Remember, this is not specific to your address alone... the METHOD you retrieve your is equally important.
|
|
- Clarence Townsend
- 8 years ago
- Views:
Transcription
1 Securing Your Skip to Page 2 to Begin or Read this FYI Using Security Certificates: Background and FYI Securing requires the use of a certificate in order to work. Once you sign up for a certificate it lasts one full year and it is easy to renew. Actually setting up the certificate is trivial. The initial registration takes about minutes. Once you have the certificate you will probably never see it or care about it until it is time to renew next year. How it Works How it works is simple. You get a certificate from a trusted third party, much like you receive an ID card from the state. You can then use the certificate to prove you are who you say you are... or in this case, your address is indeed being used by you and not some other person. When you send an , you check off the digital signature button. This sends the certificate in the background to the recipient and their client will read Sender Signed and store your certificate. Once both parties have sent each other a!signed" , encryption is now possible. Remember, this is not specific to your address alone... the METHOD you retrieve your is equally important. Key limitation sacrificed where security is gained: The encrypted s you send CANNOT be opened in a web browser. Encrypted s can only be opened from within a Mail program. It can be Apple Mail, it can be Thunderbird (on the PC) but no more geckomail.ucdavis.edu or my.ucdavis.edu for encrypted messages. This means if you forward your to Yahoo, you cannot read your encrypted messages. However, this is not true for unencrypted s. Unencrypted s can still be read from the browser. Since gmail gives free POP3 (downloading of s to mail programs), gmail will work with this while Yahoo charges for POP3 access. It is not recommended that you forward your to another account. Note: the Apple Mail client is smart enough to not encrypt a message if the recipient doesn"t have a certificate. Meaning that even though your recipient does not have this setup, it is impossible to send an encrypted to a person that he or she could not decrypt. This sounds like a lot but it"s not. It boils down to this: Once you have a certificate, and your recipient has a certificate and you have both corresponded with the Signed button checked, you are given the option to send an encrypted . Once it is sent, it can only be decrypted by a program which can decrypt it. Web browsers cannot open encrypted s. On to the steps... 1
2 Outline: Four Stages to Setup Encryption 1. Create an account on thawte.com 2. Request a certificate. You then wait minutes for Thawte to generate it. 3. Download your certificate. The mac sets it up for you. 4. your common recipients so that everyone gets your certificate, and send encrypted s! Stage 1. Create a user account on thawte.com This is a fairly straightforward process, though longer than most website registrations. You must use Safari for this whole process. Do not use Firefox! 1. In Safari, go to It looks like this to the right: 2. Click on Products in the navigation bar. You get a nice blue menu. 3. Click on Free Personal Certificates 4. The next window looks like this, click Join in the top right area. 5. You next get an agreement page. Click Next to accept their terms and conditions. In summary: the agreement specifies what these certs do, that Thawte is a Certificate Authority not endorsed by the government officially, information is gathered based on trust and not shared, and they are not liable legally. 6. On the next page, enter your Last name, first, birthday and nationality. Then click Next. (Ignore Charset) 7. The next page is titled, Requesting ID Information. Enter your UC Davis address. This will become your account username with Thawte. Then click next. 8. The next page is titled, Personal Preferences. Choose your preferred language (most likely English) and then under Charset Preference choose Use the default for my language. Click next. 9. On the next page entitled Password Setup you should create a password for your Thawte account that you will be able to remember a year from now. 2
3 10.Password Questions. On this page you need to select 5 questions and type in 5 answers. One word answers are the best. If you don"t like the questions, then create your own. The only rule is that there must be 5 questions. Click next. 11.On the next Confirmation page, make sure everything you have entered is correct, then click next. 12.IMPORTANT. You will be sent an that will help you finish the enrollment with Thawte. You MUST complete this step the same day, or it will not be successful. 13.Click on the first link in the Enter the Probe and Ping values by copying and pasting each into the webpage you just loaded. Click next. 15.You should get a confirmation page saying it was a success. Click next. 16.A login window will popup. Fill in your UC Davis address into the Name field, and then enter the password you just created into the password field. Click Log In. You will now be able to request a certificate. On to Stage 2: Requesting a Certificate... 3
