INSTALLING NOVA DATA ENCRYPTION SOFTWARE

Size: px
Start display at page:

Download "INSTALLING NOVA DATA ENCRYPTION SOFTWARE"

Transcription

1 INSTALLING NOVA DATA ENCRYPTION SOFTWARE Introduction 1. Here is what you will need to do to install the college s data encryption software on your computer, laptop, or USB storage device. The encryption software lets you create a secure folder where you can store documents safely. 2. Download the folder with the encryption software to your computer or USB device. 3. Run the software to create the secure folder on your computer or USB device. 4. When you want to use the secure folder: Click on the shortcut Select the name of the secure file Tell the computer to MOUNT the secure file Enter your password Use the secure file just like any other drive or USB device to save your documents 5. Even though it looks complicated, the process is actually easy if you follow the steps. Background Northern Virginia Community College (NOVA) processes and stores many types of sensitive and private information that if lost or stolen could result in significant financial damage to students and the college. All faculty and staff should only handle or store sensitive information if absolutely necessary for their jobs. All sensitive information must be stored and disposed of in a secure manner. PERSONAL INFORMATION (especially social security numbers or other private information) SHOULD NEVER BE STORED ON A PORTABLE DEVICE. Scope These guidelines apply to all mobile data storage media; laptops, flash or thumb drives, and CD or DVDs. PDAs and cell phones should never be used to store sensitive information because they are harder to protect and easily lost or stolen. Requirement Virginia Community College System (VCCS) requires that all critical and sensitive information stored on mobile data storage media, including laptops, must be encrypted in accordance with ISO/IEC 27002:2005(E). Responsibilities

2 Data owners and data handlers are responsible for storing and transmitting the sensitive data to maintain the confidentiality, integrity and availability of the data. The software outlined in this document will be Truecrypt. An open source software used by many colleges throughout the country. The recommended method will be to create a virtual disk that will automatically encrypt files as they are added to the disk. The virtual disk is automatically unmounted when the laptop is logged off or put into power saver mode. An encrypted disk, which is really an encrypted file, can be copied to DVD or CD and later remounted for access. The same process is used to load the software and create a secure folder (called a virtual disk) on both computers and USB devices. Install Directions for Windows Go to to download Truecrypt. Double click on the downloaded file to start the installation procedure. You can copy the folder to a new USB device or computer to create a secure folder (virtual disk). Open the folder and click on TrueCrypt.exe (be sure to pick the correct file). Click the check box to accept the license terms and click Next.

3 Leave the default option of Install and click Next. Leave the default install path and click Install.

4 Click OK to finish the installation. Click Exit to close the setup screen. On the desktop you will see an icon like the one above. Double click this icon to open the TrueCrypt console.

5 This is the main console window for TrueCrypt. From here you can create virtual drives, encrypt whole drives or partitions (not recommended) and mount and dismount virtual drives. To create a new secure file (virtual drive), click on Create Volume. The following screen will appear. On this screen you select the type of volume you wish to create. We will be creating a standard volume, so you can leave the defaults and click on Next.

6 Here you select what you are going to encrypt. For creating a standard volume, click on Select File. Navigate to the place you want to store the secure file(volume) and type in a name for the file. Use a name that makes sense to you. It is recommended you don't use spaces to make sure there are no compatibility problems if the file is moved to a CD or DVD. Once you have typed in a file name, click on Save to continue.

7 Leave the checkbox next to Never save history checked and click Next to continue. On this screen you choose the type of encryption algorithms you want to use. It is suggested you use the default options that are shown above. Once you have selected the encryption options, click on Next to continue.

8 Next you must choose how big you want your volume to be. If you plan on moving the files to CD later, make the file size 700 MB. You can create more than one volume if you need more space. After you have entered the volume size, click Next. Here you need to choose the password you will use to mount the volume. We recommend you use one of the password strategies listed at the end of this document so we can help you remember it if it is forgotten even though it is not as rigorous as TrueCrypt recommends. Remember the encryption is only as good as the password used to mount the volume. Do not use words or simple names. Choose passwords with Upper and Lower case, numbers and special characters. TrueCrypt recommends passwords greater than 20 characters, but there is no minimum. If you choose something shorter than 20 characters, there will be a warning that pops up. If you are satisfied with your password, Click Next to continue.

9 Click Yes to continue. Once the volume is created, it must be formatted. For Filesystem, you can choose FAT or NTFS. The only limitation is that if you choose NTFS and move the file to DVD, it cannot be mounted as a Read Only drive. So it is suggested you choose FAT as the Filesystem type. Click Format to format the new volume.

10 Once the volume is formatted, click OK. The new volume is created and ready for use. To create another volume, click Next and follow the same procedures as above. If you don't want to create another volume, click Exit (you can create additional volumes at any time).

