Encrypting a USB Drive Using TrueCrypt

Size: px
Start display at page:

Download "Encrypting a USB Drive Using TrueCrypt"

Transcription

1 Encrypting a USB Drive Using TrueCrypt This document details the steps to encrypt a USB Pen drive using TrueCrypt. TrueCrypt is free and open-source security software allowing encryption of documents and data files using various secure industry standard encryption algorithms combined with a user-chosen password. Prerequisites A USB drive:- Whilst it is possible to make use of a USB Drive containing existing data we recommend that you start with a freshly formatted Drive containing no data. Formatting with the FAT32 file system will allow an encrypted folder of up to 4 GB in size. Please refer to ISD Helpdesk if you require any help formatting the Pen Drive or require an encrypted folder > 4GB A computer running Windows 2000, XP, Vista or Windows 7 TrueCrypt 7.1 installed on your PC if not already installed, please contact the ISD Helpdesk to request an install. Setting up your USB Pen Drive for the first time 1. Initial setup of TrueCrypt will require you to create a TrueCrypt Volume on your Pen Drive. 2. Open TrueCrypt from the Programs Menu. 3. Click [Create Volume] 5. Select Standard TrueCrypt volume and click [Next] 4. The Volume Creation Wizard will start. Select Create an encrypted file container and click [Next]

2 6. Click [Select File] and browse to your USB Drive 10. Specify the size of the encrypted Volume you want to create in MB and click [Next]. When setting the size bear in mind the total number and anticipated size of the documents you ll want it to store in it as it cannot be increased later. Also, consider leaving free space on the pen drive to allow setup of Traveler Mode (if required) and for any requirement to store unencrypted data. 7. Enter the name (do not call it TrueCrypt) you want to use for the Volume (encrypted file container) and click [Save]. The example below creates a container called Encrypted 11. At this point you need to enter a password for the Volume. You ll need to enter it twice and if it is less than 20 characters, you ll get a message advising that you are using a weak password. We recommend use of a strong password with a minimum length of 8 characters that utilises a mixture of upper and lowercase letters, numbers and symbols. 8. Ensure the Never save history checkbox is ticked and click [Next] Remember that despite the encryption, the security of the encrypted container relies upon the strength of the password you set at this point. Warning: There is NO password recovery for TrueCrypt. If your password is forgotten/lost it will NOT be possible to access the encrypted file container! Set the password for the encrypted volume and click [Next]. 9. Select the Encryption Algorithm (the default of AES is fine) and click [Next]

3 Move your mouse randomly for several seconds to increase the cryptographic strength of the encryption keys and then click [Format]. Note that at this point the Volume will be created and time taken will depend upon the container size you set. Using a TrueCrypt Volume 16. Start TrueCrypt, and click [Select File] 12. The following screen appears during the formatting process: 17. Browse to your USB drive, select the Volume and then click [Open] 13. Once formatting is completed, click [OK] 18. You ll now need to click once on a drive letter to allow the Volume to be mounted. Note that only available driver letters are displayed so just select a letter and remember which one you ve chosen as that s how you ll access your files from Windows Explorer and your Applications. 14. Once creation of the Volume completes, click [Exit] 19. Once you ve selected a letter click [Mount] 15. Your TrueCrypt Volume (encrypted file container) is ready for use. 20. You will be prompted for your password for the Volume. Enter the password and click [OK]

4 21. You can now access and use the TrueCrypt Volume from Windows Explorer and from within your Applications to open, copy, paste and save documents as you would with any of your other drives (e.g. such as your H: drive). b. Before physically removing the USB Pen Drive you should follow the processes detailed below for both Windows XP and Windows 7 to ensure you safely remove the USB Pen Drive:- i. In Windows 7, look for the Safely Remove Hardware and Eject Media icon in the Notification Area The screen shot below, shows a windows explorer view of the drive letters available on the PC used to create this guide. Note that in this case, the Volume was mounted to drive I: Click the icon and you'll see a list of devices. Click the entry for your USB Pen Drive. Windows will display a notification telling you when it's safe to remove the device and you can then physically unplug it. ii. In Windows XP look for the Safely Remove hardware icon in the System Tray 22. Once you ve finished working with your encrypted files you need to dismount the Volume. To do this:- a. Right-click on the TrueCrypt icon next to the clock in the bottom right of the Desktop. In Windows XP it should be accessible via the System Tray. In Windows 7 it should be accessible via the Notification Area and then select Dismount All. Right-Click the icon and select Safely Remove Hardware. The Safely Remove Hardware window should appear. Tick Display Device Components and then select the USB Pen Drive entry and click [Stop]. A confirmation box appears; check that it shows the correct device and if so click [OK] Windows will display a notification telling you when it's safe to remove the device and you can then physically unplug it.

