Encrypting a USB Drive Using TrueCrypt
|
|
|
- Prudence Barber
- 10 years ago
- Views:
Transcription
1 Encrypting a USB Drive Using TrueCrypt This document details the steps to encrypt a USB Pen drive using TrueCrypt. TrueCrypt is free and open-source security software allowing encryption of documents and data files using various secure industry standard encryption algorithms combined with a user-chosen password. Prerequisites A USB drive:- Whilst it is possible to make use of a USB Drive containing existing data we recommend that you start with a freshly formatted Drive containing no data. Formatting with the FAT32 file system will allow an encrypted folder of up to 4 GB in size. Please refer to ISD Helpdesk if you require any help formatting the Pen Drive or require an encrypted folder > 4GB A computer running Windows 2000, XP, Vista or Windows 7 TrueCrypt 7.1 installed on your PC if not already installed, please contact the ISD Helpdesk to request an install. Setting up your USB Pen Drive for the first time 1. Initial setup of TrueCrypt will require you to create a TrueCrypt Volume on your Pen Drive. 2. Open TrueCrypt from the Programs Menu. 3. Click [Create Volume] 5. Select Standard TrueCrypt volume and click [Next] 4. The Volume Creation Wizard will start. Select Create an encrypted file container and click [Next]
2 6. Click [Select File] and browse to your USB Drive 10. Specify the size of the encrypted Volume you want to create in MB and click [Next]. When setting the size bear in mind the total number and anticipated size of the documents you ll want it to store in it as it cannot be increased later. Also, consider leaving free space on the pen drive to allow setup of Traveler Mode (if required) and for any requirement to store unencrypted data. 7. Enter the name (do not call it TrueCrypt) you want to use for the Volume (encrypted file container) and click [Save]. The example below creates a container called Encrypted 11. At this point you need to enter a password for the Volume. You ll need to enter it twice and if it is less than 20 characters, you ll get a message advising that you are using a weak password. We recommend use of a strong password with a minimum length of 8 characters that utilises a mixture of upper and lowercase letters, numbers and symbols. 8. Ensure the Never save history checkbox is ticked and click [Next] Remember that despite the encryption, the security of the encrypted container relies upon the strength of the password you set at this point. Warning: There is NO password recovery for TrueCrypt. If your password is forgotten/lost it will NOT be possible to access the encrypted file container! Set the password for the encrypted volume and click [Next]. 9. Select the Encryption Algorithm (the default of AES is fine) and click [Next]
3 Move your mouse randomly for several seconds to increase the cryptographic strength of the encryption keys and then click [Format]. Note that at this point the Volume will be created and time taken will depend upon the container size you set. Using a TrueCrypt Volume 16. Start TrueCrypt, and click [Select File] 12. The following screen appears during the formatting process: 17. Browse to your USB drive, select the Volume and then click [Open] 13. Once formatting is completed, click [OK] 18. You ll now need to click once on a drive letter to allow the Volume to be mounted. Note that only available driver letters are displayed so just select a letter and remember which one you ve chosen as that s how you ll access your files from Windows Explorer and your Applications. 14. Once creation of the Volume completes, click [Exit] 19. Once you ve selected a letter click [Mount] 15. Your TrueCrypt Volume (encrypted file container) is ready for use. 20. You will be prompted for your password for the Volume. Enter the password and click [OK]
4 21. You can now access and use the TrueCrypt Volume from Windows Explorer and from within your Applications to open, copy, paste and save documents as you would with any of your other drives (e.g. such as your H: drive). b. Before physically removing the USB Pen Drive you should follow the processes detailed below for both Windows XP and Windows 7 to ensure you safely remove the USB Pen Drive:- i. In Windows 7, look for the Safely Remove Hardware and Eject Media icon in the Notification Area The screen shot below, shows a windows explorer view of the drive letters available on the PC used to create this guide. Note that in this case, the Volume was mounted to drive I: Click the icon and you'll see a list of devices. Click the entry for your USB Pen Drive. Windows will display a notification telling you when it's safe to remove the device and you can then physically unplug it. ii. In Windows XP look for the Safely Remove hardware icon in the System Tray 22. Once you ve finished working with your encrypted files you need to dismount the Volume. To do this:- a. Right-click on the TrueCrypt icon next to the clock in the bottom right of the Desktop. In Windows XP it should be accessible via the System Tray. In Windows 7 it should be accessible via the Notification Area and then select Dismount All. Right-Click the icon and select Safely Remove Hardware. The Safely Remove Hardware window should appear. Tick Display Device Components and then select the USB Pen Drive entry and click [Stop]. A confirmation box appears; check that it shows the correct device and if so click [OK] Windows will display a notification telling you when it's safe to remove the device and you can then physically unplug it.