11 To actually use the secure folder (volume) you need to mount the volume to make it available to store files. Under Volume, select the drive letter you wish to use for you new volume. Then click on Select File and navigate to and select your secure folder (volume). Finally, click Mount. You will now be prompted for the password you selected earlier. Enter the password and click OK.

12 You will now see your secure folder s name next to the drive letter when it is mounted. Once you have mounted all you volumes you want to use, click Exit to close the console window. You can reopen this window from the Start Menu or by clicking on the little icon on the lower right hand of your screen. If you click My Computer, you will see the mounted drive appear just as any local drive. In the example above it is drive S. You can double click on the drive to open it. Files that are saved or moved to that drive are automatically encrypted and secrure. Files moved from this drive are automatically unencrypted. It works just like any USB storage device or folder.

13 Tips The TrueCrypt program must be available to mount the encrypted volumes. You do not have to copy the TrueCrypt folder to a USB device, disk, CD or DVD to protect the files in your secure folder. However, to open that folder on a machine, you must have TrueCrypt installed so you can click on the icon to open the TrueCrypt console. If the folder is on a USB device, you can open the console from there. When encrypting a flash/thumb drive use caution. You can either create a secure folder (volume) as described above or you may select the entire device. To select the entire device, instead of selecting a file, you would select the flash drive device. HOWEVER, If you choose to encrypt the device, everything that is currently on the flash drive will be lost, because the drive must be formatted. It is recommended you do not use device encryption AND JUST CREATE A SECURE FOLDER INSTEAD. DO NOT LOOSE PASSWORDS, they cannot be recovered. Password Strategies If you use one of the following rubrics to create your password, it will be hard for someone to guess or to hack if the portable device gets lost. At the same time, we could remind you of this rubrics so you could figure out your password if you forget it. These are all items you should know by heart but would be hard for someone else to know or to even find easily on the Internet. They also would be hard for the hacking programs to figure out easily. FOR ALL PASSWORDS: Start them with the capital letter A. Every few months when it is time to change passwords, you can update it by going to the next letter in the alphabet 1. Mother s middle name spelled backwards, 2-digit month and 2 digit year of her birthday. (Example only -- remember to start it with the letter A to make changing it later easier: Martha born Nov. 16 would become as a password AahtraM1116). If the middle name is less than 5 letters, duplicate the first letter of her name to make it at least 5 letters long, including the capital A used to start the password. (Example only: Mae born Dec. 4 would become as a password AeaMM If you want this to be even more secure, add one of the following punctuation marks to the end of your password:! or $ or & 2. Father s middle name spelled backwards, 2-digit month and 2 digit year of his birthday. (Example only -- remember to start it with the letter A to make changing it later easier: Charles born Feb. 8 would become as a password AselrahC0208). If the middle name is less than 5 letters, duplicate the first letter of her name to make it at least 5 letters long,

14 including the capital A used to start the password. (Example only: Sam born Oct. 14 would become as a password AmaSS Make of your first car (spelled backwards), 2-digit year of the car plus one of the punctuation marks! or $ or &. 4. The initials (first, middle, last) of the children in your family from youngest to oldest from when you were growing up), 2-digit month and 2-digit day of your mother s birthday (Example only: Emily Ann Smith, George Randall Smith, and Paul Alexander Smith, Jr. (you) with a mother whose birthdate was April 25 would become the password that starts with an A as above AEASGRSPAS0425). If you want this to be even more secure, add the punctuation mark (! or $ or &) at the end of your password. 5. The initials (first, middle, last) of the children in your family from youngest to oldest from when you were growing up), 2-digit month and 2-digit day of your mother s birthday (Example only: Emily Ann Smith, George Randall Smith, and Paul Alexander Smith, Jr. (you) with a father whose birthdate was Sept. 14 would become the password that starts with an A as above AEASGRSPAS0914). If you want this to be even more secure, add the punctuation mark (! or $ or &) at the end of your password. How to create a shortcut Once you have created your encrypted volume, you can create a shortcut on your desktop to automatically mount and open your encrypted volume. To create a shortcut on your desktop, right click an open area of the desktop and choose New then Shortcut.

15 The Create Shortcut dialog box will appear. In the box labeled Type the location of the item: you will be entering the location of the TrueCrypt executable along with the options for automatically mounting and opening your encrypted volume. In this example, you first point to the location of the TrueCrypt executable (use quotes as in the example below). Next the /v switch tells it where the volume is to be mounted, in this case c:\myvolume, where my volume is the actual name of the volume, replace myvolume with whatever name you gave your volume. The next switch, /l t: tells it which drive letter to use to mount the drive, use any free drive letter you want. The next switch /q tells TrueCrypt to work in quiet mode (the TrueCrypt window will not open). Next the /e switch opens the mounted drive in an explorer window. Enter this entire line, replacing your volume name and drive letter. "C:\Program Files\TrueCrypt\TrueCrypt.exe" /v c:\myvolume /l t: /q /e Next you will give your shortcut a name. Use any name that makes sense to you, then click Finish. Now you will have a shortcut on your desktop similar to the picture below.

