PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1
|
|
|
- Caroline Jones
- 10 years ago
- Views:
Transcription
1 PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1
2
3 Table of Contents 1 Self Decrypting Archives (SDA) Setting Windows to Display File Extensions Creating PGP Zip SDA Create a passphrase Creating a Strong Passphrase Send the Encrypted SDA via Opening a PGP ZIP SDA Tables
4 1 Self Decrypting Archives (SDA) If sensitive Xerox or client data is going to be sent in an (via the internet) or copied onto some other media such as a CD; it must be encrypted to protect it. PGP Desktop disk encryption software allows employees to create Self Decrypting Archives (SDAs) which do not require the recipient to have PGP Desktop to decrypt and read the file. Follow the steps herein to create encrypted files that you can then attach in an or transfer to another media such as a CD or DVD. You must have PGP Desktop disk encryption software installed on your computer to create SDAs. Note: PGP encrypts and compresses the file size of the SDA. Do not Win Zip or otherwise attempt to compress the SDA with another program. Requires that your recipients are using Windows computers. Requires that you reveal the passphrase to your recipients. Does not require that your recipients have PGP Desktop software installed on their computers. Does not require you to have any of your recipients public keys. A PGP Self-Decrypting Archive (SDA) is a PGP Zip Archive that can be opened on any Windows computer, even those that do not have PGP Desktop installed. SDA files are standard Windows executable (.exe) files that you can open simply by double-clicking them. SDA files are slightly larger than regular PGP Zip Archives because the SDA self decrypting mechanism requires a certain amount of extra space (usually about 100 K). Once you have created your PGP Zip SDA, you can send it to your recipients however you choose. Anyone who has the file and the passphrase can open the resulting PGP Zip Archive file, and everyone sees the same items. If you need to have different recipients see different items, you must create separate PGP Zip Archive files for each Caution: Take every possible precaution to ensure that the passphrase to your PGP Zip SDA is revealed to no one but the file recipients. If the passphrase is revealed to unauthorized persons, you can create a new PGP Zip SDA with a different passphrase, but you can do nothing to resecure the original archive file and whatever it contains.
5 2 Setting Windows to Display File Extensions Windows needs to be set to show file extensions. Note: This only needs to be done once. To show file extensions: 1. Double click on your My Computer icon. 2. Go to the Tools menu and select Folder Options. 3. Click on the View tab. 4. Uncheck the box for Hide extensions for known file types (Figure 1); then click OK.
6 3 Creating PGP Zip SDA Note: Advanced Users can visit the Encryptions Services site for the Using PGP SDA Quick Guide. Go to Start / All Programs / PGP / PGPDesktop. Select File, New PGP Zip from the Menu Bar
7 Click the Add files icon to select files Navigate to the files you want to add, Click the file(s) you want to encrypt Click Open
8 The file(s) you selected will appear in the New PGP Zip window, Click Next Click PGP Self-Decrypting Archive in the Encrypt window, Click Next
9 4 Create a passphrase The Create a passphrase window appears Type a passphrase in the Passphrase field. It must be at least eight characters. Type the passphrase again in the Confirm field. Click Next If you would like your password to be visible to you as you type it, click the Show Keystrokes checkbox.
10 5 Creating a Strong Passphrase The stronger your passphrase is, the more secure your files are. You can fill the Passphrase Quality bar by: Typing a longer rather than a shorter passphrase Avoiding words found in the dictionary Using mixed-case in a non-standard way ( dkmpgp instead of dkmpgp ) Including numerals in your passphrase Including symbols in your passphrase Including spaces in your passphrase
11 Confirm that the PGP Zip SDA is being saved in the desired location and with the filename you prefer. Click Next. Encrypting a single file - you will not see the file name here. By default, the SDA will be named the same as the original file and the file will be saved to the folder where it resides. Encrypting multiple files and folders - PGP will automatically name the archive by the first file in the list and display it in the Save Location path name and, by default, save it to the folder where the files reside.
