Home Computing Security Awareness

Size: px
Start display at page:

Download "Home Computing Security Awareness"

Transcription

1 Hme Cmputing Security Awareness Hme cmputing carries the same srt f risks t yur persnal infrmatin and persnal financial infrmatin that industry cmputing des t sensitive Cmpany infrmatin. The purpse f bad actrs in the hme cmputing envirnment is the same as bad actrs in the business envirnment, namely t steal yur sensitive infrmatin, gain the ability t infect yur hme cmputer with malware and spyware, and derive sme financial r persnal satisfactin rewards ut f disrupting the life f the hme cmputing victim. Eternal vigilance by the peple is the price f liberty! This is just as true tday fr the safety and security f the hme cmputing envirnment as it was in 1837 fr President Andrew Jacksn, as he made his farewell address n leaving ffice. The purpse f this shrt Hme Cmputing Security Awareness Mdule is t help the hme cmputing user identify cmmn threats, and t defend themselves, and their data against bad actrs wrking hard t deny them the liberty t pursue their infrmatin freedm f use, withut ging t the extent f turning ff their cmputer access t the wrld utside. There are multiple layers f prtectin in yur radial tires t prtect yu frm rad hazards, and yu need the same srt multi layered apprach t prtecting yur cmputer. Up tp date OS, Up t date Firewalls, Up t date AV prtectin. The starting pint f safe and prductive usage f yur hme cmputer is t defend it against the bad actrs f the wrld with multiple layers f defenses. Defensive Cmputing Define Apprpriate User Access Level Starting at the initial user definitin level and creating a Restricted Windws User fr rdinary access use and a Windws Admin User fr cmputer maintenance and sftware installatin. The Restricted Windws User is walled ff frm the cre f the perating system. Windws 7 calls this a standard user. They cannt insert/update/delete anything in the C\Windws flder. The perating system is helping yu defend itself against manipulatin by malware if yu are lgged in as a Restricted User. Only lg in as the Admin User when yu need t actually tweak yur system. It is nt fl prf against malware infectin, but it is a defensive layer. Develp a Strng On-Line Passwrd Mdel Begin yur prtectin layer effrts n line with a strng Passwrd mdel. Dn't use bvius base-wrds r clues like a name, birthday r date, these are easier t crack than whle phrases. Take advantage f length. An 8 character passwrd is many times mre difficult t crack than a fur digit passwrd. Fr even mre security, try t use "nnsense wrds." Cmbine these with numbers, upper case and lwer case characters, and symbls as well t make memrable, secure

2 passwrds. Fr example, start with a wrd like catdgs, and substitute upper case, symbls, and numbers, such as Ca1d0&5. Having a base wrd helps yu remember yur substitutins. Sme passwrd sites restrict length and symbls, s knw what the site requires befre yu create yur passwrd. The example catdgs culd have been Ca1d095 fr a n symbl, 8 character site. Anther alternate scheme is t use a memrable phrase t create a passwrd using the first r last r sme ther sequence frm the sequential letters t make a passwrd mdel yu can remember. Example: Give me liberty r give me death culd becme Gml0gMd Yu can write dwn yur passwrds, but keep them secure. A wallet card is much mre secure, and mre mbile, than a sheet f paper kept clse t yur cmputer. D nt write yur passwrd anywhere where it might be seen r fund. If yu stre a passwrd file n yur cmputer, encrypt the file, and be sure t remember that passwrd r write it dwn! If yu have truble remembering all the passwrds yu need, try using a passwrd manager r passwrd vault applicatin, which can reside n yur mbile phne fr cnvenience and security. They can stre all yur passwrds securely using a single master passwrd, and yur phne s encrypted strage will keep it secure. Cnsider having multiple levels f passwrds. A simple easy t remember level fr sites which yu access t read fr news r entertainment. Newsblgs, recipe sites, hbby sites, newspaper sites, all fit this definitin. This is a thrwaway level f passwrd. N great harm cmes t yu if smene cracked it. D nt use the same passwrd generatin lgic fr these as fr yur mre prtected level f passwrds! Use a higher level f mre prtective passwrds with alpha, numeric, and symbls, if pssible, fr sites where yu expse financial r persnal infrmatin, such as credit card infrmatin fr transactins. These passwrds shuld never be reused n mre than ne sites. Higher value sites (yur bank r credit card sites fr instance) shuld never have duplicate passwrds r base passwrds with a sequential number embedded that yu change t generate a new passwrd. Bbcash 10 and Bbcash11 are nt really different passwrds t use fr tw ATM accunts! Persnal Accunts f high value shuld have the passwrd changed every 90 days. Never tell anybdy yur passwrd. Smebdy culd verhear yu, r the persn yu tld culd let it slip. Knwing ne r mre f yur passwrds may help a bad actr guess mre f them. Be watchful f shulder surfers as yu enter yur passwrds, particularly in public lcatins. Change yur passwrds peridically r whenever it may have becme cmprmised. Frequent passwrd changing is required by cmpany plicy r federal law in sme businesses, but may encurage users t chse weaker passwrds r write dwn their passwrd near their cmputers. Dn't re-use an expired passwrd.

3 High value accunts, such as yur electrnic banking, may ffer the ptin f a One Time Passwrd system (OTP), using yur mbile phne t deliver yur single use passwrd. This is very secure since yu never use the same passwrd twice n that accunt. It is als pssible t btain yur wn OTP phne applicatin, and link it t yur persnal site accunts in sme cases. This again prvides a very secure passwrd if the ptin is available. Prtect Yurself Against Malware Attacks Always have up t date Anti-Virus sftware, OS, and third party sftware updates n yur hme cmputer, and update it as new patches cme ut fr the AV sftware. Prtect yurself and yur hme cmputer with an Internet firewall. Never turn it ff as it is the first line defense against dwnlading malware frm the Net. Remember that all prtective sftware is lking back at what is knwn t be bad, and avid questinable sites and activities where yu might be mre likely t discver the latest and greatest malware! Never dwnlad anything because f a pp up warning, as it is prbably a malware scam. Update all f yur sftware regularly, nt just yur Anti-Virus package. Cyber criminals wrk t explit vulnerability and the sftware vendrs wrk t prevent them frm ding it. Use the latest versins t help keep yur cmputer safe. Cnsider un-installing sftware that yu d nt use and keep updated, t minimize ptential vulnerability. Be careful with USB key sharing. Use yur anti-virus scan feature t scan any key that has been in smene else s cmputer. The USB drive may share mre than the pictures yu think are n it with yur cmputer! An infected USB stick is a cmmn carrier f malware. Prtect yurself frm a lst USB key by using encrypted keys fr yur prtable data strage. If yu lse it, yu may be incnvenienced but yu will be prtected against identity theft r theft f financial data that yu might have n yur key. Dn t be tricked int dwnlading malware. Be suspicius f any link r attachment in unknwn , instant messages r scial netwrk pst. D nt click Agree, OK, r I Accept in banner ads r ppups windws that ffer t inspect fr r remve malware r spyware. It is ften actually malware ffering t install itself! Be careful f dwnlading free games, music, r sftware ffered n websites yu are surfing. They are cmmn means f malware infectin. Always Be Skeptical When yu are n-line and an update windw pps up saying yu need t update this r that plugin, such as Flash, be skeptical. It is ften a scam t get yu t expse infrmatin t a bad actr site. G t the actual sftware site t check fr upgrades. Only dwnlad upgrades frm the riginal sftware site!

