Remember, this is not specific to your address alone... the METHOD you retrieve your is equally important.

Size: px
Start display at page:

Download "Remember, this is not specific to your email address alone... the METHOD you retrieve your email is equally important."

Transcription

1 Securing Your Skip to Page 2 to Begin or Read this FYI Using Security Certificates: Background and FYI Securing requires the use of a certificate in order to work. Once you sign up for a certificate it lasts one full year and it is easy to renew. Actually setting up the certificate is trivial. The initial registration takes about minutes. Once you have the certificate you will probably never see it or care about it until it is time to renew next year. How it Works How it works is simple. You get a certificate from a trusted third party, much like you receive an ID card from the state. You can then use the certificate to prove you are who you say you are... or in this case, your address is indeed being used by you and not some other person. When you send an , you check off the digital signature button. This sends the certificate in the background to the recipient and their client will read Sender Signed and store your certificate. Once both parties have sent each other a!signed" , encryption is now possible. Remember, this is not specific to your address alone... the METHOD you retrieve your is equally important. Key limitation sacrificed where security is gained: The encrypted s you send CANNOT be opened in a web browser. Encrypted s can only be opened from within a Mail program. It can be Apple Mail, it can be Thunderbird (on the PC) but no more geckomail.ucdavis.edu or my.ucdavis.edu for encrypted messages. This means if you forward your to Yahoo, you cannot read your encrypted messages. However, this is not true for unencrypted s. Unencrypted s can still be read from the browser. Since gmail gives free POP3 (downloading of s to mail programs), gmail will work with this while Yahoo charges for POP3 access. It is not recommended that you forward your to another account. Note: the Apple Mail client is smart enough to not encrypt a message if the recipient doesn"t have a certificate. Meaning that even though your recipient does not have this setup, it is impossible to send an encrypted to a person that he or she could not decrypt. This sounds like a lot but it"s not. It boils down to this: Once you have a certificate, and your recipient has a certificate and you have both corresponded with the Signed button checked, you are given the option to send an encrypted . Once it is sent, it can only be decrypted by a program which can decrypt it. Web browsers cannot open encrypted s. On to the steps... 1

2 Outline: Four Stages to Setup Encryption 1. Create an account on thawte.com 2. Request a certificate. You then wait minutes for Thawte to generate it. 3. Download your certificate. The mac sets it up for you. 4. your common recipients so that everyone gets your certificate, and send encrypted s! Stage 1. Create a user account on thawte.com This is a fairly straightforward process, though longer than most website registrations. You must use Safari for this whole process. Do not use Firefox! 1. In Safari, go to It looks like this to the right: 2. Click on Products in the navigation bar. You get a nice blue menu. 3. Click on Free Personal Certificates 4. The next window looks like this, click Join in the top right area. 5. You next get an agreement page. Click Next to accept their terms and conditions. In summary: the agreement specifies what these certs do, that Thawte is a Certificate Authority not endorsed by the government officially, information is gathered based on trust and not shared, and they are not liable legally. 6. On the next page, enter your Last name, first, birthday and nationality. Then click Next. (Ignore Charset) 7. The next page is titled, Requesting ID Information. Enter your UC Davis address. This will become your account username with Thawte. Then click next. 8. The next page is titled, Personal Preferences. Choose your preferred language (most likely English) and then under Charset Preference choose Use the default for my language. Click next. 9. On the next page entitled Password Setup you should create a password for your Thawte account that you will be able to remember a year from now. 2

3 10.Password Questions. On this page you need to select 5 questions and type in 5 answers. One word answers are the best. If you don"t like the questions, then create your own. The only rule is that there must be 5 questions. Click next. 11.On the next Confirmation page, make sure everything you have entered is correct, then click next. 12.IMPORTANT. You will be sent an that will help you finish the enrollment with Thawte. You MUST complete this step the same day, or it will not be successful. 13.Click on the first link in the Enter the Probe and Ping values by copying and pasting each into the webpage you just loaded. Click next. 15.You should get a confirmation page saying it was a success. Click next. 16.A login window will popup. Fill in your UC Davis address into the Name field, and then enter the password you just created into the password field. Click Log In. You will now be able to request a certificate. On to Stage 2: Requesting a Certificate... 3

4 Stage 2. Requesting a Certificate Follow these steps to request your certificate be generated. 1. You should now be logged in, if so, go to step 2. If not, go to thawte.com and login using the same steps as Stage 1, numbers 1-3, then clicking Login instead of Join. 2. Click Certificates. Then Request a Certificate. Then request an X.509 Format Cert. 3. On the next page, make sure Mozilla Firefox is selected, then click request. 4. The next page is titled configure certificate name. For our purposes we will not have our names verified by a notary. No Employment Information Available should be selected, so click next. 5. You will now get a configure addresses for certificate page. Your address should be checked, then click next. 6. The next page is titled, configure extranet capabilities for certificate. Click Next. 7. On the next page configure X.509v3 cert extensions, accept the Default Extensions by clicking on the first Accept. Do NOT click on configure. 4