4 Stage 2. Requesting a Certificate Follow these steps to request your certificate be generated. 1. You should now be logged in, if so, go to step 2. If not, go to thawte.com and login using the same steps as Stage 1, numbers 1-3, then clicking Login instead of Join. 2. Click Certificates. Then Request a Certificate. Then request an X.509 Format Cert. 3. On the next page, make sure Mozilla Firefox is selected, then click request. 4. The next page is titled configure certificate name. For our purposes we will not have our names verified by a notary. No Employment Information Available should be selected, so click next. 5. You will now get a configure addresses for certificate page. Your address should be checked, then click next. 6. The next page is titled, configure extranet capabilities for certificate. Click Next. 7. On the next page configure X.509v3 cert extensions, accept the Default Extensions by clicking on the first Accept. Do NOT click on configure. 4
5 8. In generate certificate public key make sure 2048 (High Grade) is selected, then click next. 9.On the next page, click finish. 10.You will get an confirming that your request for a certificate has been processed. It takes anywhere from 5-15 minutes for it to be generated by Thawte. You are done with stage 2. When you get a second saying it is ready, go to Stage 3 of this guide. Important: Don!t close your browser windows at any time! On to Stage 3: Downloading Your Certificate... 5
6 Stage 3. Downloading and Installing Your Certificate Once you have requested a certificate, as you did in stage 2, it takes a few minutes before Thawte finishes generating it. 1. You should get an from Thawte when your certificate is ready. It should look something like this: 2. Do NOT click on the link in the . It won!t work! Instead, close the Switch back to Safari, to the larger page you had open. On the left-hand side, click on the link that says view certificate status in red. 4. You should get a list saying one has been issued. Click on the word Navigator. 5. On the next page you will see a button in red that says Fetch. Click it. Safari will download your certificate. 6. When it is done downloading, Safari knows to add it to your keychain. 7. Quit the Keychain Access program by going to the Keychain Access menu, then click Quit. On to Stage 4: Signing Your Messages, and Encrypting Them... 6
7 Stage 4. Signing and Encrypting Messages You now have a certificate installed on your Mac. If you send from this Mac, with your Mail program, you have the ability to send a signed . Believe it or not, it is easy for someone to use your address to send , even without your password. With a certificate you are basically letting your recipient know you are indeed the owner of the address you are sending from. If both ends of communication have a certificate from Thawte setup, and both have corresponded with a digitally-signed message already, one can then encrypt between the two. Here"s how: 1. If your Mail program was open when you setup the certificate, Quit it, then reopen your Mail. When you relaunch if Mail asks for use of your keychain click Always Allow 2. The easiest way for everyone on staff to get a signed message is to the staff listproc. Open a new and your staff listproc or other common addresses. 3.Make sure the seal has a checkmark in it. 4.The difference between checked and not checked is subtle. One is an X while the other is a Check. Make sure it is a check-mark. There are little to no reasons why you would want to send a non-signed message. (Note, this is a digital signature produced by the certificate. It is not the same as your signature line.) 5.Note how next to the badge symbol on its left there is a lock that is grayed out. What this tells you is that you cannot send an encrypted message to this recipient. Either this recipient doesn"t have a certificate, or they have never ed you with a digital certificate. 7
8 6. Once you have made sure the badge has a check-mark in it, you can send an saying you are just setting up your secure Now let"s say we are all setup. If you are sending to a recipient who has their certificate setup, the option for a lock is given. Making sure the lock is locked will ensure the is sent encrypted. 8.Again the difference between encrypted / unencrypted is subtle. The lock on the left is unencrypted. The lock on the right is encrypted. 9.When you receive a message and you want to know if it is encrypted, it shows up in the To section. 10.Whenever you send an encrypted message, it will stay on whatever setting you last did. So, pay attention to your lock when you are sending confidential messages, and make sure it is always locked. 11.If the lock is not available (that is, it is greyed out) then either your recipient has no certificate, or they have not yet sent a signed message. If you send to multiple recipients and even just one of them isn"t set up, encryption is disabled. This system only works if everyone is set up. Paying attention to the lock before you send is crucial. 8 Important: subject lines are NOT encrypted. That!s It. You can now send Encrypted Messages!
E-mail Encryption Guide version 1.2, by Thomas Reed
E-mail Encryption Guide version 1.2, by Thomas Reed In order for two people to send and receive encrypted e-mails to/from each other, both parties need: An e-mail reader that supports encryption (such
More informationCHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account?