4 Keep a healthy skepticism regarding unslicited t yur accunt ffering anything ptentially attractive t yu fr just a buttn click n an attached link, as it may be Phishing! Phishing, the act f ffering a lure t see if yu will bite, is mre and mre prevalent as an based attack. Offering sme great deal r special infrmatin link just fr yu, frm smene r sme business yu d nt knw may be an attempt t lure yu t a site and acquire yur persnal infrmatin as yu register fr the deal r special ffer. Anther cmmn Phishing scam is t send yu an warning abut a large accunt charge r a cancelatin f yur accunt frm a business yu suppsedly knw. Examine thse links and addresses carefully! Lk fr scam links that shw a different address than expected when yu hver ver them. Als lk fr misspellings r slight changes in site names which yu think yu might knw. It is trivial fr a scammer t frge a Frm address t make yu think yu are dealing with a knwn business. If yu get a request fr any persnal r financial infrmatin update, r t cnfirm yur accunt infrmatin, never click a supplied link in a nte. G t the actual site f yur bank r stre accunt directly, and see if they are messaging yu t make sme accunt update r change. Dn t get caught by the Phisher! Think Befre Yu Share Persnal Infrmatin On-Line Yur persnal and family privacy depends n yur ability t cntrl the amunt f persnal infrmatin that yu prvide n-line and wh has access t that infrmatin. Identity theft is a majr cncentratin f bad actrs, and can be embarrassing persnally and financially injurius t yur family members. Read the privacy plicy f websites befre yu cntribute persnal r financial infrmatin. Privacy plicies shuld clearly explain what data the website gathers abut yu, hw it is used, shared, and secured, and hw yu can edit r delete it. Understand that sme scial media sites repeatedly change their sites, in the name f adding functinality and features, which break dwn the previusly applied privacy barriers f the users, requiring them t be reset ver and ver. Mnitr and knw when yur scial media site has brken yur privacy barricades and knw hw t reestablish them! D nt share mre than yu need t. D nt pst anything nline that yu wuld nt want made public. Minimize details that identify yu r yur whereabuts. Dn t pst yur plans fr trips and travel fr the wrld t see n yur scial media sites. Burglars use Scial Media t! Cnsider disabling yur ge lcating functinality fr yur camera if yu pst pictures. Knwing the lcatin tag f a picture gives a lt f infrmatin t a scammer trying t establish a cnnectin t yu, and may tell him where yu r yur children hang ut, wrk, r live, r g t schl. Keep yur accunt numbers, user names, and passwrds secret.

5 Only share yur primary address r Instant Message (IM) name with peple wh yu knw r with reputable rganizatins. Cnsider a secnd accunt fr public use which yu can ignre r delete withut any lss. Avid listing yur address r name n Internet directries and jb-psting sites. Be Cautius! Enter nly required infrmatin ften marked with an asterisk (*) n registratin and ther frms. Chse hw private yu want yur scial media prfile r blg t be! Mdify website settings r ptins t manage wh can see yur nline prfile r phts, hw peple can search fr yu, wh can make cmments n what yu pst, and hw t blck unwanted access by thers. Mnitr what thers pst abut yu and yur family members. Search fr yur name n the Internet using at least tw search engines. Search fr text and images. If yu find sensitive infrmatin n a website abut yurself, lk fr cntact infrmatin n the website and send a request t have yur infrmatin remved. Regularly review what thers write abut yu n blgs and scial netwrking websites. Ask friends nt t pst phts f yu r yur family withut yur permissin. If yu feel uncmfrtable with material such as infrmatin r phts that are psted n thers' websites, ask fr it t be remved. Be selective abut Friends. Cnsider adding nly thse yu actually knw r thse that yu have friends in cmmn. Dn t assume that a friend f a friend is yur friend until yu inquire with yur real friend. Scial engineering, the attempt t slicit identity infrmatin frm a user n a scial media site, usually starts with the friends yu d nt knw. They can gain a lt f initial knwledge abut yu by reading what yu pst. They can get a lt mre by careful cmmunicatin thru yur site. Wireless Internet Security Risks Dn t share everything! The wrld des nt need t knw everything abut yu. Hme WI-FI Netwrk Issues Wi-Fi netwrks (generally standard X) allw peple t wirelessly cnnect devices t the Internet, such as smartphnes, gaming cnsles, tablets, and laptps. Because Wi-Fi netwrks are simple t setup, many peple install their wn Wi-Fi netwrks at hme. Many hme Wi-Fi netwrks are cnfigured insecurely, allwing strangers r unauthrized peple t easily access yur hme netwrk r annymusly abuse yur Internet cnnectin. T ensure yu have a safe and secure hme Wi-Fi netwrk, here are a few simple steps yu shuld take. Limit the access t yur Wi-Fi Access Pint by taking time t set up security when yu set it up.