5 TrueCrypt Traveller (Portable Mode) Configuring your USB Pen Drive in Traveler/Portable mode will allow you to access a TrueCrypt Volume on PCs that do not have TrueCrypt locally installed. What this means is that a copy of the TrueCrypt executable is placed in an unencrypted section of the USB Pen Drive and run directly from there. Note that Traveler mode functionality requires administrator rights on the PC as the TrueCrypt application needs to install driver files to the PC. It is not standard ISD policy to grant administrative rights to CardiffMet PCs as this raises security issues related to the integrity of the Operating System and concerns regarding potential attack windows, spread and impact of security threats, viruses and general malware. 25. Click [Create] and the required files are copied to the USB Pen Drive As a result whilst Traveler mode can be setup on the USB Pen Drive using a CardiffMet PC, it is not possible to run the TrueCrypt application in Traveler mode. This is easily addressed with CardiffMet PCs by requesting that TrueCrypt be installed to the PC if it is not already available. The steps for setting up and running TrueCrypt in Traveler mode are detailed below. 23. Within TrueCrypt select Tools Menu > Traveler Disk Setup 26. Once completed and acknowledgement message appears which also points out the administrator rights issue. Click [OK] 24. Click [Browse] and select the drive letter corresponding to your USB Pen Drive, then click [OK]. In the example, the Pen Drive being used is a Kingston Drive mounted at F:

6 Click [OK] 27. Traveler Mode is now complete and if you check the Pen Drive in Windows Explorer you will find a folder named TrueCrypt containing the files required to run Traveler Mode. Running TrueCrypt in Traveller Mode 28. To run in Traveler Mode, plug-in your USB Pen Drive and use Windows Explorer to browse to the folder on it named TrueCrypt 29. Open the TrueCrypt folder and then double-click the file named TrueCrypt.exe 30. The TrueCrypt Application will open as normal and you then use it as per the instructions contained in the Using a TrueCrypt Volume section of this guide. Further Information For further information, please see the User Guide accessible from the Help Menu in the TrueCrypt application. You can also visit the TrueCrypt Website at

BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8)

BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8) BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8) Encryption is an effective method of protecting data stored on portable devices such as USB flash drives and external hard drives.

More information

Using TrueCrypt to protect data

Using TrueCrypt to protect data Using TrueCrypt to protect data Password protecting and encrypting files one by one is a certainly an effective way to securely store and share data. However, what if you have a lot of files? Creating

More information

Verbatim Secure Data USB Drive. User Guide. User Guide Version 2.0 All rights reserved

Verbatim Secure Data USB Drive. User Guide. User Guide Version 2.0 All rights reserved Verbatim Secure Data USB Drive User Guide User Guide Version 2.0 All rights reserved Table of Contents Table of Contents... 2 1. Introduction to Verbatim Secure Data USB Drive... 3 2. System Requirements...

More information

How to create a portable encrypted USB Key using TrueCrypt

How to create a portable encrypted USB Key using TrueCrypt How to create a portable encrypted USB Key using TrueCrypt INTRODUCTION TrueCrypt Traveler Mode provides secure encryption for programs/files on portable devices such as USB Memory keys. It uses strong

More information

16.4.3 Lab: Data Backup and Recovery in Windows XP

16.4.3 Lab: Data Backup and Recovery in Windows XP 16.4.3 Lab: Data Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment The

More information

Step by step guide how to password protect your USB flash drive

Step by step guide how to password protect your USB flash drive Step by step guide how to password protect your USB flash drive 1 Content 1. How to create encrypted partition on USB flash drive 2. How to work with encrypted partition on the USB flash drive - Rohos

More information

USB Flash Security Free Edition Quick Start

USB Flash Security Free Edition Quick Start Quick Start [For USB Flash Security Free Edition] 1 / 18 USB Flash Security Free Edition Quick Start Before use USB Flash Security 1. Free edition can only be installed on the USB Flash Drive up to 4GB

More information

Chapter 1 Downloading Images to Your Computer (Windows)

Chapter 1 Downloading Images to Your Computer (Windows) Software User Guide For the safe use of your camera, be sure to read the Safety Precautions thoroughly before use. Types of software installed on your computer varies depending on the method of installation

More information

SonicWALL CDP Local Archiving

SonicWALL CDP Local Archiving This document describes how to configure, implement, and manage a local archive for your SonicWALL CDP appliance. It contains the following sections: Feature Overview section on page 1 Using Local Archiving

More information

10.3.1.6 Lab - Data Backup and Recovery in Windows XP

10.3.1.6 Lab - Data Backup and Recovery in Windows XP 5.0 10.3.1.6 Lab - Data Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment

More information

Guide to Installing BBL Crystal MIND on Windows 7

Guide to Installing BBL Crystal MIND on Windows 7 Guide to Installing BBL Crystal MIND on Windows 7 Introduction The BBL Crystal MIND software can not be directly installed on the Microsoft Windows 7 platform, however it can be installed and run via XP

More information

Encrypt USB Drive to Protect Data

Encrypt USB Drive to Protect Data Encrypt USB Drive to Protect Data Enable BitLocker on USB Flash Drives to Protect Data Encryption is an effective method of protecting data stored on portable devices such as USB flash drives and external

More information

WARNING!!: Before installing Truecrypt encryption software on your

WARNING!!: Before installing Truecrypt encryption software on your Truecrypt installation and usage guide for Windows XP, 7, Vista and 8 WARNING!!: Before installing Truecrypt encryption software on your computer, you should create an Acronis image back up of your computer

More information

Table of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2

Table of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2 Table of Contents TPM Configuration Procedure... 2 1. Configuring the System BIOS... 2 2. Installing the Infineon TPM Driver and the GIGABYTE Ultra TPM Utility... 3 3. Initializing the TPM Chip... 4 3.1.

