Keep Yourself Safe from the Prying Eyes of Hackers and Snoopers!

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Keep Yourself Safe from the Prying Eyes of Hackers and Snoopers!"

Transcription

1 Protect Your Privacy Online P 7/1 Keep Yourself Safe from the Prying Eyes of Hackers and Snoopers! With the information in this article you can: Find out what secret information your PC is sharing with others Use an anonymous proxy to restrict access to your personal data when browsing the web Discover great free software to surf, chat privately and send secure The desire to remain anonymous on the Internet is not necessarily an indication of nefarious activity. People do not walk around in public with their phone numbers visibly displayed. It is just common sense to be selective about those you share personal information with. The same degree of caution should apply when we use the Internet. You may be surprised to discover what your computer is publicly announcing about its internal settings. So, why would anyone be interested? There are a variety of reasons that users might be snooping on your activities. Examples might include: profiling your interests for marketing purposes, identity theft, payment card theft, hijacking your PC for a further crime or just a voyeuristic interest in your personal communications. This article will show you how to surf, and chat without having to worry about online snoopers. Dr Steve North: It amazes me that the free software tools in this article make industry standard encryption and anonymity available to all of us. Just remember better safe than sorry! Protect yourself from snoopers and hackers online... P 7/2 Hide your PC s details with anonymous proxies... P 7/3 Secure your with Crypto Anywhere... P 7/4 Anonymous web browsing with JAP... P 7/9 Safe online chat using PSST... P 7/11 1

2 P 7/2!? Protect Your Privacy Online Protect Yourself from Snoopers and Hackers Online The two key elements to protecting your online privacy are: limiting the information that you reveal when you are web browsing and encrypting (encoding) some or all of your and chat communication. To find out what information your computer is sharing when you are online, open Internet Explorer and browse to the web page: This will produce a report similar to the one shown below. Your IP address. Your browser..net is installed. You are using XP. The time/date on your PC. Websites visited. Your home network. Software installed. An example of your online profile 2

3 Protect Your Privacy Online P 7/3 All of the information listed on the report can be used by a hacker as a possible avenue to attack your PC (called an attack vector in the computer security industry). Before closing this section, it should be noted that a reputable website would automatically encrypt your payment card details. An encrypted page will have a URL starting with https: ( s stands for secure) and a locked padlock icon at the bottom right of the browser window. Hide Your PC s Details with Anonymous Proxies A quick Internet search with Google for anonymous prox y will produce many hits. These are free websites that allow users to browse the Internet without revealing their identities. For each page that you visit, you will need to type a URL into the appropriate text field on the prox y s web page. A proxy acts as an intermediary between your computer and the information that you require. It fetches the web page data on your behalf and forwards it on to your browser. Free anonymous proxy websites come and go on the Internet with great frequency. Try the following free proxies to protect your web browsing: To establish the level of anonymity offered by an anonymous p r ox y, visit the security analysis mentioned above (h t t p : / / w w w. l e a d e r. r u / c g i - b i n / g o? w h o) and note the differences in the security report. Using megaproxy with the same computer that was used to produce the resulting figure on page P 7/2, a quick test revealed that online visibility had been greatly reduced. The only information available via megaproxy is: the browser name, browser version, Windows version (or other operating system), supported languages Secure web pages have a URL starting with https and display a locked padlock icon.!? Surf the web without giving away your personal information. You can test anonymous proxies to see how much information you are sharing. 3

4 P 7/4 Protect Your Privacy Online Megaproxy significantly improves your privacy. (but not which is actually being used) and the status of the browser s JavaScript (enabled or disabled). The following information is completely hidden by megaproxy: IP address, ISP s mail server, websites visited during the current browsing session, the browser s interface language, the processor family (for example Pe n t i u m ), Internet connection type (for example via Local Area Network), available monitor screen sizes, the currently selected screen resolution and colour depth, cookie status (enabled or disabled), Java status (enabled or disabled) and a complete list of common applications (mainly Microsoft software but also popular plug-ins). In the remaining sections of this article, you will learn about some great free tools to improve your online privacy. All of the software can be found on the CD accompanying this update, either as a download or by following the links provided.!? Crypto Anywhere is small enough to fit on a floppy disk or a USB flash drive. You can safely distribute your public key. Secure Your with Crypto Anywhere Crypto Anywhere is a tiny encryption program (a program to encode your ). It is small enough to fit on a USB flash drive, but provides industry-standard protection. This means that you can take it with you to a cyber-café and still send secure s. This software makes use of strong encryption algorithms based on public key techniques. Crypto Anywhere can be downloaded by clicking the link provided on the CD accompanying this update: h t t p : / / w w w. b y t e f u s i o n. c o m / p r o d u c t s / e n s / c r y p t o a n y w h e r e / whatiscryptoanywhere.htm The essence of public key security is that anyone can send an encrypted message to you but only you can read it. The public key that someone uses to send you a secure can be freely distributed to anyone. Having the public key does not allow a third party to read an intercepted . It only allows them to send you an encrypted mail. It is common 4