6 Always change the default administratr lgin and netwrk passwrd t smething nly yu knw. The default values are available fr almst all brands n the Internet pen t anyne! Never leave the defaults in place. It is recmmended t disable Administratr access t the settings thru the wireless netwrk. Set the cnfiguratin t require wired access thru an Ethernet cable if pssible. If yur access pint des nt have this ptin, disable HTTP and require HTPS, which supprts encryptin. Change the wireless netwrk name (ften called the SSID) t a name knwn nly t yu. Never use the default netwrk name. Set the netwrk name t Nn-bradcast r Hidden. Enable encryptin n yur netwrk by activatin f WPA2. Never run with WEP r an pen Wi-Fi netwrk. An pen netwrk allws anyne t cnnect t yur access pint. Make sure the netwrk passwrd is different frm the Administratr passwrd and nt easily guessed. Recmmended length is generally 20 characters. Yu nly have t enter it nce fr each device using the netwrk and then it is remembered by the device. Write dwn r electrnically stre this netwrk passwrd in sme nn-bvius secure place, nt taped t the access pint! If yu allw guests t use yur netwrk, yu may want t change the netwrk passwrd after they leave. Turn ff r disable WPS. Recent vulnerabilities with WPS have been uncvered which culd give an utsider access t yur wireless netwrk if it is enabled. Use f Public Wi-Fi Netwrks: Security Issues The easiest way t eavesdrp and wiretap internet cnnectins is t d s thrugh public Wi-Fi htspts. Public Wi-Fi security in mst public htspts that yu find in cafes, cffee shps, airprts, schls and htels is weak t nn-existent. Htel Wi-Fi r wired access that yu paid fr is nt autmatically always safe either. Yu are putting a lt f trust in the peratr f the htel netwrk! The FBI has warned travelers there has been an uptick in malicius sftware infecting laptps and ther devices linked t htel Internet cnnectins. The FBI stated: "Recent analysis frm the FBI and ther gvernment agencies demnstrates that malicius actrs are targeting travelers abrad thrugh pp-up windws while they are establishing an Internet cnnectin in their htel rms. Open Wi-Fi htspts run with n security encryptin which makes them very insecure! Cnsider the use f a Virtual Private Netwrk (VPN). The VPN tunnel will nt allw yur cmputer t be cnnected t tw Internet pathways, cutting ff the bad guy s access rute. Yu are transferring data in an encrypted tunnel. VPN services are available fr a mdest mnthly fee if yu need t use a lt f pen Wi-Fi, and bandwidth limited free VPN service is als available fr ccasinal users. Check it ut. Cnsider the use f nly encrypted Wi-Fi htspts utside yur hme. This is nt as secure as VPN r yur wn hme netwrk can be, but it des prvide better prtectin. Starbucks perates an encrypted netwrk at their stres, as d thers. Check befre yu cnnect! Cnsider the use f a USB cellular data card fr yur cmmunicatin access while traveling. A cellular cnnectin is encrypted and much mre secure than Wi-Fi r a htel wired netwrk, althugh yu will have a mnthly fee.

7 If yu have an iphne, r Andrid SmartPhne, yu can install a Persnal Htspt App with a data plan t allw yur iphne t act as yur laptp s cellular cnnectin. This is a very secure encrypted cnnectin t the internet fr a fee f abut $30 t $50 a mnth currently. Speed and perfrmance f SmartPhne Htspts are cmparable t lcal Wi-Fi. If yu are limited t using pen Wi-Fi htspts, yu have the ptential fr interceptin f any data transferred, thru Wi-Fi Spfing (establishment f false netwrks r false sites t steal yur authenticatin and data). Brwsing Web sites with HTTP unsecure access rather than HTTPS secure encryptin expses any data yu send ver the Internet. The Wi-Fi htspt spnsr r anther user in the immediate htspt area can intercept yur lgin infrmatin thru tls such as Firesheep. In a practice knwn as HTTP sessin hijacking (r sidejacking ) the pirating sftware intercepts brwser ckies used by many sites, including Facebk and Twitter, t identify users and allws anyne running the prgram t lg in as the spfed legitimate user, and d anything that user can d n a particular website. Spfing can get everything yu send if it is established between yu and yur intended receiver site, such as a htel r airline reservatin site, where yu wuld typically be exchanging persnal infrmatin, identity infrmatin, and credit card infrmatin. This is a Man-in-the-Middle attack. Yu are sending t the bad guy and he is recrding yur infrmatin and sending it t the intended site but nw he has a cpy f yur identity and authenticatin! Spfing can als include cntrlling the Wi-Fi t dwngrade yur HTTPS t HTTP access, leaving yu vulnerable t data hacking. If using Wi-Fi, be alert t the status f yur cnnectin as a bad actr may change it after yur sessin is established. Never send yur persnal identity infrmatin, r financial infrmatin except thru an HTTPS cnnectin which has secure encryptin! Avid pen Wi-fi if at all pssible when yu are ff f yur hme netwrk! Prtecting Yur Finances Theft f yur credit card infrmatin is a cmmn hacker attack gal. Even if yu are nt liable fr lses abve a certain amunt, the incnvenience f having t cancel accunts, and pen new accunts is majr. Cnsider the use f pay services like PayPal that allw yu t cnceal yur actual credit card infrmatin frm yur transactins. Cnsider the use f a reladable accunt card, especially fr family members playing n line multiplayer games, which ften have fees t cver electrnically. MasterCard, Visa, and American Express all ffer such cards, and lsing accunt infrmatin is nt the level f hassle that lsing a regular credit card accunt identity bring. Yu als limit yur lsses up frnt by deciding hw much balance t lad n the cards. D understand the fees assciated with these cards carefully befre yu select ne. Shp arund as there is a lt f variance and deals.

8 Physically destry hard drives in bslete PC s befre yu take them t recycle. Even if yu have a high grade disk wiping prgram, yur infrmatin can still be recvered. Encrypt sensitive files n yur hard drive, such as tax returns r yur mnthly accunt statement strage files. These files culd be very dangerus if malware cpies them ut t the bad guy. Summary The Hme Cmputing user faces the same challenges as the Business Cmputer user, but with many less resurces t help yu. Yu are n yur wn. Preparatin f yur defenses and maintaining them in a current up t date status is the key t prtecting yur cmputing envirnment. A cautius attitude and apprach t infrmatin sharing is als key t prtecting yur family and assets. Make sure that everyne in yur Hme Cmputing user envirnment is aware f the risks and the steps t take t mitigate thse risks and prtect yur family s security! Check fr advice and infrmatin n hw t make yur hme cmputing envirnment safer at: Windws Supprt-Security, Privacy, and Accunts Stay Safe Online.Org Micrsft.Cm Safety and Security Center

Social Media Security Awareness for Business or Home Computing Users

Social Media Security Awareness for Business or Home Computing Users Scial Media Security Awareness fr Business r Hme Cmputing Users The purpse f all scial media sites, whether fr business r persnal use, is cmmunicatin, sharing, and smetimes cllabratin. The benefits f the

More information

FAQs for Webroot SecureAnywhere Identity Shield

FAQs for Webroot SecureAnywhere Identity Shield FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere Identity Shield?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is the Webrt

More information

Customers FAQs for Webroot SecureAnywhere Identity Shield

Customers FAQs for Webroot SecureAnywhere Identity Shield Custmers FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere sftware?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is Webrt

More information

In addition to assisting with the disaster planning process, it is hoped this document will also::

In addition to assisting with the disaster planning process, it is hoped this document will also:: First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business

More information

Access EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3

Access EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3 EEC Single Sign In (SSI) Applicatin The EEC Single Sign In (SSI) Single Sign In (SSI) is the secure, nline applicatin that cntrls access t all f the Department f Early Educatin and Care (EEC) web applicatins.