12 Click Finish A file in the format of Filename.exe will be created Locate the newly created SDA file Right click on the file name and select Rename. Change the.exe extension on the end of the filename to exz. The new file name is now Filename.exz. Note: For security reasons, the transmission.exe files are not permitted. When sending SDA files, be sure to change the extension file name to exz.
13 6 Send the Encrypted SDA via You can send the secure Self Decrypting Archive (SDA) as you would any other file. You can attach it in an or you can copy it to a CD or other media. The recipient with the passphrase will be the only one that can open and read the file contents. Note: Do not include the passphrase you set up for the SDA in the same communication as the SDA. It must be sent in a separate communication. To send a SDA via 1. Launch your program and open a new message. 2. Locate and attach the archive you want to send. 3. Type the following instructions for the recipient in a message: Please follow the instructions below to save and decrypt the attached SDA file. 1. Save the file to your Desktop. 2. Right click on the file name and select Rename. 3. Change the.exz file extension to.exe. The new file name is now Filename.exe. 4. Double click on the filename to open the file. Click Send, to send the . Remember to send the passphrase in a separate . Note: Do not Win Zip or otherwise attempt to compress the SDA with another program.
14 7 Opening a PGP ZIP SDA Locate the and Double click. (It should have an extension of.exe.) The PGP Self Decrypting Archive - Enter Passphrase screen displays Confirm that the output is going into the desired location. If not, select the Save in: drop down menu to select correct the location. Click Save.
15 Note: If you direct the decrypted files from the PGP Zip SDA into the same location from which they originally came, the original files are overwritten. To prevent this, for each file, you are prompted to select a different location. You can also type a different filename. If you if you click Save without doing this, a warning dialog box displays. If you bypass it, the file from the PGP Zip SDA overwrites the original The file will be decrypted and placed in the location you selected
16 8 Tables
PGP Desktop Email Quick Start Guide version 9.6
What is PGP Desktop Email? PGP Desktop Email is part of the PGP Desktop family of products. You can use PGP Desktop Email to: Automatically and transparently encrypt, sign, decrypt, and verify email messages
Encryption. Introduction to using 7-Zip
IT Services Training Guide Encryption Introduction to using 7-Zip It Services Training Team The University of Manchester email: [email protected] www.itservices.manchester.ac.uk/trainingcourses/coursesforstaff
SecureZIP User Guide
SecureZIP User Guide SecureZIP is an application for zipping files to save storage space as well as encrypting files with password control to protect information. SecureZIP not only works alone to perform
How To Encrypt A Traveltrax Report On Gpg On A Pc Or Mac Or Mac (For A Free Download) On A Thumbdrive Or Ipad Or Ipa (For Free) On Pc Or Ipo (For An Ipo)
EMAIL ENCRYPTION Guide June 3, 2013 TABLE OF CONTENTS Steps to Create Encryption Public Key... 3 Installing GPG... 3 Key Generation Process... 4 Update User Settings... 6 Decrypting an encrypted file...
McAfee Endpoint Encryption for Files and Folders (EEFF) User Documentation
McAfee Endpoint Encryption for Files and Folders (EEFF) User Documentation 2013.06 McAfee Endpoint Encryption for Files and Folders (EEFF) uses powerful encryption technology to allow you to protect information
How To Encrypt a File using Windows Explorer and WinZip. For Use With All PII Data
How To Encrypt a File using Windows Explorer and WinZip For Use With All PII Data As an employee or a contractor, you share in the responsibility for protecting the privacy of individuals whose information
How To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro
Online Backup by Mozy Restore Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 How do I restore my data? There are five ways of restoring your data: 1) Performing
Royal Mail Group. getting started. with Symantec Endpoint Encryption. A user guide from Royal Mail Technology
getting started with Symantec Endpoint Encryption A user guide from Royal Mail Technology For further help, contact the IT Helpdesk on 5415 2555 (01246 282555) March 2010 Contents 1 Introduction to Symantec
