Encrypting your Communications using PGP

Size: px
Start display at page:

Download "Encrypting your Email Communications using PGP"

Transcription

1 Encrypting your Communications using PGP

2 If you are watching this tutorial as part of the conference materials, the software is on a separate CD. Alternately, you can obtain the software at the following URLs: (Mac) (Windows) (Outlook 2010 plug-in)

3 How do I protect Financial Assets?? Safe Tax Strategy Stable Institutions Strong PIN Gold Off Shore Due Diligence Trust Diversification Entities Insurance

4 How do I protect Physical Assets?? Guard Dog Safe Neighborhood Firearms Alarm System Situational Awareness Medical Checkup Eat Well Martial Arts Exercise Lifestyle

5 How do I protect Digital Assets?? One Time Password Linux PGP Tor Anti-Virus Firewall Mac Versus PC Safe Provider Technical Expertise Off The Record Chat Jitsi HTTPS Proxy Service Secure Cloud Storage Strong Password TrueCrypt

6 Answer Any and all of the above There are many technologies, techniques and tools. Each is intended to address a different problem.

7 Today We will address the challenge of communicating privately via using Public Key Encryption. If you grasp the concept of how Public Key Encryption works, developing additional security practices become much simpler. Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. - Edward Snowden

8 Agenda VERY BRIEF primer on encryption as it applies to Configure your laptop and software to send and receive encrypted Windows Mac Outlook (2010) Apple Mail

9 Three Data Security Objectives Confidentiality Preventing unwanted disclosure of information Integrity Ensuring that content as well as identity can be trusted. Availability Ensuring that data and systems are available when expected.

10 What is encryption? Encryption is the process of encoding information so that only authorized parties can read it.

11 Two Kinds of Encryption Shared Secret / Symmetric Key Both the sender and the receiver use the same encryption key. Works very well, but it requires the sender and receiver to be able securely share the key ahead of time. That is a problem in the world of . Public Key / Private Key A different key is used to decode than to encode a message. (Wait... I ll explain). This is what is used to encrypt . The enabling technology is commonly known as PGP or GPG

12 Public Key Encryption During setup, two keys are generated, a public key and a private key. The keys are mathematically related, but one cannot be used to derive the other. What is encrypted with one key can be decrypted with the other. What is encrypted with one key CANNOT be decrypted by itself. The public key is distributed far and wide to any and all. The private key is a closely guarded secret. Public Keys are used to encrypt. Private Keys are used to decrypt So here is how it works...

13 How to encrypt Make sure your recipient has PGP / GPG... and knows how to use it! Make sure you have the recipient s public key. Type your message in your mail program and click encrypt. Select the recipients Public Key to use for encryption and click Send

14 What is Signing? Signing is the act of digitally certifying that an you have sent did in fact come from you. It is comparable to the use of a signet and a seal. Assume you have my pubic key and that you know it belongs to me Assume that you know with a high degree of confidence that I have closely guarded my private key I can fingerprint my message with my private key. Using my public key in your possession, you can verify the fingerprint. Since the fingerprint is unique to my private key, you know the message came from me

15 Installation and Configuration

16 Install GPG Mac Run GPG Suite from directory Accept all default settings and install Close to finish installation In Spotlight type and run GPG Keychain Access PC Run gpg4win on thumb drive Under Choose Components, check all except GpgOL Claws-Mail Complete Installation (May require reboot) Under Programs, confirm new folder Ggp4Win and launch program Kleopatra Next - Create Keys...

17 Create Encryption Keys Mac Launch GPG Keychain Access Click New Enter name and address. Open Advanced Options in the Comment field, enter private or work Set Expiration if desired. Leave other default settings. Click Generate Key Enter passphrase and repeat. DO NOT FORGET. (I recommend a sentence). Click Finish PC In Kleopatra click File New Certificate Select Create a personal OpenPGP key pair Enter name and address. Under Comment, enter private or work Click Advanced Settings. Review and change as necessary (expiration date). Click Next and Create Key. Enter passphrase and repeat. DO NOT FORGET. (I recommend a sentence). Click Finish Next - Configure ...

18 Configure Outlook Install Outlook GPG Plug-in - gpg40_setup.exe Accept default settings (Note This is trial software) Thunderbird Install Thunderbird plug-in nameed Enigmail by clicking Tools Add-ons and search for add-in Enigmail Apple Mail No configuration necessary Next - Distribute Public Keys

19 Distribute Public Keys Mac Open GPG Keychain Access Right-click your key and hit Export CLEAR THE BOX THAT SAYS Allow Secret Key Export (IMPORTANT) PC Open Kleopatra Select your certificate and click Export Certificates Save the file to your desktop and as an attachment to: Save the file to your desktop and as an attachment to: You will receive an automatic response from with our Public Key attached. Save that file to your desktop immediately.

