virtually impossible for the same secret to be automatically generated in two separate instances. After a folder is added to BitTorrent Sync, the Secret is stored in its advanced preferences and can be accessed by double or right click on a folder in the Folders tab. There are 3 types of secrets: master (full access) secret, read only Secret for one-way sync and one-time secrets (both full access and read-only). Read only and one-time secrets may be generated only for folders operated by master secrets. If you are concerned about security, BitTorrent Sync provides opportunity to regularly generate new

9 Secrets for a folder, or replace an existing secret with your own Base64 string more than 40 characters long. The new folder Secret should be re-entered on all the devices in sync. What happens if a file is deleted or changed on one of the devices? Files deleted from a sync folder on your computer are handled depending on your OS preferences (moved to Trash/Recycle Bin/similar folders or deleted completely). On the other syncing devices these files will be moved to the.synctrash in their sync folders (.SyncTrash is hidden by default). What if several people make changes to the same file? When a file is changed on one of the devices, it will be recreated as a new copy and synced to the other devices. We save only the latest version of the file. What if files with same names are added from different computers? If several users add a file with the same name, BitTorrent Sync saves only the file that was added last. What happens when I remove folder from BitTorrent Sync? If a folder is removed from BitTorrent Sync, all the synced files stay there; incomplete files with the.! sync extension will be deleted. Does BitTorrent Sync support versioning? Currently versioning is not available. We are planning to add it in the future versions. Is one-way synchronization possible? Yes, starting from the version BitTorrent Sync features one-way synchronization. It is established via read only secret (permanent or one-time). Any folder with a read-only secret will be fully synced, but changes made in this folder will not be synced back. Do I have an option to ignore some files during sync? If you have files in your sync folder that you don t want BitTorrent Sync to track, you can use.syncignore..syncignore is a UTF-8 encoded.txt file that helps you specify single files, paths and rules for ignoring during the synchronization job. It supports? and * wildcard symbols. Note that.syncignore is applied only to the folder where it is contained and will not work with the files that have already been synced. If you add indexed files to.syncignore, they will be deleted on other syncing devices. In order to avoid this: 1. Quit BitTorrent Sync or remove the folder from sync on all the devices. 2. Modify.SyncIgnore file on all of them so that it contains same info. 3. Run BitTorrent Sync or re-add the modified folders.

10 Technology Secret The secret is a randomly generated 21-byte key. It is Base32-encoded in order to be readable by humans. BitTorrent Sync uses dev/random (Mac, Linux) and Crypto API (Windows) in order to produce a completely random string. This authentication approach is significantly stronger than a login/password combination used by other services. That's why using a secret generated by BitTorrent Sync is very safe and secure. If you want even more security, BitTorrent Sync gives you a way to use a custom secret of any length you want. Just create your own secret of any length, encode it with Base64, and enter in the secret field for BitTorrent Sync. Servers Sync is the first synchronization tool that can run completely without servers or inside your LAN without any internet access. However there are cases when servers help and we are going to describe such cases below: Peer Discovery In order to find proper peers that have the same secret, Sync uses: Local peer discovery. All peers inside local network are discovered by sending broadcast packets. If there are peers with the same secret they respond to the broadcast message and connect. Peer exchange (PEX). When two peers are connected, they exchange information about other peers they know. Known hosts in folder settings. If you have a known host with a static ip:port, you can specify this in Sync client, so that it connects to the peer using this information. DHT. Sync uses DHT to distribute information about itself and obtain the information about other peers with this secret. Sync sends SHA2(Secret):ip:port to DHT to announce itself and will get a list of peers by asking DHT for the following key SHA2(Secret) BitTorrent tracker. BitTorrent has a specific tracker server that helps peers discover each other. It also sees combination of SHA2(secret):ip:port and just helps peers connect directly. Another application of BitTorrent tracker is as a STUN server to do a NAT traversal for peers. It helps peers tbehind NAT to establish direct connection. This can t be done by DHT, so even if peers can talk to DHT, they won t be able to talk directly. We do recommend that you use a tracker server rather than DHT for the reasons of faster response and NAT traversal, so peers with higher probability could talk directly.