4. Click Next and then fill in your Name and E-mail address. Click Next again.
NOTE: Before installing PGP, Word needs to be disabled as your editor in Outlook. In Outlook, go to Tools: Options: Mail Format and uncheck Use Microsoft Office Word to edit e-mail messages. Failure to
Encrypting Files Using AxCrypt
Encrypting Files Using AxCrypt Documents, spreadsheets, databases, and other files that contain personal information or other sensitive information MUST BE encrypted when being transmitted to someone else
Yale Software Library. PGP 9.6 for Windows
PGP 9.6 for Windows How to Add keys to the All Keys key ring: 1. Run the PGP application from Start->All Programs->PGP. 2. In the PGP main application window, click on Search for keys. 3. In the Search
PGP Desktop Encrypting Removable Media. May 1 2012 Version 1.3
PGP Desktop Encrypting Removable Media May 1 2012 Version 1.3 Table of Contents Introduction... 3 Installation Notes... 3 Encrypting Removable Media... 5 Adding and Deleting Users... 10 Changing a Passphrase...
tips A quick and easy guide to securing your private information www.pkware.com
tips A quick and easy guide to securing your private information tips A quick and easy guide to securing your private information Basic Information 1. How to install SecureZIP for Windows Desktop for individual
How to Install a Network-Licensed Version of IBM SPSS Statistics 19
How to Install a Network-Licensed Version of IBM SPSS Statistics 19 Important: IBM SPSS Statistics 19 requires either Windows XP Professional or later. IBM SPSS Statistics 19 installs from a DVD and your
Figure 1: Restore Tab
Apptix Online Backup by Mozy Restore How do I restore my data? There are five ways of restoring your data: 1) Performing a Restore Using the Restore Tab You can restore files from the Apptix Online Backup
1.5 MONITOR. Schools Accountancy Team INTRODUCTION
1.5 MONITOR Schools Accountancy Team INTRODUCTION The Monitor software allows an extract showing the current financial position taken from FMS at any time that the user requires. This extract can be saved
USING STUFFIT DELUXE THE STUFFIT START PAGE CREATING ARCHIVES (COMPRESSED FILES)
USING STUFFIT DELUXE StuffIt Deluxe provides many ways for you to create zipped file or archives. The benefit of using the New Archive Wizard is that it provides a way to access some of the more powerful
Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0
Cox Business Premium Online Backup USER'S GUIDE Cox Business VERSION 1.0 Table of Contents ABOUT THIS GUIDE... 4 DOWNLOADING COX BUSINESS PREMIUM ONLINE BACKUP... 5 INSTALLING COX BUSINESS PREMIUM ONLINE
Global VPN Client Getting Started Guide
Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential
Symantec File Share Encryption Quick Start Guide Version 10.3
Symantec File Share Encryption Quick Start Guide Version 10.3 What is Symantec File Share Encryption? Symantec File Share Encryption is a software tool that provides multiple ways to protect and share
Aspera Connect User Guide
Aspera Connect User Guide Mac OS X 10.4/10.5 Browser: Firefox 2+, Safari 2+ Version 2.2 Chapter 1 Chapter 2 Chapter 3 Appendix Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment
Identity Finder: Managing Your Results
Identity Finder: Managing Your Results The most important part of running Identity Finder is determining the most effective and secure way of managing the search results. Be sure to carefully read and
SonicWALL CDP Local Archiving
This document describes how to configure, implement, and manage a local archive for your SonicWALL CDP appliance. It contains the following sections: Feature Overview section on page 1 Using Local Archiving
KeePass Getting Started on Windows
KeePass Getting Started on Windows This guide includes the initial installation of KeePass 2.x on a Windows PC, creating your first password database, testing the software and entering your first accounts.