20 Import Public Keys Remember: You need my public key to send me an encrypted . My public key (that you received from my automatic response) is my lock that I send you. I have the key to unlock it. You need to put my public key in your keychain Mac Open GPG Keychain Access Click Import and select the file saved on your desktop named caseyconfpublickey Click Open PC Open Kleopatra Click Import Certificates and select the file saved on your desktop named caseyconfpublickey Click Open

21 Finally - Time to Encrypt Stuff Mac Apple Mail Launch Apple Mail Click Compose New Message compose a test to caseyconference. 2013@gmail.com Click the lock icon to make sure it is locked. Make sure there is a checkmark in the seal icon. Click Send. Enter your PGP pass phrase from earlier. PC Outlook Launch Outlook. If asked for gpg4o settings, accept default. compose a test to caseyconference. 2013@gmail.com Ensure there is a checkbox in both Encrypt and Sign. Click Send. Enter your PGP pass phrase from earlier We will respond with an encrypted and signed from caseyconference.2013@gmail.com

22 Review and Notes You encrypt a message with another party s public key You decrypt a message with your own private key You sign a message with your own private key You verify a signature with another party s public key Does the whole get encrypted? NO What if I want to encrypt to many recipients? How about GMail via a browser? What if I lose my key or my computer crashes? ipad / iphone: opengp and ipgmail

File and email encryption with GPG4win & Enigmail

File and email encryption with GPG4win & Enigmail Protektor Services Windows Manual 11.5 File and email encryption with GPG4win & Enigmail Introduction, Contact, Legals, License Introduction Protektor Services Manual version 11.5 A new edition of the

More information

GPG installation and configuration

GPG installation and configuration Contents Introduction... 3 Windows... 5 Install GPG4WIN... 5 Configure the certificate manager... 7 Configure GPG... 7 Create your own set of keys... 9 Upload your public key to the keyserver... 11 Importing

More information

GPG - GNU Privacy Guard

GPG - GNU Privacy Guard GPG - GNU Privacy Guard How to use Károly Erdei October 15, 2014 Károly Erdei GPG - GNU Privacy Guard 1/60 1 Why 2 Cryptography 3 PGP 4 KGPG-Assistant 5 -Key-Manager 6 -Editor 7 GPG4Win 8 Enigmail Károly

More information

GPG4win / Kleopatra Documentation. Secure file and e-mail encryption by using GnuPG for Windows

GPG4win / Kleopatra Documentation. Secure file and e-mail encryption by using GnuPG for Windows GPG4win / Kleopatra Documentation Secure file and e-mail encryption by using GnuPG for Windows GPG4win Detailed How To: Installing Gpg4win: 1. Go to the following website http://www.gpg4win.org/download.html,

More information

An Introduction to Secure Email. Presented by: Addam Schroll IT Security & Privacy Analyst

An Introduction to Secure Email. Presented by: Addam Schroll IT Security & Privacy Analyst An Introduction to Secure Email Presented by: Addam Schroll IT Security & Privacy Analyst Topics Secure Email Basics Types of Secure Email Walkthroughs 2 Secure Email Services Confidentiality Message Integrity

More information

HW/Lab 1: Email Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am)

HW/Lab 1: Email Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am) HW/Lab 1: Email Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am) This HW/Lab assignment covers Lectures 2 to 4. Please review these thoroughly before starting to

More information

How to install and use the File Sharing Outlook Plugin

How to install and use the File Sharing Outlook Plugin How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.

More information

Internet E-Mail Encryption S/Mime Standard

Internet E-Mail Encryption S/Mime Standard Internet E-Mail Encryption S/Mime Standard Disclaimer: Successfully setting up encryption functions in most e-mail clients is usually not a problematic task. However, it should be noted that, when configuring

More information

Tutorial: Encrypted Email with Thunderbird and Enigmail. Author: Shashank Areguli. Published: Ed (August 9, 2014)

Tutorial: Encrypted Email with Thunderbird and Enigmail. Author: Shashank Areguli. Published: Ed (August 9, 2014) Tutorial: Encrypted Email with Thunderbird and Enigmail Author: Shashank Areguli Published: Ed (August 9, 2014) There are three issues of security that needs to dealt with on the internet, concerning information.

More information

4. Click Next and then fill in your Name and E-mail address. Click Next again.

4. Click Next and then fill in your Name and E-mail address. Click Next again. NOTE: Before installing PGP, Word needs to be disabled as your editor in Outlook. In Outlook, go to Tools: Options: Mail Format and uncheck Use Microsoft Office Word to edit e-mail messages. Failure to

More information

Yale Software Library. PGP 9.6 for Windows

Yale Software Library. PGP 9.6 for Windows PGP 9.6 for Windows How to Add keys to the All Keys key ring: 1. Run the PGP application from Start->All Programs->PGP. 2. In the PGP main application window, click on Search for keys. 3. In the Search

More information

Secure E-Mail Part II Due Date: Sept 27 Points: 25 Points

Secure E-Mail Part II Due Date: Sept 27 Points: 25 Points Secure E-Mail Part II Due Date: Sept 27 Points: 25 Points Objective 1. To explore a practical application of cryptography secure e-mail 2. To use public key encryption 3. To gain experience with the various