11 Relay Server There are rare cases when peers can t talk directly. This usually happens when devices are in an office behind good firewalls. In such a case BitTorrent provides a relay server to route traffic between peers. All traffic is AES encrypted with your Secret, so there is not even a theoretical chance for us to see anything inside. You could opt out of this, but it could introduce (=result in?) the case when peers won t be able to talk to each other. As you can see, BitTorrent Sync offers a lot of configuration options to make sure you achieve what you need. Default Sync settings are based on our extensive experience in networking and p2p and are best suitable for the majority of cases. Platforms At the moment BitTorrent Sync works on Windows, Mac and Linux devices that meet the following system requirements: Mac OS X Snow Leopard or later Windows XP SP3 or later Linux with kernel (glibs 2.4) or newer on ARM/PPC/i386/x86_64 You can install our app on Network Attached Storages (NAS) running on Linux with ARM, PowerPC, i386 and x86_64 architecture. In the future releases we plan to add versions for the most popular mobile platforms. P2P Protocol BitTorrent Sync synchronizes your files using a peer-to-peer (P2P) protocol. This protocol is very effective for transferring large files across multiple devices, and is very similar to the powerful protocol used by applications like µtorrent and BitTorrent. The data is transferred in pieces from each of the syncing devices, and BitTorrent Sync chooses the optimal algorithm to make sure you have a maximum download and upload speed during the process. The devices you setup to sync are connected directly using UDP, NAT traversal and UPnP port mapping. We also provide such additional methods of ensuring connectivity as relay and tracker servers. If your devices are on the same local network, BitTorrent Sync will use your LAN for faster synchronization. Security BitTorrent Sync was designed with privacy and security in mind. All the traffic between devices is encrypted with AES cypher and a 256-bit key created on the base of the secret a random string (20 bytes or more) that is unique for every folder.

12 It s our priority to make sure that nobody has unauthorized access to your folders. That s why there are no 3rd party servers involved when syncing your files. All the files are stored only on your trusted devices, controlled and managed solely by you. For the same reason we provide you with an agile way of managing secrets. You can regularly change them and invite people by sharing a one-time secret instead of distributing a permanent one.

Sync Security and Privacy Brief

Sync Security and Privacy Brief Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical

More information

Gladinet Cloud Backup V3.0 User Guide

Gladinet Cloud Backup V3.0 User Guide Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet

More information

ReadyNAS Remote White Paper. NETGEAR May 2010

ReadyNAS Remote White Paper. NETGEAR May 2010 ReadyNAS Remote White Paper NETGEAR May 2010 Table of Contents Overview... 3 Architecture... 3 Security... 4 Remote Firewall... 5 Performance... 5 Overview ReadyNAS Remote is a software application that

More information

FAQ. How does the new Big Bend Backup (powered by Keepit) work?

FAQ. How does the new Big Bend Backup (powered by Keepit) work? FAQ How does the new Big Bend Backup (powered by Keepit) work? Once you establish which of the folders on your hard drive you ll be backing up, you ll log into myaccount.bigbend.net and from your control

More information

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway Fireware How To VPN How do I set up a manual branch office VPN tunnel? Introduction You use Branch Office VPN (BOVPN) with manual IPSec to make encrypted tunnels between a Firebox and a second IPSec-compliant

More information

ReadyNAS Remote. User Manual. June 2013 202-11078-03. 350 East Plumeria Drive San Jose, CA 95134 USA

ReadyNAS Remote. User Manual. June 2013 202-11078-03. 350 East Plumeria Drive San Jose, CA 95134 USA User Manual June 2013 202-11078-03 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting this NETGEAR product. After installing your device, locate the serial number on the label

More information

Bit Chat: A Peer-to-Peer Instant Messenger

Bit Chat: A Peer-to-Peer Instant Messenger Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare shreyas@technitium.com https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one

More information

LogMeIn Hamachi. Getting Started Guide

LogMeIn Hamachi. Getting Started Guide LogMeIn Hamachi Getting Started Guide Contents What Is LogMeIn Hamachi?...3 Who Should Use LogMeIn Hamachi?...3 The LogMeIn Hamachi Client...4 About the Relationship Between the Client and Your LogMeIn

More information

Parallels Plesk Panel

Parallels Plesk Panel Parallels Plesk Panel Copyright Notice ISBN: N/A Parallels 660 SW 39th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2009, Parallels, Inc.