Contents Page Q. How do I access my email? Q. How do I change or reset a password for an email account? Q. How do I forward or redirect my messages to a different email address? Q. How do I set up an auto-reply
More informationInstructions For Opening UHA Encrypted Email
Receiving Encrypted Email You have received a secure, encrypted message from UHA. The message will contain the following notice and an attachment named SecureMessageAtt.hml. The attachment is shown circled
More informationAlberni Valley IT Services http://www.avits.ca admin@avits.ca. Virtual domain E-mail information.
Alberni Valley IT Services http://www.avits.ca admin@avits.ca Virtual domain E-mail information. Welcome! This document outlines information necessary for you to send and receive E-mail for your virtual
More informationSecure e-mail transaction guidelines for external users with Commission personnel.
Secure e-mail transaction guidelines for external users with Commission personnel. This document describes in general the basic requirements to set up secure (encrypted) e- mail communication between external
More informationFrom a Finder window choose Applications (shown circled in red) and then double click the Tether icon (shown circled in green).
From a Finder window choose Applications (shown circled in red) and then double click the Tether icon (shown circled in green). You will be presented with a dialog box asking for you to enter an ad-hoc
More informationHow to use encrypted email in the WECI scheme.
How to use encrypted email in the WECI scheme. Author: Ben Metcalfe. Intended Audience: Optometrists and practice-based system administrators. Date: 30 th March 2006 Introduction The PEARS scheme relies
More informationThis document provides a brief, end-user overview of the Cisco Registered Envelop Service which has been implemented by Sterne Agee.
Email Encryption User Guide Sterne Agee is committed to the security of your information. We have implemented Cisco Email Encryption to secure email communication so that only you can open it.* Questions?
More informationUser guide. Business Email
User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook
More informationSECURE EMAIL USER GUIDE OUTLOOK 2000
WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP
More informationmystanwell.com Installing Citrix Client Software Information and Business Systems
mystanwell.com Installing Citrix Client Software Information and Business Systems Doc No: 020/12 Revision No: Revision Date: Page: 1 of 16 Contents Overview... 3 1. Microsoft Internet Explorer... 3 2.
More informationHow To Sync Google Drive On A Mac Computer With A Gmail Account On A Gcd (For A Student) On A Pc Or Mac Or Mac (For An Older Person) On An Ipad Or Ipad (For Older People) On
Installation and Setup of Google Drive for Students on Mac OS X Purpose: This guide will lead you through the Google Drive Installation and Configuration. Pre-requisites: 1) ODU Student Gmail account 2)
More informationE-mail Encryption Recipient Guidelines
E-mail Encryption Recipient Guidelines Canadian Western Bank Group Human Resources Department November 1, 2013 This reference guide was developed for training and reference use only. Any discrepancies
More informationHere are the steps to configure Outlook Express for use with Salmar's Zimbra server. Select "Tools" and then "Accounts from the pull down menu.
Salmar Consulting Inc. Setting up Outlook Express to use Zimbra Marcel Gagné, February 2010 Here are the steps to configure Outlook Express for use with Salmar's Zimbra server. Open Outlook Express. Select
More informationReading an email sent with Voltage SecureMail. Using the Voltage SecureMail Zero Download Messenger (ZDM)
Reading an email sent with Voltage SecureMail Using the Voltage SecureMail Zero Download Messenger (ZDM) SecureMail is an email protection service developed by Voltage Security, Inc. that provides email
More information507-214-1000. This information is provided for informational purposes only.