16 Double click on the shortcut and you will be prompted to enter your password. After entering your password and clicking OK, the box will close and an explorer window will open.

Encrypting a USB Drive Using TrueCrypt

Encrypting a USB Drive Using TrueCrypt Encrypting a USB Drive Using TrueCrypt This document details the steps to encrypt a USB Pen drive using TrueCrypt. TrueCrypt is free and open-source security software allowing encryption of documents and

More information

Using TrueCrypt to protect data

Using TrueCrypt to protect data Using TrueCrypt to protect data Password protecting and encrypting files one by one is a certainly an effective way to securely store and share data. However, what if you have a lot of files? Creating

More information

Comodo Disk Encryption

Comodo Disk Encryption Comodo Disk Encryption Version 2.0 User Guide Version 2.0.122010 Versi Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Comodo Disk Encryption Introduction... 3

More information

How to create a portable encrypted USB Key using TrueCrypt

How to create a portable encrypted USB Key using TrueCrypt How to create a portable encrypted USB Key using TrueCrypt INTRODUCTION TrueCrypt Traveler Mode provides secure encryption for programs/files on portable devices such as USB Memory keys. It uses strong

More information

BitLocker To Go USB Flash Drive encryption User Guide

BitLocker To Go USB Flash Drive encryption User Guide BitLocker To Go USB Flash Drive encryption User Guide Introduction BitLocker To Go is a new feature of Windows 7 which allows encryption of easily misplaced portable storage devices such as USB Flash Drives

More information

How To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro

How To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro Online Backup by Mozy Restore Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 How do I restore my data? There are five ways of restoring your data: 1) Performing

More information

HEALTH INFORMATION SYSTEM (HIS) HOW TO COMMUNICATE WITH THE HIS PROJECT TEAM. How To Communicate with the HIS Project Team

HEALTH INFORMATION SYSTEM (HIS) HOW TO COMMUNICATE WITH THE HIS PROJECT TEAM. How To Communicate with the HIS Project Team How To Communicate with the HIS Project Team This guide is intended to provide you with support for communicating with the HIS Project Team. There may be instances where the HIS Project Team will require

More information

WARNING!!: Before installing Truecrypt encryption software on your

WARNING!!: Before installing Truecrypt encryption software on your Truecrypt installation and usage guide for Windows XP, 7, Vista and 8 WARNING!!: Before installing Truecrypt encryption software on your computer, you should create an Acronis image back up of your computer

More information

PGP Portable Quick Start Guide Version 10.2

PGP Portable Quick Start Guide Version 10.2 PGP Portable Quick Start Guide Version 10.2 Introduction to PGP Portable Use PGP Portable to distribute encrypted files to users who do not have PGP Desktop software. Use PGP Portable to transport files

More information

Step by step guide how to password protect your USB flash drive

Step by step guide how to password protect your USB flash drive Step by step guide how to password protect your USB flash drive 1 Content 1. How to create encrypted partition on USB flash drive 2. How to work with encrypted partition on the USB flash drive - Rohos

More information

How to enable Disk Encryption on a laptop

How to enable Disk Encryption on a laptop How to enable Disk Encryption on a laptop Skills and pre-requisites Intermediate IT skills required. You need to: have access to, and know how to change settings in the BIOS be confident that your data

More information

Tutorial How to upgrade firmware on Phison S5 controller MyDigitalSSD

Tutorial How to upgrade firmware on Phison S5 controller MyDigitalSSD Tutorial How to upgrade firmware on Phison S5 controller MyDigitalSSD Version 1.3 This tutorial will walk you through how to create a bootable USB drive and how to apply the newest firmware S5FAM030 to

More information

You can find the installer for the +Cloud Application on your SanDisk flash drive.

You can find the installer for the +Cloud Application on your SanDisk flash drive. Installation You can find the installer for the +Cloud Application on your SanDisk flash drive. Make sure that your computer is connected to the internet. Next plug in the flash drive and double click

More information

MAC/OSX - How to Encrypt Data using TrueCrypt. v.05201011

MAC/OSX - How to Encrypt Data using TrueCrypt. v.05201011 MAC/OSX - How to Encrypt Data using TrueCrypt v.05201011 This chapter contains step-by-step instructions on how to create, mount, and use a TrueCrypt volume. We strongly recommend that you read the entire

More information

PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1

PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1 PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1 Table of Contents 1 Self Decrypting Archives (SDA)... 1-2 2 Setting Windows to Display File Extensions... 2-3 3 Creating PGP Zip SDA... 3-4

More information

INTRODUCTION TO WINDOWS AND FILE MANAGEMENT. Windows 7

INTRODUCTION TO WINDOWS AND FILE MANAGEMENT. Windows 7 INTRODUCTION TO WINDOWS AND FILE MANAGEMENT Windows 7 The Work Environment Your computer monitor is designed to resemble a desktop and is often referred to as such. Just as you might put on a regular desktop,

More information

BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8)

BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8) BitLocker to Go: Encryption for personal USB flash drives (Windows 7 and 8) Encryption is an effective method of protecting data stored on portable devices such as USB flash drives and external hard drives.