More information

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols

More information

Using Opensource VPN Clients with Firetunnel

Using Opensource VPN Clients with Firetunnel This document describes how to use VPN Clients. Since the number of VPN Tunnels using PPTP is limited to 4, this is your way to connect up to 10 parallel tunnels using VPN/IPSEC technology. The method

More information

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W Article ID: 5037 Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W Objective IPSec VPN (Virtual Private Network) enables you to securely obtain remote resources by establishing

More information

FileCruiser. User Portal Guide

FileCruiser. User Portal Guide FileCruiser User Portal Guide FileCruiser Product Manual Contents Contents Getting Started with FileCruiser 1 Using the FileCruiser Agent 2 Desktop Shortcut 2 Log in to FileCruiser Agent 3 Using the FileCruiser

More information

Creating client-server setup with multiple clients

Creating client-server setup with multiple clients Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application

More information

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation User Guide for OpenDrive Application v1.6.0.4 for MS Windows Platform 20150430 April 2015 Table of Contents Installation 4 Standard Installation Unattended Installation Installation (cont.) 5 Unattended

More information

Parallels Plesk Panel. VPN Module for Parallels Plesk Panel 10 for Linux/Unix Administrator's Guide. Revision 1.0

Parallels Plesk Panel. VPN Module for Parallels Plesk Panel 10 for Linux/Unix Administrator's Guide. Revision 1.0 Parallels Plesk Panel VPN Module for Parallels Plesk Panel 10 for Linux/Unix Administrator's Guide Revision 1.0 Copyright Notice Parallels Holdings, Ltd. c/o Parallels International GMbH Vordergasse 49

More information

Configuring the BIG-IP and Check Point VPN-1 /FireWall-1

Configuring the BIG-IP and Check Point VPN-1 /FireWall-1 Configuring the BIG-IP and Check Point VPN-1 /FireWall-1 Introducing the BIG-IP and Check Point VPN-1/FireWall-1 LB, HALB, VPN, and ELA configurations Configuring the BIG-IP and Check Point FireWall-1

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions Share Drive Frequently Asked Questions Table of Contents How do I change my password?... How do I reset my password if I forgot it?... How do I share files/folders with Groups

More information

Remote Administration

Remote Administration Contents Preparing The Server 2 Firewall Considerations 3 Performing Remote Administration 4 Additional Notes 5 Mobile Application Administration 6 Managing Users In The iphone App 8 Maxum Development

More information

Simple, Secure User Guide for OpenDrive Drive Application v1.2.0.4 for OS-X Platform 20150501 May 2015

Simple, Secure User Guide for OpenDrive Drive Application v1.2.0.4 for OS-X Platform 20150501 May 2015 Simple, Secure User Guide for OpenDrive Drive Application v1.2.0.4 for OS-X Platform 20150501 May 2015 Table of Contents Logging into the Drive Application 4 Log In Sign Up Access the Drive Application

More information

802.1X Client Software

802.1X Client Software 802.1X Client Software REV1.0.0 1910011339 COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Other brands and product

More information

Seagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts

Seagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts Seagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts Seagate NAS OS 4 Reviewers Guide 2 Purpose of this guide Experience the most common use cases for the product, learn about

More information

VPN Configuration Guide. Dell SonicWALL

VPN Configuration Guide. Dell SonicWALL VPN Configuration Guide Dell SonicWALL 2013 equinux AG and equinux USA, Inc. All rights reserved. Under copyright law, this manual may not be copied, in whole or in part, without the written consent of

More information

Configuring the WT-4 for ftp (Ad-hoc Mode)

Configuring the WT-4 for ftp (Ad-hoc Mode) En Configuring the WT-4 for ftp (Ad-hoc Mode) Windows XP Introduction This document provides basic instructions on configuring the WT-4 wireless transmitter and a Windows XP Professional SP2 ftp server

More information

Manual - BoxCryptor for ios 1.3

Manual - BoxCryptor for ios 1.3 Manual - BoxCryptor for ios 1.3 1 Table of Content 1. Scope of Service... 3 1.1 About BoxCryptor... 3 1.2 About this manual... 4 2. Installing BoxCryptor for ios... 5 3. Basic functionality... 5 3.1. Setting

More information

Meet Drive. Find your files easily with Drive, and keep all your documents safe and secure.