5 8. In generate certificate public key make sure 2048 (High Grade) is selected, then click next. 9.On the next page, click finish. 10.You will get an confirming that your request for a certificate has been processed. It takes anywhere from 5-15 minutes for it to be generated by Thawte. You are done with stage 2. When you get a second saying it is ready, go to Stage 3 of this guide. Important: Don!t close your browser windows at any time! On to Stage 3: Downloading Your Certificate... 5

6 Stage 3. Downloading and Installing Your Certificate Once you have requested a certificate, as you did in stage 2, it takes a few minutes before Thawte finishes generating it. 1. You should get an from Thawte when your certificate is ready. It should look something like this: 2. Do NOT click on the link in the . It won!t work! Instead, close the Switch back to Safari, to the larger page you had open. On the left-hand side, click on the link that says view certificate status in red. 4. You should get a list saying one has been issued. Click on the word Navigator. 5. On the next page you will see a button in red that says Fetch. Click it. Safari will download your certificate. 6. When it is done downloading, Safari knows to add it to your keychain. 7. Quit the Keychain Access program by going to the Keychain Access menu, then click Quit. On to Stage 4: Signing Your Messages, and Encrypting Them... 6

7 Stage 4. Signing and Encrypting Messages You now have a certificate installed on your Mac. If you send from this Mac, with your Mail program, you have the ability to send a signed . Believe it or not, it is easy for someone to use your address to send , even without your password. With a certificate you are basically letting your recipient know you are indeed the owner of the address you are sending from. If both ends of communication have a certificate from Thawte setup, and both have corresponded with a digitally-signed message already, one can then encrypt between the two. Here"s how: 1. If your Mail program was open when you setup the certificate, Quit it, then reopen your Mail. When you relaunch if Mail asks for use of your keychain click Always Allow 2. The easiest way for everyone on staff to get a signed message is to the staff listproc. Open a new and your staff listproc or other common addresses. 3.Make sure the seal has a checkmark in it. 4.The difference between checked and not checked is subtle. One is an X while the other is a Check. Make sure it is a check-mark. There are little to no reasons why you would want to send a non-signed message. (Note, this is a digital signature produced by the certificate. It is not the same as your signature line.) 5.Note how next to the badge symbol on its left there is a lock that is grayed out. What this tells you is that you cannot send an encrypted message to this recipient. Either this recipient doesn"t have a certificate, or they have never ed you with a digital certificate. 7

8 6. Once you have made sure the badge has a check-mark in it, you can send an saying you are just setting up your secure Now let"s say we are all setup. If you are sending to a recipient who has their certificate setup, the option for a lock is given. Making sure the lock is locked will ensure the is sent encrypted. 8.Again the difference between encrypted / unencrypted is subtle. The lock on the left is unencrypted. The lock on the right is encrypted. 9.When you receive a message and you want to know if it is encrypted, it shows up in the To section. 10.Whenever you send an encrypted message, it will stay on whatever setting you last did. So, pay attention to your lock when you are sending confidential messages, and make sure it is always locked. 11.If the lock is not available (that is, it is greyed out) then either your recipient has no certificate, or they have not yet sent a signed message. If you send to multiple recipients and even just one of them isn"t set up, encryption is disabled. This system only works if everyone is set up. Paying attention to the lock before you send is crucial. 8 Important: subject lines are NOT encrypted. That!s It. You can now send Encrypted Messages!

E-mail Encryption Guide version 1.2, by Thomas Reed

E-mail Encryption Guide version 1.2, by Thomas Reed E-mail Encryption Guide version 1.2, by Thomas Reed In order for two people to send and receive encrypted e-mails to/from each other, both parties need: An e-mail reader that supports encryption (such

More information

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account?

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account? Contents Page Q. How do I access my email? Q. How do I change or reset a password for an email account? Q. How do I forward or redirect my messages to a different email address? Q. How do I set up an auto-reply

More information

Instructions For Opening UHA Encrypted Email

Instructions For Opening UHA Encrypted Email Receiving Encrypted Email You have received a secure, encrypted message from UHA. The message will contain the following notice and an attachment named SecureMessageAtt.hml. The attachment is shown circled

More information

Alberni Valley IT Services http://www.avits.ca admin@avits.ca. Virtual domain E-mail information.

Alberni Valley IT Services http://www.avits.ca admin@avits.ca. Virtual domain E-mail information. Alberni Valley IT Services http://www.avits.ca admin@avits.ca Virtual domain E-mail information. Welcome! This document outlines information necessary for you to send and receive E-mail for your virtual

More information

Secure e-mail transaction guidelines for external users with Commission personnel.

Secure e-mail transaction guidelines for external users with Commission personnel. Secure e-mail transaction guidelines for external users with Commission personnel. This document describes in general the basic requirements to set up secure (encrypted) e- mail communication between external

More information

From a Finder window choose Applications (shown circled in red) and then double click the Tether icon (shown circled in green).