More information

BitLocker To Go USB Flash Drive encryption User Guide

BitLocker To Go USB Flash Drive encryption User Guide BitLocker To Go USB Flash Drive encryption User Guide Introduction BitLocker To Go is a new feature of Windows 7 which allows encryption of easily misplaced portable storage devices such as USB Flash Drives

More information

Option nv, Gaston Geenslaan 14, B-3001 Leuven Tel +32 16 317 411 Fax +32 16 207 164 http://www.option.com Page 1 of 14

Option nv, Gaston Geenslaan 14, B-3001 Leuven Tel +32 16 317 411 Fax +32 16 207 164 http://www.option.com Page 1 of 14 Page 1 of 14 ! " #!"#$ % &&' Page 2 of 14 1 INTRODUCTION One of the highly desirable features of the GlobeSurfer III device is the ability to network together Printers and External Hard Disk drives (aka

More information

Getting Started with MozyPro Online Backup Online Software from Time Warner Cable Business Class

Getting Started with MozyPro Online Backup Online Software from Time Warner Cable Business Class Getting Started with MozyPro Online Backup Online Software from Time Warner Cable Business Class A Guide for Users MozyPro is an online backup service with an easy to use interface so you can start backing

More information

MAC/OSX - How to Encrypt Data using TrueCrypt. v.05201011

MAC/OSX - How to Encrypt Data using TrueCrypt. v.05201011 MAC/OSX - How to Encrypt Data using TrueCrypt v.05201011 This chapter contains step-by-step instructions on how to create, mount, and use a TrueCrypt volume. We strongly recommend that you read the entire

More information

Only smart people read the manual.

Only smart people read the manual. Only smart people read the manual. Contents Getting Started... 1 Installing the FreeAgent Tools... 1 Using the FreeAgent Tools Icons... 9 Using the System Tray Icon... 10 Disconnecting the FreeAgent Drive...

More information

Smart TPM. User's Manual. Rev. 1001 12MD-STPM-1001R

Smart TPM. User's Manual. Rev. 1001 12MD-STPM-1001R Smart TPM User's Manual Rev. 1001 12MD-STPM-1001R We recommend that you download the latest version of the Smart TPM utility from GIGABYTE's website. If you have installed Ultra TPM earlier, you can install

More information

TPG MOBILE BROADBAND QUICK SETUP GUIDE

TPG MOBILE BROADBAND QUICK SETUP GUIDE TPG MOBILE BROADBAND QUICK SETUP GUIDE TPG USB E1762 Modem Thank you for choosing TPG Mobile Broadband and USB E1762 modem. This User Guide provides step by step instructions that will take you through

More information

You can find the installer for the +Cloud Application on your SanDisk flash drive.

You can find the installer for the +Cloud Application on your SanDisk flash drive. Installation You can find the installer for the +Cloud Application on your SanDisk flash drive. Make sure that your computer is connected to the internet. Next plug in the flash drive and double click

More information

1. Scope of Service. 1.1 About Boxcryptor Classic

1. Scope of Service. 1.1 About Boxcryptor Classic Manual for Mac OS X Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 4 2. Installation... 5 2.1 Installing Boxcryptor Classic... 5 2.2 Licensing Boxcryptor Classic

More information

DataTraveler Secure - Privacy Edition

DataTraveler Secure - Privacy Edition DataTraveler Secure - Privacy Edition This document is designed to help users become familiar with the DataTraveler Secure - Privacy Edition. For additional support, please visit our on-line technical

More information

ScanShell.Net Install Guide

ScanShell.Net Install Guide ScanShell.Net Install Guide Please install the software first - DO NOT PLUG IN THE SCANNER The scanner has been carefully packaged to avoid damage during transportation. Before operating the scanner, please

More information

Kaspersky Password Manager USER GUIDE

Kaspersky Password Manager USER GUIDE Kaspersky Password Manager USER GUIDE Dear User! Thank you for choosing our product. We hope that this documentation helps you in your work and provides answers you may need. Any type of reproduction or

More information

Virtual Office Remote Installation Guide

Virtual Office Remote Installation Guide Virtual Office Remote Installation Guide Table of Contents VIRTUAL OFFICE REMOTE INSTALLATION GUIDE... 3 UNIVERSAL PRINTER CONFIGURATION INSTRUCTIONS... 12 CHANGING DEFAULT PRINTERS ON LOCAL SYSTEM...