507-214-1000 This information is provided for informational purposes only. The following guide will show you how to set up email in various email programs. The Basic Email settings for all email addresses
More informationSecure Email Client Guide
PRESIDIO BANK 33 Secure Email Client Guide THE BUSINESS BANK THAT WORKS 8/2013 Table of Contents Introduction.....3 Our Responsibility to Protect Confidential Information....4 Registering and Accessing
More informationUCIT Office of Information Security Standard Operation Procedure: HIPAA Privacy and Security Basics Training
UCIT Office of Information Security Standard Operation Procedure: HIPAA Privacy and Security Basics Training How to Complete HIPAA Training Readership: UC Program Coordinators Summary: Step-by-step procedure
More informationTable of Contents. How to Disable or Partially Disable Pop-up Blockers
Table of Contents How to Disable or Partially Disable Pop-up Blockers Internet Explorer 8 and 9... 2 Internet Explorer 7... 3 Internet Explorer 6... 4 FireFox 3 and Up for Windows... 5 Firefox 3.0 and
More informationHow To Use The Nvcc
NAHCA Virtual Campus of Care User Guide National Association of Health Care Assistants www.nahcacareforce.org (417)623-6049 Getting Started To start your education in the Virtual Campus of Care you must
More informationDIRECT MESSAGING END USER GUIDE ALABAMA ONE HEALTH RECORD. Unify Data Management Platform 2012/2013 Software Build 5.15
DIRECT MESSAGING END USER GUIDE ALABAMA ONE HEALTH RECORD Unify Data Management Platform 2012/2013 Software Build 5.15 April 2015 Proprietary and Confidential Property of Truven Health Analytics Inc.
More informationXythos on Demand Quick Start Guide For Xythos Drive
Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document
More informationSetting up secure e-mail communication with Ericsson. Guideline for Ericsson partners
Setting up secure e-mail communication with Ericsson Guideline for Ericsson partners In this presentation Introduction Technical prerequisites Getting started Exchanging Public Keys Sending a signed e-mail
More informationA Guide to using egas Lead Applicant
A Guide to using egas Lead Applicant egas Browsers and Browser Settings Logging In Passwords Navigation Principles Your Contact Details Tasks Overview Completing Tasks egas The Health and Care Research
More informationSetting up Channel-21 Secure RSS CEP on
Setting up Channel-21 Secure RSS CEP on Important Information About C21 CEP Podcasts itunes iphone / ipad Android Phone/Tablet Demo Videos Important Information about Channel-21 CEP Channel-21 Digital
More informationPortal Recipient Guide
Portal Recipient Guide Lindenhouse Software Limited 2015 Contents 1 Introduction... 4 2 Account Activation... 4 3 Forgotten Password... 9 4 Document signing... 12 5 Authenticating your Device & Browser...
More informationHow do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?
Enterprise Computing & Service Management How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac? In order to connect remotely to a PC computer from your Mac, we recommend
More informationRecommended Browser Setting for MySBU Portal
The MySBU portal is built using Microsoft s SharePoint technology framework, therefore, for the best viewing experience, Southwest Baptist University recommends the use of Microsoft s Internet Explorer,
More informationHow to install and use the File Sharing Outlook Plugin
How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.
More informationInitial Setup of Mozilla Thunderbird with IMAP for OS X Lion
Initial Setup of Mozilla Thunderbird Concept This document describes the procedures for setting up the Mozilla Thunderbird email client to download messages from Google Mail using Internet Message Access
More informationMICROSOFT OUTLOOK 2011 GETTING STARTED AND HELP RESOURCES
MICROSOFT OUTLOOK 2011 GETTING STARTED AND HELP RESOURCES Lasted Edited: 2012-07-10 1 Introduction... 4 Getting Started... 4 Tour of the Outlook 2011 Interface... 4 Start Outlook 2011... 5 Configure E-mail
More informationDjigzo S/MIME setup guide
Author: Martijn Brinkers Table of Contents...1 Introduction...3 Quick setup...4 Create a CA...4 Fill in the form:...5 Add certificates for internal users...5 Add certificates for external recipients...7
More informationConfiguring your email client to connect to your Exchange mailbox
Configuring your email client to connect to your Exchange mailbox Contents Use Outlook Web Access (OWA) to access your Exchange mailbox... 2 Use Outlook 2003 to connect to your Exchange mailbox... 3 Add
More informationInitial Setup of Mozilla Thunderbird with IMAP for Windows 7
Initial Setup of Mozilla Thunderbird Concept This document describes the procedures for setting up the Mozilla Thunderbird email client to download messages from Google Mail using Internet Message Access
More informationPersonal Secure Email Certificate
Entrust Certificate Services Personal Secure Email Certificate Enrollment Guide Date of Issue: October 2010 Copyright 2010 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
More information8x8 Click2Pop User Guide
USER GUIDE 8x8 User Guide Getting Started with April 2014 Contents Introduction... 3 What s new.... 3 8x8.... 3 Here is how works...4 8x8 Click2Connect.... 4 Requirements.... 4 Installation on Microsoft
More informationConfiguring an Email Client to Connect to CASS Mail Servers
Configuring an Email Client to Connect to CASS Mail Servers Table of Contents Introduction... 2 Webmail... 2 Settings... 2 Forwarding... 2 Email Client Configuration... 3 Outlook 2003... 3 Outlook 2007...