Backing Up and Deleting Files
CHAPTER 5 Backing Up and Deleting Files Video files can be copied from the hard disk to external storage media, such as CD-R, DVD, MO, or ZIP drives. Video files saved on the hard disk can be easily deleted
How to Password Protect Files & Folders in Mac OS X with Disk Images
The best way to secure sensitive information from malware is to encrypt it. Encryption works by using a complex formula to securely scramble (or encrypt) individual files and folders, entire disks and
Backing up Microsoft Outlook Email For the PC Using MS Outlook 2000 Keith Roberts
WIN1020 November 2003 Backing up Microsoft Outlook Email For the PC Using MS Outlook 2000 Keith Roberts INTRODUCTION... 1 PREPARATION... 1 BACKING UP EMAIL... 2 RESTORING EMAIL FROM A PERSONAL FILE FOLDER...
eadvantage Certificate Enrollment Procedures
eadvantage Certificate Enrollment Procedures Purpose: Instructions for members to obtain a digital certificate which is a requirement to conduct financial transactions with the Federal Home Loan Bank of
PGP Desktop Email Quick Start Guide Version 10.2
PGP Desktop Email Quick Start Guide Version 10.2 What is PGP Desktop Email? PGP Desktop Email is part of the PGP Desktop family of products. Use PGP Desktop Email to: Automatically and transparently encrypt,
If you have problems or questions, please call the helpdesk at 4444. Before beginning, CLOSE ALL DOCUMENTS AND PROGRAMS.
Page 1 of 17 Instructions for using Genie-Soft Backup Manager Pro 7 Task 1: Burning a backup of My Documents to a CD Task 2: Restoring and/or verifying backups. Note: You must have a CD-RW or DVD-RW drive
Yale Software Library
Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 203-432-9000, [email protected] Two-factor authentication: Installation and configuration instructions for
How to install and use the File Sharing Outlook Plugin
How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.
Document Management Quick Reference Guide
Documents Area The Citadon CW folders have the look and feel of Windows Explorer. The name of the selected folder appears above, and the folder's contents are displayed in the right frame. Corresponding
How to Back Up and Restore an ACT! Database Answer ID 19211
How to Back Up and Restore an ACT! Database Answer ID 19211 Please note: Answer ID documents referenced in this article can be located at: http://www.act.com/support/index.cfm (Knowledge base link). The
2. To encrypt the drive for future use, click Yes (Fig 1, 2). This will start the encryption process.
Dell Data Protection USB Drive Encryption Introduction To further protect PC s that have access to sensitive data, the Dell Data Protection (DDP) client detects and encrypts USB/Flash drives when they
Using Websense Data Endpoint Client Software
1 Using Websense Data Endpoint Client Software Related topics: Disabling the endpoint client, page 3 Viewing contained files, page 5 Viewing logs, page 6 Updating the endpoint client, page 7 Your organization
Call Recorder Quick CD Access System
Call Recorder Quick CD Access System V4.0 VC2010 Contents 1 Call Recorder Quick CD Access System... 3 1.1 Install the software...4 1.2 Start...4 1.3 View recordings on CD...5 1.4 Create an archive on Hard
USER MANUAL. v. 11.4.1 ---------------------- December 2015 ----------------------
USER MANUAL v. 11.4.1 ---------------------- December 2015 ---------------------- Contents At a Glance Miscellaneous 3 About EncryptDisc 14 Product info 4 About this manual 15 Copyright & trademark 15
CBH Provider EDI Browser Manual
CBH Provider EDI Browser Manual Table of Contents PGP Software Installation Windows XP 2 PGP Software Installation Windows 7 9 Main Screen 16 Log In Screen 19 Report: Authorizations 21 Decryption Instructions
BounceBack User Guide
Table Of Contents 1. Table of Contents... 2 2. 1-0 Introduction... 3 2.1 1-0: Introduction... 4 2.2 1-1: BounceBack Software Overview... 6 3. 2-0 Navigating the BounceBack Control Center... 9 3.1 2-0:
NDSR Utilities. Creating Backup Files. Chapter 9
Chapter 9 NDSR Utilities NDSR utilities include various backup and restore features, ways to generate output files, and methods of importing and exporting Header tab information. This chapter describes:
Steganos Secure E-Mail Step by Step Instructions. Introduction STEP 1: INSTALLATION
Steganos Secure E-Mail Step by Step Instructions Introduction Although more and more PC users learn that an e-mail can be read by a third party as easily as a postcard, e-mail encryption is still quite
Diamante WiFi Wireless Communication User Guide. Linksys E1200
Diamante WiFi Wireless Communication User Guide Linksys E1200 Release: February 2012; August 2011; February 2011 Patent Pending. Copyright 2012, Stenograph, L.L.C. All Rights Reserved. Printed in U.S.A.