More information

Signing and Encryption with GnuPG

Signing and Encryption with GnuPG Signing and Encryption with GnuPG Steve Revilak http://www.srevilak.net/wiki/talks Cryptoparty @ Somerville Public Library January 10, 2015 1 / 20 What is GnuPG? GnuPG is a free software implementation

More information

Sending an Encrypted/Unencrypted Message. Let's Begin: Log In and Set Up Security Questions. Create Additional ProMailSource Accounts:

Sending an Encrypted/Unencrypted Message. Let's Begin: Log In and Set Up Security Questions. Create Additional ProMailSource Accounts: Let's Begin: Log In and Set Up Security Questions To start, you can log in from the ProMailSource home page. Sending an Encrypted/Unencrypted Message Every message you send through ProMailSource is automatically

More information

Encrypting Email with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY BY FRAUKE OSTER

Encrypting Email with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY BY FRAUKE OSTER COVER STORY Encrypting Email Encrypting Email with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY The leading email applications include new features for helping users secure and authenticate their

More information

Using Your PGP Tool to Update Your Email Address Settings for Encrypted Messaging

Using Your PGP Tool to Update Your Email Address Settings for Encrypted Messaging Technology Help Desk 412 624-HELP [4357] http://technology.pitt.edu Using Your PGP Tool to Update Your Email Address Settings for Encrypted Messaging Overview The University of Pittsburgh is removing the

More information

FRCC Secure Transfer & Storage Infrastructure. Training for new data transfer process

FRCC Secure Transfer & Storage Infrastructure. Training for new data transfer process FRCC Secure Transfer & Storage Infrastructure Training for new data transfer process Training Objects Understand the changes in regards to the data transfer process using PKI Installation Key management

More information

How to use PGP Encryption with iscribe

How to use PGP Encryption with iscribe How to use PGP Encryption with iscribe iscribe e-mail seamlessly supports e-mail encryption and digital signatures. This bulletin describes how to setup iscribe so that you can send and receive encrypted

More information

Remember, this is not specific to your email address alone... the METHOD you retrieve your email is equally important.

Remember, this is not specific to your email address alone... the METHOD you retrieve your email is equally important. Securing Your Email Skip to Page 2 to Begin or Read this FYI Using Security Certificates: Background and FYI Securing email requires the use of a certificate in order to work. Once you sign up for a certificate

More information

Getting started with IMAP for Aggiemail What is IMAP?

Getting started with IMAP for Aggiemail What is IMAP? Getting started with IMAP for Aggiemail What is IMAP? IMAP, or Internet Message Access Protocol, lets you download messages from Aggiemail s servers onto your computer so you can access your mail with

More information

Receiving Secure Email from Citi For External Customers and Business Partners

Receiving Secure Email from Citi For External Customers and Business Partners Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure

More information

LiteCommerce Advanced Security Module. Version 2.8

LiteCommerce Advanced Security Module. Version 2.8 LiteCommerce Advanced Security Module Version 2.8 Reference Manual Revision date: Jul/03/2007 LiteCommerce Advanced Security Module Reference Manual I Table of Contents Introduction...1 Administrator...2

More information

I. Configuring Digital signature certificate in Microsoft Outlook 2003:

I. Configuring Digital signature certificate in Microsoft Outlook 2003: I. Configuring Digital signature certificate in Microsoft Outlook 2003: In order to configure Outlook 2003 to use the new message security settings please follow these steps: 1. Open Outlook. 2. Go to

More information

Djigzo S/MIME setup guide

Djigzo S/MIME setup guide Author: Martijn Brinkers Table of Contents...1 Introduction...3 Quick setup...4 Create a CA...4 Fill in the form:...5 Add certificates for internal users...5 Add certificates for external recipients...7

More information

Secure e-mail transaction guidelines for external users with Commission personnel.

Secure e-mail transaction guidelines for external users with Commission personnel. Secure e-mail transaction guidelines for external users with Commission personnel. This document describes in general the basic requirements to set up secure (encrypted) e- mail communication between external

More information

Contents First Time Setup... 2 Setting up the Legal Vault Client (KiteDrive)... 3 Setting up the KiteDrive Outlook Plugin... 10 Using the Legal Vault

Contents First Time Setup... 2 Setting up the Legal Vault Client (KiteDrive)... 3 Setting up the KiteDrive Outlook Plugin... 10 Using the Legal Vault Contents First Time Setup... 2 Setting up the Legal Vault Client (KiteDrive)... 3 Setting up the KiteDrive Outlook Plugin... 10 Using the Legal Vault Outlook Plugin... 13 Using KiteDrive to Send Large

More information

Secure Email User Guide. Guidance for Recipients of Secure Email Messages from Lloyds Banking Group