More information

Global VPN Client Getting Started Guide

Global VPN Client Getting Started Guide Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

Encrypting Files Using AxCrypt

Encrypting Files Using AxCrypt Encrypting Files Using AxCrypt Documents, spreadsheets, databases, and other files that contain personal information or other sensitive information MUST BE encrypted when being transmitted to someone else

More information

HOW TO INSTALL FS USB TRANSCRIPTION SOFTWARE (OFFICE ADMIN MEDICAL)

HOW TO INSTALL FS USB TRANSCRIPTION SOFTWARE (OFFICE ADMIN MEDICAL) Go to itstartshere.nbcc.ca to watch a video on how to do this. HOW TO INSTALL FS USB TRANSCRIPTION SOFTWARE (OFFICE ADMIN MEDICAL) These steps MUST be performed while at the college. Cannot be done from

More information

SP Widget. Users Manual

SP Widget. Users Manual SP Widget Users Manual 1 Contents 1. Disclaimer notice... 4 2. Product intro...5 3. System requirements... 5 4. Introduction... 6 4.1 Activating SP Widget... 6 Illustration 4.1... 6 4.2 Browser interface...

More information

Here is a guide on how to encrypt a part of your USB flash drive and access it on any computer:

Here is a guide on how to encrypt a part of your USB flash drive and access it on any computer: How to password protect your USB flash drive. According to the XXX agency reports 80% of all lost and stolen USB flash drives contained a very important information: business or government data. The following

More information

Using Bitlocker to Encrypt your Flash Drive Information Technology Services July 27, 2012

Using Bitlocker to Encrypt your Flash Drive Information Technology Services July 27, 2012 Using Bitlocker to Encrypt your Flash Drive Information Technology Services July 27, 2012 Contact the ITS Helpdesk at 402-559-7700 or [email protected] with questions. How it works Basically, BitLocker

More information

HDDtoGO. User Guide. User Manual Version 3.4 2004-2010 CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual

HDDtoGO. User Guide. User Manual Version 3.4 2004-2010 CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual HDDtoGO User Guide User Manual Version 3.4 2004-2010 CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual Table of Contents Table of Contents...1 1. Introduction...2 2. System Requirements...3

More information

PCLinq2 Hi-Speed USB Bridge-Network Cable. Quick Network Setup Guide

PCLinq2 Hi-Speed USB Bridge-Network Cable. Quick Network Setup Guide PCLinq2 Hi-Speed USB Bridge-Network Cable Congratulations! Quick Network Setup Guide For Windows 98/ME/2000/XP Congratulations for installing the PCLinq2 Hi-Speed USB Bridge-Network Cable. This Quick Network

More information

User Manual - Secure Lock Ware

User Manual - Secure Lock Ware User Manual - Secure Lock Ware Drive Encryption System Ultra High Security - 256-bit Capable AES Encryption for Buffalo USB Hard Drives www.buffalotech.com v1.8 Table of Contents Introduction.................................

More information

How to Install Applications (APK Files) on Your Android Phone

How to Install Applications (APK Files) on Your Android Phone How to Install Applications (APK Files) on Your Android Phone Overview An Android application is stored in an APK file (i.e., a file named by {Application Name}.apk). You must install the APK on your Android

More information

AIM SOFTWARE AND USB DRIVER INSTALLATION PROCEDURE

AIM SOFTWARE AND USB DRIVER INSTALLATION PROCEDURE AIM SOFTWARE AND USB DRIVER INSTALLATION PROCEDURE CONTENTS AIM software and USB Driver installation Chapter 1 Installing AIM software and AIM USB driver... 2 Chapter 2 Installation under Microsoft Windows

More information

IsItUp Quick Start Manual

IsItUp Quick Start Manual IsItUp - When you need to know the status of your network Taro Software Inc. Website: www.tarosoft.com Telephone: 703-405-4697 Postal address: 8829 110th Lane, Seminole Fl, 33772 Electronic mail: [email protected]

More information

Guide how to protect your private data with Rohos Disk Encryption

Guide how to protect your private data with Rohos Disk Encryption Guide how to protect your private data with Rohos Disk Encryption 1 Content 1. Encrypt USB drive - Portable Application 2. Encrypt HDD 3. Hide folder 4. Have USB Key for access control 5. Rohos disk options

More information

BSDI Advanced Fitness & Wellness Software

BSDI Advanced Fitness & Wellness Software BSDI Advanced Fitness & Wellness Software 6 Kellie Ct. Califon, NJ 07830 http://www.bsdi.cc SOFTWARE BACKUP/RESTORE INSTRUCTION SHEET This document will outline the steps necessary to take configure the

More information

Surf it Easy. User Guide

Surf it Easy. User Guide Surf it Easy User Guide User Manual Version 1.1 2004 CoSoSys SRL Surf it Easy User Manual Table of Contents Table of Contents... I 1. Introduction... 1 2. System Requirements... 2 3. Installation... 2