5 TrueCrypt Traveller (Portable Mode) Configuring your USB Pen Drive in Traveler/Portable mode will allow you to access a TrueCrypt Volume on PCs that do not have TrueCrypt locally installed. What this means is that a copy of the TrueCrypt executable is placed in an unencrypted section of the USB Pen Drive and run directly from there. Note that Traveler mode functionality requires administrator rights on the PC as the TrueCrypt application needs to install driver files to the PC. It is not standard ISD policy to grant administrative rights to CardiffMet PCs as this raises security issues related to the integrity of the Operating System and concerns regarding potential attack windows, spread and impact of security threats, viruses and general malware. 25. Click [Create] and the required files are copied to the USB Pen Drive As a result whilst Traveler mode can be setup on the USB Pen Drive using a CardiffMet PC, it is not possible to run the TrueCrypt application in Traveler mode. This is easily addressed with CardiffMet PCs by requesting that TrueCrypt be installed to the PC if it is not already available. The steps for setting up and running TrueCrypt in Traveler mode are detailed below. 23. Within TrueCrypt select Tools Menu > Traveler Disk Setup 26. Once completed and acknowledgement message appears which also points out the administrator rights issue. Click [OK] 24. Click [Browse] and select the drive letter corresponding to your USB Pen Drive, then click [OK]. In the example, the Pen Drive being used is a Kingston Drive mounted at F:
6 Click [OK] 27. Traveler Mode is now complete and if you check the Pen Drive in Windows Explorer you will find a folder named TrueCrypt containing the files required to run Traveler Mode. Running TrueCrypt in Traveller Mode 28. To run in Traveler Mode, plug-in your USB Pen Drive and use Windows Explorer to browse to the folder on it named TrueCrypt 29. Open the TrueCrypt folder and then double-click the file named TrueCrypt.exe 30. The TrueCrypt Application will open as normal and you then use it as per the instructions contained in the Using a TrueCrypt Volume section of this guide. Further Information For further information, please see the User Guide accessible from the Help Menu in the TrueCrypt application. You can also visit the TrueCrypt Website at
BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8)
BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8) Encryption is an effective method of protecting data stored on portable devices such as USB flash drives and external hard drives.
Using TrueCrypt to protect data
Using TrueCrypt to protect data Password protecting and encrypting files one by one is a certainly an effective way to securely store and share data. However, what if you have a lot of files? Creating
Verbatim Secure Data USB Drive. User Guide. User Guide Version 2.0 All rights reserved
Verbatim Secure Data USB Drive User Guide User Guide Version 2.0 All rights reserved Table of Contents Table of Contents... 2 1. Introduction to Verbatim Secure Data USB Drive... 3 2. System Requirements...