Secure Email User Guide. Guidance for Recipients of Secure Email Messages from Lloyds Banking Group Guidance for Recipients of Secure Email Messages from Lloyds Banking Group Version: 1.3 Last updated: 14/04/2016 1 Introduction This user guide is intended for third party email users users who receive,

More information

Pretty Good Privacy with GnuPG

Pretty Good Privacy with GnuPG Pretty Good Privacy with GnuPG Steve Revilak Cabot House Sep. 24, 2013 1 / 16 Encryption and Signing Encryption The purpose is to ensure that a message is readable only by someone possessing a specific

More information

Concepts in Crypto. Parker Higgins parker@eff.org @xor. Micah Lee micah@eff.org @micahflee PGP: 4FF3 AA1B D29E 1638 32DE C765 9433 5F88 9A36 7709

Concepts in Crypto. Parker Higgins parker@eff.org @xor. Micah Lee micah@eff.org @micahflee PGP: 4FF3 AA1B D29E 1638 32DE C765 9433 5F88 9A36 7709 Concepts in Crypto Parker Higgins parker@eff.org @xor PGP: 4FF3 AA1B D29E 1638 32DE C765 9433 5F88 9A36 7709 Micah Lee micah@eff.org @micahflee PGP: 5C17 6163 61BD 9F92 422A C08B B4D2 5A1E 9999 9697 Who

More information

IBM Aspera Add-in for Microsoft Outlook 1.3.2

IBM Aspera Add-in for Microsoft Outlook 1.3.2 IBM Aspera Add-in for Microsoft Outlook 1.3.2 Windows: 7, 8 Revision: 1.3.2.100253 Generated: 02/12/2015 10:58 Contents 2 Contents Introduction... 3 System Requirements... 5 Setting Up... 6 Account Credentials...6

More information

Using Entrust certificates with Microsoft Office and Windows

Using Entrust certificates with Microsoft Office and Windows Entrust Managed Services PKI Using Entrust certificates with Microsoft Office and Windows Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark

More information

How To Encrypt A Traveltrax Report On Gpg On A Pc Or Mac Or Mac (For A Free Download) On A Thumbdrive Or Ipad Or Ipa (For Free) On Pc Or Ipo (For An Ipo)

How To Encrypt A Traveltrax Report On Gpg On A Pc Or Mac Or Mac (For A Free Download) On A Thumbdrive Or Ipad Or Ipa (For Free) On Pc Or Ipo (For An Ipo) EMAIL ENCRYPTION Guide June 3, 2013 TABLE OF CONTENTS Steps to Create Encryption Public Key... 3 Installing GPG... 3 Key Generation Process... 4 Update User Settings... 6 Decrypting an encrypted file...

More information

Installing Logos SSL Certificates on Mobile Devices

Installing Logos SSL Certificates on Mobile Devices Installing Logos SSL Certificates on Mobile Devices Phase 1: Obtain the SSL Certificate You can obtain the SSL certificate in one of 2 ways. Method 1 Download the SSL certificate from it.logostech.net

More information

Keep Yourself Safe from the Prying Eyes of Hackers and Snoopers!

Keep Yourself Safe from the Prying Eyes of Hackers and Snoopers! Protect Your Privacy Online P 7/1 Keep Yourself Safe from the Prying Eyes of Hackers and Snoopers! With the information in this article you can: Find out what secret information your PC is sharing with

More information

Open-Xchange Guard Major Release v2.0.0. Feature Overview V1.4

Open-Xchange Guard Major Release v2.0.0. Feature Overview V1.4 Open-Xchange Guard Major Release v2.0.0 Feature Overview V1.4 2015 Copyright Open-Xchange Inc. This document is the intellectual property of Open-Xchange Inc. The document may be copied in whole or in

More information

Dictamus Manual. Dictamus is a professional dictation app for iphone, ipod touch and ipad. This manual describes setup and use of Dictamus version 10.

Dictamus Manual. Dictamus is a professional dictation app for iphone, ipod touch and ipad. This manual describes setup and use of Dictamus version 10. Dictamus Manual Dictamus is a professional dictation app for iphone, ipod touch and ipad. This manual describes setup and use of Dictamus version 10. Table of Contents Settings! 3 General! 3 Dictation!

More information

INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v15.5.0 ONWARDS)

INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v15.5.0 ONWARDS) Web: Overview INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v15.5.0 ONWARDS) This document provides an installation and configuration guide for MDaemon Messaging Server along with

More information

How to Setup Privacy Guard Encryption.

How to Setup Privacy Guard Encryption. How to Setup Privacy Guard Encryption. Contents Setting up for the first time.... 1 Installing the Software (free)... 1 Generating your own key... 2 Share your key with your friends so they can send you

More information

JPMorgan Chase Treasury Workstation. Certification Setup Guide Version 2.0

JPMorgan Chase Treasury Workstation. Certification Setup Guide Version 2.0 EMENTS JPMorgan Chase Treasury Workstation Certification Setup Guide Version 2.0 December 2010 TABLE OF CONTENTS Introduction... 1 About this Guide... 1 When to Create the Certificates... 2 Getting Help...