From a Finder window choose Applications (shown circled in red) and then double click the Tether icon (shown circled in green). From a Finder window choose Applications (shown circled in red) and then double click the Tether icon (shown circled in green). You will be presented with a dialog box asking for you to enter an ad-hoc

More information

How to use encrypted email in the WECI scheme.

How to use encrypted email in the WECI scheme. How to use encrypted email in the WECI scheme. Author: Ben Metcalfe. Intended Audience: Optometrists and practice-based system administrators. Date: 30 th March 2006 Introduction The PEARS scheme relies

More information

This document provides a brief, end-user overview of the Cisco Registered Envelop Service which has been implemented by Sterne Agee.

This document provides a brief, end-user overview of the Cisco Registered Envelop Service which has been implemented by Sterne Agee. Email Encryption User Guide Sterne Agee is committed to the security of your information. We have implemented Cisco Email Encryption to secure email communication so that only you can open it.* Questions?

More information

User guide. Business Email

User guide. Business Email User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook

More information

SECURE EMAIL USER GUIDE OUTLOOK 2000

SECURE EMAIL USER GUIDE OUTLOOK 2000 WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP

More information

mystanwell.com Installing Citrix Client Software Information and Business Systems

mystanwell.com Installing Citrix Client Software Information and Business Systems mystanwell.com Installing Citrix Client Software Information and Business Systems Doc No: 020/12 Revision No: Revision Date: Page: 1 of 16 Contents Overview... 3 1. Microsoft Internet Explorer... 3 2.

More information

How To Sync Google Drive On A Mac Computer With A Gmail Account On A Gcd (For A Student) On A Pc Or Mac Or Mac (For An Older Person) On An Ipad Or Ipad (For Older People) On

How To Sync Google Drive On A Mac Computer With A Gmail Account On A Gcd (For A Student) On A Pc Or Mac Or Mac (For An Older Person) On An Ipad Or Ipad (For Older People) On Installation and Setup of Google Drive for Students on Mac OS X Purpose: This guide will lead you through the Google Drive Installation and Configuration. Pre-requisites: 1) ODU Student Gmail account 2)

More information

E-mail Encryption Recipient Guidelines

E-mail Encryption Recipient Guidelines E-mail Encryption Recipient Guidelines Canadian Western Bank Group Human Resources Department November 1, 2013 This reference guide was developed for training and reference use only. Any discrepancies

More information

Here are the steps to configure Outlook Express for use with Salmar's Zimbra server. Select "Tools" and then "Accounts from the pull down menu.

Here are the steps to configure Outlook Express for use with Salmar's Zimbra server. Select Tools and then Accounts from the pull down menu. Salmar Consulting Inc. Setting up Outlook Express to use Zimbra Marcel Gagné, February 2010 Here are the steps to configure Outlook Express for use with Salmar's Zimbra server. Open Outlook Express. Select

More information

Reading an email sent with Voltage SecureMail. Using the Voltage SecureMail Zero Download Messenger (ZDM)

Reading an email sent with Voltage SecureMail. Using the Voltage SecureMail Zero Download Messenger (ZDM) Reading an email sent with Voltage SecureMail Using the Voltage SecureMail Zero Download Messenger (ZDM) SecureMail is an email protection service developed by Voltage Security, Inc. that provides email

More information

507-214-1000. This information is provided for informational purposes only.

507-214-1000. This information is provided for informational purposes only. 507-214-1000 This information is provided for informational purposes only. The following guide will show you how to set up email in various email programs. The Basic Email settings for all email addresses

More information

Secure Email Client Guide

Secure Email Client Guide PRESIDIO BANK 33 Secure Email Client Guide THE BUSINESS BANK THAT WORKS 8/2013 Table of Contents Introduction.....3 Our Responsibility to Protect Confidential Information....4 Registering and Accessing

More information

UCIT Office of Information Security Standard Operation Procedure: HIPAA Privacy and Security Basics Training

UCIT Office of Information Security Standard Operation Procedure: HIPAA Privacy and Security Basics Training UCIT Office of Information Security Standard Operation Procedure: HIPAA Privacy and Security Basics Training How to Complete HIPAA Training Readership: UC Program Coordinators Summary: Step-by-step procedure

More information

Table of Contents. How to Disable or Partially Disable Pop-up Blockers

Table of Contents. How to Disable or Partially Disable Pop-up Blockers Table of Contents How to Disable or Partially Disable Pop-up Blockers Internet Explorer 8 and 9... 2 Internet Explorer 7... 3 Internet Explorer 6... 4 FireFox 3 and Up for Windows... 5 Firefox 3.0 and

More information

How To Use The Nvcc

How To Use The Nvcc NAHCA Virtual Campus of Care User Guide National Association of Health Care Assistants www.nahcacareforce.org (417)623-6049 Getting Started To start your education in the Virtual Campus of Care you must

More information

DIRECT MESSAGING END USER GUIDE ALABAMA ONE HEALTH RECORD. Unify Data Management Platform 2012/2013 Software Build 5.15

DIRECT MESSAGING END USER GUIDE ALABAMA ONE HEALTH RECORD. Unify Data Management Platform 2012/2013 Software Build 5.15 DIRECT MESSAGING END USER GUIDE ALABAMA ONE HEALTH RECORD Unify Data Management Platform 2012/2013 Software Build 5.15 April 2015 Proprietary and Confidential Property of Truven Health Analytics Inc.