5 Protect Your Privacy Online P 7/5 practice to attach public keys to signatures, so that others can mail you securely. Your private key must never be shared with anyone. Every user has a unique pair of public and private keys. To send someone an encrypted , you need to have his or her public key. Therefore, they will need to be using Crypto Anywhere or a compatible tool (Crypto Anywhere is compatible with PGP Pretty Good Privacy and most popular encryption software). Once you have received a public key from your friend (remember this initial does not need to be secure, anybody is allowed access to the public key), you can start sending them secure s. It s even possible to send encrypted to users who do not have Crypto Anywhere. This is sent as a self-extracting attachment, which will reveal its contents only when the recipient enters a pre-arranged password. Configuring Crypto Anywhere It s time to get Crypto Anywhere up and running. Luckily, it has its own very simple configuration wizard. To get started: 1. After installing Crypto Anywhere, a configuration wizard will run. Select Yes, configure now and then click Next. 2. If you want to use Crypto Anywhere with Microsoft Outlook, select Yes (otherwise select No) and then click Next. Note: even if you select No, Crypto Anywhere will integrate itself with Outlook Express. 3. Select Use Direct Drop recommended. Note: if your encrypted s fail to arrive, you may need to reconfigure this to Use my ISP s mail server. To configure it in this way, you will need to enter the details for your account (user, password, mail server etc). Using your ISP s mail server may not be possible if you are not connected to the Internet via the same ISP (you might be in a cyber-café, for example). Crypto Anywhere will work with most other encryption software tools and can even send secure mail to users without appropriate software. Direct Drop will send the encrypted straight to the recipient s mail server. 5

6 P 7/6 Protect Your Privacy Online A longer pass phrase generates stronger encryption. 4. If Crypto Anywhere says that it has detected an installation of SecExMail, select No, do not import keys and then click Next. 5. Select Yes, create encryption keys now and then click Finish. 6. On the Choose New Key Type screen, select Create SecExtMail Key RSA + Twofish. 7. Click OK > Next. 8. Enter your name and address. 9. Click Next. 10. Select 2048 bits safe. 11. Click Next. 12. Enter a memorable pass phrase (twice). Note: the strength of the cryptographic protection is indicated and it is stronger with a longer phrase. 13. Click Next. 14. Click randomly on the window but try to evenly cover the screen with cross hairs. 15. Click OK > Next > OK. 16. Click Finish > OK. Random mouse clicks are used to create a unique cryptographic key. Configuring Crypto Anywhere in Windows XP 6

7 Protect Your Privacy Online P 7/7 Getting Started with Crypto Anywhere and Outlook Express Crypto Anywhere will work perfectly happily on its own without Outlook or Outlook Express. However, using it in this manner does result in one disadvantage. Any encrypted outgoing will not be saved with your regular . Encrypted s arriving in your client will still need pasting into Crypto Anywhere, for decryption. The copy in your inbox will remain in its encrypted form. As described above, integrating Crypto Anywhere with Outlook is presented as an option during the configuration wizard. To switch it on or off after configuration, you can access the option as follows: 1. In the left pane of Crypto Anywhere, click Configuration > Outlook Integration. 2. Tick Integrate with Outlook Office (or un-tick it to cancel integration). 3. Click OK to dismiss the confirmation alert. Integration with Outlook Express is automatically established during initial configuration. If you do want to change its status, you will find an appropriate option in the same location as above: 1. In the left pane of Crypto Anywhere, click Configuration > Outlook Integration. 2. Tick Integrate with Outlook Express at start-up (or un-tick it to cancel integration). 3. Tick Minimize to system tray at start-up (or un-tick it to cancel integration). Outlook Express integration will only work if Crypto Anywhere is running first. This option starts and minimises Crypto Anywhere, each time Windows starts. 4. Click OK to dismiss the confirmation alert. Note that integration is only possible with Outlook Express versions 5 or 6. Using Crypto Anywhere with Outlook Express ensures that all of your is stored in one location. Remember to start Crypto Anywhere before you run Outlook Express. 7

8 P 7/8 Protect Your Privacy Online Try sending a test to yourself to confirm installation. You will need to communicate the password to the recipient. Encrypting outgoing with Crypto Anywhere and Outlook Express To encrypt an from Outlook Express: 1. Start Crypto Anywhere (if not already started). You may need to click Use Unregistered Version. 2. Start Outlook Express. 3. Compose an in the normal manner. 4. Click the new Outlook Express toolbar button Encrypt before sending (note that this button toggles and nothing will happen until you click Send). 5. Click Send. Crypto Anywhere s For your eyes only screen will open. 6. If the intended recipient s public key is shown in the list, select it and click OK. If you are just testing how this works, then send yourself an . Your public key should be on the list. 7. If you don t yet have the intended recipient s public key, then select no key. The address from Outlook Express should appear under Self Decrypting Enter a password of your choosing (twice). Remember that you will have to communicate this password to the recipient in some manner. Don t send it by , as this defeats the object of the exercise! 9. Click OK and Outlook Express should now send the encrypted . You can confirm this by looking in the Sent Items folder of Outlook Express. A self-decrypting will appear as an attachment. Decrypting incoming with Crypto Anywhere and Outlook Express This subsection will help you to decrypt an received in Outlook Express. This might include a test message that you have sent to yourself. To proceed: 8

9 Protect Your Privacy Online P 7/9 1. Start Crypto Anywhere (if not already started). You may need to click Use Unregistered Version. 2. Start Outlook Express. 3. Double-click on the received , so that it opens in its own window. This is the only way to see the Decrypt Message button on the toolbar. 4. Click Decrypt Message. 5. Crypto Anywhere should display the decrypted version in a window headed Your Message. Remember that the version in your Outlook Express inbox will remain encrypted. If you want the message in a readable format, you will need to save it as a text file, or decrypt it each time you read it. Anonymous Web Browsing with JAP The free tool JAP performs in a similar manner to the anonymous proxies described earlier. It provides anonymous web browsing, preventing others from tracking your online activities. JAP works by sharing a single, static IP address amongst all users of the software. You can download JAP by clicking on the link provided on the CD accompanying this update: Instead of connecting directly to a web server, your browsing is conducted through several encrypted intermediaries. These are called mixes. A predetermined sequence of mixes is called a mix cascade. Your connection is hidden among the connections of all the other users. Not even the provider of the intermediary mixes can determine which connection belongs to which user. Independent institutions such as universities, which officially declare that they do not keep connection log files, generally provide mixes. The big advantage to using JAP (as compared to the various anonymous proxies) is that you You need to double-click on the in order to display the Decrypt Message button.!? JAP shares a single IP address amongst a group of users. With JAP you can use your favourite browser. 9