More information

1. Scope of Service. 1.1 About Boxcryptor Classic

1. Scope of Service. 1.1 About Boxcryptor Classic Manual for Mac OS X Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 4 2. Installation... 5 2.1 Installing Boxcryptor Classic... 5 2.2 Licensing Boxcryptor Classic

More information

Hi-Speed USB Flash Disk User s Manual Guide

Hi-Speed USB Flash Disk User s Manual Guide Hi-Speed USB Flash Disk User s Manual Guide System Requirements Windows 98, ME, 2000, XP, Mac OS 10.1, Linux 2.4 or above AMD or Intel Pentium 133MHz or better based computer USB 1.1, USB 2.0 or higher

More information

These instructions were tested on OS X 10.9.4. Earlier or later versions may have slight or major differences in how things work and appear.

These instructions were tested on OS X 10.9.4. Earlier or later versions may have slight or major differences in how things work and appear. These instructions were tested on OS X 10.9.4. Earlier or later versions may have slight or major differences in how things work and appear. PART ONE VBOX INSTALL AND FILE STAGING You will be given a location

More information

Imation LOCK User Manual

Imation LOCK User Manual Page: - 0 - Imation LOCK User Manual Security Application Program V2.0 - D Page: - 1 - Table of Contents A. Introduction... 2 B. General Description... 2 C. Features... 2 D. Before Using the Security Application

More information

If you have problems or questions, please call the helpdesk at 4444. Before beginning, CLOSE ALL DOCUMENTS AND PROGRAMS.

If you have problems or questions, please call the helpdesk at 4444. Before beginning, CLOSE ALL DOCUMENTS AND PROGRAMS. Page 1 of 17 Instructions for using Genie-Soft Backup Manager Pro 7 Task 1: Burning a backup of My Documents to a CD Task 2: Restoring and/or verifying backups. Note: You must have a CD-RW or DVD-RW drive

More information

Using Websense Data Endpoint Client Software

Using Websense Data Endpoint Client Software 1 Using Websense Data Endpoint Client Software Related topics: Disabling the endpoint client, page 3 Viewing contained files, page 5 Viewing logs, page 6 Updating the endpoint client, page 7 Your organization

More information

BitLocker To Go User Guide

BitLocker To Go User Guide BitLocker To Go User Guide 1. Introduction BitLocker To Go a new feature of Windows 7 is a full-disk encryption protection technology for removable storage devices that are connected to one of the USB

More information

SonicWALL CDP Local Archiving

SonicWALL CDP Local Archiving This document describes how to configure, implement, and manage a local archive for your SonicWALL CDP appliance. It contains the following sections: Feature Overview section on page 1 Using Local Archiving

More information

ScanShell.Net Install Guide

ScanShell.Net Install Guide ScanShell.Net Install Guide Please install the software first - DO NOT PLUG IN THE SCANNER The scanner has been carefully packaged to avoid damage during transportation. Before operating the scanner, please

More information

BounceBack User Guide

BounceBack User Guide Table Of Contents 1. Table of Contents... 2 2. 1-0 Introduction... 3 2.1 1-0: Introduction... 4 2.2 1-1: BounceBack Software Overview... 6 3. 2-0 Navigating the BounceBack Control Center... 9 3.1 2-0:

More information

HP ProtectTools for Small Business Security Software, Version 5.10. User Guide

HP ProtectTools for Small Business Security Software, Version 5.10. User Guide HP ProtectTools for Small Business Security Software, Version 5.10 User Guide Copyright 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

More information

Disabling Microsoft SharePoint in order to install the OneDrive for Business Client

Disabling Microsoft SharePoint in order to install the OneDrive for Business Client Disabling Microsoft SharePoint in order to install the OneDrive for Business Client If you try to setup and sync your OneDrive online documents with the client software and Microsoft SharePoint opens,

More information

Online Backup and Recovery Manager Setup for Microsoft Windows.

Online Backup and Recovery Manager Setup for Microsoft Windows. Online Backup and Recovery Manager Setup for Microsoft Windows. Backup Wizard Default Interface Recovery Wizard Online Backup and Recovery Manager Setup Backup Wizard After installing and launching the

More information

Virtual Office Remote Installation Guide

Virtual Office Remote Installation Guide Virtual Office Remote Installation Guide Table of Contents VIRTUAL OFFICE REMOTE INSTALLATION GUIDE... 3 UNIVERSAL PRINTER CONFIGURATION INSTRUCTIONS... 12 CHANGING DEFAULT PRINTERS ON LOCAL SYSTEM...