More information

Xythos on Demand Quick Start Guide For Xythos Drive

Xythos on Demand Quick Start Guide For Xythos Drive Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document

More information

Setting up secure e-mail communication with Ericsson. Guideline for Ericsson partners

Setting up secure e-mail communication with Ericsson. Guideline for Ericsson partners Setting up secure e-mail communication with Ericsson Guideline for Ericsson partners In this presentation Introduction Technical prerequisites Getting started Exchanging Public Keys Sending a signed e-mail

More information

A Guide to using egas Lead Applicant

A Guide to using egas Lead Applicant A Guide to using egas Lead Applicant egas Browsers and Browser Settings Logging In Passwords Navigation Principles Your Contact Details Tasks Overview Completing Tasks egas The Health and Care Research

More information

Setting up Channel-21 Secure RSS CEP on

Setting up Channel-21 Secure RSS CEP on Setting up Channel-21 Secure RSS CEP on Important Information About C21 CEP Podcasts itunes iphone / ipad Android Phone/Tablet Demo Videos Important Information about Channel-21 CEP Channel-21 Digital

More information

Portal Recipient Guide

Portal Recipient Guide Portal Recipient Guide Lindenhouse Software Limited 2015 Contents 1 Introduction... 4 2 Account Activation... 4 3 Forgotten Password... 9 4 Document signing... 12 5 Authenticating your Device & Browser...

More information

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac? Enterprise Computing & Service Management How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac? In order to connect remotely to a PC computer from your Mac, we recommend

More information

Recommended Browser Setting for MySBU Portal

Recommended Browser Setting for MySBU Portal The MySBU portal is built using Microsoft s SharePoint technology framework, therefore, for the best viewing experience, Southwest Baptist University recommends the use of Microsoft s Internet Explorer,

More information

How to install and use the File Sharing Outlook Plugin

How to install and use the File Sharing Outlook Plugin How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.

More information

Initial Setup of Mozilla Thunderbird with IMAP for OS X Lion

Initial Setup of Mozilla Thunderbird with IMAP for OS X Lion Initial Setup of Mozilla Thunderbird Concept This document describes the procedures for setting up the Mozilla Thunderbird email client to download messages from Google Mail using Internet Message Access

More information

MICROSOFT OUTLOOK 2011 GETTING STARTED AND HELP RESOURCES

MICROSOFT OUTLOOK 2011 GETTING STARTED AND HELP RESOURCES MICROSOFT OUTLOOK 2011 GETTING STARTED AND HELP RESOURCES Lasted Edited: 2012-07-10 1 Introduction... 4 Getting Started... 4 Tour of the Outlook 2011 Interface... 4 Start Outlook 2011... 5 Configure E-mail

More information

Djigzo S/MIME setup guide

Djigzo S/MIME setup guide Author: Martijn Brinkers Table of Contents...1 Introduction...3 Quick setup...4 Create a CA...4 Fill in the form:...5 Add certificates for internal users...5 Add certificates for external recipients...7

More information

Configuring your email client to connect to your Exchange mailbox

Configuring your email client to connect to your Exchange mailbox Configuring your email client to connect to your Exchange mailbox Contents Use Outlook Web Access (OWA) to access your Exchange mailbox... 2 Use Outlook 2003 to connect to your Exchange mailbox... 3 Add

More information

Initial Setup of Mozilla Thunderbird with IMAP for Windows 7

Initial Setup of Mozilla Thunderbird with IMAP for Windows 7 Initial Setup of Mozilla Thunderbird Concept This document describes the procedures for setting up the Mozilla Thunderbird email client to download messages from Google Mail using Internet Message Access

More information

Personal Secure Email Certificate

Personal Secure Email Certificate Entrust Certificate Services Personal Secure Email Certificate Enrollment Guide Date of Issue: October 2010 Copyright 2010 Entrust. All rights reserved. Entrust is a trademark or a registered trademark

More information

8x8 Click2Pop User Guide

8x8 Click2Pop User Guide USER GUIDE 8x8 User Guide Getting Started with April 2014 Contents Introduction... 3 What s new.... 3 8x8.... 3 Here is how works...4 8x8 Click2Connect.... 4 Requirements.... 4 Installation on Microsoft

More information

Configuring an Email Client to Connect to CASS Mail Servers

Configuring an Email Client to Connect to CASS Mail Servers Configuring an Email Client to Connect to CASS Mail Servers Table of Contents Introduction... 2 Webmail... 2 Settings... 2 Forwarding... 2 Email Client Configuration... 3 Outlook 2003... 3 Outlook 2007...