10 P 7/10 Protect Your Privacy Online don t have to type URLs into the proxy s web page. You can use your favourite browser, in the normal manner. Configure Internet Explorer to work with JAP. Verify that JAP is hiding your IP address. 10 Getting started with JAP The interface for JAP is partially in English, with some items described in the developer s native German. As only one click is required to activate it, this should not prove problematic. To set up JAP for Internet Explorer, perform the following steps: 1. Start JAP. 2. Under the section Ananymität (anonymity), select Ein. The needle on the anonymity meter should now indicate low, fair or high. A low setting indicates that not many other users are currently sharing the same JAP IP address. The more users that are online, the more secure your identity will become. 3. Start Internet Explorer. 4. Click Tools > Internet Options > Connections. 5. If you use a dial-up Internet connection, select your connection from the Dial-up and Virtual Private Network settings section. Click on Settings. 6. If you use a broadband Internet connection, click LAN Settings... under the Local Area Network (LAN) settings section. 7. Select Use a proxy server for this connection (or Use a proxy server for your LAN). 8. Type: as the proxy server and 4001 as the port. 9. Click OK > OK. Note that if you now browse to cgi-bin/go?who (the checker that we used earlier in this article), you should see that your real IP address is no longer visible. To surf anonymously, you will need to start JAP as well as Internet Explorer. To surf without JAP, you will need to disable the proxy by unselecting the Use a proxy server

11 Protect Your Privacy Online P 7/11 for this connection (or Use a proxy server for your LAN) option in Internet Explorer. Safe Online Chat Using PSST This is a simple, highly encrypted, peer-to-peer instant messaging tool. Unlike many instant chat applications, PSST does not use an intermediary server. Instead, messages pass directly between the two users engaged in chatting. This arrangement is known as P2P (peer-to-peer). You can download PSST from the CD accompanying this update. There are two things that you will need to check with the remote user before staring a secure chat session. Firstly, you will need to agree a question and answer phrase to use for security. This can be anything. For example: Q. What colour is the dog? A. Black. All that matters is that the person initiating the connection remembers both the question and answer. The other user only needs to know the answer. This provides a further level of security, to make sure that your chat session has not been hijacked by a malicious third party. Secondly, the chat initiator will need to know the IP address of the remote user. If the remote user s ISP (Internet Service Provider) allocates static IPs, then you will only need to find this out once. If the allocation is dynamic, the IP will change each time the remote user connects to the Internet. For a broadband connection, this number will stay the same for days, weeks or months at a time. For a dial-up connection, the IPs will change for each session. If the IP is dynamic and the remote user has reconnected, you will need to know the new IP address. The remote user will need to check his or her current IP address, by proceeding as follows: 1. Click Start > Run. 2. Type: ipconfig 3. Press Enter.!? PSST does not use an intermediary server. Time to choose a simple question and answer. Ask your chat partner to check his or her IP address. 11

12 P 7/12 Protect Your Privacy Online If you are using a LAN, check the IP address using your router s interface. Use the question and answer to provide extra security. This prevents your chat from being vulnerable to a man-in-themiddle attack. Please note: if you are connected via a LAN (Local Area Network), the ipconfig command may return a local IP address (one that is not reachable over the Internet). If this is the case, you will need to use your router s browser interface (please refer to the manual) to discover its public IP address. Get chatting with PSST To start chatting, both users will need to start their copies of PSST. You (as the local user) will need to establish a connection, as follows: When prompted, move your mouse around randomly. This happens each time that you start PSST and is a part of the encryption process. 1. Click Connect. 2. Type the remote user s IP address into the appropriate field. 3. Click OK. 4. Type the answer to the agreed question. 5. Click OK. You should see the message: Correct answer received connection secured. 6. You can now type a message into the appropriate text field and then click Send to transmit it to the remote user. 7. Click Quit when you wish to end a chat session That s it! Now you can surf the web, and chat without constantly looking over your virtual shoulder. By using encryption techniques you can be confident that the data you send over the Internet cannot be read by anyone other than the intended recipient. Just be careful out there 12

User Guide. Version 3.0 April 2006

User Guide. Version 3.0 April 2006 User Guide Version 3.0 April 2006 2006 Obvious Solutions Inc. All rights reserved. Dabra and Dabra Network are trademarks of Obvious Solutions Inc. All other trademarks owned by their respective trademark

More information

RAPID BROADBAND INSTALLATION RAPID BROADBAND SUPPORT CONTACT DETAILS. support@rapidbroadband.ie AND TROUBLESHOOTING GUIDE. Email: Tel: 076 6708787

RAPID BROADBAND INSTALLATION RAPID BROADBAND SUPPORT CONTACT DETAILS. support@rapidbroadband.ie AND TROUBLESHOOTING GUIDE. Email: Tel: 076 6708787 RAPID BROADBAND INSTALLATION AND TROUBLESHOOTING GUIDE RAPID BROADBAND SUPPORT CONTACT DETAILS Email: support@rapidbroadband.ie Tel: 076 6708787 January 2008 1 INTERNET CONNECTION TROUBLESHOOTING GUIDE

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

HomeNet. Gateway User Guide

HomeNet. Gateway User Guide HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Xythos on Demand Quick Start Guide For Xythos Drive

Xythos on Demand Quick Start Guide For Xythos Drive Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document

More information

Setting up Email in Outlook Express

Setting up Email in Outlook Express Setting up Email in Outlook Express If you have more than one email account but need to use a single computer to access them, then Outlook Express can help. To begin, open Outlook Express by double-clicking

More information

Overview Keys. Overview

Overview Keys. Overview Overview Keys Overview The PGPmail program performs fast, high-security, public-key encrypting (with optional compression), decrypting, and authenticating of electronic messages and files. The program