How to create a portable encrypted USB Key using TrueCrypt
How to create a portable encrypted USB Key using TrueCrypt INTRODUCTION TrueCrypt Traveler Mode provides secure encryption for programs/files on portable devices such as USB Memory keys. It uses strong
16.4.3 Lab: Data Backup and Recovery in Windows XP
16.4.3 Lab: Data Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment The
Step by step guide how to password protect your USB flash drive
Step by step guide how to password protect your USB flash drive 1 Content 1. How to create encrypted partition on USB flash drive 2. How to work with encrypted partition on the USB flash drive - Rohos
USB Flash Security Free Edition Quick Start
Quick Start [For USB Flash Security Free Edition] 1 / 18 USB Flash Security Free Edition Quick Start Before use USB Flash Security 1. Free edition can only be installed on the USB Flash Drive up to 4GB
Chapter 1 Downloading Images to Your Computer (Windows)
Software User Guide For the safe use of your camera, be sure to read the Safety Precautions thoroughly before use. Types of software installed on your computer varies depending on the method of installation
SonicWALL CDP Local Archiving
This document describes how to configure, implement, and manage a local archive for your SonicWALL CDP appliance. It contains the following sections: Feature Overview section on page 1 Using Local Archiving
10.3.1.6 Lab - Data Backup and Recovery in Windows XP
5.0 10.3.1.6 Lab - Data Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment
Guide to Installing BBL Crystal MIND on Windows 7
Guide to Installing BBL Crystal MIND on Windows 7 Introduction The BBL Crystal MIND software can not be directly installed on the Microsoft Windows 7 platform, however it can be installed and run via XP
Encrypt USB Drive to Protect Data
Encrypt USB Drive to Protect Data Enable BitLocker on USB Flash Drives to Protect Data Encryption is an effective method of protecting data stored on portable devices such as USB flash drives and external
WARNING!!: Before installing Truecrypt encryption software on your
Truecrypt installation and usage guide for Windows XP, 7, Vista and 8 WARNING!!: Before installing Truecrypt encryption software on your computer, you should create an Acronis image back up of your computer
Table of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2
Table of Contents TPM Configuration Procedure... 2 1. Configuring the System BIOS... 2 2. Installing the Infineon TPM Driver and the GIGABYTE Ultra TPM Utility... 3 3. Initializing the TPM Chip... 4 3.1.
BitLocker To Go USB Flash Drive encryption User Guide
BitLocker To Go USB Flash Drive encryption User Guide Introduction BitLocker To Go is a new feature of Windows 7 which allows encryption of easily misplaced portable storage devices such as USB Flash Drives
Option nv, Gaston Geenslaan 14, B-3001 Leuven Tel +32 16 317 411 Fax +32 16 207 164 http://www.option.com Page 1 of 14
Page 1 of 14 ! " #!"#$ % &&' Page 2 of 14 1 INTRODUCTION One of the highly desirable features of the GlobeSurfer III device is the ability to network together Printers and External Hard Disk drives (aka
Getting Started with MozyPro Online Backup Online Software from Time Warner Cable Business Class
Getting Started with MozyPro Online Backup Online Software from Time Warner Cable Business Class A Guide for Users MozyPro is an online backup service with an easy to use interface so you can start backing
MAC/OSX - How to Encrypt Data using TrueCrypt. v.05201011
MAC/OSX - How to Encrypt Data using TrueCrypt v.05201011 This chapter contains step-by-step instructions on how to create, mount, and use a TrueCrypt volume. We strongly recommend that you read the entire
Only smart people read the manual.
Only smart people read the manual. Contents Getting Started... 1 Installing the FreeAgent Tools... 1 Using the FreeAgent Tools Icons... 9 Using the System Tray Icon... 10 Disconnecting the FreeAgent Drive...
Smart TPM. User's Manual. Rev. 1001 12MD-STPM-1001R
Smart TPM User's Manual Rev. 1001 12MD-STPM-1001R We recommend that you download the latest version of the Smart TPM utility from GIGABYTE's website. If you have installed Ultra TPM earlier, you can install
TPG MOBILE BROADBAND QUICK SETUP GUIDE
TPG MOBILE BROADBAND QUICK SETUP GUIDE TPG USB E1762 Modem Thank you for choosing TPG Mobile Broadband and USB E1762 modem. This User Guide provides step by step instructions that will take you through
You can find the installer for the +Cloud Application on your SanDisk flash drive.