More information

User Guide. Version 3.0 April 2006

User Guide. Version 3.0 April 2006 User Guide Version 3.0 April 2006 2006 Obvious Solutions Inc. All rights reserved. Dabra and Dabra Network are trademarks of Obvious Solutions Inc. All other trademarks owned by their respective trademark

More information

isecuremail User Guide for iphone

isecuremail User Guide for iphone isecuremail User Guide for iphone Page 1 CONTENTS Chapter 1: Welcome... 4 Chapter 2: Getting Started... 5 Compatability... 5 Preliminary Steps... 5 Setting up a POP3 / IMAP4/ Exchange Email Account...

More information

USER MANUAL. v. 1.0.0.95 Windows Client ------------------------ January 2014 ------------------------

USER MANUAL. v. 1.0.0.95 Windows Client ------------------------ January 2014 ------------------------ USER MANUAL v. 1.0.0.95 Windows Client ------------------------ January 2014 ------------------------ 1 Contents At a Glance Troubleshoot 3 About SkyCrypt 23 FAQ 4 About this manual 23 Contact support

More information

Secure Email User Guide. PGP (Pretty Good Privacy)

Secure Email User Guide. PGP (Pretty Good Privacy) Secure Email User Guide PGP (Pretty Good Privacy) 1 Contents 1 Introduction... 3 2 PGP Web Messenger... 4 3 Enrolling as a PGP Web Messenger User... 4 4 How to use PGP Web Messenger... 6 4.1 Mailbox access...

More information

Secure Client Applications

Secure Client Applications Secure Client Applications Networking Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 26 June 2014 Common/Reports/secure-client-apps.tex, r900 1/26 Acronyms

More information

Office of Information Technology Connecting to Microsoft Exchange User Guide

Office of Information Technology Connecting to Microsoft Exchange User Guide OVERVIEW The Office of Information Technology is migrating its messaging infrastructure from Microsoft Exchange 2003 to Microsoft Exchange 2010. Moving to the latest technology will provide many enhancements

More information

E-mail Encryption Recipient Guidelines

E-mail Encryption Recipient Guidelines E-mail Encryption Recipient Guidelines Canadian Western Bank Group Human Resources Department November 1, 2013 This reference guide was developed for training and reference use only. Any discrepancies

More information

Using your Encrypted BlackBerry

Using your Encrypted BlackBerry Using your Encrypted BlackBerry How do I change the Language on my BlackBerry? 1. On the Home screen or in a folder, click the Options icon. 2. Click Typing and Input > Language. 3. To change the display

More information

How To Access Your Cpa.Com Email From Your Computer Or A Mobile Phone Or Ipad (For A Free Download) Without Having To Use A Webmail Account

How To Access Your Cpa.Com Email From Your Computer Or A Mobile Phone Or Ipad (For A Free Download) Without Having To Use A Webmail Account CPA.com Full Email Account Getting Started Guide Note: You do not need to read this guide if you signed up for the CPA.com Forward-Only Service. Congratulations on the purchase of your new CPA.com Full

More information

ENCRYPTION EMAIL ENCRYPTION A BLACK PAPER HOW TO SECURE YOUR EMAILS FOR FREE WITH THE STRONGEST ENCRYPTION IN THE WORLD EMAIL A BLACK PAPER

ENCRYPTION EMAIL ENCRYPTION A BLACK PAPER HOW TO SECURE YOUR EMAILS FOR FREE WITH THE STRONGEST ENCRYPTION IN THE WORLD EMAIL A BLACK PAPER EMIL REPORT FROM SOVEREIGNMN.COM PPER EMIL HOW TO SECURE YOUR EMILS FOR FREE WITH THE STRONGEST IN THE WORLD PPER 1 EMIL PPER Why You Should Encrypt Your Emails... 3 Encrypting Your Emails With PGP:...

More information

The Joys of Importing & Using an S/MIME Certificate CCIT Publication

The Joys of Importing & Using an S/MIME Certificate CCIT Publication The Joys of Importing & Using an S/MIME Certificate CCIT Publication The Joys of Importing & Using an S/MIME Certificate Page 1 / 24 Table of Contents The Joys of Importing & Using an S/MIME Certificate...3

More information

CBH Provider EDI Browser Manual

CBH Provider EDI Browser Manual CBH Provider EDI Browser Manual Table of Contents PGP Software Installation Windows XP 2 PGP Software Installation Windows 7 9 Main Screen 16 Log In Screen 19 Report: Authorizations 21 Decryption Instructions

More information

1. Scope of Service. 1.1 About Boxcryptor Classic

1. Scope of Service. 1.1 About Boxcryptor Classic Manual for Mac OS X Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 4 2. Installation... 5 2.1 Installing Boxcryptor Classic... 5 2.2 Licensing Boxcryptor Classic

More information

Symantec Encryption Solutions for Email, Powered by PGP Technology

Symantec Encryption Solutions for Email, Powered by PGP Technology Symantec Encryption Solutions for Email, Powered by PGP Technology Data Sheet: Encryption The Problem with Email Are you worried that users are emailing sensitive information openly? According to Osterman

More information

FAQ. How does the new Big Bend Backup (powered by Keepit) work?