More information

Chapter Title. Time Warner Cable Business Class Online Backup. Windows User Guide. Version 2.6

Chapter Title. Time Warner Cable Business Class Online Backup. Windows User Guide. Version 2.6 Chapter Title Time Warner Cable Business Class Online Backup Windows User Guide Version 2.6 Table of Contents Table of Contents... 2 Chapter 1: About This Guide... 3 Chapter 2: Getting Started...4 Installing

More information

WA2262 Applied Data Science and Big Data Analytics Boot Camp for Business Analysts. Classroom Setup Guide. Web Age Solutions Inc.

WA2262 Applied Data Science and Big Data Analytics Boot Camp for Business Analysts. Classroom Setup Guide. Web Age Solutions Inc. WA2262 Applied Data Science and Big Data Analytics Boot Camp for Business Analysts Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Software

More information

Centurion PLUS CPC4 Download Guide

Centurion PLUS CPC4 Download Guide Centurion PLUS CPC4 Download Guide using C4 File Transfer Utility. 1010537 03 01 10 Section 50 1.0 Background: 1.1 The Centurion PLUS Control system consists of a Centurion PLUS Core (CPC4 1) and Color

More information

SecureDoc for Mac v6.1. User Manual

SecureDoc for Mac v6.1. User Manual SecureDoc for Mac v6.1 User Manual Copyright 1997-2012 by WinMagic Inc. All rights reserved. Printed in Canada Many products, software and technologies are subject to export control for both Canada and

More information

KeePass Getting Started on Windows

KeePass Getting Started on Windows KeePass Getting Started on Windows This guide includes the initial installation of KeePass 2.x on a Windows PC, creating your first password database, testing the software and entering your first accounts.

More information

Acronis Backup & Recovery 11

Acronis Backup & Recovery 11 Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation

More information

Getting Started User s Guide

Getting Started User s Guide Getting Started This short guide can help you to quickly start using Acronis True Image Home 2011. It describes just a few of the key features of Acronis True Image Home 2011. For detailed program information,

More information

16.4.3 Lab: Data Backup and Recovery in Windows XP

16.4.3 Lab: Data Backup and Recovery in Windows XP 16.4.3 Lab: Data Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment The

More information

How To Set Up Dataprotect

How To Set Up Dataprotect How To Set Up Dataprotect This document will show you how to install and configure your computer for a Typical installation. If you have questions about configuring a Custom installation please contact

More information

First Time On-Campus VLab Setup Windows XP Edition

First Time On-Campus VLab Setup Windows XP Edition First Time On-Campus VLab Setup Windows XP Edition General: This guide is a step-by-step walkthrough of downloading, installing and configuring VMware View Client for the University of Cincinnati s VLab

More information

Law School Computing Services User Memo

Law School Computing Services User Memo Law School Computing Services User Memo Accessing and Using Shared No. 37 7/28/2015 Email Accounts in Outlook Overview: Many Law School departments and organizations use shared email accounts. Shared email

More information

Password Depot for Android

Password Depot for Android Password Depot for Android Table Of Contents Table Of Contents... 2 User interface... 3 Action Bar... 3 Overflow Menu... 4 Entry menu... 5 Context Bar... 6 Settings... 7 Creating a password file... 8 Opening

More information

Hosting Users Guide 2011

Hosting Users Guide 2011 Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure

More information

Installing LearningBay Enterprise Part 2

Installing LearningBay Enterprise Part 2 Installing LearningBay Enterprise Part 2 Support Document Copyright 2012 Axiom. All Rights Reserved. Page 1 Please note that this document is one of three that details the process for installing LearningBay

More information

SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems

SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems What is SSH?: SSH is an application that protects the TCP/IP connections between two computers. The software

More information

TxEIS on Internet Explorer 7

TxEIS on Internet Explorer 7 TxEIS on Internet Explorer 7 General Set Up Recommendations: Several modifications will need to be made to the computer settings in Internet Explorer to ensure TxEIS runs smoothly, reports pop up as desired,

More information

Seagate Manager. User Guide. For Use With Your FreeAgent TM Drive. Seagate Manager User Guide for Use With Your FreeAgent Drive 1

Seagate Manager. User Guide. For Use With Your FreeAgent TM Drive. Seagate Manager User Guide for Use With Your FreeAgent Drive 1 Seagate Manager User Guide For Use With Your FreeAgent TM Drive Seagate Manager User Guide for Use With Your FreeAgent Drive 1 Seagate Manager User Guide for Use With Your FreeAgent Drive Revision 1 2008

More information

Team Foundation Server 2012 Installation Guide

Team Foundation Server 2012 Installation Guide Team Foundation Server 2012 Installation Guide Page 1 of 143 Team Foundation Server 2012 Installation Guide Benjamin Day benday@benday.com v1.0.0 November 15, 2012 Team Foundation Server 2012 Installation

More information

How to register and use our Chat System

How to register and use our Chat System How to register and use our Chat System Why this document? We have a very good chat system and easy to use when you are set up, but getting registered and into the system can be a bit complicated. If you

More information

Contents. Getting Started...1. Managing Your Drives...14. Backing Up & Restoring Folders...28. Synchronizing Folders...48. Managing Security...