More informationSteps to Opening Your First Password-Protected Envelope
This section provides step-by-step instructions for opening a password-protected Registered Envelope for the first time. The steps demonstrate a typical scenario for a first-time recipient. Some of the
More informationPISA 2015 MS Online School Questionnaire: User s Manual
OECD Programme for International Student Assessment 2015 PISA 2015 MS Online School Questionnaire: User s Manual Doc: CY6_CBA_SCQ_MSPrincipalManual.docx September 2014 Produced by ETS, Core 2 Contractor
More informationInternet E-Mail Encryption S/Mime Standard
Internet E-Mail Encryption S/Mime Standard Disclaimer: Successfully setting up encryption functions in most e-mail clients is usually not a problematic task. However, it should be noted that, when configuring
More informationLaw School Computing Services User Memo
Law School Computing Services User Memo Accessing and Using Shared No. 37 7/28/2015 Email Accounts in Outlook Overview: Many Law School departments and organizations use shared email accounts. Shared email
More informationHow do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?
How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac? In order to connect remotely to a PC computer from your Mac, we recommend the MS Remote Desktop for Mac client.
More informationMacs are not directly compatible with Noetix.
Those that use Macintosh computers to access Noetix cannot directly access Noetix through http://www.sandiego.edu/noetix. If one is on a Mac and goes to Noetix directly in a web browser, the page is likely
More informationMy Online Education. Student Guide
My Online Education Student Guide Table of Contents Introduction...3 System Requirements...4 Quick Tips...5 Turning Off Pop-Up Blockers...7 Setting Screen Resolution...9 Help/Support Resources...10 MOE
More informationGuide to Training Teachers on the Co-op Dashboard
Guide to Training Teachers on the Co-op Dashboard https://www.hourrepublic.com Hour Republic is a tool used by (i) students to track co-op hours, activities, skills and more, and (ii) teachers to monitor
More informationLync Online Deployment Guide. Version 1.0
Date 28/07/2014 Table of Contents 1. Provisioning Lync Online... 1 1.1 Operating System Requirements... 1 1.2 Browser Requirements Administrative Centre... 1 2. Obtaining your login Credentials & Logging
More informationE-mail Encryption. How do I send my e-mail encryption key?
E-mail Encryption SecurenCrypt e-mail encryption was designed to work as a plug-in with Microsoft Outlook. The following instructions are geared toward users encrypting e-mail with Outlook. However, throughout
More informationMac OS X. Staff members using NEIU issued laptops and computers on Active Directory can access NEIU resources that are available on the wired network.
Mac OS X The University Technology Services is privileged to offer a secure wifi network to the university community. Connecting to this network will provide you with benefits in security and improved
More informationPersonalizing Your Individual Phone Line Setup
Personalizing Your Individual Phone Line Setup For assistance, please call 1-800-453-2251 With these instruction, you will: 1. Record your greeting. 2. Configure your 911 settings. 3. Learn how to use
More informationInstallation Guide. Before We Begin: Please verify your practice management system is compatible with Dental Collect Enterprise.
Installation Guide Before We Begin: Please verify your practice management system is compatible with Dental Collect Enterprise. Compatibility List: https://www.sikkasoft.com/pms-fs-supported-by-spu/ NOTE:
More informationMozilla Thunderbird: Setup & Configuration Learning Guide
Mozilla Thunderbird: Setup & Configuration Learning Guide Exchange Email at Tufts Below you will find some nomenclature to help familiarize you with the Tufts email system. Term UTLN Email Address Exchange
More informationGuide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards
The World Internet Security Company Solutions for Security Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards Wherever Security
More informationEmail Client Configuration Guide
Email Client Configuration Guide Table of Contents Email Configuration...3 Email settings...3 IMAP...3 POP...3 SMTP...3 Process Overview...5 Account set up wizards...5 Anatomy of an email address...5 Why
More informationNICCA User Guide for digitally signing email Using Digital Signature Certificate (DSC) in Outlook Express
NICCA User Guide for digitally signing email Using Digital Signature Certificate (DSC) in Outlook Express 1. DESCRIPTION This guide explains the procedure for using the NICCA issued digital certificate
More informationQuick Start Guide to Logging in to Online Banking
Quick Start Guide to Logging in to Online Banking Log In to Internet Banking: Note: The first time you log in you are required to use your Customer ID. Your Customer ID is the primary account holder s
More information6. Is it mandatory to have the digital certificate issued from NICCA?...3. 7. Is it mandatory for the sender and receiver to have a NIC email id?...