More information

4. Click Next and then fill in your Name and E-mail address. Click Next again.

4. Click Next and then fill in your Name and E-mail address. Click Next again. NOTE: Before installing PGP, Word needs to be disabled as your editor in Outlook. In Outlook, go to Tools: Options: Mail Format and uncheck Use Microsoft Office Word to edit e-mail messages. Failure to

More information

PGP Desktop Email Quick Start Guide version 9.6

PGP Desktop Email Quick Start Guide version 9.6 What is PGP Desktop Email? PGP Desktop Email is part of the PGP Desktop family of products. You can use PGP Desktop Email to: Automatically and transparently encrypt, sign, decrypt, and verify email messages

More information

CNW Re-Tooling Exercises

CNW Re-Tooling Exercises CNW Re-Tooling Exercises I Exercise 1: VPN... 1 Scenario... 1 Detail Steps to perform exercise:... 1 Exercise 2: Install and Configure a Certificate to Web Server... 4 Scenario... 4 Detail Steps to perform

More information

Microsoft Outlook Web Access Overview

Microsoft Outlook Web Access Overview Microsoft Outlook Web Access Overview Table of contents Logging on to Outlook Web Access... 3 The sections of Outlook Web Access... 4 The Inbox Toolbar... 4 How to sections... 5 Email Basics... 5 Use the

More information

Configuring your email client to connect to your Exchange mailbox

Configuring your email client to connect to your Exchange mailbox Configuring your email client to connect to your Exchange mailbox Contents Use Outlook Web Access (OWA) to access your Exchange mailbox... 2 Use Outlook 2003 to connect to your Exchange mailbox... 3 Add

More information

E-mail Encryption. How do I send my e-mail encryption key?

E-mail Encryption. How do I send my e-mail encryption key? E-mail Encryption SecurenCrypt e-mail encryption was designed to work as a plug-in with Microsoft Outlook. The following instructions are geared toward users encrypting e-mail with Outlook. However, throughout

More information

IsItUp Quick Start Manual

IsItUp Quick Start Manual IsItUp - When you need to know the status of your network Taro Software Inc. Website: www.tarosoft.com Telephone: 703-405-4697 Postal address: 8829 110th Lane, Seminole Fl, 33772 Electronic mail: Contact1@tarosoft.com

More information

Unipass Securemail Client FAQ Document v1.1. This document a summary of some of the most common questions asked about the Unipass Securemail client.

Unipass Securemail Client FAQ Document v1.1. This document a summary of some of the most common questions asked about the Unipass Securemail client. Unipass Securemail Client FAQ Document v1.1 This document a summary of some of the most common questions asked about the Unipass Securemail client. UIdP Project Team 28/06/2014 Contents Section 1 - Unipass

More information

SECURE EMAIL USER GUIDE OUTLOOK 2000

SECURE EMAIL USER GUIDE OUTLOOK 2000 WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP

More information

User's Manual. Intego Remote Management Console User's Manual Page 1

User's Manual. Intego Remote Management Console User's Manual Page 1 User's Manual Intego Remote Management Console User's Manual Page 1 Intego Remote Management Console for Macintosh 2007 Intego, Inc. All Rights Reserved Intego, Inc. www.intego.com This manual was written

More information

This guide will go through the common ways that a user can make their computer more secure.

This guide will go through the common ways that a user can make their computer more secure. A beginners guide in how to make a Laptop/PC more secure. This guide will go through the common ways that a user can make their computer more secure. Here are the key points covered: 1) Device Password

More information

Configuring, Customizing, and Troubleshooting Outlook Express

Configuring, Customizing, and Troubleshooting Outlook Express 3 Configuring, Customizing, and Troubleshooting Outlook Express............................................... Terms you ll need to understand: Outlook Express Newsgroups Address book Email Preview pane

More information

PREMIUM MAIL USER GUIDE

PREMIUM MAIL USER GUIDE PREMIUM MAIL USER GUIDE WHO THIS USER GUIDE IS FOR This document is for users of BigPond Premium Mail. It describes the features of BigPond Premium Mail from a user s perspective. It contains: A general

More information

Email Client Configuration Guide

Email Client Configuration Guide Email Client Configuration Guide Table of Contents Email Configuration...3 Email settings...3 IMAP...3 POP...3 SMTP...3 Process Overview...5 Account set up wizards...5 Anatomy of an email address...5 Why

More information

INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v15.5.0 ONWARDS)

INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v15.5.0 ONWARDS) Web: Overview INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v15.5.0 ONWARDS) This document provides an installation and configuration guide for MDaemon Messaging Server along with

More information

VPOP3 Your email post office Getting Started Guide

VPOP3 Your email post office Getting Started Guide VPOP3 Your email post office Getting Started Guide VPOP3 Getting Started Guide, version 2.1 1 Copyright Statement This manual is proprietary information of Paul Smith Computer Services and is not to be

More information

Exchange 2003 Mailboxes

Exchange 2003 Mailboxes Exchange 2003 Mailboxes Microsoft will stop supporting Exchange 2003 mailboxes in 2014 as it comes to the end of it s life. To maintain our levels of support and performance of all our customers, we will

More information

DigiDelivery Client Quick Start

DigiDelivery Client Quick Start DigiDelivery Client Quick Start Installing the DigiDelivery Client To download and install the DigiDelivery client software: 1 Launch your Web browser and navigate to www.digidesign.com/digidelivery/clients.