More information

Junos Pulse Instructions for Windows and Mac OS X

Junos Pulse Instructions for Windows and Mac OS X Juns Pulse Instructins fr Windws and Mac OS X When yu pen the Juns client fr the first time yu get the fllwing screen. This screen shws yu have n cnnectins. Create a new cnnectin by clicking n the + icn.

More information

5.2.1 Passwords. Information Technology Policy. Policy. Purpose. Policy Statement. Applicability of this Policy

5.2.1 Passwords. Information Technology Policy. Policy. Purpose. Policy Statement. Applicability of this Policy Infrmatin Technlgy Plicy 5.2.1 Passwrds Plicy Area: 5.2 Security Title: 5.2.1 Passwrds Issued by: Assistant Vice-President/CIO, ITS Date Issued: 2006 July 24 Last Revisin Date: 2011 Octber 19 Apprved by:

More information

Often people have questions about new or enhanced services. This is a list of commonly asked questions and answers regarding our new WebMail format.

Often people have questions about new or enhanced services. This is a list of commonly asked questions and answers regarding our new WebMail format. Municipal Service Cmmissin Gerald P. Cle Frederick C. DeLisle Thmas M. Kaul Gregry L. Riggle Stanley A. Rutkwski Electric, Steam, Water Cable Televisin and High Speed Internet Service since 1889 Melanie

More information

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library

More information

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop.

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop. Web Develpment Offshre Develpment Outsurcing SEO ACTIVITY MONITOR This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it

More information

Hand-out:do:Nothing (social media security settings with Facebook used in examples)

Hand-out:do:Nothing (social media security settings with Facebook used in examples) Hand-ut:d:Nthing (scial media security settings with Facebk used in examples) University f Oxfrd Infrmatin Security infsec@it.x.ac.uk: www.it.x.ac.uk/infsec/prtectyurself/scialmedia/ Scial engineering

More information

Helpdesk Support Tickets & Knowledgebase

Helpdesk Support Tickets & Knowledgebase Helpdesk Supprt Tickets & Knwledgebase User Guide Versin 1.0 Website: http://www.mag-extensin.cm Supprt: http://www.mag-extensin.cm/supprt Please read this user guide carefully, it will help yu eliminate

More information

iphone Mobile Application Guide Version 2.2.2

iphone Mobile Application Guide Version 2.2.2 iphne Mbile Applicatin Guide Versin 2.2.2 March 26, 2014 Fr the latest update, please visit ur website: www.frte.net/mbile Frte Payment Systems, Inc. 500 West Bethany, Suite 200 Allen, Texas 75013 (800)

More information

Data Protection Policy & Procedure

Data Protection Policy & Procedure Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015

More information

State Bank Virtual Card FAQs

State Bank Virtual Card FAQs State Bank Virtual Card FAQs 1) What is State Bank Virtual Card? State Bank Virtual Card is a limit Debit card, which can be created using the State Bank Internet Banking facility fr ecmmerce (nline) transactins.

More information

For students to participate in BYOD please follow these two steps

For students to participate in BYOD please follow these two steps www.readingtn.k12.nj.us September 15, 2015 Dear Readingtn Middle Schl Families, We are excited t annunce that we are cntinuing with Bring Yur Own Device fr all middle schl students! We recgnize that many

More information

Internet and E-Mail Policy User s Guide

Internet and E-Mail Policy User s Guide Internet and E-Mail Plicy User s Guide Versin 2.2 supprting partnership in mental health Internet and E-Mail Plicy User s Guide Ver. 2.2-1/5 Intrductin Health and Scial Care requires a great deal f cmmunicatin

More information

Outlook Web Access Training Light Version: Using a browser other than Internet Explorer 6.0 or later. A NWOCA Training Session

Outlook Web Access Training Light Version: Using a browser other than Internet Explorer 6.0 or later. A NWOCA Training Session Outlk Web Access Training Light Versin: Using a brwser ther than Internet Explrer 6.0 r later A NWOCA Training Sessin 1 Lg On T Lg On t yur OutLk Web Access accunt, either: G t this URL: https://dwa.nwca.rg

More information

Deployment Overview (Installation):

Deployment Overview (Installation): Cntents Deplyment Overview (Installatin):... 2 Installing Minr Updates:... 2 Dwnlading the installatin and latest update files:... 2 Installing the sftware:... 3 Uninstalling the sftware:... 3 Lgging int

More information

Remote Desktop Tutorial. By: Virginia Ginny Morris

Remote Desktop Tutorial. By: Virginia Ginny Morris Remte Desktp Tutrial By: Virginia Ginny Mrris 2008 Remte Desktp Tutrial Virginia Ginny Mrris Page 2 Scpe: The fllwing manual shuld accmpany my Remte Desktp Tutrial vide psted n my website http://www.ginnymrris.cm

More information

First Global Data Corp.

First Global Data Corp. First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First

More information

KIK s GUIDE FOR LAW ENFORCEMENT

KIK s GUIDE FOR LAW ENFORCEMENT Thanks fr checking ut ur law enfrcement guide. Kik takes the safety f ur users very seriusly, and we hpe this guide will be a useful tl fr yu. It includes infrmatin abut ur app; the features and functins

More information

AMWA Chapter Subgroups on LinkedIn Guidance for Subgroup Managers and Chapter Leaders, updated 2-12-15

AMWA Chapter Subgroups on LinkedIn Guidance for Subgroup Managers and Chapter Leaders, updated 2-12-15 AMWA Chapter Subgrups n LinkedIn Guidance fr Subgrup Managers and Chapter Leaders, updated 2-12-15 1. Chapters may nt have an independent grup n LinkedIn, Facebk, r ther scial netwrking site. AMWA prvides

More information

IM, Presence, and Contacts

IM, Presence, and Contacts Find smene Lync 2013 Quick Reference IM, Presence, and Cntacts The quickest way t find smene via Lync is t launch a search by typing the persn s name r IM address in the search bx n the Lync main windw.