Installation You can find the installer for the +Cloud Application on your SanDisk flash drive. Make sure that your computer is connected to the internet. Next plug in the flash drive and double click
1. Scope of Service. 1.1 About Boxcryptor Classic
Manual for Mac OS X Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 4 2. Installation... 5 2.1 Installing Boxcryptor Classic... 5 2.2 Licensing Boxcryptor Classic
DataTraveler Secure - Privacy Edition
DataTraveler Secure - Privacy Edition This document is designed to help users become familiar with the DataTraveler Secure - Privacy Edition. For additional support, please visit our on-line technical
ScanShell.Net Install Guide
ScanShell.Net Install Guide Please install the software first - DO NOT PLUG IN THE SCANNER The scanner has been carefully packaged to avoid damage during transportation. Before operating the scanner, please
Kaspersky Password Manager USER GUIDE
Kaspersky Password Manager USER GUIDE Dear User! Thank you for choosing our product. We hope that this documentation helps you in your work and provides answers you may need. Any type of reproduction or
Virtual Office Remote Installation Guide
Virtual Office Remote Installation Guide Table of Contents VIRTUAL OFFICE REMOTE INSTALLATION GUIDE... 3 UNIVERSAL PRINTER CONFIGURATION INSTRUCTIONS... 12 CHANGING DEFAULT PRINTERS ON LOCAL SYSTEM...
Global VPN Client Getting Started Guide
Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential
Encrypting Files Using AxCrypt
Encrypting Files Using AxCrypt Documents, spreadsheets, databases, and other files that contain personal information or other sensitive information MUST BE encrypted when being transmitted to someone else
HOW TO INSTALL FS USB TRANSCRIPTION SOFTWARE (OFFICE ADMIN MEDICAL)
Go to itstartshere.nbcc.ca to watch a video on how to do this. HOW TO INSTALL FS USB TRANSCRIPTION SOFTWARE (OFFICE ADMIN MEDICAL) These steps MUST be performed while at the college. Cannot be done from
SP Widget. Users Manual
SP Widget Users Manual 1 Contents 1. Disclaimer notice... 4 2. Product intro...5 3. System requirements... 5 4. Introduction... 6 4.1 Activating SP Widget... 6 Illustration 4.1... 6 4.2 Browser interface...
Here is a guide on how to encrypt a part of your USB flash drive and access it on any computer:
How to password protect your USB flash drive. According to the XXX agency reports 80% of all lost and stolen USB flash drives contained a very important information: business or government data. The following
Using Bitlocker to Encrypt your Flash Drive Information Technology Services July 27, 2012
Using Bitlocker to Encrypt your Flash Drive Information Technology Services July 27, 2012 Contact the ITS Helpdesk at 402-559-7700 or [email protected] with questions. How it works Basically, BitLocker
HDDtoGO. User Guide. User Manual Version 3.4 2004-2010 CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual
HDDtoGO User Guide User Manual Version 3.4 2004-2010 CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual Table of Contents Table of Contents...1 1. Introduction...2 2. System Requirements...3
PCLinq2 Hi-Speed USB Bridge-Network Cable. Quick Network Setup Guide
PCLinq2 Hi-Speed USB Bridge-Network Cable Congratulations! Quick Network Setup Guide For Windows 98/ME/2000/XP Congratulations for installing the PCLinq2 Hi-Speed USB Bridge-Network Cable. This Quick Network
User Manual - Secure Lock Ware
User Manual - Secure Lock Ware Drive Encryption System Ultra High Security - 256-bit Capable AES Encryption for Buffalo USB Hard Drives www.buffalotech.com v1.8 Table of Contents Introduction.................................