More information

e-dpp 4.0.2 May 2013 Quick Installation Guide Microsoft Windows 2003 Server, XP, Vista, 7 Access Database

e-dpp 4.0.2 May 2013 Quick Installation Guide Microsoft Windows 2003 Server, XP, Vista, 7 Access Database e-dpp 4.0.2 May 2013 Microsoft Windows 2003 Server, XP, Vista, 7 Access Database ELTECHS Engineering and Consulting Co., Ltd., Japan www.eltechs.co.jp Tel No. +81 (47) 490-1010 Fax No. +81 (47) 490-1011

More information

Royal Mail Group. getting started. with Symantec Endpoint Encryption. A user guide from Royal Mail Technology

Royal Mail Group. getting started. with Symantec Endpoint Encryption. A user guide from Royal Mail Technology getting started with Symantec Endpoint Encryption A user guide from Royal Mail Technology For further help, contact the IT Helpdesk on 5415 2555 (01246 282555) March 2010 Contents 1 Introduction to Symantec

More information

Lenovo Online Data Backup User Guide Version 1.8.14

Lenovo Online Data Backup User Guide Version 1.8.14 Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data

More information

Richmond Systems. SupportDesk Quick Start Guide

Richmond Systems. SupportDesk Quick Start Guide Richmond Systems SupportDesk Quick Start Guide Table of Contents SupportDesk Quick Start Guide...1 Introduction...1 Pre-requisites...2 Installation at a Glance...2 Installation...3 Setup Console...13

More information

After installation of Rohos Disk Encryption, insert your USB pen drive to the computer and run the Rohos Disk Encryption application.

After installation of Rohos Disk Encryption, insert your USB pen drive to the computer and run the Rohos Disk Encryption application. Rohos Disk Encryption - creates hidden and password protected partitions on the computer or USB flash drive. With megabytes of sensitive files and private data on your computer or USB drive you can not

More information

Contents. Getting Started...1. Managing Your Drives...14. Backing Up & Restoring Folders...28. Synchronizing Folders...48. Managing Security...

Contents. Getting Started...1. Managing Your Drives...14. Backing Up & Restoring Folders...28. Synchronizing Folders...48. Managing Security... Contents Getting Started.....................................................1 Using the Formatting Tool........................................1 Preparing the Software Manually..................................4

More information

8x8 Click2Pop User Guide

8x8 Click2Pop User Guide USER GUIDE 8x8 User Guide Getting Started with April 2014 Contents Introduction... 3 What s new.... 3 8x8.... 3 Here is how works...4 8x8 Click2Connect.... 4 Requirements.... 4 Installation on Microsoft

More information

Connecting your Blackberry to Aliant Hosted Exchange. Instructions for connecting Blackberry hand-held devices to Aliant Hosted Exchange

Connecting your Blackberry to Aliant Hosted Exchange. Instructions for connecting Blackberry hand-held devices to Aliant Hosted Exchange Instructions for connecting Blackberry hand-held devices to Aliant Hosted Exchange 1 Table of Contents: BLACKBERRY 7750/6750 VERSIONS 3.7188 OR 3.6... 3 1. Verify the configuration of Outlook on the PC

More information

NAS 249 Virtual Machine Configuration with VirtualBox

NAS 249 Virtual Machine Configuration with VirtualBox NAS 249 Virtual Machine Configuration with VirtualBox Configure and run Virtual Machines on ASUSTOR Portal with VirtualBox A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you

More information

Instructions for Uploading and Sending Transcripts to the CollegeforTN.org Transcript Exchange Chancery SMS IMPORTANT NOTES:

Instructions for Uploading and Sending Transcripts to the CollegeforTN.org Transcript Exchange Chancery SMS IMPORTANT NOTES: Instructions for Uploading and Sending Transcripts to the CollegeforTN.org Transcript Exchange Chancery SMS IMPORTANT NOTES: START WITH STEP 1 ONLY IF YOU HAVE DOWNLOADED AND INSTALLED THE CHANCERY SMS

More information

PLEASE NOTE: The client data used in these manuals is purely fictional.

PLEASE NOTE: The client data used in these manuals is purely fictional. Welcome! CAREWare Quick Start guides will walk you through the basics of setting up, managing and using the main CAREWare functions. It is intended for non-technical users who just need to get basic information

More information

Print Audit 6 - SQL Server 2005 Express Edition

Print Audit 6 - SQL Server 2005 Express Edition Print Audit 6 - SQL Server 2005 Express Edition Summary This is a step-by-step guide to install SQL Server 2005 Express Edition to use as a database for Print Audit 6. Pre-Requisites There are a few pre-requisites

More information

CANON FAX L360 SOFTWARE MANUAL

CANON FAX L360 SOFTWARE MANUAL CANON FAX L360 SOFTWARE MANUAL Before You Begin the Installation: a Checklist 2 To ensure a smooth and successful installation, take some time before you begin to plan and prepare for the installation