More information

990 e-postcard FAQ. Is there a charge to file form 990-N (e-postcard)? No, the e-postcard system is completely free.

990 e-postcard FAQ. Is there a charge to file form 990-N (e-postcard)? No, the e-postcard system is completely free. 990 e-pstcard FAQ Fr frequently asked questins abut filing the e-pstcard that are nt listed belw, brwse the FAQ at http://epstcard.frm990.rg/frmtsfaq.asp# (cpy and paste this link t yur brwser). General

More information

Welcome to Remote Access Services (RAS)

Welcome to Remote Access Services (RAS) Welcme t Remte Access Services (RAS) Our gal is t prvide yu with seamless access t the TD netwrk, including the TD intranet site, yur applicatins and files, and ther imprtant wrk resurces -- whether yu

More information

Connecting to Email: Live@edu

Connecting to Email: Live@edu Cnnecting t Email: Live@edu Minimum Requirements fr Yur Cmputer We strngly recmmend yu upgrade t Office 2010 (Service Pack 1) befre the upgrade. This versin is knwn t prvide a better service and t eliminate

More information

Information & Communications Technology ICT Security Compliance Guide (Student)

Information & Communications Technology ICT Security Compliance Guide (Student) Infrmatin & Cmmunicatins Technlgy ICT Security Cmpliance Guide (Student) RESTRICTED Dcument ID: ICT-SSG Versin 1.1 Effective Date 1 Nv 2011 Dcument Cntrl Revisin Histry Versin Date Descriptin Authr 1.0

More information

Service Desk Self Service Overview

Service Desk Self Service Overview Tday s Date: 08/28/2008 Effective Date: 09/01/2008 Systems Invlved: Audience: Tpics in this Jb Aid: Backgrund: Service Desk Service Desk Self Service Overview All Service Desk Self Service Overview Service

More information

Corporate Account Takeover & Information Security Awareness

Corporate Account Takeover & Information Security Awareness Crprate Accunt Takever & Infrmatin Security Awareness What is Crprate Accunt Takever? A fast grwing electrnic crime where thieves typically use sme frm f malware t btain lgin credentials t Crprate Online

More information

ISAM TO SQL MIGRATION IN SYSPRO

ISAM TO SQL MIGRATION IN SYSPRO 118 ISAM TO SQL MIGRATION IN SYSPRO This dcument is aimed at assisting yu in the migratin frm an ISAM data structure t an SQL database. This is nt a detailed technical dcument and assumes the reader has

More information

Preventing Identity Theft

Preventing Identity Theft Preventing Identity Theft Each year, millins f Americans have their identity stlen. ENG Lending wants yu t have the infrmatin yu need t prtect yurself against identity theft. While there are n guarantees

More information

RECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS. interests in the use of IT services, such as online bank services of Société Générale de Banques au

RECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS. interests in the use of IT services, such as online bank services of Société Générale de Banques au RECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS Best practices IT security refers t the bdy f techniques and best practices t prtect yur cmputers and yur interests in the use f IT services, such as nline

More information

Treasury Gateway Getting Started Guide

Treasury Gateway Getting Started Guide Treasury Gateway Getting Started Guide Treasury Gateway is a premier single sign-n and security prtal which allws yu access t multiple services simultaneusly thrugh the same sessin, prvides cnvenient access

More information

STIOffice Integration Installation, FAQ and Troubleshooting

STIOffice Integration Installation, FAQ and Troubleshooting STIOffice Integratin Installatin, FAQ and Trubleshting Installatin Steps G t the wrkstatin/server n which yu have the STIDistrict Net applicatin installed. On the STI Supprt page at http://supprt.sti-k12.cm/,

More information

Serv-U Distributed Architecture Guide

Serv-U Distributed Architecture Guide Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v14.0.1.0 Page 1 f 16 Intrductin Serv-U

More information

CallRex 4.2 Installation Guide

CallRex 4.2 Installation Guide CallRex 4.2 Installatin Guide This dcument describes hw t install CallRex 4.2. It cvers the fllwing: CallRex 4.2 Cmpnents. Server Prerequisites. Perfrming the Installatin. Changing the Accunt Used by CallRex

More information

Identity fraud and theft

Identity fraud and theft Page 1 f 5 Identity theft is when yur persnal details are stlen and identity fraud is when thse details are used t cmmit fraud. Mre abut identity fraud and identity theft Identity fraud can happen when:

More information

Completing Contracts Online

Completing Contracts Online Cmpleting Cntracts Online Getting started using zipfrm Plus t cmplete cntracts nline quickly and efficiently The ziplgix Advantage Seamless prfessinal wrkflw Easy t use Reduced data entry Always accurate,

More information

Configuring an Email Client for your Hosting Support POP/IMAP mailbox

Configuring an Email Client for your Hosting Support POP/IMAP mailbox Cnfiguring an Email Client fr yur Hsting Supprt POP/IMAP mailbx This article lists the email settings and prt numbers fr pp and imap cnfiguratins, as well as fr SSL. It cntains instructins fr setting up

More information

Tipsheet: Sending Out Mass Emails in ApplyYourself

Tipsheet: Sending Out Mass Emails in ApplyYourself GEORGETOWN GRADUATE SCHOOL Tipsheet: Sending Out Mass Emails in ApplyYurself In ApplyYurself (AY), it is very simple and easy t send a mass email t all f yur prspects, applicants, r students with applicatins

More information

WEB APPLICATION SECURITY TESTING

WEB APPLICATION SECURITY TESTING WEB APPLICATION SECURITY TESTING Cpyright 2012 ps_testware 1/7 Intrductin Nwadays every rganizatin faces the threat f attacks n web applicatins. Research shws that mre than half f all data breaches are

More information

Chapter - 3. Cable Connections

Chapter - 3. Cable Connections Chapter - 3 Cable Cnnectins One bradband alternative is thrugh cable TV, where yur Internet cnnectin is delivered t yur hme thrugh yur televisin cable. Many cable prviders wn't qute yu an exact speed,

More information

SBClient and Microsoft Windows Terminal Server (Including Citrix Server)

SBClient and Microsoft Windows Terminal Server (Including Citrix Server) SBClient and Micrsft Windws Terminal Server (Including Citrix Server) Cntents 1. Intrductin 2. SBClient Cmpatibility Infrmatin 3. SBClient Terminal Server Installatin Instructins 4. Reslving Perfrmance