How to Install Applications (APK Files) on Your Android Phone
How to Install Applications (APK Files) on Your Android Phone Overview An Android application is stored in an APK file (i.e., a file named by {Application Name}.apk). You must install the APK on your Android
AIM SOFTWARE AND USB DRIVER INSTALLATION PROCEDURE
AIM SOFTWARE AND USB DRIVER INSTALLATION PROCEDURE CONTENTS AIM software and USB Driver installation Chapter 1 Installing AIM software and AIM USB driver... 2 Chapter 2 Installation under Microsoft Windows
IsItUp Quick Start Manual
IsItUp - When you need to know the status of your network Taro Software Inc. Website: www.tarosoft.com Telephone: 703-405-4697 Postal address: 8829 110th Lane, Seminole Fl, 33772 Electronic mail: [email protected]
Guide how to protect your private data with Rohos Disk Encryption
Guide how to protect your private data with Rohos Disk Encryption 1 Content 1. Encrypt USB drive - Portable Application 2. Encrypt HDD 3. Hide folder 4. Have USB Key for access control 5. Rohos disk options
BSDI Advanced Fitness & Wellness Software
BSDI Advanced Fitness & Wellness Software 6 Kellie Ct. Califon, NJ 07830 http://www.bsdi.cc SOFTWARE BACKUP/RESTORE INSTRUCTION SHEET This document will outline the steps necessary to take configure the
Surf it Easy. User Guide
Surf it Easy User Guide User Manual Version 1.1 2004 CoSoSys SRL Surf it Easy User Manual Table of Contents Table of Contents... I 1. Introduction... 1 2. System Requirements... 2 3. Installation... 2
e-dpp 4.0.2 May 2013 Quick Installation Guide Microsoft Windows 2003 Server, XP, Vista, 7 Access Database
e-dpp 4.0.2 May 2013 Microsoft Windows 2003 Server, XP, Vista, 7 Access Database ELTECHS Engineering and Consulting Co., Ltd., Japan www.eltechs.co.jp Tel No. +81 (47) 490-1010 Fax No. +81 (47) 490-1011
Royal Mail Group. getting started. with Symantec Endpoint Encryption. A user guide from Royal Mail Technology
getting started with Symantec Endpoint Encryption A user guide from Royal Mail Technology For further help, contact the IT Helpdesk on 5415 2555 (01246 282555) March 2010 Contents 1 Introduction to Symantec
Lenovo Online Data Backup User Guide Version 1.8.14
Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data
Richmond Systems. SupportDesk Quick Start Guide
Richmond Systems SupportDesk Quick Start Guide Table of Contents SupportDesk Quick Start Guide...1 Introduction...1 Pre-requisites...2 Installation at a Glance...2 Installation...3 Setup Console...13
After installation of Rohos Disk Encryption, insert your USB pen drive to the computer and run the Rohos Disk Encryption application.
Rohos Disk Encryption - creates hidden and password protected partitions on the computer or USB flash drive. With megabytes of sensitive files and private data on your computer or USB drive you can not
Contents. Getting Started...1. Managing Your Drives...14. Backing Up & Restoring Folders...28. Synchronizing Folders...48. Managing Security...
Contents Getting Started.....................................................1 Using the Formatting Tool........................................1 Preparing the Software Manually..................................4
8x8 Click2Pop User Guide
USER GUIDE 8x8 User Guide Getting Started with April 2014 Contents Introduction... 3 What s new.... 3 8x8.... 3 Here is how works...4 8x8 Click2Connect.... 4 Requirements.... 4 Installation on Microsoft
Connecting your Blackberry to Aliant Hosted Exchange. Instructions for connecting Blackberry hand-held devices to Aliant Hosted Exchange
Instructions for connecting Blackberry hand-held devices to Aliant Hosted Exchange 1 Table of Contents: BLACKBERRY 7750/6750 VERSIONS 3.7188 OR 3.6... 3 1. Verify the configuration of Outlook on the PC
NAS 249 Virtual Machine Configuration with VirtualBox
NAS 249 Virtual Machine Configuration with VirtualBox Configure and run Virtual Machines on ASUSTOR Portal with VirtualBox A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you
Instructions for Uploading and Sending Transcripts to the CollegeforTN.org Transcript Exchange Chancery SMS IMPORTANT NOTES:
Instructions for Uploading and Sending Transcripts to the CollegeforTN.org Transcript Exchange Chancery SMS IMPORTANT NOTES: START WITH STEP 1 ONLY IF YOU HAVE DOWNLOADED AND INSTALLED THE CHANCERY SMS
PLEASE NOTE: The client data used in these manuals is purely fictional.