More information

BCTextEncoder Help File

BCTextEncoder Help File BCTextEncoder Help File Introduction Introduction Main Features BCTextEncoder Requirements BCTextEncoder Specifications 2 Introduction BCTextEncoder is a line in BestCrypt family of encryption software

More information

Changes to Skillnet Group Emails. Outlook and Outlook Express Users

Changes to Skillnet Group Emails. Outlook and Outlook Express Users Changes to Skillnet Group Emails Skillnet Group emails are moving from the current provider to our own exchange mail server. This will mean that you will have a much improved web-mail system and almost

More information

Zen Internet. Online Data Backup. Zen Vault Express for Windows. Issue: 2.0.08

Zen Internet. Online Data Backup. Zen Vault Express for Windows. Issue: 2.0.08 Zen Internet Online Data Backup Zen Vault Express for Windows Issue: 2.0.08 Contents 1 Introduction... 3 1.1 System Requirements... 3 2 Installation... 5 2.1 The Setup WIzard... 5 3 The Backup Service...

More information

Contents First Time Setup... 2 Setting up the Legal Vault Client (KiteDrive)... 3 Setting up the KiteDrive Outlook Plugin... 10 Using the Legal Vault

Contents First Time Setup... 2 Setting up the Legal Vault Client (KiteDrive)... 3 Setting up the KiteDrive Outlook Plugin... 10 Using the Legal Vault Contents First Time Setup... 2 Setting up the Legal Vault Client (KiteDrive)... 3 Setting up the KiteDrive Outlook Plugin... 10 Using the Legal Vault Outlook Plugin... 13 Using KiteDrive to Send Large

More information

Dell SonicWALL SRA 7.5 Secure Virtual Meeting and Secure Virtual Assist

Dell SonicWALL SRA 7.5 Secure Virtual Meeting and Secure Virtual Assist Dell SonicWALL SRA 7.5 Secure Virtual Meeting and Secure Virtual Assist Document Scope This document describes how to configure and use the Dell SonicWALL SRA Secure Virtual Meeting feature and the Dell

More information

WebEx Remote Access User s Guide

WebEx Remote Access User s Guide About This Guide This guide introduces you to WebEx Remote Access and its features. This guide assumes that you have a user account for your Remote Access service. Note To obtain a user account, contact

More information

Corporate Telephony Toolbar User Guide

Corporate Telephony Toolbar User Guide Corporate Telephony Toolbar User Guide 1 Table of Contents 1 Introduction...6 1.1 About Corporate Telephony Toolbar... 6 1.2 About This Guide... 6 1.3 Accessing The Toolbar... 6 1.4 First Time Login...

More information

MessageGuard 3.0 User Guide

MessageGuard 3.0 User Guide MessageGuard 3.0 User Guide Table of Contents Introduction... 3 Installing the MessageGuard Desktop Client... 3 Sending Secure E-mail Messages with the Desktop Client... 11 Reading Secure E-mail Messages

More information

Software Installation Requirements

Software Installation Requirements Software Installation Guide PrintIQ TM Software Installation Requirements Please use the following guide to ensure that you're meeting all requirements prior to installing the PrintIQ TM Xerox Device Agent

More information

Using Remote Web Workplace Version 1.01

Using Remote Web Workplace Version 1.01 Using Remote Web Workplace Version 1.01 Remote web workplace allows you to access your Windows XP desktop through Small Business Server 2003 from a web browser. 1. Connect to the Internet in your remote

More information

INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v9.5.0 ONWARDS)

INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v9.5.0 ONWARDS) Web: Overview INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v9.5.0 ONWARDS) This document is designed to provide a quick installation and configuration guide for MDaemon along

More information

How to Configure Outlook 2003 to connect to Exchange 2010

How to Configure Outlook 2003 to connect to Exchange 2010 How to Configure Outlook 2003 to connect to Exchange 2010 Outlook 2003 will install and work correctly on any version of Windows XP, Vista, Windows 7 or Windows 8. These instructions describe how to setup

More information

Using Remote Desktop to access your Office Computer or Faculty Remote Desktop Server August, 2005 This document consists of two main parts and an

Using Remote Desktop to access your Office Computer or Faculty Remote Desktop Server August, 2005 This document consists of two main parts and an Using Remote Desktop to access your Office Computer or Faculty Remote Desktop Server August, 2005 This document consists of two main parts and an addendum. The first part will be the steps required to

More information

HP ProtectTools Embedded Security Guide

HP ProtectTools Embedded Security Guide HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded

More information

Outlook 2010 Essentials

Outlook 2010 Essentials Outlook 2010 Essentials Training Manual SD35 Langley Page 1 TABLE OF CONTENTS Module One: Opening and Logging in to Outlook...1 Opening Outlook... 1 Understanding the Interface... 2 Using Backstage View...

More information

TWO WAYS TO SCHEDULE A SCOPIA VIDEO CONFERENCE BASED MEETING. 1- SCOPIA USER PORTAL 2- OUTLOOK SCOPIA MEETING PLUG-IN

TWO WAYS TO SCHEDULE A SCOPIA VIDEO CONFERENCE BASED MEETING. 1- SCOPIA USER PORTAL 2- OUTLOOK SCOPIA MEETING PLUG-IN TWO WAYS TO SCHEDULE A SCOPIA VIDEO CONFERENCE BASED MEETING. 1- SCOPIA USER PORTAL 2- OUTLOOK SCOPIA MEETING PLUG-IN USING IVIEW SCOPIA USER PORTAL TO SCHEDULE A MEETING: GO TO: http://iview.utoledo.edu:8080/

More information

GE Measurement & Control. Remote Comms System. Installation and User Reference Guide

GE Measurement & Control. Remote Comms System. Installation and User Reference Guide GE Measurement & Control Remote Comms System Installation and User Reference Guide Contents BENEFITS OF REMOTE COMMS SYSTEM... 1 HOW THE REMOTE COMMS SYSTEM WORKS... 3 COMPONENTS OF REMOTE COMMS SYSTEM...