More information

Norwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16

Norwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16 Yu must read and agree t fllw the netwrk rules belw t use yur netwrk accunt r access the internet. Nrwd Public Schls makes available t students access t cmputers and the Internet. Students are expected

More information

A. Early Case Assessment

A. Early Case Assessment Electrnic Discvery Reference Mdel Standards fr the identificatin f electrnically stred infrmatin in discvery http://www.edrm.net/resurces/standards/identificatin A. Early Case Assessment Once a triggering

More information

MITEL MC FOR ANDROID FEATURE OVERVIEW PREPARATION INSTALLATION DOWNLOAD CONFIGURATION (REDIRECT) QUICK REFERENCE GUIDE

MITEL MC FOR ANDROID FEATURE OVERVIEW PREPARATION INSTALLATION DOWNLOAD CONFIGURATION (REDIRECT) QUICK REFERENCE GUIDE QUICK REFERENCE GUIDE MITEL MC FOR ANDROID IN FEATURE OVERVIEW Yur Mitel Mbile Client ( client in the fllwing) makes a variety f cmmunicatin services available that are nrmally ffered by several phnes

More information

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008 Exercise 5 Server Cnfiguratin, Web and FTP Instructins and preparatry questins Administratin f Cmputer Systems, Fall 2008 This dcument is available nline at: http://www.hh.se/te2003 Exercise 5 Server Cnfiguratin,

More information

Integrating With incontact dbprovider & Screen Pops

Integrating With incontact dbprovider & Screen Pops Integrating With incntact dbprvider & Screen Pps incntact has tw primary pints f integratin. The first pint is between the incntact IVR (script) platfrm and the custmer s crprate database. The secnd pint

More information

FAQ Frequently Asked Questions & Answers for using the online assessment platform of ΜanpowerGroup

FAQ Frequently Asked Questions & Answers for using the online assessment platform of ΜanpowerGroup FAQ Frequently Asked Questins & Answers fr using the nline assessment platfrm f ΜanpwerGrup Versin 1.0 Athens, July 2014 1 Frequently Asked Questins & Answers regarding the use f the nline assessment platfrm

More information

Cloud Services MDM. Windows 8 User Guide

Cloud Services MDM. Windows 8 User Guide Clud Services MDM Windws 8 User Guide 10/24/2014 CONTENTS Overview... 2 Supprted Devices... 2 System Capabilities... 2 Enrllment and Activatin... 3 Prcess Overview... 3 Verify Prerequisites... 3 Dwnlad

More information

Website Design Worksheet

Website Design Worksheet Website Design Wrksheet The mst crucial and imprtant part f having a website designed, r redesigned is t set gals and decide up frnt what yu want yur website t d. What is the purpse f yur new website?

More information

Social media guidelines

Social media guidelines Scial media guidelines I. Overview This dcument will prvide yu with basic guidelines n using scial media channels such as Facebk, Twitter r YuTube t reach individuals and families abut hw t prepare fr

More information

Implementing ifolder Server in the DMZ with ifolder Data inside the Firewall

Implementing ifolder Server in the DMZ with ifolder Data inside the Firewall Implementing iflder Server in the DMZ with iflder Data inside the Firewall Nvell Cl Slutins AppNte www.nvell.cm/clslutins JULY 2004 OBJECTIVES The bjectives f this dcumentatin are as fllws: T cnfigure

More information

Ensuring end-to-end protection of video integrity

Ensuring end-to-end protection of video integrity White paper Ensuring end-t-end prtectin f vide integrity Prepared by: Jhn Rasmussen, Senir Technical Prduct Manager, Crprate Business Unit, Milestne Systems Date: May 22, 2015 Milestne Systems Ensuring

More information

Unified Infrastructure/Organization Computer System/Software Use Policy

Unified Infrastructure/Organization Computer System/Software Use Policy Unified Infrastructure/Organizatin Cmputer System/Sftware Use Plicy 1. Statement f Respnsibility All emplyees are charged with the security and integrity f the cmputer system. Emplyees are asked t help

More information

GETTING STARTED With the Control Panel Table of Contents

GETTING STARTED With the Control Panel Table of Contents With the Cntrl Panel Table f Cntents Cntrl Panel Desktp... 2 Left Menu... 3 Infrmatin... 3 Plan Change... 3 Dmains... 3 Statistics... 4 Ttal Traffic... 4 Disk Quta... 4 Quick Access Desktp... 4 MAIN...

More information

HP Connected Backup Online Help. Version 8.7.1 04 October 2012

HP Connected Backup Online Help. Version 8.7.1 04 October 2012 HP Cnnected Backup Online Help Versin 8.7.1 04 Octber 2012 Legal Ntices Warranty The nly warranties fr Hewlett-Packard prducts and services are set frth in the express statements accmpanying such prducts

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

Best Practices on Monitoring Hotel Review Sites By Max Starkov and Mariana Mechoso Safer

Best Practices on Monitoring Hotel Review Sites By Max Starkov and Mariana Mechoso Safer January 2008 Best Practices n Mnitring Htel Review Sites By Max Starkv and Mariana Mechs Safer Hteliers ften ask HeBS hw they can mnitr the Internet chatter surrunding their htels and whether r nt they

More information

Serv-U Distributed Architecture Guide

Serv-U Distributed Architecture Guide Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v15.1.2.0 Page 1 f 20 Intrductin Serv-U

More information

Internet and Social Media Solicitations: Wise Giving Tips

Internet and Social Media Solicitations: Wise Giving Tips Internet and Scial Media Slicitatins: Wise Giving Tips Charities use a wide variety f methds t slicit charitable dnatins. New and pwerful technlgies utilize nt just the internet and email, but als scial

More information

Using PayPal Website Payments Pro UK with ProductCart

Using PayPal Website Payments Pro UK with ProductCart Using PayPal Website Payments Pr UK with PrductCart Overview... 2 Abut PayPal Website Payments Pr & Express Checkut... 2 What is Website Payments Pr?... 2 Website Payments Pr and Website Payments Standard...