Meet Drive. Find your files easily with Drive, and keep all your documents safe and secure. Meet Drive With Google Drive, you can store your files in the cloud, share them with your team members or external partners, and access the files from anywhere. Find your files easily with Drive, and keep

More information

How to Install a Network-Licensed Version of IBM SPSS Statistics 19

How to Install a Network-Licensed Version of IBM SPSS Statistics 19 How to Install a Network-Licensed Version of IBM SPSS Statistics 19 Important: IBM SPSS Statistics 19 requires either Windows XP Professional or later. IBM SPSS Statistics 19 installs from a DVD and your

More information

1. Scope of Service. 1.1 About Boxcryptor Classic

1. Scope of Service. 1.1 About Boxcryptor Classic Manual for Mac OS X Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 4 2. Installation... 5 2.1 Installing Boxcryptor Classic... 5 2.2 Licensing Boxcryptor Classic

More information

How To Configure L2TP VPN Connection for MAC OS X client

How To Configure L2TP VPN Connection for MAC OS X client How To Configure L2TP VPN Connection for MAC OS X client How To Configure L2TP VPN Connection for MAC OS X client Applicable Version: 10.00 onwards Overview Layer 2 Tunnelling Protocol (L2TP) can be used

More information

Client applications are available for PC and Mac computers and ios and Android mobile devices. Internet

Client applications are available for PC and Mac computers and ios and Android mobile devices. Internet Introduction to OpenVPN 1 - Introduction to OpenVPN The AN-300-RT-4L2W router features a built-in OpenVPN server for secure, easily configured access to the network from the Internet using devices with

More information

IHS owncloud: IHS Sync Storage

IHS owncloud: IHS Sync Storage IHS owncloud: IHS Sync Storage The secure and convenient alternative to Dropbox et al. Why IHS owncloud? Large storage space for increased productivity: IHS users have access to 15 GB of IHS owncloud file

More information

Daylite Server Admin Guide (Dec 09, 2011)

Daylite Server Admin Guide (Dec 09, 2011) Daylite Server Admin Guide (Dec 09, 2011) Table of contents Objective 3 Audience 3 Overview 4 Setting up the Daylite Server Admin 5 Database Security 16 Further reading 19 Help and other resources 21 2

More information

Egnyte for Power and Standard Users. User Guide

Egnyte for Power and Standard Users. User Guide Egnyte for Power and Standard Users User Guide Egnyte Inc. 1350 West Middlefield Road. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) Revised June 2015 Table of Contents Chapter 1: Getting

More information

Global Knowledge MEA Remote Labs. Remote Lab Access Procedure

Global Knowledge MEA Remote Labs. Remote Lab Access Procedure Global Knowledge MEA Remote Labs Remote Lab Access Procedure Contents 1. Overview... 3 2. Student Workstation Requirements... 3 2.1. Windows Platforms... 3 2.2. Apple Platforms... 3 2.3. Linux Platforms...

More information

MS Windows DHCP Server Configuration

MS Windows DHCP Server Configuration MS Windows DHCP Server Configuration Abstract This document describes how to configure option 43 on a Microsoft Windows 2000/2003 DHCP server. This information may be used in an Aruba Networks solution

More information

How to install and set up the WinSCP software for Secure File Transfer

How to install and set up the WinSCP software for Secure File Transfer How to install and set up the WinSCP software for Secure File Transfer WinSCP FTP client is free and easy to use. If you have another secure FTP client you may use it and simply configure it to match the

More information

Virtual Workplace Personal Device Client Installation Instructions

Virtual Workplace Personal Device Client Installation Instructions Virtual Workplace Personal Device Client Installation Instructions 1 Table of Contents About this Installation Guide... 2 Client Overview... 2 VMware Horizon View Clients... 2 UniPrint Clients... 3 Client

More information

RLM Server Guide. For Macintosh and Windows

RLM Server Guide. For Macintosh and Windows RLM Server Guide For Macintosh and Windows Gene Codes Corporation 775 Technology Drive, Ann Arbor, MI 48108 USA 1.800.497.4939 (USA) +1.734.769.7249 (elsewhere) +1.734.769.7074 (fax) www.genecodes.com

More information

Web+Center Version 7.x Windows Quick Install Guide 2 Tech Free Version Rev March 7, 2012

Web+Center Version 7.x Windows Quick Install Guide 2 Tech Free Version Rev March 7, 2012 Web+Center Version 7.x Windows Quick Install Guide 2 Tech Free Version Rev March 7, 2012 1996-2012 Internet Software Sciences Welcome to the Web+Center Installation and Configuration guide. This document