FAQ. How does the new Big Bend Backup (powered by Keepit) work? FAQ How does the new Big Bend Backup (powered by Keepit) work? Once you establish which of the folders on your hard drive you ll be backing up, you ll log into myaccount.bigbend.net and from your control

More information

FTP-Stream Module: InstantShare End User Guide

FTP-Stream Module: InstantShare End User Guide FTP-Stream Module: InstantShare End User Guide InstantShare Overview InstantShare is an easy way to quickly share large files to external partners and to request them to send files back to you. But unlike

More information

Mac Client Installation Notes

Mac Client Installation Notes Mac Client Installation Notes Important Note Please note that Java no longer ships with MAC OS X 10.7 (Lion) and you will need to download and install Java before installing the Attix5 Pro MAC Backup Client

More information

Signing and Encryption with GnuPG

Signing and Encryption with GnuPG Signing and Encryption with GnuPG Steve Revilak Cryptoparty @ Northeastern Law School Feb. 9, 2014 1 / 22 What is GnuPG? GnuPG is a free software implementation of the OpenPGP standard. PGP stands for

More information

Biography of Trainer. Education. Experience. Summary. TLS/SSL : Securing your website PGP : Secure your email communication. Topic

Biography of Trainer. Education. Experience. Summary. TLS/SSL : Securing your website PGP : Secure your email communication. Topic Topic Name of the Trainer/Speaker Professional Position and Name of Organization Email TLS/SSL : Securing your website PGP : Secure your email communication Mohammad Fakrul Alam CTO bdhub Limited fakrul@bdhub.com

More information

BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8)

BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8) BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8) Encryption is an effective method of protecting data stored on portable devices such as USB flash drives and external hard drives.

More information

Q. I use a MAC How do I change my password so I can send and receive my email?

Q. I use a MAC How do I change my password so I can send and receive my email? Password Change FAQ Q. I use a MAC How do I change my password so I can send and receive my email? A. First point a browser to http://www.redlands.edu/passwordmanager and change your password. Afterward,

More information

Ubuntu Open PGP IMPLEMENTATION. Dr. ENİS KARAARSLAN 2014

Ubuntu Open PGP IMPLEMENTATION. Dr. ENİS KARAARSLAN 2014 Ubuntu Open PGP IMPLEMENTATION Dr. ENİS KARAARSLAN 2014 Enter your personal information, select your key encryption type, key strength, and when you want your key to expire. Your name and email address

More information

THUNDERBIRD WORKBOOK

THUNDERBIRD WORKBOOK THUNDERBIRD WORKBOOK 1 2 Published : 2012-05-25 License : None INTRODUCTION 1. ABOUT THIS WORKBOOK 2. INTRODUCTION TO THUNDERBIRD 3 1. ABOUT THIS WORKBOOK T his workbook is designed to complete specific

More information

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account?

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account? Contents Page Q. How do I access my email? Q. How do I change or reset a password for an email account? Q. How do I forward or redirect my messages to a different email address? Q. How do I set up an auto-reply

More information

Personal Secure Email Certificate

Personal Secure Email Certificate Entrust Certificate Services Personal Secure Email Certificate Enrollment Guide Date of Issue: October 2010 Copyright 2010 Entrust. All rights reserved. Entrust is a trademark or a registered trademark

More information

LSGMI REMOTE DESKTOP SERVICES.

LSGMI REMOTE DESKTOP SERVICES. LSGMI REMOTE DESKTOP SERVICES. This Document is to describe the steps that you should follow in order to have a secured Remote Access to this Service. Requirements: Access to Remote Services is only supported

More information

INTRODUCTION TO CRYPTOGRAPHY

INTRODUCTION TO CRYPTOGRAPHY INTRODUCTION TO CRYPTOGRAPHY AUTHOR: ANAS TAWILEH anas@tawileh.net Available online at: http://www.tawileh.net/courses/ia This work is released under a Creative Commons Attribution-ShareAlike 2.5 License

More information

BOTTOM UP THINKING EMAIL SETUP INSTRUCTIONS. Unique businesses require unique solutions CLIENT GUIDE

BOTTOM UP THINKING EMAIL SETUP INSTRUCTIONS. Unique businesses require unique solutions CLIENT GUIDE BOTTOM UP THINKING Unique businesses require unique solutions EMAIL SETUP INSTRUCTIONS CLIENT GUIDE INDEX How to connect a. Deciding on best method (POP or IMAP) Setting up email on devices Webmail a.

More information

Gold Lock Desktop. User Manual. Follow these simple steps to install, configure, and use Gold Lock Desktop.