More information

MaaS360 Cloud Extender

MaaS360 Cloud Extender MaaS360 Clud Extender Installatin Guide Cpyright 2012 Fiberlink Cmmunicatins Crpratin. All rights reserved. Infrmatin in this dcument is subject t change withut ntice. The sftware described in this dcument

More information

Part I: Welcome to BoardEffect -- Overview & Online Tour

Part I: Welcome to BoardEffect -- Overview & Online Tour Part I: Welcme t BardEffect -- Overview & Online Tur BardEffect is the leading e-gvernance tl fr missin-based rganizatins. This secure website will allw the Shaping NJ Partnership members t cmmunicate,

More information

Remote Working (Policy & Procedure)

Remote Working (Policy & Procedure) Remte Wrking (Plicy & Prcedure) Publicatin Scheme Y/N Department f Origin Plicy Hlder Authrs Can be published n Frce Website Prfessinal Standards Department (PSD) Ch Supt Head f PSD IT Security Officer

More information

PENNSYLVANIA SURPLUS LINES ASSOCIATION Electronic Filing System (EFS) Frequently Asked Questions and Answers

PENNSYLVANIA SURPLUS LINES ASSOCIATION Electronic Filing System (EFS) Frequently Asked Questions and Answers PENNSYLVANIA SURPLUS LINES ASSOCIATION Electrnic Filing System (EFS) Frequently Asked Questins and Answers 1 What changed in Release 2.0?...2 2 Why was my accunt disabled?...3 3 Hw d I inactivate an accunt?...4

More information

Exchanging Files Securely with Gerstco Using gpg4win Public Key Encryption

Exchanging Files Securely with Gerstco Using gpg4win Public Key Encryption Exchanging Files Securely with Gerstc Using gpg4win Public Key Encryptin Overview Visit the fllwing page n Gerstc s website t watch a vide verview f Public Key Encryptin: www.gerstc.cm/???? Initial Setup

More information

Magenta HR in partnership with breath ehr

Magenta HR in partnership with breath ehr BREATHEHR ONLINE HR SYSTEM AND PORTAL Magenta HR in partnership with breath ehr Magenta HR Cnsulting Ltd. 24 Canning Street, Edinburgh EH3 8EG Tel. 0131 2272769 www.magentahr.cm inf@magentahr.cm 6 December

More information

Level 3 SM Ready-Access User Guide

Level 3 SM Ready-Access User Guide Level 3 SM Ready-Access User Guide Octber 2012 15RDA0010 1 2012 Level 3 Cmmunicatins, LLC. All Rights Reserved. Level 3, Level 3 Cmmunicatins, and the Level 3 Lg are either registered service marks r service

More information

FAQs regarding our system upgrade

FAQs regarding our system upgrade FAQs regarding ur system upgrade 1) Q: Why are yu upgrading yur cre data prcessing system? A: An upgrade is the act f making smething better, such as an imprved experience r a human interactin. At Arsenal

More information

Phone support is available if you have any questions or problems with the NASP PRO software during your tournament.

Phone support is available if you have any questions or problems with the NASP PRO software during your tournament. NASP Pr Turnament Instructins Updated 11/4/13 - NASP Pr Turnament Step by Step It is HIGHLY recmmended that yu read and fllw these instructins. Als, print these instructins and have them available at yur

More information

AppStore: Search for Mitel MC in the Apple AppStore and install it. The Mitel MC software is free of charge.

AppStore: Search for Mitel MC in the Apple AppStore and install it. The Mitel MC software is free of charge. QUICK REFERENCE GUIDE MITEL MC FOR IPHONE IN FEATURE OVERVIEW Yur Mitel Mbile Client ( client in the fllwing) makes a variety f cmmunicatin services available that are nrmally ffered by several phnes (mbile

More information

X7500 Series, X4500 Scanner Series MFPs: LDAP Address Book and Authentication Configuration and Basic Troubleshooting Tips

X7500 Series, X4500 Scanner Series MFPs: LDAP Address Book and Authentication Configuration and Basic Troubleshooting Tips X7500 Series, X4500 Scanner Series MFPs: LDAP Address Bk and Authenticatin Cnfiguratin and Basic Trubleshting Tips Lexmark Internatinal 1 Prerequisite Infrm atin In rder t cnfigure a Lexmark MFP fr LDAP

More information

Email Setup PPD IT How-to Guides June 2010

Email Setup PPD IT How-to Guides June 2010 Email Setup Cntents Email Infrmatin... 2 IMAP and POP3 settings... 2 Cnfiguring Micrsft Outlk 2007... 2 Archiving mail... 3 Cnfiguring AutArchive in Micrsft Outlk 2007... 3 Access frm ff site... 4 Cnfiguring

More information

New in this release. Sphere 9.4.3.2 (October 2013)

New in this release. Sphere 9.4.3.2 (October 2013) New in this release Sphere 9.4.3.2 (Octber 2013) The fllwing client-facing changes were implemented: An issue that prevented certain Friends Asking Friends spnsrship levels frm appearing as ptins n the

More information

NEC CLOUD STORAGE. User Guide. Version: R03.1

NEC CLOUD STORAGE. User Guide. Version: R03.1 NEC CLOUD STORAGE User Guide Versin: R03.1 2013 1 INTRODUCTION... 5 1.1 GOALS OF THIS DOCUMENT... 5 1.2 TERMS, ACRONYMS AND ABBREVIATIONS... 5 2 INTRODUCTION TO NEC CLOUD STORAGE... 6 2.1 WHAT IS NEEDED

More information

Data Protection Act Data security breach management

Data Protection Act Data security breach management Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing

More information

BRILL s Editorial Manager (EM) Manual for Authors Table of Contents

BRILL s Editorial Manager (EM) Manual for Authors Table of Contents BRILL s Editrial Manager (EM) Manual fr Authrs Table f Cntents Intrductin... 2 1. Getting Started: Creating an Accunt... 2 2. Lgging int EM... 3 3. Changing Yur Access Cdes and Cntact Infrmatin... 3 3.1

More information

Click here to open the library

Click here to open the library Dcument Management What is a Dcument Library? Use a dcument library t stre, rganize, sync, and share dcuments with peple. Yu can use cauthring, versining, and check ut t wrk n dcuments tgether. With yur

More information

NASDAQ BookViewer 2.0 User Guide

NASDAQ BookViewer 2.0 User Guide NASDAQ BkViewer 2.0 User Guide NASDAQ BkViewer 2.0 ffers a real-time view f the rder depth using the NASDAQ Ttalview prduct fr NASDAQ and ther exchange-listed securities including: The tp buy and sell

More information

Application Advisories for Data Integrator for Non- EDI location

Application Advisories for Data Integrator for Non- EDI location Applicatin Advisries fr Data Integratr fr Nn- EDI lcatin It is a standalne Windws based applicatin that will be installed at every Cmmissinerate. Applicatin will be used fr filling Bill f Entry and Shipping

More information

Telelink 6. Installation Manual

Telelink 6. Installation Manual Telelink 6 Installatin Manual Table f cntents 1. SYSTEM REQUIREMENTS... 3 1.1. Hardware Requirements... 3 1.2. Sftware Requirements... 3 1.2.1. Platfrm... 3 1.2.1.1. Supprted Operating Systems... 3 1.2.1.2.