More information

OPTAC Fleet Viewer. Instruction Manual

OPTAC Fleet Viewer. Instruction Manual OPTAC Fleet Viewer Instruction Manual Stoneridge Limited Claverhouse Industrial Park Dundee DD4 9UB Help-line Telephone Number: 0870 887 9256 E-Mail: [email protected] Document version 4.0 Part Number:

More information

How to Download Images Using Olympus Auto-Connect USB Cameras and Olympus Master

How to Download Images Using Olympus Auto-Connect USB Cameras and Olympus Master How to Download Images Using Olympus Auto-Connect USB Cameras and Olympus Master Introduction Auto-Connect USB is a feature that allows Olympus digital cameras to emulate a Hard disk drive when connected

More information

Crystal Practice Management Encrypting the Database

Crystal Practice Management Encrypting the Database Crystal Practice Management Encrypting the Database www.crystalpm.com 2013 Contents Overview... 1 Level of Encryption... 1 Why encrypt your Crystal Practice Management data?... 1 How to encrypt the database...

More information

Microsoft Office 365 with MailDefender

Microsoft Office 365 with MailDefender (PC) for Microsoft Office 365 with MailDefender V1.0 Contents 1 Logging in to the Office 365 Portal... 3 1.1 Outlook Web Access Exchange & Lync... 3 1.2 Team Site SharePoint Online... 3 2 Configuring your

More information

Backup Utility. Specify when the backup utility runs. You may configure the backup program to run at regular intervals or at a specified time.

Backup Utility. Specify when the backup utility runs. You may configure the backup program to run at regular intervals or at a specified time. Backup Utility 3501175 ver.01 The Buffalo Backup Utility is software to back up and restore data from your PC. To use, select the source drives to be backed up and a target location for backup data. Features

More information

How do I find the Wireless Security Information in Windows XP, Vista, 7, 8 or 8.1?

How do I find the Wireless Security Information in Windows XP, Vista, 7, 8 or 8.1? Description of Problem 100000025093 How do I find the Wireless Security Information in Windows XP, Vista, 7, 8 or 8.1? Description of Solution 200000032138 These steps may help you locate your wireless

More information

BackupAssist v6 quickstart guide

BackupAssist v6 quickstart guide New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet

More information

Setting up Remote Desktop

Setting up Remote Desktop Setting up Remote Desktop Terminology: Host PC the computer you want to access remotely; the destination Client PC the computer you are actually using to access another PC; the source IP Address the numerical

More information

Print Server Application Guide

Print Server Application Guide Print Server Application Guide TD W8968 TD W8970 / TD W8970B TD W8980 / TD W8980B Rev: 1.0.0 1910010772 Contents Overview...1 Installation for Windows OS...2 Application for Windows OS...7 How to launch/exit

More information

Installing Windows 7. On your Samsung NC10

Installing Windows 7. On your Samsung NC10 Installing Windows 7 On your Samsung NC10 1 Contents Before you start page 3 Nine things you need to do 1. Windows 7 Upgrade Advisor page 4 2. Backing up your personal data page 6 3. Installing Windows

More information

Using. Microsoft Virtual PC. Page 1

Using. Microsoft Virtual PC. Page 1 Using Microsoft Virtual PC T4 Page 1 Microsoft Virtual PC Microsoft Virtual PC allows multiple Guest Operating Systems (Virtual Machines) to run using the resources of the Host Operating System (The PC

More information

SOFTWARE INSTALLATION INSTRUCTIONS

SOFTWARE INSTALLATION INSTRUCTIONS AUDITGARD LGA Electronic Combination Lock SOFTWARE INSTALLATION INSTRUCTIONS Implementation Package The AuditGard Software implementation package includes: 707013 AuditGard Software Install CD 42145 Programming/Audit

More information

Centurion PLUS CPC4 Download Guide

Centurion PLUS CPC4 Download Guide Centurion PLUS CPC4 Download Guide using C4 File Transfer Utility. 1010537 03 01 10 Section 50 1.0 Background: 1.1 The Centurion PLUS Control system consists of a Centurion PLUS Core (CPC4 1) and Color

More information

Midland BT Updater BTUpdater Program Program file (x86) ), Midland

Midland BT Updater BTUpdater Program Program file (x86) ), Midland Midland BT Updater After you downloaded the BT Updater setup application from the web site, double click on it and follow the installation procedure. The BTUpdater application is automatically installed

More information

How to Setup Privacy Guard Encryption.

How to Setup Privacy Guard Encryption. How to Setup Privacy Guard Encryption. Contents Setting up for the first time.... 1 Installing the Software (free)... 1 Generating your own key... 2 Share your key with your friends so they can send you

More information

DataTraveler Locker+ User Manual

DataTraveler Locker+ User Manual DataTraveler Locker+ User Manual Document No. 48008071-001.A02 DataTraveler Locker+ Page 1 of 22 Table of Contents About This Manual... 3 System Requirements... 3 Recommendations... 3 Setup (Windows Environment)...