FAQ FOR S/MIME 1. What is S/MIME?...2 2. What is digital certificate?...2 3. What is an encrypted email?...2 4. Is it mandatory to use this service?...2 5. What I need to do to start using S/MIME service?...2
More informationNeoMail Guide. Neotel (Pty) Ltd
NeoMail Guide Neotel (Pty) Ltd NeoMail Connect Guide... 1 1. POP and IMAP Client access... 3 2. Outlook Web Access... 4 3. Outlook (IMAP and POP)... 6 4. Outlook 2007... 16 5. Outlook Express... 24 1.
More informationMassey University Wireless Network Client Configuration Mac OS X 10.6 10.9
Massey University Wireless Network Client Configuration Mac OS X 10.6 10.9 MAC wireless network Requirements Information Technology Services You must have an active Massey username and password (i.e. you
More informationSecure Email FAQs for External Stakeholders
Secure Email FAQs for External Stakeholders Ver: 07 November 2012 What is secure email and why am I getting encrypted emails from the IPCC? Why do I have to register to open a Registered Envelope? What
More informationLaw College Computer and Technology Information
Law College Computer and Technology Information Account Creation All law students, faculty and staff must have a University of Toledo authentication domain (UTAD) computer account. This account will allow
More informationSending an Encrypted/Unencrypted Message. Let's Begin: Log In and Set Up Security Questions. Create Additional ProMailSource Accounts:
Let's Begin: Log In and Set Up Security Questions To start, you can log in from the ProMailSource home page. Sending an Encrypted/Unencrypted Message Every message you send through ProMailSource is automatically
More informationOPS Data Quick Start Guide
OPS Data Quick Start Guide OPS Data Features Guide Revision: October, 2014 Technical Support (24/7) - (334) 705-1605 http://www.opelikapower.com Quick Start Guide OPS Data: Beginning today, you have access
More informationAT&T Voice DNA User Guide
AT&T Voice DNA User Guide Page 1 Table of Contents GET STARTED... 4 Log In... 5 About the User Dashboard... 9 Manage Personal Profile... 15 Manage Messages... 17 View and Use Call Logs... 22 Search the
More informationMiraCosta College now offers two ways to access your student virtual desktop.
MiraCosta College now offers two ways to access your student virtual desktop. We now feature the new VMware Horizon View HTML access option available from https://view.miracosta.edu. MiraCosta recommends
More informationUsing Outlook Web Access
Using Outlook Web Access Log on JTSA Outlook Web Access 1. Enter the following URL into the address bar on your web browser (Internet Explorer recommended) and press enter http://exweb.jtsa.edu 2. The
More informationSHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client
SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client Version 1.1 1/15/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a required
More informationSecure E-Mail Part II Due Date: Sept 27 Points: 25 Points
Secure E-Mail Part II Due Date: Sept 27 Points: 25 Points Objective 1. To explore a practical application of cryptography secure e-mail 2. To use public key encryption 3. To gain experience with the various
More informationInstalling LearningBay Enterprise Part 2
Installing LearningBay Enterprise Part 2 Support Document Copyright 2012 Axiom. All Rights Reserved. Page 1 Please note that this document is one of three that details the process for installing LearningBay
More informationU.S. Bank Secure Mail
U.S. Bank Secure Mail @ Table of Contents Getting Started 3 Logging into Secure Mail 5 Opening Your Messages 7 Replying to a Message 8 Composing a New Message 8 1750-All Introduction: The use of email
More informationPersonal Online Banking:
Personal Online Banking: If you access your account information through CNB Online Banking, our personal banking site, you will be able to import your account transactions directly into Quicken/QuickBooks.