More information

Steps to Opening Your First Password-Protected Envelope

Steps to Opening Your First Password-Protected Envelope This section provides step-by-step instructions for opening a password-protected Registered Envelope for the first time. The steps demonstrate a typical scenario for a first-time recipient. Some of the

More information

PISA 2015 MS Online School Questionnaire: User s Manual

PISA 2015 MS Online School Questionnaire: User s Manual OECD Programme for International Student Assessment 2015 PISA 2015 MS Online School Questionnaire: User s Manual Doc: CY6_CBA_SCQ_MSPrincipalManual.docx September 2014 Produced by ETS, Core 2 Contractor

More information

Internet E-Mail Encryption S/Mime Standard

Internet E-Mail Encryption S/Mime Standard Internet E-Mail Encryption S/Mime Standard Disclaimer: Successfully setting up encryption functions in most e-mail clients is usually not a problematic task. However, it should be noted that, when configuring

More information

Law School Computing Services User Memo

Law School Computing Services User Memo Law School Computing Services User Memo Accessing and Using Shared No. 37 7/28/2015 Email Accounts in Outlook Overview: Many Law School departments and organizations use shared email accounts. Shared email

More information

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac? How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac? In order to connect remotely to a PC computer from your Mac, we recommend the MS Remote Desktop for Mac client.

More information

Macs are not directly compatible with Noetix.

Macs are not directly compatible with Noetix. Those that use Macintosh computers to access Noetix cannot directly access Noetix through http://www.sandiego.edu/noetix. If one is on a Mac and goes to Noetix directly in a web browser, the page is likely

More information

My Online Education. Student Guide

My Online Education. Student Guide My Online Education Student Guide Table of Contents Introduction...3 System Requirements...4 Quick Tips...5 Turning Off Pop-Up Blockers...7 Setting Screen Resolution...9 Help/Support Resources...10 MOE

More information

Guide to Training Teachers on the Co-op Dashboard

Guide to Training Teachers on the Co-op Dashboard Guide to Training Teachers on the Co-op Dashboard https://www.hourrepublic.com Hour Republic is a tool used by (i) students to track co-op hours, activities, skills and more, and (ii) teachers to monitor

More information

Lync Online Deployment Guide. Version 1.0

Lync Online Deployment Guide. Version 1.0 Date 28/07/2014 Table of Contents 1. Provisioning Lync Online... 1 1.1 Operating System Requirements... 1 1.2 Browser Requirements Administrative Centre... 1 2. Obtaining your login Credentials & Logging

More information

E-mail Encryption. How do I send my e-mail encryption key?

E-mail Encryption. How do I send my e-mail encryption key? E-mail Encryption SecurenCrypt e-mail encryption was designed to work as a plug-in with Microsoft Outlook. The following instructions are geared toward users encrypting e-mail with Outlook. However, throughout

More information

Mac OS X. Staff members using NEIU issued laptops and computers on Active Directory can access NEIU resources that are available on the wired network.

Mac OS X. Staff members using NEIU issued laptops and computers on Active Directory can access NEIU resources that are available on the wired network. Mac OS X The University Technology Services is privileged to offer a secure wifi network to the university community. Connecting to this network will provide you with benefits in security and improved

More information

Personalizing Your Individual Phone Line Setup

Personalizing Your Individual Phone Line Setup Personalizing Your Individual Phone Line Setup For assistance, please call 1-800-453-2251 With these instruction, you will: 1. Record your greeting. 2. Configure your 911 settings. 3. Learn how to use

More information

Installation Guide. Before We Begin: Please verify your practice management system is compatible with Dental Collect Enterprise.

Installation Guide. Before We Begin: Please verify your practice management system is compatible with Dental Collect Enterprise. Installation Guide Before We Begin: Please verify your practice management system is compatible with Dental Collect Enterprise. Compatibility List: https://www.sikkasoft.com/pms-fs-supported-by-spu/ NOTE:

More information

Mozilla Thunderbird: Setup & Configuration Learning Guide

Mozilla Thunderbird: Setup & Configuration Learning Guide Mozilla Thunderbird: Setup & Configuration Learning Guide Exchange Email at Tufts Below you will find some nomenclature to help familiarize you with the Tufts email system. Term UTLN Email Address Exchange

More information

Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards

Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards The World Internet Security Company Solutions for Security Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards Wherever Security

More information

Email Client Configuration Guide

Email Client Configuration Guide Email Client Configuration Guide Table of Contents Email Configuration...3 Email settings...3 IMAP...3 POP...3 SMTP...3 Process Overview...5 Account set up wizards...5 Anatomy of an email address...5 Why

More information

NICCA User Guide for digitally signing email Using Digital Signature Certificate (DSC) in Outlook Express

NICCA User Guide for digitally signing email Using Digital Signature Certificate (DSC) in Outlook Express NICCA User Guide for digitally signing email Using Digital Signature Certificate (DSC) in Outlook Express 1. DESCRIPTION This guide explains the procedure for using the NICCA issued digital certificate

More information

Quick Start Guide to Logging in to Online Banking

Quick Start Guide to Logging in to Online Banking Quick Start Guide to Logging in to Online Banking Log In to Internet Banking: Note: The first time you log in you are required to use your Customer ID. Your Customer ID is the primary account holder s

More information

6. Is it mandatory to have the digital certificate issued from NICCA?...3. 7. Is it mandatory for the sender and receiver to have a NIC email id?...