More information

Connecting to the University Wireless Network

Connecting to the University Wireless Network Connecting to the University Wireless Network Wifi is available to staff and registered students of University in certain areas of the three campuses of the University. This area of coverage will be expanded

More information

EW1015 R3 USB 2.0 to IDE and SATA adapter 1 ENGLISH

EW1015 R3 USB 2.0 to IDE and SATA adapter 1 ENGLISH EW1015 R3 USB 2.0 to IDE and SATA adapter 1 ENGLISH EW1015 R3 - USB 2.0 to IDE and SATA adapter 2 ENGLISH Table of contents 1.0 Introduction... 2 1.1 Functions and features... 2 1.2 Packing contents...

More information

GUARD1 PLUS Mini-Attendant File Manager User's Guide Version 2.71

GUARD1 PLUS Mini-Attendant File Manager User's Guide Version 2.71 GUARD1 PLUS Mini-Attendant File Manager User's Guide Version 2.71 Copyright 2002 TimeKeeping Systems, Inc. GUARD1 PLUS and THE PIPE are registered trademarks of TimeKeeping Systems, Inc. Introduction This

More information

OPTAC Fleet Viewer. Instruction Manual

OPTAC Fleet Viewer. Instruction Manual OPTAC Fleet Viewer Instruction Manual Stoneridge Limited Claverhouse Industrial Park Dundee DD4 9UB Help-line Telephone Number: 0870 887 9256 E-Mail: [email protected] Document version 3.0 Part Number:

More information

Using Microsoft Internet Explorer 6 (Windows 2000/ Windows XP/ Windows Server 2003)

Using Microsoft Internet Explorer 6 (Windows 2000/ Windows XP/ Windows Server 2003) Security Alert Dialog Box When installing the program with SSL selected, a Windows security alert dialog box may appear each time you open Internet Explorer. This section describes how to prevent the display

More information

eduroam wireless setup guide for Windows 7, XP and Vista

eduroam wireless setup guide for Windows 7, XP and Vista Information Technology Services eduroam wireless setup guide for Windows 7, XP and Vista Configuring Windows to connect to the eduroam wireless network June 2011 Introduction This document describes how

More information

ODBC Driver Version 4 Manual

ODBC Driver Version 4 Manual ODBC Driver Version 4 Manual Revision Date 12/05/2007 HanDBase is a Registered Trademark of DDH Software, Inc. All information contained in this manual and all software applications mentioned in this manual

More information

BorderGuard Client. Version 4.4. November 2013

BorderGuard Client. Version 4.4. November 2013 BorderGuard Client Version 4.4 November 2013 Blue Ridge Networks 14120 Parke Long Court, Suite 103 Chantilly, Virginia 20151 703-631-0700 WWW.BLUERIDGENETWORKS.COM All Products are provided with RESTRICTED

More information

Print Server Application Guide. This guide applies to the following models.

Print Server Application Guide. This guide applies to the following models. Print Server Application Guide This guide applies to the following models. TL-WR842ND TL-WR1042ND TL-WR1043ND TL-WR2543ND TL-WDR4300 CONTENTS Chapter 1. Overview... 1 Chapter 2. Before Installation...

More information

HP RDX Continuous Data Protection Software Quickstart Guide

HP RDX Continuous Data Protection Software Quickstart Guide HP RDX Continuous Data Protection Software Quickstart Guide *5697-3351* HP Part Number: 5697-3351 Published: May 2014 Edition: Fourth Copyright 2008 2014 Hewlett-Packard Development Company, L.P. Microsoft,

More information

LCD MONITOR TOUCH DISPLAY DRIVER OPERATION MANUAL. for Mac. Version 1.0 PN-K322B/PN-K322BH/LL-S201A. Applicable models

LCD MONITOR TOUCH DISPLAY DRIVER OPERATION MANUAL. for Mac. Version 1.0 PN-K322B/PN-K322BH/LL-S201A. Applicable models LCD MONITOR TOUCH DISPLAY DRIVER OPERATION MANUAL for Mac Version 1.0 Applicable models PN-K322B/PN-K322BH/LL-S201A Contents Introduction...3 System Requirements...3 Setting up the Computer...4 Installing

More information

Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide

Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide Symantec Backup Exec 12.5 for Windows Servers Quick Installation Guide 13897290 Installing Backup Exec This document includes the following topics: System requirements Before you install About the Backup

More information

4cast Client Specification and Installation

4cast Client Specification and Installation 4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights

More information

LCD MONITOR TOUCH PANEL DRIVER 2 OPERATION MANUAL. for Mac. Version 1.0 PN-L703A/PN-70TA3/PN-L703B/PN-70TB3/PN-L603A/PN-60TA3/PN-L603B/PN-60TB3