More information

Secure Your Home Computer and Router. Windows 7 Abbreviated Version. LeRoy Luginbill, CISSP

Secure Your Home Computer and Router. Windows 7 Abbreviated Version. LeRoy Luginbill, CISSP Secure Your Home Computer and Router Windows 7 Abbreviated Version LeRoy Luginbill, CISSP TABLE OF CONTENTS Introduction... 2 Getting Ready... 5 Page 1 of 10 Introduction By giving the Introduction and

More information

Configuring Your Email Client: Outlook Express

Configuring Your Email Client: Outlook Express Configuring Your Email Client: Outlook Express Information in this document created by Webmail.us and provided by Bare Feet Studios. Table of Contents Chapter 1. Introduction... 1-1 What is an Email Client?...

More information

MECnet Portal: Using Web Based Email

MECnet Portal: Using Web Based Email DRAFT User s Manual MECnet Portal: Using Web Based Email MECnet is a division of Merrimack Education Center, a non profit organization DRAFT MECnet Portal Quick Reference Guide To access your mail, use

More information

ACCEPT THE SECURITY CERTIFICATE FOR THE WEB FILTER

ACCEPT THE SECURITY CERTIFICATE FOR THE WEB FILTER ACCEPT THE SECURITY CERTIFICATE FOR THE WEB FILTER ACCESS THE WEB FILTER VIA ITS LAN 1 IP ADDRESS ACCEPT THE SECURITY CERTIFICATE FOR THE WEB FILTER Access the Web Filter via its LAN 1 IP Address A. Launch

More information

I. Configuring Digital signature certificate in Microsoft Outlook 2003:

I. Configuring Digital signature certificate in Microsoft Outlook 2003: I. Configuring Digital signature certificate in Microsoft Outlook 2003: In order to configure Outlook 2003 to use the new message security settings please follow these steps: 1. Open Outlook. 2. Go to

More information

OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook. 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.

OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook. 5/1/2012 2012 Encryptomatic LLC www.encryptomatic. OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.com Contents What is OutDisk?... 3 OutDisk Requirements... 3 How Does

More information

WordCom, Inc. Secure File Transfer Web Application

WordCom, Inc. Secure File Transfer Web Application WordCom, Inc. Secure File Transfer Web Application Table of Contents 1. Introduction 2. Logging into WordCom s File Transfer Web Client 3. Toolbar buttons 4. Sending a package in Enhanced Mode (If installed

More information

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide September, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Exchange 2010 Outlook Profile Configuration... 1 Outlook Profile

More information

Point to Point Broadband Internet Service Business

Point to Point Broadband Internet Service Business Point to Point Broadband Internet Service Business [Type the company name] USER GUIDE VERSION 1.012010 [Type the document subtitle] Table of Contents Welcome to Point to Point Broadband!... 2 Disclaimer.

More information

Configuring Your Email Client: Outlook Express. Quick Reference

Configuring Your Email Client: Outlook Express. Quick Reference Configuring Your Email Client: Outlook Express Quick Reference Table of Contents Chapter 1. Introduction...1-1 What is an Email Client?...1-1 Who Should Read This Manual?...1-1 POP, IMAP, and SSL: Which

More information

How to Remotely View Security Cameras Using the Internet

How to Remotely View Security Cameras Using the Internet How to Remotely View Security Cameras Using the Internet Introduction: The ability to remotely view security cameras is one of the most useful features of your EZWatch Pro system. It provides the ability

More information

Getting Started with WebEx Access Anywhere

Getting Started with WebEx Access Anywhere Getting Started with WebEx Access Anywhere This guide provides basic instructions to help you start using WebEx Access Anywhere quickly. This guide assumes that you have a user account on your meeting

More information

VNC User Guide. Version 5.0. June 2012

VNC User Guide. Version 5.0. June 2012 VNC User Guide Version 5.0 June 2012 Trademarks VNC is a registered trademark of RealVNC Ltd. in the U.S. and in other countries. Other trademarks are the property of their respective owners. Protected

More information

INTRODUCTION TO CRYPTOGRAPHY

INTRODUCTION TO CRYPTOGRAPHY INTRODUCTION TO CRYPTOGRAPHY AUTHOR: ANAS TAWILEH anas@tawileh.net Available online at: http://www.tawileh.net/courses/ia This work is released under a Creative Commons Attribution-ShareAlike 2.5 License

More information

USER GUIDE. General Information... 2. The BeAnywhere Service... 2. BeAnywhere Server... 2. BeAnywhere DRIVE... 2. Security... 2

USER GUIDE. General Information... 2. The BeAnywhere Service... 2. BeAnywhere Server... 2. BeAnywhere DRIVE... 2. Security... 2 USER GUIDE TABLE OF CONTENTS General Information... 2 The BeAnywhere Service... 2 BeAnywhere Server... 2 BeAnywhere DRIVE... 2 Security... 2 Level 1 User Security... 3 Level 2 Communications Security...

More information

Using Avaya Flare Experience for Windows

Using Avaya Flare Experience for Windows Using Avaya Flare Experience for Windows Release 9.0 Issue 02.01 September 2013 Contents Chapter 1: About Flare Experience... 5 About Flare Experience... 5 Main window... 6 Button descriptions... 10 Chapter

More information

Microsoft Exchange Mailbox Email Software Setup Guide

Microsoft Exchange Mailbox Email Software Setup Guide Microsoft Exchange Mailbox Email Software Setup Guide Microsoft Exchange Mailbox Setup Guide Setting up a Microsoft Exchange mailbox only takes a few minutes. You can set up any email software to send

More information

Student Mail Access. Introduction. Option One: Using an E-mail Client

Student Mail Access. Introduction. Option One: Using an E-mail Client Student Mail Access Introduction There are two ways that you will be able to access your e-mail from any location. You can use an e-mail client or a Web browser (p. 11). These options will be accessible

More information

Email client configuration guide. Business Email

Email client configuration guide. Business Email Email client configuration guide Business Email August 2013 Contents 1. Mac Email Clients 1.1 Downloading Microsoft Outlook (Professional Plan Users) 1.2 Configuring Microsoft Outlook (Full Exchange Server

More information

AXIS Camera Station Quick Installation Guide

AXIS Camera Station Quick Installation Guide AXIS Camera Station Quick Installation Guide Copyright Axis Communications AB April 2005 Rev. 3.5 Part Number 23997 1 Table of Contents Regulatory Information.................................. 3 AXIS Camera

More information

Law Conferencing uses the Webinterpoint 8.2 web conferencing platform. This service is completely reservationless and available 24/7.