More information

Frequently Asked Questions

Frequently Asked Questions Maxum Development Corp. Rumpus launches fine, but users can t connect. What should I do? By far the most common problem people have when getting started with Rumpus is not with Rumpus at all, but in setting

More information

IBackup Drive User Guide

IBackup Drive User Guide IBackup Drive User Guide TABLE OF CONTENTS Introduction... 3 Features... 4 Install IBackup Drive... 5 Login to IBackup Drive... 5 About Main Screen... 7 Settings... 8 Toolbar Options... 11 IBackup Drive

More information

GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007

GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007 GREEN HOUSE DATA Built right. Just for you. E-Mail Services Guide greenhousedata.com 1 Green House Data 340 Progress Circle Cheyenne, WY 82007 Table of Contents Getting Started on Business Class Email

More information

The full setup includes the server itself, the server control panel, Firebird Database Server, and three sample applications with source code.

The full setup includes the server itself, the server control panel, Firebird Database Server, and three sample applications with source code. Content Introduction... 2 Data Access Server Control Panel... 2 Running the Sample Client Applications... 4 Sample Applications Code... 7 Server Side Objects... 8 Sample Usage of Server Side Objects...

More information

Andover Continuum. Network Security Configuration Guide

Andover Continuum. Network Security Configuration Guide Andover Continuum Network Security Configuration Guide 2010, Schneider Electric All Rights Reserved No part of this publication may be reproduced, read or stored in a retrieval system, or transmitted,

More information

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20 Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup

More information

FileCruiser. Desktop Agent Guide

FileCruiser. Desktop Agent Guide FileCruiser Desktop Agent Guide FileCruiser Desktop Agent Guide Contents Contents Getting Started with FileCruiser 1 Using the FileCruiser Agent 2 Desktop Shortcut 2 Log in to FileCruiser Agent 3 Using

More information

Open Directory. Contents. Before You Start 2. Configuring Rumpus 3. Testing Accessible Directory Service Access 4. Specifying Home Folders 4

Open Directory. Contents. Before You Start 2. Configuring Rumpus 3. Testing Accessible Directory Service Access 4. Specifying Home Folders 4 Contents Before You Start 2 Configuring Rumpus 3 Testing Accessible Directory Service Access 4 Specifying Home Folders 4 Open Directory Groups 6 Maxum Development Corp. Before You Start Open Directory

More information

CDUfiles User Guide. Chapter 1: Accessing your data with CDUfiles. Sign In. CDUfiles User Guide Page 1. Here are the first steps to using CDUfiles.

CDUfiles User Guide. Chapter 1: Accessing your data with CDUfiles. Sign In. CDUfiles User Guide Page 1. Here are the first steps to using CDUfiles. CDUfiles User Guide Chapter 1: Accessing your data with CDUfiles Here are the first steps to using CDUfiles. Sign In Open your web browser and enter cdufiles.cdu.edu.au or Note: Use cdufiles.egnyte.com

More information

Preparing for GO!Enterprise MDM On-Demand Service

Preparing for GO!Enterprise MDM On-Demand Service Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules

More information

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home. Remote Desktop Gateway Accessing a Campus Managed Device (Windows Only) from home. Contents Introduction... 2 Quick Reference... 2 Gateway Setup - Windows Desktop... 3 Gateway Setup Windows App... 4 Gateway

More information

Agency Pre Migration Tasks

Agency Pre Migration Tasks Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required

More information

Back to My Mac User s Guide

Back to My Mac User s Guide Back to My Mac User s Guide This guide will show you how to access a remote Leopard or Snow Leopard based Mac, Time Capsule, or external hard disk connected to an AirPort Extreme Base Station over the

More information

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client. WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard

More information

Made Easy Windows Sync App Tutorial

Made Easy Windows Sync App Tutorial Investor Storage Newsletter Made Easy Windows Sync App Tutorial The aim of this tutorial is simply to demonstrate how to set up Synchronization using the Storage Made Easy Sync App that is installed as