More informationInternet and Email Help. Table of Contents:
Internet and Email Help The following tips are provided to assist you in troubleshooting and managing your Plex Internet and email services. For additional issues or concerns, you may also call our Product
More informationOverview of Registered Envelopes. Registered Envelope Notification Message
Overview of Registered Envelopes A Registered Envelope is a type of encrypted email message. Some Registered Envelopes are password-protected, while others are encrypted but do not require a password.
More informationAfter you've enabled POP/IMAP access in i.mail, you need to configure your email client to download i.mail messages.
User Guide- i.mail enhancement Configure POP/IMAP access using Outlook and Windows Mail Firstly, you need to enable POP/IMAP on your i.mail account: 1. Log into your i.mail account via web 2. Click Mail
More informationIntroduction...3. Creating an Apple ID...3. Setting Up Your ipad...4. Connecting to Genesis...4. Setting Up Your ipad...5. ipad Name Change...
Table of Contents Introduction...3 Creating an Apple ID...3 Setting Up Your ipad...4 Connecting to Genesis...4 Setting Up Your ipad...5 ipad Name Change...6 Meraki ipad Registration...7 Changing a Passcode...8
More informationStudent ANGEL FAQs. General Issues: System Requirements:
Student ANGEL FAQs General Issues: What is ANGEL? How do I log in? What is my username and password? How do I activate my account? I forgot my C number/password, what do I do? I registered after the first
More informationIMAP and SMTP Setup in Email Clients
IMAP and SMTP Setup in Email Clients Configuring an Email Client for IMAP Configuring an Email Client for the SMTP Server Overview Internet Message Access Protocol (IMAP), or a remote connection through
More information!"#$ Stonington Public Schools Parents Guide for InfoSnap Online Enrollment. for Returning. Students. August. Online Enrollment.
Stonington Public Schools Parents Guide for InfoSnap Online Enrollment for Returning Students August!"#$ Explains how to complete Returning Student Enrollment forms Online through the PowerSchool Parent
More informationSecure Email A Guide for Users
Secure Email A Guide for Users October 14, 2013 10/13 TABLE OF CONTENTS USING THE SYSTEM FOR THE FIRST TIME... 3 EMAIL NOTIFICATION OF SECURE INFORMATION... 3 GETTING REGISTERED ON THE SYSTEM... 4 ACCOUNT
More informationHow To Create A Digital Signature And Sign A Document With Adobe Reader XI
How To Create A Digital Signature And Sign A Document With Adobe Reader XI jhigbee 12/05/2012 How To Create A Digital Signature In Adobe Reader XI (1) Open Acrobat Reader XI and navigate to the Preferences
More informationTRUST Online u s e r g u i d e v e r s i o n 8. 4 O c t o b e r 2 0 1 3
TRUSTOnline u s e r g u i d e version 8.4 October 2013 TABLE of CONTENTS Access Trust Online... 1 Login to Trust Online... 1 Enhanced Authentication Login... 3 Select an Account... 5 Locate an Account...
More informationShentel (Shentel.net)
Shentel (Shentel.net) Email Quick Start Guide Your new webmail is now powered by Contents If you are forwarding your Shentel.net email to a third party address...2 If you use an email program other than
More informationisecuremail User Guide for iphone
isecuremail User Guide for iphone Page 1 CONTENTS Chapter 1: Welcome... 4 Chapter 2: Getting Started... 5 Compatability... 5 Preliminary Steps... 5 Setting up a POP3 / IMAP4/ Exchange Email Account...