Law Conferencing uses the Webinterpoint 8.2 web conferencing platform. This service is completely reservationless and available 24/7. Law Conferencing uses the Webinterpoint 8.2 web conferencing platform. This service is completely reservationless and available 24/7. This document contains detailed instructions on all features. Table

More information

USER GUIDE WWPass Security for Email (Outlook) For WWPass Security Pack 2.4

USER GUIDE WWPass Security for Email (Outlook) For WWPass Security Pack 2.4 USER GUIDE WWPass Security for Email (Outlook) For WWPass Security Pack 2.4 March 2014 TABLE OF CONTENTS Chapter 1 Welcome... 4 Introducing WWPass Security for Email (Outlook)... 5 Supported Outlook Products...

More information

Honeywell Secure Email External User Guide August 2013

Honeywell Secure Email External User Guide August 2013 Honeywell Secure Email External User Guide August 2013 PAGE: 1 of 14 Chapter No Table of Content Page No 1 Introduction 3 2 Using the Honeywell Secure Email Interface 3 3 Sending an Encrypted Email to

More information

Microsoft Outlook Quick Reference Sheet

Microsoft Outlook Quick Reference Sheet Microsoft Outlook is an incredibly powerful e-mail and personal information management application. Its features and capabilities are extensive. Refer to this handout whenever you require quick reminders

More information

Departmental (Service) Account Set Up

Departmental (Service) Account Set Up Departmental (Service) Account Set Up Exchange does not offer an exact equivalent to GroupWise proxy. Listed below are different methods of accessing your departmental or service account. All require that

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab

Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab Microsoft Corporation Published: May, 2005 Author: Microsoft Corporation Abstract This guide describes how to create

More information

Quick Start Guide v4.0 Client Outlook Connection

Quick Start Guide v4.0 Client Outlook Connection Quick Start Guide v4.0 Client Outlook Connection Contents Chapter 1 Outlook Anywhere - Outlook Anywhere 3 - Setting up Outlook Anywhere for PC 4 - Setting up Outlook for Mac 9 CLIENT OUTLOOK CONNECTION

More information

Computing Guide. Web authentication access to restricted Web pages from off campus

Computing Guide. Web authentication access to restricted Web pages from off campus Computing Guide THE LIBRARY www.salford.ac.uk/library Web authentication access to restricted Web pages from off campus Some of the University s web pages and services are restricted to University of Salford

More information

Symantec File Share Encryption Quick Start Guide Version 10.3

Symantec File Share Encryption Quick Start Guide Version 10.3 Symantec File Share Encryption Quick Start Guide Version 10.3 What is Symantec File Share Encryption? Symantec File Share Encryption is a software tool that provides multiple ways to protect and share

More information

Hosted Microsoft Exchange Client Setup & Guide Book

Hosted Microsoft Exchange Client Setup & Guide Book Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows Mobile Phone ActiveSync setup & configuration Section 3 - Apple iphone

More information

CITRIX TROUBLESHOOTING TIPS

CITRIX TROUBLESHOOTING TIPS CITRIX TROUBLESHOOTING TIPS The purpose of this document is to outline the Most Common Frequently Asked Questions regarding access to the County of York Computer Systems via Citrix. SYSTEM REQUIREMENTS:

More information

Vodafone Text Centre User Guide for Microsoft Outlook

Vodafone Text Centre User Guide for Microsoft Outlook Vodafone Text Centre User Guide for Microsoft Outlook 1 Contents Introduction 1 System requirements 2 Installation 3 The installation guide 3 First use 5 Send a message 8 Select recipient 8 Enter the message

More information

Module One: Getting Started... 6. Opening Outlook... 6. Setting Up Outlook for the First Time... 7. Understanding the Interface...

Module One: Getting Started... 6. Opening Outlook... 6. Setting Up Outlook for the First Time... 7. Understanding the Interface... 2 CONTENTS Module One: Getting Started... 6 Opening Outlook... 6 Setting Up Outlook for the First Time... 7 Understanding the Interface...12 Using Backstage View...14 Viewing Your Inbox...15 Closing Outlook...17

More information

CamGuard Security System CamGuard Security System Manual

CamGuard Security System CamGuard Security System Manual CamGuard Security System Manual JMC Electron Co.,LTD Brief Introduction... 3 Features... 3 System Requirements... 3 Configuration... 4 Add Camera... 4 Device Options... 4 About Alarm... 5 Alarm Actions...

More information

Regain Your Privacy on the Internet

Regain Your Privacy on the Internet Regain Your Privacy on the Internet by Boris Loza, PhD, CISSP from SafePatrol Solutions Inc. You'd probably be surprised if you knew what information about yourself is available on the Internet! Do you

More information

Gold Lock Desktop. User Manual. Follow these simple steps to install, configure, and use Gold Lock Desktop.