More information

Addonics T E C H N O L O G I E S. NAS Adapter. Model: NASU2. 1.0 Key Features

Addonics T E C H N O L O G I E S. NAS Adapter. Model: NASU2. 1.0 Key Features 1.0 Key Features Addonics T E C H N O L O G I E S NAS Adapter Model: NASU2 User Manual Convert any USB 2.0 / 1.1 mass storage device into a Network Attached Storage device Great for adding Addonics Storage

More information

Chapter 8 Advanced Configuration

Chapter 8 Advanced Configuration Chapter 8 Advanced Configuration This chapter describes how to configure the advanced features of your ProSafe 802.11g Wireless VPN Firewall FVG318. Configuring Dynamic DNS If your network has a permanently

More information

Ciphermail Gateway PDF Encryption Setup Guide

Ciphermail Gateway PDF Encryption Setup Guide CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway PDF Encryption Setup Guide March 6, 2014, Rev: 5454 Copyright c 2008-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Portal 4 3 PDF encryption

More information

How to install and use the File Sharing Outlook Plugin

How to install and use the File Sharing Outlook Plugin How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.

More information

SNMP Proxy Agent 2014

SNMP Proxy Agent 2014 MG-SOFT Corporation SNMP Proxy Agent 2014 USER MANUAL (Document Version: 3.2) Document published on 29-September-2014 Copyright 2007-2014 MG-SOFT Corporation Introduction In order to improve the design

More information

SecuRemote for Windows 32/64-bit

SecuRemote for Windows 32/64-bit SecuRemote for Windows 32/64-bit E75.30 User Guide 13 September 2012 Classification: [Protected] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Configuring the WT-4 for Upload to a Computer (Infrastructure Mode)

Configuring the WT-4 for Upload to a Computer (Infrastructure Mode) En Configuring the WT-4 for Upload to a Computer (Infrastructure Mode) Windows XP This document provides basic instructions on configuring the WT-4 wireless transmitter and a Windows XP Professional SP2

More information

USER GUIDE. General Information... 2. The BeAnywhere Service... 2. BeAnywhere Server... 2. BeAnywhere DRIVE... 2. Security... 2

USER GUIDE. General Information... 2. The BeAnywhere Service... 2. BeAnywhere Server... 2. BeAnywhere DRIVE... 2. Security... 2 USER GUIDE TABLE OF CONTENTS General Information... 2 The BeAnywhere Service... 2 BeAnywhere Server... 2 BeAnywhere DRIVE... 2 Security... 2 Level 1 User Security... 3 Level 2 Communications Security...

More information

Using the Synchronization Client

Using the Synchronization Client Using the Synchronization Client The owncloud Desktop Client remains in the background and is visible as an icon in the system tray (Windows, KDE), status bar (Mac OS X), or notification area (Linux).

More information

IONU BETA USER MANUAL IONU Security, Inc.

IONU BETA USER MANUAL IONU Security, Inc. 2014 IONU BETA USER MANUAL IONU Security, Inc. Contents IONU Solution Intro... 3 Account Installation Process... 4 Account Creation - Windows... 5 Inviting Others... 6 IONU Secure File System... 7 Storage

More information

Establishing a VPN tunnel to CNet CWR-854 VPN router using WinXP IPSec client

Establishing a VPN tunnel to CNet CWR-854 VPN router using WinXP IPSec client Establishing a VPN tunnel to CNet CWR-854 VPN router using WinXP IPSec client Generally speaking, remote users need to use a VPN client software for establishing a VPN connection to their home/work router

More information

Overview. Author: Seth Scardefield Updated 11/11/2013

Overview. Author: Seth Scardefield Updated 11/11/2013 Author: Seth Scardefield Updated 11/11/2013 Yealink IP Phone OpenVPN Guide This guide will walk you through configuring an OpenVPN server instance in pfsense to allow Yealink IP Phones (T26P, T28P, T32G,

More information

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Configuring SonicWALL TSA on Citrix and Terminal Services Servers Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,

More information

Setting Up Your FTP Server

Setting Up Your FTP Server Requirements:! A computer dedicated to FTP server only! Linksys router! TCP/IP internet connection Steps: Getting Started Configure Static IP on the FTP Server Computer: Setting Up Your FTP Server 1. This

More information

User s Manual. Copyright 2010 Vantec Thermal Technologies. All Rights Reserved.