Contents. Getting Started...1. Managing Your Drives...14. Backing Up & Restoring Folders...28. Synchronizing Folders...48. Managing Security... Contents Getting Started.....................................................1 Using the Formatting Tool........................................1 Preparing the Software Manually..................................4

More information

Verbatim Secure Data USB Drive. User Guide. User Guide Version 2.0 All rights reserved

Verbatim Secure Data USB Drive. User Guide. User Guide Version 2.0 All rights reserved Verbatim Secure Data USB Drive User Guide User Guide Version 2.0 All rights reserved Table of Contents Table of Contents... 2 1. Introduction to Verbatim Secure Data USB Drive... 3 2. System Requirements...

More information

How to Encrypt Files Containing Sensitive Data (using 7zip software or Microsoft password protection) How to Create Strong Passwords

How to Encrypt Files Containing Sensitive Data (using 7zip software or Microsoft password protection) How to Create Strong Passwords How to Encrypt Files Containing Sensitive Data (using 7zip software or Microsoft password protection) How to Create Strong Passwords School IT Systems Support Herts for Learning Ltd SROB220, Robertson

More information

How to Encrypt your Windows 7 SDS Machine with Bitlocker

How to Encrypt your Windows 7 SDS Machine with Bitlocker How to Encrypt your Windows 7 SDS Machine with Bitlocker ************************************ IMPORTANT ******************************************* Before encrypting your SDS Windows 7 Machine it is highly

More information

Encrypting Files Using AxCrypt

Encrypting Files Using AxCrypt Encrypting Files Using AxCrypt Documents, spreadsheets, databases, and other files that contain personal information or other sensitive information MUST BE encrypted when being transmitted to someone else

More information

Installing Windows XP Professional

Installing Windows XP Professional CHAPTER 3 Installing Windows XP Professional After completing this chapter, you will be able to: Plan for an installation of Windows XP Professional. Use a CD to perform an attended installation of Windows

More information

Apple Mac VPN Service Setting up Remote Desktop

Apple Mac VPN Service Setting up Remote Desktop Apple Mac VPN Service Setting up Remote Desktop After you have successfully connected via the VPN client to the University network you will then need to make the connection to your machine. To do this

More information

Sky Broadband upgrading your router software

Sky Broadband upgrading your router software Sky Broadband upgrading your router software Why upgrade to the new software? As with all aspects of the services we provide, we have been working to enhance the performance of the software in your wireless

More information

( ://.. / ) ( ://. / )

( ://.. / ) ( ://. / ) How to encrypt (almost) anything PCWorld 1 of 5 ( ://.. / ) ( ://. / ) @atcastle Jan 18, 2013 3:30 AM SINGLE PAGE (?PAGE=0) Your email messages can contain some very sensitive information, which makes

More information

4cast Client Specification and Installation

4cast Client Specification and Installation 4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights

More information

Media Device Encryption

Media Device Encryption Media Device Encryption The age of portable media has brought us a plethora of mobile media devices that allow information to be easily transported from place to place. Though portable media devices like

More information

Global VPN Client Getting Started Guide

Global VPN Client Getting Started Guide Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

How To Use Senior Systems Cloud Services

How To Use Senior Systems Cloud Services Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To

More information

Protecting GoldMine CRM database with DbDefence

Protecting GoldMine CRM database with DbDefence Protecting GoldMine CRM database with DbDefence Version 1.1, 26 July 2013 Introduction As the backbone of any digital venture, databases are essential to the running of organizations, whether they be enormous

More information

Installing Sun's VirtualBox on Windows XP and setting up an Ubuntu VM

Installing Sun's VirtualBox on Windows XP and setting up an Ubuntu VM Installing Sun's VirtualBox on Windows XP and setting up an Ubuntu VM laptop will need to have 10GB of free space to install download the latest VirtualBox software from www.sun.com make sure you pick

More information

Outlook 2007: Managing your mailbox

Outlook 2007: Managing your mailbox Outlook 2007: Managing your mailbox Find its size and trim it down Use Mailbox Cleanup On the Tools menu, click Mailbox Cleanup. You can do any of the following from this one location: View the size of