6. Is it mandatory to have the digital certificate issued from NICCA?...3. 7. Is it mandatory for the sender and receiver to have a NIC email id?... FAQ FOR S/MIME 1. What is S/MIME?...2 2. What is digital certificate?...2 3. What is an encrypted email?...2 4. Is it mandatory to use this service?...2 5. What I need to do to start using S/MIME service?...2

More information

NeoMail Guide. Neotel (Pty) Ltd

NeoMail Guide. Neotel (Pty) Ltd NeoMail Guide Neotel (Pty) Ltd NeoMail Connect Guide... 1 1. POP and IMAP Client access... 3 2. Outlook Web Access... 4 3. Outlook (IMAP and POP)... 6 4. Outlook 2007... 16 5. Outlook Express... 24 1.

More information

Massey University Wireless Network Client Configuration Mac OS X 10.6 10.9

Massey University Wireless Network Client Configuration Mac OS X 10.6 10.9 Massey University Wireless Network Client Configuration Mac OS X 10.6 10.9 MAC wireless network Requirements Information Technology Services You must have an active Massey username and password (i.e. you

More information

Secure Email FAQs for External Stakeholders

Secure Email FAQs for External Stakeholders Secure Email FAQs for External Stakeholders Ver: 07 November 2012 What is secure email and why am I getting encrypted emails from the IPCC? Why do I have to register to open a Registered Envelope? What

More information

Law College Computer and Technology Information

Law College Computer and Technology Information Law College Computer and Technology Information Account Creation All law students, faculty and staff must have a University of Toledo authentication domain (UTAD) computer account. This account will allow

More information

Sending an Encrypted/Unencrypted Message. Let's Begin: Log In and Set Up Security Questions. Create Additional ProMailSource Accounts:

Sending an Encrypted/Unencrypted Message. Let's Begin: Log In and Set Up Security Questions. Create Additional ProMailSource Accounts: Let's Begin: Log In and Set Up Security Questions To start, you can log in from the ProMailSource home page. Sending an Encrypted/Unencrypted Message Every message you send through ProMailSource is automatically

More information

OPS Data Quick Start Guide

OPS Data Quick Start Guide OPS Data Quick Start Guide OPS Data Features Guide Revision: October, 2014 Technical Support (24/7) - (334) 705-1605 http://www.opelikapower.com Quick Start Guide OPS Data: Beginning today, you have access

More information

AT&T Voice DNA User Guide

AT&T Voice DNA User Guide AT&T Voice DNA User Guide Page 1 Table of Contents GET STARTED... 4 Log In... 5 About the User Dashboard... 9 Manage Personal Profile... 15 Manage Messages... 17 View and Use Call Logs... 22 Search the

More information

MiraCosta College now offers two ways to access your student virtual desktop.

MiraCosta College now offers two ways to access your student virtual desktop. MiraCosta College now offers two ways to access your student virtual desktop. We now feature the new VMware Horizon View HTML access option available from https://view.miracosta.edu. MiraCosta recommends

More information

Using Outlook Web Access

Using Outlook Web Access Using Outlook Web Access Log on JTSA Outlook Web Access 1. Enter the following URL into the address bar on your web browser (Internet Explorer recommended) and press enter http://exweb.jtsa.edu 2. The

More information

SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client

SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client Version 1.1 1/15/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a required

More information

Secure E-Mail Part II Due Date: Sept 27 Points: 25 Points

Secure E-Mail Part II Due Date: Sept 27 Points: 25 Points Secure E-Mail Part II Due Date: Sept 27 Points: 25 Points Objective 1. To explore a practical application of cryptography secure e-mail 2. To use public key encryption 3. To gain experience with the various

More information

Installing LearningBay Enterprise Part 2

Installing LearningBay Enterprise Part 2 Installing LearningBay Enterprise Part 2 Support Document Copyright 2012 Axiom. All Rights Reserved. Page 1 Please note that this document is one of three that details the process for installing LearningBay

More information

U.S. Bank Secure Mail

U.S. Bank Secure Mail U.S. Bank Secure Mail @ Table of Contents Getting Started 3 Logging into Secure Mail 5 Opening Your Messages 7 Replying to a Message 8 Composing a New Message 8 1750-All Introduction: The use of email

More information

Personal Online Banking:

Personal Online Banking: Personal Online Banking: If you access your account information through CNB Online Banking, our personal banking site, you will be able to import your account transactions directly into Quicken/QuickBooks.

More information

Internet and Email Help. Table of Contents:

Internet and Email Help. Table of Contents: Internet and Email Help The following tips are provided to assist you in troubleshooting and managing your Plex Internet and email services. For additional issues or concerns, you may also call our Product

More information

Overview of Registered Envelopes. Registered Envelope Notification Message

Overview of Registered Envelopes. Registered Envelope Notification Message Overview of Registered Envelopes A Registered Envelope is a type of encrypted email message. Some Registered Envelopes are password-protected, while others are encrypted but do not require a password.