Welcome! CAREWare Quick Start guides will walk you through the basics of setting up, managing and using the main CAREWare functions. It is intended for non-technical users who just need to get basic information
Print Audit 6 - SQL Server 2005 Express Edition
Print Audit 6 - SQL Server 2005 Express Edition Summary This is a step-by-step guide to install SQL Server 2005 Express Edition to use as a database for Print Audit 6. Pre-Requisites There are a few pre-requisites
CANON FAX L360 SOFTWARE MANUAL
CANON FAX L360 SOFTWARE MANUAL Before You Begin the Installation: a Checklist 2 To ensure a smooth and successful installation, take some time before you begin to plan and prepare for the installation
OPTAC Fleet Viewer. Instruction Manual
OPTAC Fleet Viewer Instruction Manual Stoneridge Limited Claverhouse Industrial Park Dundee DD4 9UB Help-line Telephone Number: 0870 887 9256 E-Mail: [email protected] Document version 4.0 Part Number:
How to Download Images Using Olympus Auto-Connect USB Cameras and Olympus Master
How to Download Images Using Olympus Auto-Connect USB Cameras and Olympus Master Introduction Auto-Connect USB is a feature that allows Olympus digital cameras to emulate a Hard disk drive when connected
Crystal Practice Management Encrypting the Database
Crystal Practice Management Encrypting the Database www.crystalpm.com 2013 Contents Overview... 1 Level of Encryption... 1 Why encrypt your Crystal Practice Management data?... 1 How to encrypt the database...
Microsoft Office 365 with MailDefender
(PC) for Microsoft Office 365 with MailDefender V1.0 Contents 1 Logging in to the Office 365 Portal... 3 1.1 Outlook Web Access Exchange & Lync... 3 1.2 Team Site SharePoint Online... 3 2 Configuring your
Backup Utility. Specify when the backup utility runs. You may configure the backup program to run at regular intervals or at a specified time.
Backup Utility 3501175 ver.01 The Buffalo Backup Utility is software to back up and restore data from your PC. To use, select the source drives to be backed up and a target location for backup data. Features
How do I find the Wireless Security Information in Windows XP, Vista, 7, 8 or 8.1?
Description of Problem 100000025093 How do I find the Wireless Security Information in Windows XP, Vista, 7, 8 or 8.1? Description of Solution 200000032138 These steps may help you locate your wireless
BackupAssist v6 quickstart guide
New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet
Setting up Remote Desktop
Setting up Remote Desktop Terminology: Host PC the computer you want to access remotely; the destination Client PC the computer you are actually using to access another PC; the source IP Address the numerical
Print Server Application Guide
Print Server Application Guide TD W8968 TD W8970 / TD W8970B TD W8980 / TD W8980B Rev: 1.0.0 1910010772 Contents Overview...1 Installation for Windows OS...2 Application for Windows OS...7 How to launch/exit
Installing Windows 7. On your Samsung NC10
Installing Windows 7 On your Samsung NC10 1 Contents Before you start page 3 Nine things you need to do 1. Windows 7 Upgrade Advisor page 4 2. Backing up your personal data page 6 3. Installing Windows
Using. Microsoft Virtual PC. Page 1
Using Microsoft Virtual PC T4 Page 1 Microsoft Virtual PC Microsoft Virtual PC allows multiple Guest Operating Systems (Virtual Machines) to run using the resources of the Host Operating System (The PC
SOFTWARE INSTALLATION INSTRUCTIONS
AUDITGARD LGA Electronic Combination Lock SOFTWARE INSTALLATION INSTRUCTIONS Implementation Package The AuditGard Software implementation package includes: 707013 AuditGard Software Install CD 42145 Programming/Audit
Centurion PLUS CPC4 Download Guide
Centurion PLUS CPC4 Download Guide using C4 File Transfer Utility. 1010537 03 01 10 Section 50 1.0 Background: 1.1 The Centurion PLUS Control system consists of a Centurion PLUS Core (CPC4 1) and Color
Midland BT Updater BTUpdater Program Program file (x86) ), Midland
Midland BT Updater After you downloaded the BT Updater setup application from the web site, double click on it and follow the installation procedure. The BTUpdater application is automatically installed
How to Setup Privacy Guard Encryption.