Most of your tasks in Windows XP will involve working with information
OFFICE 1 File Management Files and Folders Most of your tasks in Windows XP will involve working with information stored on your computer. This material briefly explains how information is stored in Windows
Symantec Backup Exec Desktop Laptop Option ( DLO )
The following is a short description of our backup software: BACKUP-EXEC-DLO. We have set many of the parameters for you but, if necessary, these parameters can be changed. Symantec Backup Exec Desktop
User Guide. Digital Signature
User Guide Digital Signature ENTRUST ESP 9..2 Document version: 2.2 Publication date: January 2014 This guide is the exclusive property of Notarius Inc. All reproduction, printing or distribution of this
Step by step guide how to password protect your USB flash drive
Step by step guide how to password protect your USB flash drive 1 Content 1. How to create encrypted partition on USB flash drive 2. How to work with encrypted partition on the USB flash drive - Rohos
PGP Portable Quick Start Guide Version 10.2
PGP Portable Quick Start Guide Version 10.2 Introduction to PGP Portable Use PGP Portable to distribute encrypted files to users who do not have PGP Desktop software. Use PGP Portable to transport files
BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8)
BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8) Encryption is an effective method of protecting data stored on portable devices such as USB flash drives and external hard drives.
WA2262 Applied Data Science and Big Data Analytics Boot Camp for Business Analysts. Classroom Setup Guide. Web Age Solutions Inc.
WA2262 Applied Data Science and Big Data Analytics Boot Camp for Business Analysts Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Software
McAfee Endpoint Encryption for Files and Folders. Self Extractor White Paper
McAfee Endpoint Encryption for Files and Folders Self Extractor White Paper About Endpoint Encryption for Files and Folders Self-Extractors Introduction Endpoint Encryption for Files and Folders is a
DEPLOYING A VISUAL BASIC.NET APPLICATION
C6109_AppendixD_CTP.qxd 18/7/06 02:34 PM Page 1 A P P E N D I X D D DEPLOYING A VISUAL BASIC.NET APPLICATION After completing this appendix, you will be able to: Understand how Visual Studio performs deployment
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
Outlook 2013 ~ e Mail Quick Tips
The Ribbon: Home tab New Email to send a new mail New Items to send a new mail, a new appointment, a new meeting, a new contact, a new task, a new Lync Meeting Ignore to ignore a request Clean Up to clean
Lenovo Online Data Backup User Guide Version 1.8.14
Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data
Contents. Getting Started...1. Managing Your Drives...14. Backing Up & Restoring Folders...28. Synchronizing Folders...48. Managing Security...
Contents Getting Started.....................................................1 Using the Formatting Tool........................................1 Preparing the Software Manually..................................4
HMRC Secure Electronic Transfer (SET)
HMRC Secure Electronic Transfer (SET) How to use HMRC SET using PGP Desktop Version 2.0 Contents Welcome to HMRC SET 1 HMRC SET overview 2 Encrypt a file to send to HMRC 3 Upload files to the Government
Managing Files. On a PC, after you find your file, right click it and selet Rename from the pop-up menu.