User s Manual. Copyright 2010 Vantec Thermal Technologies. All Rights Reserved. Copyright 2010 Vantec Thermal Technologies. All Rights Reserved. User s Manual Package Contents: 1 NextStar FX Gigabit NAS Adapter x1 2 AC Adapter x1 3 Installation Guide x1 4 Rubber Feet x4 5 User s CD

More information

Mac OS VPN Set Up Guide

Mac OS VPN Set Up Guide Mac OS VPN Set Up Guide If internet traffic is not being sent over the VPN then go to System Preferences- >Network and click on your VPN connection. Click the "Advanced..." button, and in the "Options"

More information

NETASQ SSO Agent Installation and deployment

NETASQ SSO Agent Installation and deployment NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user

More information

Crystal Quality Business Optimization System Installation Guide

Crystal Quality Business Optimization System Installation Guide Crystal Quality Business Optimization System Installation Guide Crystal Quality Installation Crystal quality has a fully automated installation package that install all the needed softwares and components.

More information

How to configure your Desktop Computer and Mobile Devices post migrating to Microsoft Office 365

How to configure your Desktop Computer and Mobile Devices post migrating to Microsoft Office 365 How to configure your Desktop Computer and Mobile Devices post migrating to Microsoft Office 365 1 Contents Purpose... 3 Office 365 Mail Connections... 3 Finding IMAP server... 3 Desktop computers... 4

More information

From Centralization to Distribution: A Comparison of File Sharing Protocols

From Centralization to Distribution: A Comparison of File Sharing Protocols From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015

More information

Installation, Setup, & Uninstall Guide Virtual TimeClock 15 Network Edition for Mac

Installation, Setup, & Uninstall Guide Virtual TimeClock 15 Network Edition for Mac Virtual TimeClock Installation, Setup, & Uninstall Guide Virtual TimeClock 15 Network Edition for Mac Overview This guide will help you quickly install, configure, and if needed, uninstall Virtual TimeClock

More information

WatchDox for Windows. User Guide. Version 3.9.5

WatchDox for Windows. User Guide. Version 3.9.5 WatchDox for Windows User Guide Version 3.9.5 Notice Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to

More information

Copyright 2005 Danware Data A/S. Portions used under license from third parties. All rights reserved. Document revision: 2005252 Please send comments

Copyright 2005 Danware Data A/S. Portions used under license from third parties. All rights reserved. Document revision: 2005252 Please send comments Copyright 2005 Danware Data A/S. Portions used under license from third parties. All rights reserved. Document revision: 2005252 Please send comments to: Danware Data A/S Bregnerodvej 127 DK-3460 Birkerod

More information

Table of Contents. Part 1 Hotspot setup guide. Antamedia Hotspot Manual. Contents Requirements 2 Pre-installation

Table of Contents. Part 1 Hotspot setup guide. Antamedia Hotspot Manual. Contents Requirements 2 Pre-installation Contents Table of Contents Part 1 1... 1 1 Requirements... 3 2 Pre-installation steps... 7 3 Windows Server... 7 Configuring DHCP service on Windows 2008... 12 Configuring Routing on Windows 2008... 18

More information

WatchDox for Mac User Guide

WatchDox for Mac User Guide WatchDox for Mac User Guide Version 2.3.0 Confidentiality This document contains confidential material that is proprietary to WatchDox. The information and ideas herein may not be disclosed to any unauthorized

More information

Cloud Backup Express

Cloud Backup Express Cloud Backup Express Table of Contents Installation and Configuration Workflow for RFCBx... 3 Cloud Management Console Installation Guide for Windows... 4 1: Run the Installer... 4 2: Choose Your Language...

More information

EveryonePrint. Mobile Gateway 4.1. Installation Guide. EveryonePrint Mobile Gateway Installation Guide Page 1 of 27

EveryonePrint. Mobile Gateway 4.1. Installation Guide. EveryonePrint Mobile Gateway Installation Guide Page 1 of 27 EveryonePrint Mobile Gateway 4.1 Installation Guide EveryonePrint Mobile Gateway Installation Guide 2016.03.30 Page 1 of 27 1. Introduction... 3 1.1 Multiple networks (using Multicast Bonjour AirPrint)...