More informationHow to use the Online Module Enrolment Application
How to use the Online Module Enrolment Application Introduction This guide will take you through how to select your preferred optional modules for the new academic year using Online Module Enrolment. Note:
More informationINTRODUCTION TO EMAIL: & BASICS
University of North Carolina at Chapel Hill Libraries Chapel Hill Public Library Carrboro Branch Library Carrboro Cybrary Durham Public Library INTRODUCTION TO EMAIL: & BASICS Getting Started Page 02 Prerequisites
More informationGlobalstar 9600. User Guide for Mac
Globalstar 9600 User Guide for Mac This guide is based on the production version of the Globalstar 9600 and Sat-Fi Apps. Software changes may have occurred after this printing. Globalstar reserves the
More informationRemedy ITSM Service Request Management Quick Start Guide
Remedy ITSM Service Request Management Quick Start Guide Table of Contents 1.0 Getting Started With Remedy s Service Request Management. 3 2.0 Submitting a Service Request.7 3.0 Updating a Service Request
More informationEmail Update Instructions
1 Email Update Instructions Contents Email Client Settings The Basics... 3 Outlook 2013... 4 Outlook 2007... 6 Outlook Express... 7 Windows Mail... 8 Thunderbird 3... 9 Apple Mail... 10 2 Email Client
More informationUsing Rackspace Webmail
Using Rackspace Webmail Contents 1. Logging into Rackspace Webmail... 1 2. Add/Change your Signature... 2 3. Configure audible notifications... 5 4. Manage Auto-Reply ( Out of Office /Vacation responder)...
More informationWarwick Email: The Switch Over to Live@edu
Warwick Email: The Switch Over to Live@edu For people who use Outlook or access email via Web Access the login process is very simple. You are required to change your password twice before you will be
More informationCollege of Marin Email Accounts Fall 2010. marin.edu Email Access,
marin.edu Email Access, There are two email accounts assigned to each full-time and part-time faculty member, firstname.lastname@marin.edu, referred to as your marin.edu account and yourlogin@mycom.marin.edu,
More informationMac OS VPN Set Up Guide
Mac OS VPN Set Up Guide If internet traffic is not being sent over the VPN then go to System Preferences- >Network and click on your VPN connection. Click the "Advanced..." button, and in the "Options"
More informationHow To Use Touchtone.Com'S Digital Phone Service Web Portal User Guide (For Ip Phones) On A Pc Or Ip Phone (For A Cell Phone) On Pc Or Mac) On Your Ip Phone On A Mac Or Ip Cell Phone On
Digital Phone Service Web Portal User Guide TouchTone provides subscribers an easy-to-use Web-based administrator portal to help manage your IP phone s features and call routing functions. In this document
More informationUsing the Jive for ios App
Using the Jive for ios App TOC 2 Contents App Overview...3 System Requirements... 4 Release Notes...5 Which Version Am I Using?... 6 Connecting to Your Community... 11 Getting Started...12 Using Your Inbox...13
More informationMICROSOFT OFFICE 365 EXCHANGE ONLINE CLOUD
6/4/14 Samson V. 1. Configure Outlook 2011 for Exchange Online Step 1 First we need to verify that your Office 2011 is up-to-date. Launch any Office 2011 product (Word, Excel, Outlook) and click on the
More informationGCM for Android Setup Guide
GCM for Android Setup Guide This guide provides information on...... Prerequisites for using Google Cloud Messaging service... Instructions for setting up GCM service via the Google API console... Configuring
More informationFrequently Asked Questions Mindful Schools Online Courses. Logging In... 2. Navigation... 3. Emails & Forums... 3. Tracking My Work... 4. Files...
Frequently Asked Questions Mindful Schools Online Courses Short Video tutorials (coming soon) Getting Started How to update your profile and add a picture How to post in a forum How to complete self-reflection
More informationHow To Configure Email Using Different Email Clients
How To Configure Email Using Different Email Clients This document will show step by step instructions for setting up and updating email accounts using different Email Clients. Always remember to verify
More information1. What practices does Raleigh Medical Group, P.A. include? 2. Is my health information secure? Who has access to this information?
Troubleshooting and Frequently Asked Questions FollowMyHealth Patient Portal 1. What practices does Raleigh Medical Group, P.A. include? 2. Is my health information secure? Who has access to this information?
More informationmy.scouting Tools Training Dashboard Trained Exception Report YPT Aging Report Trained Leader Rpt Add Training Search Training View Training
my.scouting Tools Training Dashboard YPT Aging my.scouting Tools is best experienced using Firefox 14 or greater, Google Chrome 21 or greater, Apple Safari 6 or greater, and Internet Explorer 9.0 or greater.
More informationSetting up an Apple ID
Setting up an Apple ID SETUP GUIDE: This setup guide was created for Albany Creek State High school to be used only for the purpose of assisting school staff and students in setting up and configuring
More information