More information

Spamguard SPAM Filter

Spamguard SPAM Filter Spamguard SPAM Filter The ECU Spam Firewall (spamguard) is designed t blck r quarantine e-mail messages that are r lk like spam befre it reaches ur email servers. The spam firewall will NOT catch all f

More information

Introduction LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE. 2015 Savision B.V. savision.com All rights reserved.

Introduction LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE. 2015 Savision B.V. savision.com All rights reserved. Rev 7.5.0 Intrductin 2 LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE 2015 Savisin B.V. savisin.cm All rights reserved. This manual, as well as the sftware described in it, is furnished under license and

More information

CHECKING ACCOUNTS AND ATM TRANSACTIONS

CHECKING ACCOUNTS AND ATM TRANSACTIONS 1 Grades 6-8 Lessn 1 CHECKING ACCOUNTS AND ATM TRANSACTIONS Tpic t Teach: This lessn is intended fr middle schl students in sixth thrugh eighth grades during a frty minute time perid. The lessn teaches

More information

EVENT PLANNING GUIDE

EVENT PLANNING GUIDE EVENT PLANNING GUIDE Office f Student Activities 176 Murphy Campus Blvd Wac, GA 30182 770.537.5722 phne 770.537.7995 fax tmazhani@westgatech.edu Event Planning 101 at West Gergia Tech! ~Registered Student

More information

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008

Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008 Exercise 5 Server Cnfiguratin, Web and FTP Instructins and preparatry questins Administratin f Cmputer Systems, Fall 2008 This dcument is available nline at: http://www.hh.se/te2003 Exercise 5 Server Cnfiguratin,

More information

AT&T U-verse App for Android FAQs

AT&T U-verse App for Android FAQs AT&T U-verse App fr Andrid FAQs Abut AT&T U-verse App What is AT&T U-verse App fr Andrid? AT&T U-verse fr Andrid is a service that prvides all U-verse subscribers the ability t view their U-verse TV Guide,

More information

Merchant Management System. New User Guide CARDSAVE

Merchant Management System. New User Guide CARDSAVE Merchant Management System New User Guide CARDSAVE Table f Cntents Lgging-In... 2 Saving the MMS website link... 2 Lgging-in and changing yur passwrd... 3 Prcessing Transactins... 4 Security Settings...

More information

WatchDox Server. Administrator's Guide. Version 3.8.5

WatchDox Server. Administrator's Guide. Version 3.8.5 WatchDx Server Administratr's Guide Versin 3.8.5 Cnfidentiality This dcument cntains cnfidential material that is prprietary WatchDx. The infrmatin and ideas herein may nt be disclsed t any unauthrized

More information

Mobile Deployment Guide For Apple ios

Mobile Deployment Guide For Apple ios Fr Apple ios Cpyright This dcument is prtected by the United States cpyright laws, and is prprietary t Zscaler Inc. Cpying, reprducing, integrating, translating, mdifying, enhancing, recrding by any infrmatin

More information

Getting Started Guide

Getting Started Guide AnswerDash Resurces http://answerdash.cm Cntextual help fr sales and supprt Getting Started Guide AnswerDash is cmmitted t helping yu achieve yur larger business gals. The utlined pre-launch cnsideratins

More information

Using Sentry-go Enterprise/ASPX for Sentry-go Quick & Plus! monitors

Using Sentry-go Enterprise/ASPX for Sentry-go Quick & Plus! monitors Using Sentry-g Enterprise/ASPX fr Sentry-g Quick & Plus! mnitrs 3Ds (UK) Limited, February, 2014 http://www.sentry-g.cm Be Practive, Nt Reactive! Intrductin Sentry-g Enterprise Reprting is a self-cntained

More information

LISTSERV ADMINISTRATION Department of Client Services Information Technology Systems Division

LISTSERV ADMINISTRATION Department of Client Services Information Technology Systems Division LISTSERV ADMINISTRATION Department f Client Services Infrmatin Technlgy Systems Divisin E-MAIL LIST INSTRUCTIONS Yur List s Admin Webpage...2 Fr assistance cntact the Technlgy Assistance Center: 962-4357

More information

User Guide Version 3.9

User Guide Version 3.9 User Guide Versin 3.9 Page 2 f 22 Summary Cntents 1 INTRODUCTION... 3 1.1 2 CREATE A NEW ACCOUNT... 4 2.1 2.2 3 NAVIGATION... 3 CREATE AN EMAIL ACCOUNT... 4 CREATE AN ALIAS ACCOUNT... 6 MODIFYING AN EXISTING

More information

Firewall/Proxy Server Settings to Access Hosted Environment. For Access Control Method (also known as access lists and usually used on routers)

Firewall/Proxy Server Settings to Access Hosted Environment. For Access Control Method (also known as access lists and usually used on routers) Firewall/Prxy Server Settings t Access Hsted Envirnment Client firewall settings in mst cases depend n whether the firewall slutin uses a Stateful Inspectin prcess r ne that is cmmnly referred t as an

More information

HR Management Information (HRS)

HR Management Information (HRS) HR Management Infrmatin (HRS) Fact Sheet N 10. Managing Access t Claims Online T give access t ther departmental staff yu must be a Site Leader ie a Principal r Preschl Directr. If yu are nt a site leader

More information

The Law Office of the Future: Remote Access and Virtual Law Firms Jeffrey S. Krause, Esq.

The Law Office of the Future: Remote Access and Virtual Law Firms Jeffrey S. Krause, Esq. The Law Office f the Future: Remte Access and Virtual Law Firms Jeffrey S. Krause, Esq. Presentatin Outline Intrductin Wrking Remte vs. Virtual Office Wrking Remte Temprary way t wrk Access yur ffice cmputer

More information

Preparing to Deploy Reflection : A Guide for System Administrators. Version 14.1

Preparing to Deploy Reflection : A Guide for System Administrators. Version 14.1 Preparing t Deply Reflectin : A Guide fr System Administratrs Versin 14.1 Table f Cntents Table f Cntents... 2 Preparing t Deply Reflectin 14.1:... 3 A Guide fr System Administratrs... 3 Overview f the

More information