More information

WatchDox for Windows User Guide. Version 3.9.0

WatchDox for Windows User Guide. Version 3.9.0 Version 3.9.0 Notice Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals or

More information

Live Maps. for System Center Operations Manager 2007 R2 v6.2.1. Installation Guide

Live Maps. for System Center Operations Manager 2007 R2 v6.2.1. Installation Guide Live Maps for System Center Operations Manager 2007 R2 v6.2.1 Installation Guide CONTENTS Contents... 2 Introduction... 4 About This Guide... 4 Supported Products... 4 Understanding Live Maps... 4 Live

More information

Presto User s Manual. Collobos Software Version 1.6. 2014 Collobos Software, Inc http://www.collobos.com

Presto User s Manual. Collobos Software Version 1.6. 2014 Collobos Software, Inc http://www.collobos.com Presto User s Manual Collobos Software Version 1.6 2014 Collobos Software, Inc http://www.collobos.com Welcome To Presto 3 System Requirements 3 How It Works 4 Presto Service 4 Presto 4 Printers 5 Virtual

More information

Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216

Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216 Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216 2013 TeamDrive Systems GmbH Page 1 Table of Contents 1 Starting TeamDrive for Android for the First

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

Bell Business Backup Getting Started Guide. You do the work. We ll back it up. Automatically.

Bell Business Backup Getting Started Guide. You do the work. We ll back it up. Automatically. Bell Business Backup Getting Started Guide You do the work. We ll back it up. Automatically. Getting Started Guide Introduction...2 Minimum System Requirements...3 STEP 1: Downloading the software...4

More information

Configuring the WT-4 for ftp (Infrastructure Mode)

Configuring the WT-4 for ftp (Infrastructure Mode) Introduction En Configuring the WT-4 for ftp (Infrastructure Mode) This document provides basic instructions on configuring the WT-4 wireless transmitter and a ftp server for transmission over an infrastructure

More information

Help. F-Secure Online Backup

Help. F-Secure Online Backup Help F-Secure Online Backup F-Secure Online Backup Help... 3 Introduction... 3 What is F-Secure Online Backup?... 3 How does the program work?... 3 Using the service for the first time... 3 Activating

More information

SATO Network Interface Card Configuration Instructions

SATO Network Interface Card Configuration Instructions SATO Network Interface Card Configuration Instructions Table of Contents Section Page 1. Reset of wired/wireless interface card 3 2. Installing the All-In-One Utility 4 3. Installing the Admin Manager

More information

WINDOWS 7 & HOMEGROUP

WINDOWS 7 & HOMEGROUP WINDOWS 7 & HOMEGROUP SHARING WITH WINDOWS XP, WINDOWS VISTA & OTHER OPERATING SYSTEMS Abstract The purpose of this white paper is to explain how your computers that are running previous versions of Windows

More information

Synchronization Agent Configuration Guide

Synchronization Agent Configuration Guide SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012476-001, Revision A Release Date July 2014 Trademarks All intellectual property

More information

Securepoint Security Systems

Securepoint Security Systems HowTo: VPN with OpenVPN, certificates and OpenVPN-GUI Securepoint Security Systems Version 2007nx Release 3 Contents 1 Configuration on the appliance... 4 1.1 Setting up network objects... 4 1.2 Creating

More information

Windows Firewall Configuration with Group Policy for SyAM System Client Installation

Windows Firewall Configuration with Group Policy for SyAM System Client Installation with Group Policy for SyAM System Client Installation SyAM System Client can be deployed to systems on your network using SyAM Management Utilities. If Windows Firewall is enabled on target systems, it

More information

How To Set Up Dataprotect

How To Set Up Dataprotect How To Set Up Dataprotect This document will show you how to install and configure your computer for a Typical installation. If you have questions about configuring a Custom installation please contact

More information

Configuring Infoblox DHCP

Configuring Infoblox DHCP Copyright 2008 Sophos Group. All rights reserved. No part of this publication may be reproduced, stored in retrieval system, or transmitted, in any form or by any means electronic, mechanical, photocopying,

More information

Signiant Agent installation

Signiant Agent installation Signiant Agent installation Release 11.3.0 March 2015 ABSTRACT Guidelines to install the Signiant Agent software for the WCPApp. The following instructions are adapted from the Signiant original documentation

More information

SecureVault Online Backup Service FAQ

SecureVault Online Backup Service FAQ SecureVault Online Backup Service FAQ C0110 SecureVault FAQ (EN) - 1 - Rev. 19-Nov-2007 Table of Contents 1. General 4 Q1. Can I exchange the client type between SecureVault PC Backup Manager and SecureVault

More information