Gold Lock Desktop. User Manual. Follow these simple steps to install, configure, and use Gold Lock Desktop. User Manual Follow these simple steps to install, configure, and use. Content 1 Installation...02 2 Configuration...03-06 3 Use...07 4 Verification & Security...08 5 Backup & Restore...09 6 File Encryption...10

More information

Secure Email User Guide

Secure Email User Guide Secure Email User Guide Transport Layer Security (TLS) Pretty Good Privacy (PGP) PDF Messenger 1 Contents 1 Introduction... 3 2 Transport Layer Security (TLS).4 3 Pretty Good Privacy (PGP).5 4 PDF Messenger...

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Secure Email Client Guide

Secure Email Client Guide PRESIDIO BANK 33 Secure Email Client Guide THE BUSINESS BANK THAT WORKS 8/2013 Table of Contents Introduction.....3 Our Responsibility to Protect Confidential Information....4 Registering and Accessing

More information

Directory and Messaging Services Enterprise Secure Mail Services

Directory and Messaging Services Enterprise Secure Mail Services Title: Directory and Messaging Services Enterprise Secure Mail Services Enterprise Secure Mail Services for End Users Attention: Receivers of Secure Mail Retrieval of Secure Mail by the Recipient Once

More information

The Handbook V 1.8 Adaptations by Ludwig Hügelschäfer Based on Version 1 by Daniele Raffo with Patrick Brunschwig and Robert J. Hansen.

The Handbook V 1.8 Adaptations by Ludwig Hügelschäfer Based on Version 1 by Daniele Raffo with Patrick Brunschwig and Robert J. Hansen. openpgp email security for mozilla applications The Handbook V 1.8 Adaptations by Ludwig Hügelschäfer Based on Version 1 by Daniele Raffo with Patrick Brunschwig and Robert J. Hansen. Enigmail Handbook

More information

Guide Installing Digital Certificates in Outlook 2000

Guide Installing Digital Certificates in Outlook 2000 Guide Installing Digital Certificates in Outlook 2000 Document SIGNE_PAPET. Ver. 1.0 Date of application 06/08/2012 Seguridad documental 2 Introduction This document describes the steps for configuring

More information

STEP 01 Nortel Contivity VPN Client Installation

STEP 01 Nortel Contivity VPN Client Installation STEP 01 Nortel Contivity VPN Client Installation The screen shots below may not be exactly what you see while installing the Contivity VPN Client on your PC. Different browsers and operating systems may

More information

How to get Office 365 through your Student Email

How to get Office 365 through your Student Email How to get Office 365 through your Student Email Locating and installing Microsoft Office 365 ProPlus is a quick and simple process. To begin the installation, log into your GCU email account, either by

More information

How to Password Protect Files & Folders in Mac OS X with Disk Images

How to Password Protect Files & Folders in Mac OS X with Disk Images The best way to secure sensitive information from malware is to encrypt it. Encryption works by using a complex formula to securely scramble (or encrypt) individual files and folders, entire disks and

More information

Frequently Asked Questions. Frequently Asked Questions. 2013 SSLPost Page 1 of 31 support@sslpost.com

Frequently Asked Questions. Frequently Asked Questions. 2013 SSLPost Page 1 of 31 support@sslpost.com Frequently Asked Questions 2013 SSLPost Page 1 of 31 support@sslpost.com Table of Contents 1 What is SSLPost Cloud? 3 2 Why do I need SSLPost Cloud? 4 3 What do I need to use SSLPost Cloud? 5 4 Which Internet

More information

REMOTELY ACCESS YOUR FILES WITH THE FLAGLER FILECONNECT SYSTEM

REMOTELY ACCESS YOUR FILES WITH THE FLAGLER FILECONNECT SYSTEM REMOTELY ACCESS YOUR FILES WITH THE FLAGLER FILECONNECT SYSTEM This document explains the various ways to connect to your network files and group share data. In addition, staff and full-time faculty are

More information

Mac OS X User Manual Version 2.0

Mac OS X User Manual Version 2.0 Mac OS X User Manual Version 2.0 Welcome to ncrypted Cloud! ncrypted Cloud is a Privacy, Security, and Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption)

More information

SECURE EMAIL USER GUIDE OUTLOOK 2000

SECURE EMAIL USER GUIDE OUTLOOK 2000 WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP

More information

Backing up Microsoft Outlook Email For the PC Using MS Outlook 2000 Keith Roberts

Backing up Microsoft Outlook Email For the PC Using MS Outlook 2000 Keith Roberts WIN1020 November 2003 Backing up Microsoft Outlook Email For the PC Using MS Outlook 2000 Keith Roberts INTRODUCTION... 1 PREPARATION... 1 BACKING UP EMAIL... 2 RESTORING EMAIL FROM A PERSONAL FILE FOLDER...