Gold Lock Desktop. User Manual. Follow these simple steps to install, configure, and use Gold Lock Desktop. User Manual Follow these simple steps to install, configure, and use. Content 1 Installation...02 2 Configuration...03-06 3 Use...07 4 Verification & Security...08 5 Backup & Restore...09 6 File Encryption...10

More information

Online Backup by Mozy. Restore Common Questions

Online Backup by Mozy. Restore Common Questions Online Backup by Mozy Restore Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 How do I restore my data? There are five ways of restoring your data: 1) Performing

More information

Outlook Email. User Guide IS TRAINING CENTER. 833 Chestnut St, Suite 600. Philadelphia, PA 19107 215-503-7500

Outlook Email. User Guide IS TRAINING CENTER. 833 Chestnut St, Suite 600. Philadelphia, PA 19107 215-503-7500 Outlook Email User Guide IS TRAINING CENTER 833 Chestnut St, Suite 600 Philadelphia, PA 19107 215-503-7500 This page intentionally left blank. TABLE OF CONTENTS Getting Started... 3 Opening Outlook...

More information

Endpoint Security VPN for Windows 32-bit/64-bit

Endpoint Security VPN for Windows 32-bit/64-bit Endpoint Security VPN for Windows 32-bit/64-bit E75.20 User Guide 13 September 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected

More information

ProxyCap Help. Table of contents. Configuring ProxyCap. 2015 Proxy Labs

ProxyCap Help. Table of contents. Configuring ProxyCap. 2015 Proxy Labs ProxyCap Help 2015 Proxy Labs Table of contents Configuring ProxyCap The Ruleset panel Loading and saving rulesets Delegating ruleset management The Proxies panel The proxy list view Adding, removing and

More information

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved. GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...

More information

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0 Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers

More information

TeamViewer 8 Manual Remote Control

TeamViewer 8 Manual Remote Control TeamViewer 8 Manual Remote Control Rev 8.1-12/2012 TeamViewer GmbH Kuhnbergstraße 16 D-73037 Göppingen www.teamviewer.com Table of Contents 1 About TeamViewer... 6 1.1 About the software... 6 1.2 About

More information

Global VPN Client Getting Started Guide

Global VPN Client Getting Started Guide Global VPN Client Getting Started Guide PROTECTION AT THE SPEED OF BUSINESS Introduction The SonicWALL Global VPN Client creates a Virtual Private Network (VPN) connection between your computer and the

More information

MN-700 Base Station Configuration Guide

MN-700 Base Station Configuration Guide MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station

More information

Using desktop ANYWHERE

Using desktop ANYWHERE Using desktop ANYWHERE A facility for students and staff which provides access to University IT facilities from most computers which have a connection to the Internet. Using a web browser you can access:

More information

Technical Publications. Author: Zultys Technical Support Department

Technical Publications. Author: Zultys Technical Support Department September 09 MXMeeting User Guide Author: Zultys Technical Support Department MXMeeting is a multi-function web collaboration system. The client-server architecture requires Internet connectivity for its

More information

Microsoft Exchange Mailbox Email Software Setup Guide

Microsoft Exchange Mailbox Email Software Setup Guide Microsoft Exchange Mailbox Email Software Setup Guide Microsoft Exchange Mailbox Setup Guide Setting up a Microsoft Exchange mailbox only takes a few minutes. You can set up any email software to send

More information

Merak Outlook Connector User Guide

Merak Outlook Connector User Guide IceWarp Server Merak Outlook Connector User Guide Version 9.0 Printed on 21 August, 2007 i Contents Introduction 1 Installation 2 Pre-requisites... 2 Running the install... 2 Add Account Wizard... 6 Finalizing

More information

Sending an Encrypted/Unencrypted Message. Let's Begin: Log In and Set Up Security Questions. Create Additional ProMailSource Accounts:

Sending an Encrypted/Unencrypted Message. Let's Begin: Log In and Set Up Security Questions. Create Additional ProMailSource Accounts: Let's Begin: Log In and Set Up Security Questions To start, you can log in from the ProMailSource home page. Sending an Encrypted/Unencrypted Message Every message you send through ProMailSource is automatically

More information

Small Business Backup & Recovery (File Servers, Peer-to-Peer, Laptops, Desktops)

Small Business Backup & Recovery (File Servers, Peer-to-Peer, Laptops, Desktops) Small Business Backup & Recovery (File Servers, Peer-to-Peer, Laptops, Desktops) Smart Features: Continuous Backup Anywhere Access to Backed Up Data Simple Rate Plan Secure Bank Grade Encryption Open Files

More information

MS Live Communication Server managed by TELUS. Getting Started Guide. v. 1.0

MS Live Communication Server managed by TELUS. Getting Started Guide. v. 1.0 MS Live Communication Server managed by TELUS Getting Started Guide v. 1.0 Table of Contents Getting Connected...1 Managing Contacts...2 Searching for a Contact...2 Adding a Contact to Your Contacts List...2

More information

Get Started Guide - PC Tools Internet Security

Get Started Guide - PC Tools Internet Security Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools

More information

Host Access Management and Security Server

Host Access Management and Security Server Host Access Management and Security Server Evaluation Guide Host Access Management and Security Server Evaluation Guide 12.2 Copyrights and Notices Copyright 2015 Attachmate Corporation. All rights reserved.

More information

Installing the Microsoft Network Driver Interface

Installing the Microsoft Network Driver Interface Installing the Microsoft Network Driver Interface Overview This guide explains how to install the PictureTel Live200 Microsoft Network Driver Interface (NDIS) software you have downloaded from PictureTel's

More information

Core Essentials. Outlook 2010. Module 1. Diocese of St. Petersburg Office of Training Training@dosp.org

Core Essentials. Outlook 2010. Module 1. Diocese of St. Petersburg Office of Training Training@dosp.org Core Essentials Outlook 2010 Module 1 Diocese of St. Petersburg Office of Training Training@dosp.org TABLE OF CONTENTS Topic One: Getting Started... 1 Workshop Objectives... 2 Topic Two: Opening and Closing

More information