More information

Royal Mail Group. getting started. with Symantec Endpoint Encryption. A user guide from Royal Mail Technology

Royal Mail Group. getting started. with Symantec Endpoint Encryption. A user guide from Royal Mail Technology getting started with Symantec Endpoint Encryption A user guide from Royal Mail Technology For further help, contact the IT Helpdesk on 5415 2555 (01246 282555) March 2010 Contents 1 Introduction to Symantec

More information

Setting Up Monthly Reporter

Setting Up Monthly Reporter Setting Up Monthly Reporter April 11, 2014 I. HOW IT WORKS A QUICK OVERVIEW A. AuditWare Development Company maintains a powerful, sophisticated server on which a portion of memory is assigned to each

More information

ODBC Driver Version 4 Manual

ODBC Driver Version 4 Manual ODBC Driver Version 4 Manual Revision Date 12/05/2007 HanDBase is a Registered Trademark of DDH Software, Inc. All information contained in this manual and all software applications mentioned in this manual

More information

Table of Contents. Rebit 5 Help

Table of Contents. Rebit 5 Help Rebit 5 Help i Rebit 5 Help Table of Contents Getting Started... 1 Making the First Recovery Point... 1 Don't Forget to Create a Recovery Media... 1 Changing Backup Settings... 1 What Does Rebit 5 Do?...

More information

10.3.1.6 Lab - Data Backup and Recovery in Windows XP

10.3.1.6 Lab - Data Backup and Recovery in Windows XP 5.0 10.3.1.6 Lab - Data Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment

More information

Personal Folders Backup

Personal Folders Backup Personal Folders Backup The Personal Folders Backup tool is designed for use in Outlook 2000 and later and the operating systems that support each respective Outlook version. The tool provides a quick

More information

Linux Development Environment Description Based on VirtualBox Structure

Linux Development Environment Description Based on VirtualBox Structure Linux Development Environment Description Based on VirtualBox Structure V1.0 1 VirtualBox is open source virtual machine software. It mainly has three advantages: (1) Free (2) compact (3) powerful. At

More information

Managing Files. On a PC, after you find your file, right click it and selet Rename from the pop-up menu.

Managing Files. On a PC, after you find your file, right click it and selet Rename from the pop-up menu. Managing Files File Types, Renaming Files The software you are using will automatically save your file as the type that applies to your current application. For Microsoft Word documents, for example, will

More information

Upgrading from Windows XP to Windows 7

Upgrading from Windows XP to Windows 7 Upgrading your PC from Windows XP to Windows 7 requires a custom installation which doesn't preserve your programs, files, or settings. It s sometimes called a clean installation for that reason. A custom

More information

Crystal Practice Management Encrypting the Database

Crystal Practice Management Encrypting the Database Crystal Practice Management Encrypting the Database www.crystalpm.com 2013 Contents Overview... 1 Level of Encryption... 1 Why encrypt your Crystal Practice Management data?... 1 How to encrypt the database...

More information

Keystone 600N5 SERVER and STAND-ALONE INSTALLATION INSTRUCTIONS

Keystone 600N5 SERVER and STAND-ALONE INSTALLATION INSTRUCTIONS The following instructions are required for installation of Best Access System s Keystone 600N5 (KS600N) network key control software for the server side. Please see the system requirements on the Keystone

More information

Symantec Backup Exec Desktop Laptop Option ( DLO )

Symantec Backup Exec Desktop Laptop Option ( DLO ) The following is a short description of our backup software: BACKUP-EXEC-DLO. We have set many of the parameters for you but, if necessary, these parameters can be changed. Symantec Backup Exec Desktop

More information

User guide. Business Email

User guide. Business Email User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook

More information

Acceptable Encryption Usage for UTHSC

Acceptable Encryption Usage for UTHSC This document explains the acceptable use of encryption for the UTHSC system. It includes: acceptable encryption software, techniques, algorithms and instructions. Encryption methods and software are arranged

More information

WebDisk Essentials How to Post & Retrieve Files From Your Own Online Storage Area

WebDisk Essentials How to Post & Retrieve Files From Your Own Online Storage Area WebDisk Essentials How to Post & Retrieve Files From Your Own Online Storage Area OTS PUBLICATION: WD2 REVISED 1-20-2012 TRAINING@TOWSON.EDU OFFICE OF TECHNOLOGY SERVICES =Shortcut =Advice =Caution What

More information

XConsole GUI setup communication manual September 2010.