How to Setup Privacy Guard Encryption. Contents Setting up for the first time.... 1 Installing the Software (free)... 1 Generating your own key... 2 Share your key with your friends so they can send you
DataTraveler Locker+ User Manual
DataTraveler Locker+ User Manual Document No. 48008071-001.A02 DataTraveler Locker+ Page 1 of 22 Table of Contents About This Manual... 3 System Requirements... 3 Recommendations... 3 Setup (Windows Environment)...
Connecting to the University Wireless Network
Connecting to the University Wireless Network Wifi is available to staff and registered students of University in certain areas of the three campuses of the University. This area of coverage will be expanded
EW1015 R3 USB 2.0 to IDE and SATA adapter 1 ENGLISH
EW1015 R3 USB 2.0 to IDE and SATA adapter 1 ENGLISH EW1015 R3 - USB 2.0 to IDE and SATA adapter 2 ENGLISH Table of contents 1.0 Introduction... 2 1.1 Functions and features... 2 1.2 Packing contents...
GUARD1 PLUS Mini-Attendant File Manager User's Guide Version 2.71
GUARD1 PLUS Mini-Attendant File Manager User's Guide Version 2.71 Copyright 2002 TimeKeeping Systems, Inc. GUARD1 PLUS and THE PIPE are registered trademarks of TimeKeeping Systems, Inc. Introduction This
OPTAC Fleet Viewer. Instruction Manual
OPTAC Fleet Viewer Instruction Manual Stoneridge Limited Claverhouse Industrial Park Dundee DD4 9UB Help-line Telephone Number: 0870 887 9256 E-Mail: [email protected] Document version 3.0 Part Number:
Using Microsoft Internet Explorer 6 (Windows 2000/ Windows XP/ Windows Server 2003)
Security Alert Dialog Box When installing the program with SSL selected, a Windows security alert dialog box may appear each time you open Internet Explorer. This section describes how to prevent the display
eduroam wireless setup guide for Windows 7, XP and Vista
Information Technology Services eduroam wireless setup guide for Windows 7, XP and Vista Configuring Windows to connect to the eduroam wireless network June 2011 Introduction This document describes how
ODBC Driver Version 4 Manual
ODBC Driver Version 4 Manual Revision Date 12/05/2007 HanDBase is a Registered Trademark of DDH Software, Inc. All information contained in this manual and all software applications mentioned in this manual
BorderGuard Client. Version 4.4. November 2013
BorderGuard Client Version 4.4 November 2013 Blue Ridge Networks 14120 Parke Long Court, Suite 103 Chantilly, Virginia 20151 703-631-0700 WWW.BLUERIDGENETWORKS.COM All Products are provided with RESTRICTED
Print Server Application Guide. This guide applies to the following models.
Print Server Application Guide This guide applies to the following models. TL-WR842ND TL-WR1042ND TL-WR1043ND TL-WR2543ND TL-WDR4300 CONTENTS Chapter 1. Overview... 1 Chapter 2. Before Installation...