Managing Files File Types, Renaming Files The software you are using will automatically save your file as the type that applies to your current application. For Microsoft Word documents, for example, will
INTRODUCTION TO WINDOWS AND FILE MANAGEMENT. Windows 7
INTRODUCTION TO WINDOWS AND FILE MANAGEMENT Windows 7 The Work Environment Your computer monitor is designed to resemble a desktop and is often referred to as such. Just as you might put on a regular desktop,
ProjectWise Explorer V8i User Manual for Subconsultants & Team Members
ProjectWise Explorer V8i User Manual for Subconsultants & Team Members submitted to Michael Baker International Subconsultants & Team Members submitted by Michael Baker International ProjectWise Support
Outlook 2010 Archiving Email CPAC Workshop Summer 2014
Outlook 2010 Archiving Email CPAC Workshop Summer 2014 Presenters: Kaleo Kelikani and Linda Holdzkom, ITS Technical Services Contents Tips and Tools for the Desktop Version of Outlook Page 2-4 What is
www.thedatalocker.com Customer Service: 1-877-264-3715 Email Us: [email protected]
TheDataLocker online backup allows you to store, backup and retrieve any computer data over the internet to a secured remote system. Its main function is to generate a duplicate of your important files
Installing your certificate on your Windows PC
Installing your certificate on your PC Choose your email software below to learn how to obtain and install a digital certificate. Microsoft Outlook Mail Using Outlook or Mail Step one Visit Comodo for
Overview Keys. Overview
Overview Keys Overview The PGPmail program performs fast, high-security, public-key encrypting (with optional compression), decrypting, and authenticating of electronic messages and files. The program
File Management Utility User Guide
File Management Utility User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held
How to Setup Privacy Guard Encryption.
How to Setup Privacy Guard Encryption. Contents Setting up for the first time.... 1 Installing the Software (free)... 1 Generating your own key... 2 Share your key with your friends so they can send you
How To Use The Syndicate Bank Rsa Security Token For Internet Banking On Pc Or Mac Or Mac (For A Web Browser) For A Long Time (For An Ipad) For Free (For Free) For An Unlimited Time) For Your
Syndicate Bank Supply and Commissioning of Two Factor Authentication for Internet with Two Factor Authentication for Bank s Internal Users for Various Applications Desktop based User Manual for using SyndProtect
MINIMIZING DISK SPACE USAGE IN SAAS OR VIRTUAL OFFICE CS
MINIMIZING DISK SPACE USAGE IN SAAS OR VIRTUAL OFFICE CS In General... 1 Creative Solutions Accounting... 1 FileCabinet CS... 4 Fixed Assets CS... 6 Practice CS... 7 UltraTax CS... 8 Microsoft Outlook...
PDG Software. PDG Key Manager User Guide
PDG Key Manager User Guide , Inc. 1751 Montreal Circle, Suite B Tucker, Georgia 30084-6802 Copyright 1998-2000 PDG Software, Inc.; All rights reserved. PDG Software, Inc. ("PDG Software") retains all
Microsoft Security Essentials Installation and Configuration Guide
Microsoft Security Essentials Installation and Configuration Guide This installation guide is for users who are intending to download the software from Microsoft s web site. If you are not intending on
Identity Finder Setup
Identity Finder Information Sheet for MAC This document will walk you through how to install, scan, and secure any SI found on your computer, or storage devices using the Identity Finder Software. This
Comodo Disk Encryption
Comodo Disk Encryption Version 2.0 User Guide Version 2.0.122010 Versi Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Comodo Disk Encryption Introduction... 3
SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems
SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems What is SSH?: SSH is an application that protects the TCP/IP connections between two computers. The software
Lotus Notes Email Archive Guide
Lotus Notes Email Archive Guide For Lotus Notes Client version 5.0.5 File : Lotus Notes Email Archive Guide.doc Page 1 / 10 Printed on : 23/08/05 1. Objective Email archiving is one of the housekeeping
PDG Software. Keyman Encryption Guide
Keyman Encryption Guide , Inc. 1751 Montreal Circle, Suite B Tucker, Georgia 30084-6802 Copyright 1998-2004 PDG Software, Inc.; All rights reserved. PDG Software, Inc. ("PDG Software") retains all ownership
Xythos on Demand Quick Start Guide For Xythos Drive
Xythos on Demand Quick Start Guide For Xythos Drive What is Xythos on Demand? Xythos on Demand is not your ordinary online storage or file sharing web site. Instead, it is an enterprise-class document
Setting up VMware ESXi for 2X VirtualDesktopServer Manual
Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples
PGP Whole Disk Encryption Quick Start Guide Version 9.8
PGP Whole Disk Encryption Quick Start Guide Version 9.8 What is PGP Whole Disk Encryption? The PGP Whole Disk Encryption (WDE) product is a software tool that provides multiple ways to protect your data
Using the GroupWise Client
Spring 2006 (Our appreciation to Jennifer Sherouse for her assistance in editing and improving this document) Page 1 of 15 What is the GroupWise Client The GroupWise client is a program that installs on
Configuration for Professional Client Access
In a network environment, in order for the clients to access the data over the network, you will need to set up a network share to the data file. CREATING A NETWORK SHARE There may be slight differences
BSDI Advanced Fitness & Wellness Software
BSDI Advanced Fitness & Wellness Software 6 Kellie Ct. Califon, NJ 07830 http://www.bsdi.cc SOFTWARE BACKUP/RESTORE INSTRUCTION SHEET This document will outline the steps necessary to take configure the
Global VPN Client Getting Started Guide
Global VPN Client Getting Started Guide PROTECTION AT THE SPEED OF BUSINESS Introduction The SonicWALL Global VPN Client creates a Virtual Private Network (VPN) connection between your computer and the
Setting Up Monthly Reporter
Setting Up Monthly Reporter April 11, 2014 I. HOW IT WORKS A QUICK OVERVIEW A. AuditWare Development Company maintains a powerful, sophisticated server on which a portion of memory is assigned to each
How to setup a VPN on Windows XP in Safari.