LCD MONITOR TOUCH PANEL DRIVER 2 OPERATION MANUAL. for Mac. Version 1.0 PN-L703A/PN-70TA3/PN-L703B/PN-70TB3/PN-L603A/PN-60TA3/PN-L603B/PN-60TB3 LCD MONITOR TOUCH PANEL DRIVER 2 OPERATION MANUAL for Mac Version 1.0 Applicable models PN-L703A/PN-70TA3/PN-L703B/PN-70TB3/PN-L603A/PN-60TA3/PN-L603B/PN-60TB3 Contents Introduction...3 System Requirements...3

More information

Magaya Software Installation Guide

Magaya Software Installation Guide Magaya Software Installation Guide MAGAYA SOFTWARE INSTALLATION GUIDE INTRODUCTION Introduction This installation guide explains the system requirements for installing any Magaya software, the steps to

More information

Page 1 S5.5 Monitoring Software Manual Rev 1.2 for Software Ver 1.0

Page 1 S5.5 Monitoring Software Manual Rev 1.2 for Software Ver 1.0 Trantec S5.5 Monitoring Software Manual Initial Setup Minimum PC Requirements 1.6 GHz CPU, 256 MB Memory, 1 available USB port, Windows XP Recommended PC >2.0 GHz CPU, 512 MB (XP) 1 GB (Vista) memory,

More information

ScoMIS Encryption Service

ScoMIS Encryption Service Introduction This guide explains how to install the ScoMIS Encryption Service Software onto a laptop computer. There are three stages to the installation which should be completed in order. The installation

More information

PIGCHAMP MOBILE. PigCHAMP Knowledge Software. Installation Guide for Mobile Units

PIGCHAMP MOBILE. PigCHAMP Knowledge Software. Installation Guide for Mobile Units PIGCHAMP MOBILE PigCHAMP Knowledge Software Installation Guide for Mobile Units Table of Contents: Important Note:... 4 Chapter 1: PC Setup... 5 A. Install PigCHAMP Mobile Manager on Windows XP...5 B.

More information

FAQ for USB Flash Drive

FAQ for USB Flash Drive FAQ for USB Flash Drive 1. What is a USB Flash Drive? A USB Flash Drive consists of a flash memory data storage device integrated with a USB interface. USB Flash Drives are typically removable and rewritable.

More information

Upgrading from Windows XP to Windows 7

Upgrading from Windows XP to Windows 7 Upgrading your PC from Windows XP to Windows 7 requires a custom installation which doesn't preserve your programs, files, or settings. It s sometimes called a clean installation for that reason. A custom

More information

File and Printer Sharing with Microsoft Windows

File and Printer Sharing with Microsoft Windows Operating System File and Printer Sharing with Microsoft Windows Microsoft Corporation Published: November 2003 Abstract File and printer sharing in Microsoft Windows allows you to share the contents of

More information

Detective. Family. HPGe-Based Portable Nuclide Identifiers. Wireless Remote Operation With SOTI s Pocket Controller Software

Detective. Family. HPGe-Based Portable Nuclide Identifiers. Wireless Remote Operation With SOTI s Pocket Controller Software Detective Family HPGe-Based Portable Nuclide Identifiers Wireless Remote Operation With SOTI s Pocket Controller Software This document tells how to set up the Detective-EX/DX, Micro-Detective, Micro-trans-SPEC,

More information

VirtualXP Users Guide

VirtualXP Users Guide VirtualXP Users Guide Contents Chapter 1: Introduction... 2 Chapter 2: Install and Uninstall VirtualXP... 3 2.1 System Requirement... 3 2.2 Installing VirtualXP... 3 2.3 Uninstalling VirtualXP... 3 Chapter

More information

Cloud Catcher TM Software

Cloud Catcher TM Software Cloud Catcher TM Software User Manual Version 2.0 Technical Support SanDisk Knowledgebase Contact SanDisk Table of Contents Overview... 2 Minimum System Requirements... 2 Languages Supported... 2 Installing

More information

3M Occupational Health and Environmental Safety 3M E-A-Rfit Validation System. Version 4.2 Software Installation Guide (Upgrade) 1 P age

3M Occupational Health and Environmental Safety 3M E-A-Rfit Validation System. Version 4.2 Software Installation Guide (Upgrade) 1 P age 3M Occupational Health and Environmental Safety 3M E-A-Rfit Validation System Version 4.2 Software Installation Guide (Upgrade) 1 P age Contents Important Information Read First... 3 Software Download...

More information

COMBOGARDPRO. 39E Electronic Combination Lock SOFTWARE INSTALLATION INSTRUCTIONS

COMBOGARDPRO. 39E Electronic Combination Lock SOFTWARE INSTALLATION INSTRUCTIONS COMBOGARDPRO 39E Electronic Combination Lock SOFTWARE INSTALLATION INSTRUCTIONS IMPLEMENTATION PACKAGE The ComboGard Pro Software implementation package includes: 707012 ComboGard Pro Software Install

More information