HP RDX Continuous Data Protection Software Quickstart Guide
HP RDX Continuous Data Protection Software Quickstart Guide *5697-3351* HP Part Number: 5697-3351 Published: May 2014 Edition: Fourth Copyright 2008 2014 Hewlett-Packard Development Company, L.P. Microsoft,
LCD MONITOR TOUCH DISPLAY DRIVER OPERATION MANUAL. for Mac. Version 1.0 PN-K322B/PN-K322BH/LL-S201A. Applicable models
LCD MONITOR TOUCH DISPLAY DRIVER OPERATION MANUAL for Mac Version 1.0 Applicable models PN-K322B/PN-K322BH/LL-S201A Contents Introduction...3 System Requirements...3 Setting up the Computer...4 Installing
Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide
Symantec Backup Exec 12.5 for Windows Servers Quick Installation Guide 13897290 Installing Backup Exec This document includes the following topics: System requirements Before you install About the Backup
4cast Client Specification and Installation
4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights
LCD MONITOR TOUCH PANEL DRIVER 2 OPERATION MANUAL. for Mac. Version 1.0 PN-L703A/PN-70TA3/PN-L703B/PN-70TB3/PN-L603A/PN-60TA3/PN-L603B/PN-60TB3
LCD MONITOR TOUCH PANEL DRIVER 2 OPERATION MANUAL for Mac Version 1.0 Applicable models PN-L703A/PN-70TA3/PN-L703B/PN-70TB3/PN-L603A/PN-60TA3/PN-L603B/PN-60TB3 Contents Introduction...3 System Requirements...3
Magaya Software Installation Guide
Magaya Software Installation Guide MAGAYA SOFTWARE INSTALLATION GUIDE INTRODUCTION Introduction This installation guide explains the system requirements for installing any Magaya software, the steps to
Page 1 S5.5 Monitoring Software Manual Rev 1.2 for Software Ver 1.0
Trantec S5.5 Monitoring Software Manual Initial Setup Minimum PC Requirements 1.6 GHz CPU, 256 MB Memory, 1 available USB port, Windows XP Recommended PC >2.0 GHz CPU, 512 MB (XP) 1 GB (Vista) memory,
ScoMIS Encryption Service
Introduction This guide explains how to install the ScoMIS Encryption Service Software onto a laptop computer. There are three stages to the installation which should be completed in order. The installation
PIGCHAMP MOBILE. PigCHAMP Knowledge Software. Installation Guide for Mobile Units
PIGCHAMP MOBILE PigCHAMP Knowledge Software Installation Guide for Mobile Units Table of Contents: Important Note:... 4 Chapter 1: PC Setup... 5 A. Install PigCHAMP Mobile Manager on Windows XP...5 B.
FAQ for USB Flash Drive
FAQ for USB Flash Drive 1. What is a USB Flash Drive? A USB Flash Drive consists of a flash memory data storage device integrated with a USB interface. USB Flash Drives are typically removable and rewritable.
Upgrading from Windows XP to Windows 7
Upgrading your PC from Windows XP to Windows 7 requires a custom installation which doesn't preserve your programs, files, or settings. It s sometimes called a clean installation for that reason. A custom
File and Printer Sharing with Microsoft Windows
Operating System File and Printer Sharing with Microsoft Windows Microsoft Corporation Published: November 2003 Abstract File and printer sharing in Microsoft Windows allows you to share the contents of
Detective. Family. HPGe-Based Portable Nuclide Identifiers. Wireless Remote Operation With SOTI s Pocket Controller Software
Detective Family HPGe-Based Portable Nuclide Identifiers Wireless Remote Operation With SOTI s Pocket Controller Software This document tells how to set up the Detective-EX/DX, Micro-Detective, Micro-trans-SPEC,
VirtualXP Users Guide
VirtualXP Users Guide Contents Chapter 1: Introduction... 2 Chapter 2: Install and Uninstall VirtualXP... 3 2.1 System Requirement... 3 2.2 Installing VirtualXP... 3 2.3 Uninstalling VirtualXP... 3 Chapter
Cloud Catcher TM Software
Cloud Catcher TM Software User Manual Version 2.0 Technical Support SanDisk Knowledgebase Contact SanDisk Table of Contents Overview... 2 Minimum System Requirements... 2 Languages Supported... 2 Installing
3M Occupational Health and Environmental Safety 3M E-A-Rfit Validation System. Version 4.2 Software Installation Guide (Upgrade) 1 P age
3M Occupational Health and Environmental Safety 3M E-A-Rfit Validation System Version 4.2 Software Installation Guide (Upgrade) 1 P age Contents Important Information Read First... 3 Software Download...
COMBOGARDPRO. 39E Electronic Combination Lock SOFTWARE INSTALLATION INSTRUCTIONS
COMBOGARDPRO 39E Electronic Combination Lock SOFTWARE INSTALLATION INSTRUCTIONS IMPLEMENTATION PACKAGE The ComboGard Pro Software implementation package includes: 707012 ComboGard Pro Software Install