More information

Outlook Web Access 2003 Remote User Guide

Outlook Web Access 2003 Remote User Guide UNITED STATES COAST GUARD Outlook Web Access 2003 Remote User Guide Using Common Access Card Access TISCOM TIS-42 07/29/2008 Version 1.0 CAC Enabled Outlook Web Access CAC Enabled OWA is a way to view

More information

Lotus Notes 8.5 to Office 365 for business

Lotus Notes 8.5 to Office 365 for business Lotus Notes 8.5 to Office 365 for business Make the switch Microsoft Outlook 2013 may look different from Lotus Notes 8.5, but you ll quickly discover that Outlook lets you do everything you re used to

More information

Outlook XP Email Only

Outlook XP Email Only Outlook XP Email Only Table of Contents OUTLOOK XP EMAIL 5 HOW EMAIL WORKS: 5 POP AND SMTP: 5 TO SET UP THE POP AND SMTP ADDRESSES: 6 TO SET THE DELIVERY PROPERTY: 8 STARTING OUTLOOK: 10 THE OUTLOOK BAR:

More information

Setting up secure e-mail communication with Ericsson. Guideline for Ericsson partners

Setting up secure e-mail communication with Ericsson. Guideline for Ericsson partners Setting up secure e-mail communication with Ericsson Guideline for Ericsson partners In this presentation Introduction Technical prerequisites Getting started Exchanging Public Keys Sending a signed e-mail

More information

User guide. Business Email

User guide. Business Email User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook

More information

PDG Software. Encryption Guide

PDG Software. Encryption Guide Encryption Guide , Inc. 1751 Montreal Circle, Suite B Tucker, Georgia 30084-6802 Copyright 1998-2006 PDG Software, Inc.; All rights reserved. PDG Software, Inc. ("PDG Software") retains all ownership

More information

Secure Email Recipient Guide

Secure Email Recipient Guide Secure Email Recipient Guide Contents How to open your first Encrypted Message.... 3 Step-by-Step Guide to Opening Your First Envelope... 3 Step One:... 3 Step Two:... 4 Step Three:... 4 Step Four:...

More information

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0 Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust

More information

Active Directory Self-Service FAQ

Active Directory Self-Service FAQ Active Directory Self-Service FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com

More information

Encrypt USB Drive to Protect Data

Encrypt USB Drive to Protect Data Encrypt USB Drive to Protect Data Enable BitLocker on USB Flash Drives to Protect Data Encryption is an effective method of protecting data stored on portable devices such as USB flash drives and external

More information

Training module 2 Installing VMware View

Training module 2 Installing VMware View Training module 2 Installing VMware View In this second module we ll install VMware View for an End User Computing environment. We ll install all necessary parts such as VMware View Connection Server and

More information

Using etoken for Securing E-mails Using Outlook and Outlook Express

Using etoken for Securing E-mails Using Outlook and Outlook Express Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered

More information

USING CAMPUS ANYWARE OVER THE VPN (WINDOWS XP)

USING CAMPUS ANYWARE OVER THE VPN (WINDOWS XP) USING CAMPUS ANYWARE OVER THE VPN (WINDOWS XP) This document will explain how to install Campus Anyware on your machine (if needed), and how to run Campus Anyware from your machine while you are connected

More information

VPN Web Portal Usage Guide

VPN Web Portal Usage Guide VPN Web Portal Usage Guide Table of Contents WHAT IS VPN WEB CLIENT 4 SUPPORTED WEB BROWSERS 4 LOGGING INTO VPN WEB CLIENT 5 ESTABLISHING A VPN CONNECTION 6 KNOWN ISSUES WITH MAC COMPUTERS 6 ACCESS INTRANET

More information

NCH Secure Web Delivery Instructions

NCH Secure Web Delivery Instructions NCH Secure Web Delivery Instructions Typically when you send an email to a person, it is sent in Clear Text and can be viewed as it traverses the internet. Email is typically not considered a good vehicle

More information

Problem. Solution. Quatrix is professional, secure and easy to use file sharing.

Problem. Solution. Quatrix is professional, secure and easy to use file sharing. Quatrix Data Sheet Problem Consumer file sharing services such as Hightail, WeTransfer and Dropbox are causing a massive headache for enterprise IT as BYOFT (bring your own file transfer) opens up vulnerabilities

More information

WHAT IS VIRTUAL DESKTOP? WHAT YOU NEED LOG IN TO VIRTUAL DESKTOP SET UP CITRIX RECEIVER REMOTE ACCESS GUIDE

WHAT IS VIRTUAL DESKTOP? WHAT YOU NEED LOG IN TO VIRTUAL DESKTOP SET UP CITRIX RECEIVER REMOTE ACCESS GUIDE WHAT IS VIRTUAL DESKTOP? Virtual Desktop is an online environment that allows you to access NSF applications and a virtual desktop that mimics a Windows 7 environment. You can use Virtual Desktop to use

More information

TABLE OF CONTENTS. Legend:

TABLE OF CONTENTS. Legend: user guide Android Ed. 1.1 TABLE OF CONTENTS 1 INTRODUCTION... 4 1.1 Indicators on the top tool bar... 5 1.2 First control bar... 7 1.3 Second control bar... 7 1.4 Description of the icons in the main

More information