More information

After you've enabled POP/IMAP access in i.mail, you need to configure your email client to download i.mail messages.

After you've enabled POP/IMAP access in i.mail, you need to configure your email client to download i.mail messages. User Guide- i.mail enhancement Configure POP/IMAP access using Outlook and Windows Mail Firstly, you need to enable POP/IMAP on your i.mail account: 1. Log into your i.mail account via web 2. Click Mail

More information

Introduction...3. Creating an Apple ID...3. Setting Up Your ipad...4. Connecting to Genesis...4. Setting Up Your ipad...5. ipad Name Change...

Introduction...3. Creating an Apple ID...3. Setting Up Your ipad...4. Connecting to Genesis...4. Setting Up Your ipad...5. ipad Name Change... Table of Contents Introduction...3 Creating an Apple ID...3 Setting Up Your ipad...4 Connecting to Genesis...4 Setting Up Your ipad...5 ipad Name Change...6 Meraki ipad Registration...7 Changing a Passcode...8

More information

Student ANGEL FAQs. General Issues: System Requirements:

Student ANGEL FAQs. General Issues: System Requirements: Student ANGEL FAQs General Issues: What is ANGEL? How do I log in? What is my username and password? How do I activate my account? I forgot my C number/password, what do I do? I registered after the first

More information

IMAP and SMTP Setup in Email Clients

IMAP and SMTP Setup in Email Clients IMAP and SMTP Setup in Email Clients Configuring an Email Client for IMAP Configuring an Email Client for the SMTP Server Overview Internet Message Access Protocol (IMAP), or a remote connection through

More information

!"#$ Stonington Public Schools Parents Guide for InfoSnap Online Enrollment. for Returning. Students. August. Online Enrollment.

!#$ Stonington Public Schools Parents Guide for InfoSnap Online Enrollment. for Returning. Students. August. Online Enrollment. Stonington Public Schools Parents Guide for InfoSnap Online Enrollment for Returning Students August!"#$ Explains how to complete Returning Student Enrollment forms Online through the PowerSchool Parent

More information

Secure Email A Guide for Users

Secure Email A Guide for Users Secure Email A Guide for Users October 14, 2013 10/13 TABLE OF CONTENTS USING THE SYSTEM FOR THE FIRST TIME... 3 EMAIL NOTIFICATION OF SECURE INFORMATION... 3 GETTING REGISTERED ON THE SYSTEM... 4 ACCOUNT

More information

How To Create A Digital Signature And Sign A Document With Adobe Reader XI

How To Create A Digital Signature And Sign A Document With Adobe Reader XI How To Create A Digital Signature And Sign A Document With Adobe Reader XI jhigbee 12/05/2012 How To Create A Digital Signature In Adobe Reader XI (1) Open Acrobat Reader XI and navigate to the Preferences

More information

TRUST Online u s e r g u i d e v e r s i o n 8. 4 O c t o b e r 2 0 1 3

TRUST Online u s e r g u i d e v e r s i o n 8. 4 O c t o b e r 2 0 1 3 TRUSTOnline u s e r g u i d e version 8.4 October 2013 TABLE of CONTENTS Access Trust Online... 1 Login to Trust Online... 1 Enhanced Authentication Login... 3 Select an Account... 5 Locate an Account...

More information

Shentel (Shentel.net)

Shentel (Shentel.net) Shentel (Shentel.net) Email Quick Start Guide Your new webmail is now powered by Contents If you are forwarding your Shentel.net email to a third party address...2 If you use an email program other than

More information

isecuremail User Guide for iphone

isecuremail User Guide for iphone isecuremail User Guide for iphone Page 1 CONTENTS Chapter 1: Welcome... 4 Chapter 2: Getting Started... 5 Compatability... 5 Preliminary Steps... 5 Setting up a POP3 / IMAP4/ Exchange Email Account...

More information

How to use the Online Module Enrolment Application

How to use the Online Module Enrolment Application How to use the Online Module Enrolment Application Introduction This guide will take you through how to select your preferred optional modules for the new academic year using Online Module Enrolment. Note:

More information

INTRODUCTION TO EMAIL: & BASICS

INTRODUCTION TO EMAIL: & BASICS University of North Carolina at Chapel Hill Libraries Chapel Hill Public Library Carrboro Branch Library Carrboro Cybrary Durham Public Library INTRODUCTION TO EMAIL: & BASICS Getting Started Page 02 Prerequisites

More information

Globalstar 9600. User Guide for Mac

Globalstar 9600. User Guide for Mac Globalstar 9600 User Guide for Mac This guide is based on the production version of the Globalstar 9600 and Sat-Fi Apps. Software changes may have occurred after this printing. Globalstar reserves the

More information

Remedy ITSM Service Request Management Quick Start Guide

Remedy ITSM Service Request Management Quick Start Guide Remedy ITSM Service Request Management Quick Start Guide Table of Contents 1.0 Getting Started With Remedy s Service Request Management. 3 2.0 Submitting a Service Request.7 3.0 Updating a Service Request

More information

Email Update Instructions

Email Update Instructions 1 Email Update Instructions Contents Email Client Settings The Basics... 3 Outlook 2013... 4 Outlook 2007... 6 Outlook Express... 7 Windows Mail... 8 Thunderbird 3... 9 Apple Mail... 10 2 Email Client

More information

Using Rackspace Webmail

Using Rackspace Webmail Using Rackspace Webmail Contents 1. Logging into Rackspace Webmail... 1 2. Add/Change your Signature... 2 3. Configure audible notifications... 5 4. Manage Auto-Reply ( Out of Office /Vacation responder)...