How to setup a VPN on Windows XP in Safari. If you want to configure a VPN connection from a Windows XP client computer you only need what comes with the Operating System itself, it's all built right in.
How To Use Senior Systems Cloud Services
Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To
KI6501 Data Manager. Software User Manual
KI6501 Data Manager Software User Manual CONTENTS 1. Installation of USB Virtual COM Port driver software... 2 2. Installation of KI6501 Manager Software... 2 3. Connecting KI6501 to PC (Personal Computer)
SecureDoc for Mac v6.1. User Manual
SecureDoc for Mac v6.1 User Manual Copyright 1997-2012 by WinMagic Inc. All rights reserved. Printed in Canada Many products, software and technologies are subject to export control for both Canada and
INFORMATION SECURITY GUIDELINE How to Encrypt Files Using Common Applications Revision 1.1
INFORMATION SECURITY GUIDELINE How to Encrypt Files Using Common Applications Revision 1.1 Contents Introduction... 1 Safely Delivering the Encryption Password to the Recipient... 2 How to Encrypt Files
Virtual Office Remote Installation Guide
Virtual Office Remote Installation Guide Table of Contents VIRTUAL OFFICE REMOTE INSTALLATION GUIDE... 3 UNIVERSAL PRINTER CONFIGURATION INSTRUCTIONS... 12 CHANGING DEFAULT PRINTERS ON LOCAL SYSTEM...
MAC/OSX - How to Encrypt Data using TrueCrypt. v.05201011
MAC/OSX - How to Encrypt Data using TrueCrypt v.05201011 This chapter contains step-by-step instructions on how to create, mount, and use a TrueCrypt volume. We strongly recommend that you read the entire
QUICK START GUIDE EDI Claims Link for Windows version 3.1
QUICK START GUIDE EDI Claims Link for Windows version 3.1 System Requirements - Operating system: Windows 98 or later - Computer/Processor: Pentium 2, 233 MHz or greater - Memory: 64MB Ram - Initial application
HADS 2.1.0e Installation and migration
Ageing, Disability and Home Care, Department of Family and Community Services MDS fact sheet - February 2012 HADS 2.1.0e Installation and migration Caution! If at any stage during this process you receive
USER MANUAL. v. 11.3 ------------------------ January 2014 ------------------------
USER MANUAL v. 11.3 ------------------------ January 2014 ------------------------ 1 Contents At a Glance Miscellaneous 3 About EncryptDisc 14 Product info 4 About this manual 15 Copyright & trademark
HP ProtectTools for Small Business Security Software, Version 5.10. User Guide
HP ProtectTools for Small Business Security Software, Version 5.10 User Guide Copyright 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Backups User Guide. for Webroot SecureAnywhere Essentials Webroot SecureAnywhere Complete
Backups User Guide for Webroot SecureAnywhere Essentials Webroot SecureAnywhere Complete Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com Version 8.0.1 Webroot