XConsole GUI setup communication manual September 2010. XConsole GUI setup communication manual September 2010. XConsole is compatible with Microsoft XP, Vista and Windows 7. The software will also work if using Boot camp on a Mac. IMPORTANT NOTES: - Do NOT

More information

PGP Desktop Email Quick Start Guide version 9.6

PGP Desktop Email Quick Start Guide version 9.6 What is PGP Desktop Email? PGP Desktop Email is part of the PGP Desktop family of products. You can use PGP Desktop Email to: Automatically and transparently encrypt, sign, decrypt, and verify email messages

More information

Clickfree Software User Guide

Clickfree Software User Guide Clickfree Software User Guide Last Revised: Nov 2, 2011 Clickfree_backup_software_user_guide_v1.0 Clickfree and the Clickfree logo are trademarks or registered trademarks of Storage Appliance Corporation.

More information

Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide

Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide Symantec Backup Exec 12.5 for Windows Servers Quick Installation Guide 13897290 Installing Backup Exec This document includes the following topics: System requirements Before you install About the Backup

More information

User s Manual. Transcend JetFlash SecureDrive. Contents

User s Manual. Transcend JetFlash SecureDrive. Contents User s Manual Transcend JetFlash SecureDrive Thank you for purchasing Transcend s USB Flash drive with built-in 256-bit AES encryption security. JetFlash SecureDrive helps you safeguard data by creating

More information

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,

More information

Guide how to protect your private data with Rohos Disk Encryption

Guide how to protect your private data with Rohos Disk Encryption Guide how to protect your private data with Rohos Disk Encryption 1 Content 1. Encrypt USB drive - Portable Application 2. Encrypt HDD 3. Hide folder 4. Have USB Key for access control 5. Rohos disk options

More information

Simple Computer Backup

Simple Computer Backup Title: Simple Computer Backup (Win 7 and 8) Author: Nancy DeMarte Date Created: 11/10/13 Date(s) Revised: 1/20/15 Simple Computer Backup This tutorial includes these methods of backing up your PC files:

More information

GIAC Introduction to Security Fundamentals. Laptop and External Drive Configuration Guide Version 1.2 SEC301

GIAC Introduction to Security Fundamentals. Laptop and External Drive Configuration Guide Version 1.2 SEC301 GIAC Introduction to Security Fundamentals Laptop and External Drive Configuration Guide Version 1.2 SEC301 SEC301 - Hands-on Exercises Addendum Page 1 Table of Contents Background... 3 Ensure that the

More information

System update procedure for Kurio 7 (For build number above 110)

System update procedure for Kurio 7 (For build number above 110) System update procedure for Kurio 7 (For build number above 110) IMPORTANT NOTE: Before starting the procedure, please check your current Android build number, that can be found as follows: exit the Kurio

More information

Figure 1: Restore Tab

Figure 1: Restore Tab Apptix Online Backup by Mozy Restore How do I restore my data? There are five ways of restoring your data: 1) Performing a Restore Using the Restore Tab You can restore files from the Apptix Online Backup

More information

For Mac User Directions, see page 5

For Mac User Directions, see page 5 Windows Vista, Windows 7, and Windows XP with Service Pack 3 Remote Desktop Access For Mac User Directions, see page 5 This instruction allows district staff and students to access the Commack UFSD network

More information

Installing the Virtual Desktop Application (MAC)

Installing the Virtual Desktop Application (MAC) Installing the Virtual Desktop Application (MAC) The folowing instructions will guide you through the process of installing the components necessary to connect in to the NEL B Virtual Desktop environment

More information

IsItUp Quick Start Manual

IsItUp Quick Start Manual IsItUp - When you need to know the status of your network Taro Software Inc. Website: www.tarosoft.com Telephone: 703-405-4697 Postal address: 8829 110th Lane, Seminole Fl, 33772 Electronic mail: Contact1@tarosoft.com

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Managing documents, files and folders

Managing documents, files and folders Managing documents, files and folders Your computer puts information at your fingertips. Over time, however, you might have so many files that it can be difficult to find the specific file you need. Without

More information

Home and Shared Folders on Windows Accessing Home and Shared Folders on Active Directory File Servers Using Windows

Home and Shared Folders on Windows Accessing Home and Shared Folders on Active Directory File Servers Using Windows Overview Home and Shared Folders on Windows Accessing Home and Shared Folders on Active Directory File Servers Using Windows Ithaca College provides network file sharing for all faculty members, all staff

More information

QUICK START GUIDE EDI Claims Link for Windows version 3.1

QUICK START GUIDE EDI Claims Link for Windows version 3.1 QUICK START GUIDE EDI Claims Link for Windows version 3.1 System Requirements - Operating system: Windows 98 or later - Computer/Processor: Pentium 2, 233 MHz or greater - Memory: 64MB Ram - Initial application

More information

Working with Online CBS Clients

Working with Online CBS Clients ACCOUNTANT S ASSISTANT Working with Online CBS Clients version 2010.x.x TL 22280 (4/28/10) Copyright Information Text copyright 1998-2010 by Thomson Reuters/Tax & Accounting. All rights reserved. Video

More information