More information

Warwick Email: The Switch Over to Live@edu

Warwick Email: The Switch Over to Live@edu Warwick Email: The Switch Over to Live@edu For people who use Outlook or access email via Web Access the login process is very simple. You are required to change your password twice before you will be

More information

College of Marin Email Accounts Fall 2010. marin.edu Email Access,

College of Marin Email Accounts Fall 2010. marin.edu Email Access, marin.edu Email Access, There are two email accounts assigned to each full-time and part-time faculty member, firstname.lastname@marin.edu, referred to as your marin.edu account and yourlogin@mycom.marin.edu,

More information

Mac OS VPN Set Up Guide

Mac OS VPN Set Up Guide Mac OS VPN Set Up Guide If internet traffic is not being sent over the VPN then go to System Preferences- >Network and click on your VPN connection. Click the "Advanced..." button, and in the "Options"

More information

How To Use Touchtone.Com'S Digital Phone Service Web Portal User Guide (For Ip Phones) On A Pc Or Ip Phone (For A Cell Phone) On Pc Or Mac) On Your Ip Phone On A Mac Or Ip Cell Phone On

How To Use Touchtone.Com'S Digital Phone Service Web Portal User Guide (For Ip Phones) On A Pc Or Ip Phone (For A Cell Phone) On Pc Or Mac) On Your Ip Phone On A Mac Or Ip Cell Phone On Digital Phone Service Web Portal User Guide TouchTone provides subscribers an easy-to-use Web-based administrator portal to help manage your IP phone s features and call routing functions. In this document

More information

Using the Jive for ios App

Using the Jive for ios App Using the Jive for ios App TOC 2 Contents App Overview...3 System Requirements... 4 Release Notes...5 Which Version Am I Using?... 6 Connecting to Your Community... 11 Getting Started...12 Using Your Inbox...13

More information

MICROSOFT OFFICE 365 EXCHANGE ONLINE CLOUD

MICROSOFT OFFICE 365 EXCHANGE ONLINE CLOUD 6/4/14 Samson V. 1. Configure Outlook 2011 for Exchange Online Step 1 First we need to verify that your Office 2011 is up-to-date. Launch any Office 2011 product (Word, Excel, Outlook) and click on the

More information

GCM for Android Setup Guide

GCM for Android Setup Guide GCM for Android Setup Guide This guide provides information on...... Prerequisites for using Google Cloud Messaging service... Instructions for setting up GCM service via the Google API console... Configuring

More information

Frequently Asked Questions Mindful Schools Online Courses. Logging In... 2. Navigation... 3. Emails & Forums... 3. Tracking My Work... 4. Files...

Frequently Asked Questions Mindful Schools Online Courses. Logging In... 2. Navigation... 3. Emails & Forums... 3. Tracking My Work... 4. Files... Frequently Asked Questions Mindful Schools Online Courses Short Video tutorials (coming soon) Getting Started How to update your profile and add a picture How to post in a forum How to complete self-reflection

More information

How To Configure Email Using Different Email Clients

How To Configure Email Using Different Email Clients How To Configure Email Using Different Email Clients This document will show step by step instructions for setting up and updating email accounts using different Email Clients. Always remember to verify

More information

1. What practices does Raleigh Medical Group, P.A. include? 2. Is my health information secure? Who has access to this information?

1. What practices does Raleigh Medical Group, P.A. include? 2. Is my health information secure? Who has access to this information? Troubleshooting and Frequently Asked Questions FollowMyHealth Patient Portal 1. What practices does Raleigh Medical Group, P.A. include? 2. Is my health information secure? Who has access to this information?

More information

my.scouting Tools Training Dashboard Trained Exception Report YPT Aging Report Trained Leader Rpt Add Training Search Training View Training

my.scouting Tools Training Dashboard Trained Exception Report YPT Aging Report Trained Leader Rpt Add Training Search Training View Training my.scouting Tools Training Dashboard YPT Aging my.scouting Tools is best experienced using Firefox 14 or greater, Google Chrome 21 or greater, Apple Safari 6 or greater, and Internet Explorer 9.0 or greater.

More information

Setting up an Apple ID

Setting up an Apple ID Setting up an Apple ID SETUP GUIDE: This setup guide was created for Albany Creek State High school to be used only for the purpose of assisting school staff and students in setting up and configuring

More information